last executing test programs: 1m6.039187495s ago: executing program 3 (id=2933): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="00010000", @ANYRES16=0x0, @ANYBLOB="000326bd7000fcdbdf2503000000790008805b4f2525b2dc3a73ec37e7122e6f0d55382854d419b883b7ed64bd3c7b9fb15273e787030718751e0a22cc6cabcae114aa6448d0356183e1ca7c01536c5c6f37915b26a3e75515ab02807fe932b8a415a581dcdc7800f91e231c001d800400d3800c002000f3000000002b3c0c7e9b52baf56fe40000000008008c00ac1414aa000000700002806a00e400addd3588300c750bd8c6341eedf20d260a37a63d761fd730c00d02e9ba0a478e7a2f6629a6ad62011d9ab5dc40c92828"], 0x100}, 0x1, 0x0, 0x0, 0x8000}, 0x42) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x15) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1000"], 0x1ac}, 0x1, 0x0, 0x0, 0x22004840}, 0x4001) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 1m5.375530944s ago: executing program 3 (id=2935): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="02002cbd7000fedbdf2502000000080003008000400008001d"], 0x24}, 0x1, 0x0, 0x0, 0x20008010}, 0x400d0) sendmsg$auto_CGROUPSTATS_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="13000000", @ANYRES16=0x0, @ANYBLOB="2586f2bd7000fedbdf2504"], 0x1c}, 0x1, 0x0, 0x0, 0x400c9d0}, 0x4080) r0 = socket(0x10, 0x2, 0x14) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000002fc0)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000a14"], 0x14}, 0x1, 0x0, 0x0, 0x80c3}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB='r'], 0x1ac}, 0x1, 0x0, 0x0, 0x40}, 0x200440c0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x4c084}, 0x51) sendmmsg$auto(r0, &(0x7f0000000080)={{0x0, 0x8001c01, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x7}, 0x3d55, 0x0) 1m4.506221913s ago: executing program 3 (id=2938): openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/security/tomoyo/manager\x00', 0x2, 0x0) pidfd_open$auto(0x1, 0x0) openat$auto_qrtr_tun_ops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/cuse\x00', 0x1842, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system/cpu/cpu0/hotplug/target\x00', 0x201, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) close_range$auto(0xffffffffffffffff, 0xffffffffffffffff, 0x2) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x4, 0x15f4da0a, 0x1, 0x3, 0x0, 0x80000001, 0x7, 0x6d39, 0x5, 0x2, 0x1]}, 0x0) 1m4.126400053s ago: executing program 3 (id=2941): close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x3, 0x6) lsm_list_modules$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x401c5820, 0x0) mkdir$auto(0x0, 0x353) 1m3.754529699s ago: executing program 3 (id=2943): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) mbind$auto(0x2000, 0x100000004, 0x100000000, 0x0, 0x5, 0x2) getpeername$auto(0x3, 0x0, 0x0) 1m0.157279551s ago: executing program 3 (id=2962): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) mmap$auto(0x0, 0x400008, 0x1000df, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) mmap$auto(0x4, 0x2020009, 0x9, 0xeb1, 0xffffffffffffffff, 0x8000) msync$auto(0x0, 0xe0, 0x6) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) 59.322850172s ago: executing program 32 (id=2962): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) mmap$auto(0x0, 0x400008, 0x1000df, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) mmap$auto(0x4, 0x2020009, 0x9, 0xeb1, 0xffffffffffffffff, 0x8000) msync$auto(0x0, 0xe0, 0x6) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) 11.794506111s ago: executing program 2 (id=3198): openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0x8, 0x0) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f00000002c0), 0x100, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) 11.200805924s ago: executing program 2 (id=3203): sendmsg$auto_NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x31df4f184fd6d27d}, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000080)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x4000000000007, 0xa505}, 0x800}, 0x4, 0x4008) r0 = socket(0x29, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}, 0x1, 0x0, 0x0, 0x2000}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x13}, 0x803}, 0xfffffff9, 0x10, 0x0) ioctl$auto(r0, 0x89f3, 0x24) 10.746764335s ago: executing program 0 (id=3207): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000229bd70090000004a0003000000000008"], 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0xc0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) r0 = syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$auto_BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="8b632abd7000fedbdf250a"], 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x40000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="18"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c03, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 10.402396911s ago: executing program 1 (id=3209): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x15) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1300"], 0x1ac}}, 0x4004) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 10.197890221s ago: executing program 4 (id=3210): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x742, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) fallocate$auto(0x8000000000000003, 0x0, 0xd, 0xcbd5d) memfd_secret$auto(0x0) pipe2$auto(0x0, 0x80) sendfile$auto(0x6, 0x3, 0x0, 0xc01) 10.165434976s ago: executing program 0 (id=3211): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x42, 0x0) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24040004}, 0x800) openat$auto_proc_loginuid_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/loginuid\x00', 0x309c02, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/irq/9/smp_affinity\x00', 0x129542, 0x0) read$auto(0x3, 0x0, 0x7) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7111}, 0xc) 9.60649698s ago: executing program 1 (id=3212): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)) getdents$auto(r0, 0x0, 0xfff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x8000, 0x0) madvise$auto(0x0, 0x8, 0x15) write$auto_proc_reg_file_ops_compat_inode(0xffffffffffffffff, 0x0, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) 9.456872264s ago: executing program 4 (id=3213): socket$nl_generic(0x10, 0x3, 0x10) openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x82042, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) timer_create$auto(0x9, 0x0, 0x0) timer_settime$auto(0x0, 0x9, &(0x7f00000000c0)={{0x400000000f, 0x10007}, {0x9}}, 0x0) timer_gettime$auto(0x0, 0x0) socket(0x2b, 0x1, 0x1) setsockopt$auto(0x5, 0x1, 0x4b, 0x0, 0x9) 9.415739913s ago: executing program 0 (id=3214): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xa0440, 0x0) adjtimex$auto(&(0x7f00000004c0)={0xf332b6c, 0x0, 0x0, 0xfffffffffffffffd, 0x4ea, 0x1, 0x6, 0x0, 0x1, 0x0, 0x8, {0x100000000, 0x10000}, 0x5, 0x6, 0xfffffffffffffffd, 0x6, 0x0, 0x80000004, 0x81, 0xffffffffffff628e, 0xa747, 0xdeb1, 0x804}) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0xc0282, 0x0) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video0\x00', 0x0, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) select$auto(0x6, 0x0, 0x0, &(0x7f00000002c0)={[0x1fc, 0x200000000807, 0xd, 0x1, 0x948b, 0x3, 0x7f, 0x3, 0x3, 0x9, 0x4, 0x5, 0x6d3f, 0x9, 0x9, 0xfffffffffffffffd]}, 0x0) 9.346514043s ago: executing program 2 (id=3215): r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sg0\x00', 0x8402, 0x0) ioctl$auto_SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)="ec") mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x3fd, 0x8000) io_uring_setup$auto(0x6, 0x0) read$auto(0x3, 0x0, 0x80) close_range$auto(0x2, 0x8000, 0x0) io_uring_setup$auto(0x6, 0x0) open(0x0, 0x22240, 0x155) 9.233422716s ago: executing program 1 (id=3216): mmap$auto(0x0, 0x9, 0x400000072, 0x8b72, 0x1000000002, 0x8000) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp1\x00', 0x201, 0x0) r0 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(r0, r0, 0x0) r1 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video24\x00', 0xa240, 0x0) ioctl$auto(r1, 0xc0585611, r1) 8.71618099s ago: executing program 4 (id=3217): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) syz_clone(0x4200, 0x0, 0x0, 0x0, 0x0, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) bpf$auto(0x0, &(0x7f00000001c0)=@task_fd_query={0x9, 0x21eb, 0x7ff, 0x6, 0xa, 0x1000009, 0x5f, 0x0, 0x3}, 0x6f3) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_coredump_filter_operations_base(0xffffffffffffff9c, &(0x7f0000000140), 0x141002, 0x0) readv$auto(0x3, &(0x7f00000002c0)={0x0, 0x8}, 0x8) 8.434477887s ago: executing program 1 (id=3218): mmap$auto(0x0, 0x2a, 0xdf, 0x9b72, 0x1000, 0x28000) close_range$auto(0x2, 0x8, 0x0) openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/psaux\x00', 0x2, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/udp_early_demux\x00', 0x28802, 0x0) setresgid$auto(0x81, 0x800000a0, 0x8) setgroups$auto(0xc00000000, 0xfffffffffffffffc) setresuid$auto(0x0, 0x8, 0x8000) read$auto(0x3, 0x0, 0x80) 8.331989103s ago: executing program 0 (id=3219): mmap$auto(0x0, 0x2000b, 0x4, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/zswap/parameters/compressor\x00', 0x80002, 0x0) write$auto_ocfs2_control_fops_stack_user(r0, &(0x7f0000003900)='\t', 0x1) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/sunrpc/parameters/pool_mode\x00', 0x80302, 0x0) sendfile$auto(r1, r1, 0x0, 0x43) write$auto(0x3, 0x0, 0xfdf3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) 8.147142685s ago: executing program 2 (id=3220): close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) r0 = socket(0xa, 0x2, 0x3a) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x2, 0x0) socket(0xa, 0x801, 0x106) setsockopt$auto(r0, 0x29, 0x4b, &(0x7f00000000c0)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\x1e\x1b\xc3 \xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\x91_\vBj\x0eQ\xce\x16\'C\x8c\x01\x80\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\x00\x00\x00\x00\xe4\xa5\xfe\xb5', 0x10000110) bind$auto(0x3, &(0x7f0000000040)=@generic={0xa, "02d0ac0c00e435826339c7328903"}, 0x6a) 8.042451649s ago: executing program 1 (id=3221): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socketpair$auto(0x1, 0x6, 0x8000000000000000, 0x0) socket(0x10, 0x3, 0x4000c) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$auto_OVS_FLOW_CMD_GET(0xffffffffffffffff, 0x0, 0x800) syz_clone(0x20300000, 0x0, 0x0, 0x0, 0x0, 0x0) futex$auto(0x0, 0x8d, 0x0, 0x0, 0x0, 0x100) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) 7.98189026s ago: executing program 4 (id=3222): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x2) open(&(0x7f0000000040)='./file0\x00', 0x149443, 0x0) socket(0x22, 0x2, 0x1) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/wakeup/wakeup8/expire_count\x00', 0x0, 0x0) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000001280)='/sys/kernel/security/tomoyo/profile\x00', 0x20002, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) read$auto(0x3, 0x0, 0x8080) 7.639980301s ago: executing program 4 (id=3223): mmap$auto(0x0, 0x9, 0x3ff57696, 0x9b72, 0x2, 0x8000000000008000) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyra\x00', 0x48140, 0x0) readv$auto(r0, &(0x7f00000000c0)={0x0, 0x5}, 0x3) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) bpf$auto(0x0, 0x0, 0x10) openat$auto_uinput_fops_uinput(0xffffffffffffff9c, 0x0, 0x8081, 0x0) 7.474475637s ago: executing program 0 (id=3224): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) write$auto_drm_edid_fops_drm_debugfs(0xffffffffffffffff, &(0x7f00000015c0)="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", 0x319) close_range$auto(0x2, 0x8, 0x0) memfd_create$auto(0x0, 0x7) socketpair$auto(0x21, 0x7, 0x1, 0x0) socket(0xa, 0x2, 0x3a) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "abe6de3d6468fe8000"}, 0x55) 7.269328764s ago: executing program 2 (id=3225): mmap$auto(0x0, 0x5, 0x2, 0x40eb2, 0x401, 0x300000000000) close_range$auto(0x2, 0x8, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sda\x00', 0x2c201, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) pipe$auto(0x0) dup2$auto(0x5, 0x4) splice$auto(0x4, 0x0, 0x2, 0x0, 0x80004001, 0x9) write$auto(0x6, 0x0, 0x100000001) 7.219856548s ago: executing program 4 (id=3226): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x15) setreuid$auto(0x0, 0x20000000004) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1000af"], 0x1ac}, 0x1, 0x0, 0x0, 0x22004840}, 0x4001) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 7.078450768s ago: executing program 1 (id=3227): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0xa, 0x2, 0x88) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) r0 = openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x8a403, 0x0) ioctl$auto_IOCTL_VMCI_VERSION2(r0, 0x7a7, 0x0) prctl$auto_PR_GET_TSC(0x19, 0x7, 0x0, 0x0, 0xe) ioctl$auto_IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, 0x6) ioctl$auto_IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, 0x0) 6.800491225s ago: executing program 0 (id=3228): close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) r0 = socket(0xa, 0x1, 0x84) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) io_uring_setup$auto(0x6, 0x0) setsockopt$auto(0x3, 0x10000000084, 0x81, 0x0, 0x8) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) getsockopt$auto(r0, 0x84, 0x16, 0x0, 0x0) 0s ago: executing program 2 (id=3229): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$auto(0x3, 0x0, 0x80) write$auto(0xffffffffffffffff, 0x0, 0x9) setsockopt$auto(0xffffffffffffffff, 0x107, 0x17, 0x0, 0x28) openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, 0x0, 0x405c3, 0x0) semctl$auto(0x4, 0xff, 0x1, 0x234f) kernel console output (not intermixed with test programs): tes in process `syz.1.2642'. [ 441.548555][T12555] syz.1.2643 (12555) used greatest stack depth: 19800 bytes left [ 441.565484][T12560] zero sized request [ 443.236259][T12590] netlink: 'syz.2.2657': attribute type 4 has an invalid length. [ 445.177847][T12623] netlink: 'syz.0.2671': attribute type 27 has an invalid length. [ 445.220102][T12623] netlink: 334 bytes leftover after parsing attributes in process `syz.0.2671'. [ 445.299800][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 445.306315][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 445.785651][T12633] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2675'. [ 445.848408][T12633] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2675'. [ 446.212811][T12638] FAULT_INJECTION: forcing a failure. [ 446.212811][T12638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 446.323573][T12638] CPU: 1 UID: 0 PID: 12638 Comm: syz.1.2677 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 446.323600][T12638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 446.323610][T12638] Call Trace: [ 446.323617][T12638] [ 446.323624][T12638] dump_stack_lvl+0x16c/0x1f0 [ 446.323655][T12638] should_fail_ex+0x512/0x640 [ 446.323683][T12638] should_fail_alloc_page+0xe7/0x130 [ 446.323701][T12638] prepare_alloc_pages+0x3c2/0x610 [ 446.323721][T12638] ? rcu_is_watching+0x12/0xc0 [ 446.323741][T12638] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 446.323767][T12638] ? kasan_save_stack+0x42/0x60 [ 446.323795][T12638] ? __lock_acquire+0x622/0x1c90 [ 446.323826][T12638] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 446.323849][T12638] ? __lock_acquire+0x622/0x1c90 [ 446.323872][T12638] ? __asan_memcpy+0x3c/0x60 [ 446.323897][T12638] ? __pfx_interleave_nid+0x10/0x10 [ 446.323921][T12638] ? __lock_acquire+0x622/0x1c90 [ 446.323945][T12638] ? policy_nodemask+0xea/0x4e0 [ 446.323972][T12638] alloc_pages_mpol+0x1fb/0x550 [ 446.323999][T12638] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 446.324031][T12638] folio_alloc_mpol_noprof+0x36/0x2f0 [ 446.324051][T12638] vma_alloc_folio_noprof+0xed/0x1e0 [ 446.324070][T12638] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 446.324088][T12638] ? find_held_lock+0x2b/0x80 [ 446.324104][T12638] ? __handle_mm_fault+0x1092/0x5490 [ 446.324128][T12638] __handle_mm_fault+0x2f21/0x5490 [ 446.324155][T12638] ? __pfx___handle_mm_fault+0x10/0x10 [ 446.324176][T12638] ? __pte_offset_map_lock+0x174/0x310 [ 446.324193][T12638] ? find_held_lock+0x2b/0x80 [ 446.324208][T12638] ? find_held_lock+0x2b/0x80 [ 446.324229][T12638] ? follow_page_pte+0x3af/0x14c0 [ 446.324252][T12638] handle_mm_fault+0x589/0xd10 [ 446.324278][T12638] __get_user_pages+0x589/0x3b80 [ 446.324302][T12638] ? __pfx_mt_find+0x10/0x10 [ 446.324320][T12638] ? __pfx___get_user_pages+0x10/0x10 [ 446.324346][T12638] populate_vma_page_range+0x278/0x3a0 [ 446.324367][T12638] ? __pfx_populate_vma_page_range+0x10/0x10 [ 446.324385][T12638] ? __pfx_find_vma_intersection+0x10/0x10 [ 446.324404][T12638] ? do_mmap+0x69c/0x1210 [ 446.324424][T12638] __mm_populate+0x1d8/0x380 [ 446.324444][T12638] ? __pfx___mm_populate+0x10/0x10 [ 446.324465][T12638] ? up_write+0x1b2/0x520 [ 446.324490][T12638] vm_mmap_pgoff+0x362/0x450 [ 446.324509][T12638] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 446.324525][T12638] ? do_set_mempolicy+0x220/0x480 [ 446.324553][T12638] ? __x64_sys_futex+0x1e0/0x4c0 [ 446.324573][T12638] ? __x64_sys_futex+0x1e9/0x4c0 [ 446.324595][T12638] ksys_mmap_pgoff+0x7d/0x5c0 [ 446.324611][T12638] ? xfd_validate_state+0x61/0x180 [ 446.324631][T12638] ? __pfx_kernel_set_mempolicy+0x10/0x10 [ 446.324659][T12638] __x64_sys_mmap+0x125/0x190 [ 446.324683][T12638] do_syscall_64+0xcd/0x490 [ 446.324701][T12638] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 446.324718][T12638] RIP: 0033:0x7f0675d8e929 [ 446.324733][T12638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 446.324749][T12638] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 446.324765][T12638] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 446.324776][T12638] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 446.324785][T12638] RBP: 00007f0675e10b39 R08: 0000000000000002 R09: 0000000000008000 [ 446.324795][T12638] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 446.324812][T12638] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 446.324834][T12638] [ 447.079748][T12641] raw_sendmsg: syz.3.2674 forgot to set AF_INET. Fix it! [ 447.488971][T12644] netlink: 'syz.2.2680': attribute type 4 has an invalid length. [ 447.794428][T12649] bridge0: port 3(netdevsim1) entered blocking state [ 447.802584][T12649] bridge0: port 3(netdevsim1) entered disabled state [ 447.926877][T12649] netdevsim netdevsim0 netdevsim1: entered allmulticast mode [ 448.005392][T12649] netdevsim netdevsim0 netdevsim1: entered promiscuous mode [ 448.080218][T12649] bridge0: port 3(netdevsim1) entered blocking state [ 448.087037][T12649] bridge0: port 3(netdevsim1) entered forwarding state [ 448.597132][ T30] audit: type=1800 audit(4294967477.890:14): pid=12658 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.2684" name="dbroot" dev="configfs" ino=47527 res=0 errno=0 [ 449.208327][T12662] netlink: 338 bytes leftover after parsing attributes in process `syz.0.2686'. [ 449.386305][T12662] bridge0: entered promiscuous mode [ 449.990958][T12668] netlink: 338 bytes leftover after parsing attributes in process `syz.2.2688'. [ 450.197866][T12668] IPv6: NLM_F_CREATE should be specified when creating new route [ 452.289189][T12691] netlink: 146 bytes leftover after parsing attributes in process `syz.0.2696'. [ 454.774062][T12730] : renamed from gre0 (while UP) [ 455.698707][T12737] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2711'. [ 456.098894][T12747] netlink: 330 bytes leftover after parsing attributes in process `syz.3.2715'. [ 456.401460][T12752] FAULT_INJECTION: forcing a failure. [ 456.401460][T12752] name failslab, interval 1, probability 0, space 0, times 0 [ 456.496058][T12752] CPU: 1 UID: 0 PID: 12752 Comm: syz.1.2717 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 456.496087][T12752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 456.496097][T12752] Call Trace: [ 456.496104][T12752] [ 456.496111][T12752] dump_stack_lvl+0x16c/0x1f0 [ 456.496142][T12752] should_fail_ex+0x512/0x640 [ 456.496167][T12752] ? __kmalloc_node_track_caller_noprof+0xc3/0x510 [ 456.496196][T12752] should_failslab+0xc2/0x120 [ 456.496212][T12752] __kmalloc_node_track_caller_noprof+0xd6/0x510 [ 456.496238][T12752] ? proc_create_reg+0xe3/0x180 [ 456.496253][T12752] ? fib_notifier_ops_register+0x32/0x270 [ 456.496272][T12752] ? __pfx_ipmr_net_init+0x10/0x10 [ 456.496293][T12752] kmemdup_noprof+0x29/0x60 [ 456.496318][T12752] fib_notifier_ops_register+0x32/0x270 [ 456.496336][T12752] ? __pfx_ipmr_net_init+0x10/0x10 [ 456.496354][T12752] ipmr_net_init+0x57/0x4e0 [ 456.496374][T12752] ? __pfx_ipmr_net_init+0x10/0x10 [ 456.496392][T12752] ops_init+0x1e2/0x5f0 [ 456.496412][T12752] setup_net+0x1ff/0x510 [ 456.496428][T12752] ? lockdep_init_map_type+0x5c/0x280 [ 456.496451][T12752] ? __pfx_setup_net+0x10/0x10 [ 456.496469][T12752] ? debug_mutex_init+0x37/0x70 [ 456.496487][T12752] copy_net_ns+0x2a6/0x5f0 [ 456.496509][T12752] create_new_namespaces+0x3ea/0xa90 [ 456.496532][T12752] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 456.496552][T12752] ksys_unshare+0x45b/0xa40 [ 456.496573][T12752] ? __pfx_ksys_unshare+0x10/0x10 [ 456.496595][T12752] ? xfd_validate_state+0x61/0x180 [ 456.496623][T12752] __x64_sys_unshare+0x31/0x40 [ 456.496644][T12752] do_syscall_64+0xcd/0x490 [ 456.496661][T12752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.496678][T12752] RIP: 0033:0x7f0675d8e929 [ 456.496692][T12752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.496708][T12752] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 456.496724][T12752] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 456.496735][T12752] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 456.496745][T12752] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 456.496755][T12752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 456.496765][T12752] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 456.496786][T12752] [ 458.669082][T12775] netlink: 'syz.1.2726': attribute type 27 has an invalid length. [ 458.705978][T12775] netlink: 334 bytes leftover after parsing attributes in process `syz.1.2726'. [ 459.687248][T12776] Process accounting resumed [ 460.410862][T12799] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2735'. [ 461.275411][T12809] fanotify: failed to encode fid (type=0, len=0, err=-2) [ 461.584849][T12814] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2741'. [ 462.500924][T12827] Process accounting paused [ 463.763850][T12845] netlink: 350 bytes leftover after parsing attributes in process `syz.2.2751'. [ 464.453530][T12856] mkiss: ax0: crc mode is auto. [ 464.600034][T12860] netlink: 326 bytes leftover after parsing attributes in process `syz.2.2757'. [ 465.778753][T12875] ima: policy update failed [ 465.853676][ T30] audit: type=1802 audit(4294967504.135:15): pid=12875 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.1.2763" res=0 errno=0 [ 465.916414][T12462] Bluetooth: hci0: unexpected event 0x05 length: 440 > 4 [ 466.513980][T12887] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2767'. [ 467.051607][T12895] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2771'. [ 467.165493][T12898] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2772'. [ 467.238628][T12900] netlink: 17 bytes leftover after parsing attributes in process `syz.3.2774'. [ 469.360900][T12931] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2785'. [ 470.586422][T12946] futex_wake_op: syz.1.2789 tries to shift op by -9; fix this program [ 472.760613][T12963] netlink: 334 bytes leftover after parsing attributes in process `syz.1.2798'. [ 473.395294][T12974] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2803'. [ 473.832003][T12978] FAULT_INJECTION: forcing a failure. [ 473.832003][T12978] name failslab, interval 1, probability 0, space 0, times 0 [ 473.927028][T12978] CPU: 1 UID: 0 PID: 12978 Comm: syz.1.2804 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 473.927062][T12978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 473.927073][T12978] Call Trace: [ 473.927079][T12978] [ 473.927092][T12978] dump_stack_lvl+0x16c/0x1f0 [ 473.927124][T12978] should_fail_ex+0x512/0x640 [ 473.927149][T12978] ? __kmalloc_noprof+0xbf/0x510 [ 473.927175][T12978] ? memcg_list_lru_alloc+0x4e9/0x740 [ 473.927197][T12978] should_failslab+0xc2/0x120 [ 473.927213][T12978] __kmalloc_noprof+0xd2/0x510 [ 473.927236][T12978] ? __lock_acquire+0x622/0x1c90 [ 473.927262][T12978] memcg_list_lru_alloc+0x4e9/0x740 [ 473.927292][T12978] ? __pfx_memcg_list_lru_alloc+0x10/0x10 [ 473.927323][T12978] ? get_mem_cgroup_from_objcg+0xd3/0x330 [ 473.927348][T12978] __memcg_slab_post_alloc_hook+0x133/0x960 [ 473.927370][T12978] ? kasan_save_track+0x14/0x30 [ 473.927395][T12978] kmem_cache_alloc_lru_noprof+0x30f/0x3b0 [ 473.927420][T12978] ? __d_alloc+0x31/0xaa0 [ 473.927453][T12978] __d_alloc+0x31/0xaa0 [ 473.927480][T12978] d_alloc_pseudo+0x1c/0xc0 [ 473.927498][T12978] alloc_file_pseudo+0xcf/0x230 [ 473.927517][T12978] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 473.927541][T12978] ioctx_alloc+0x5ab/0x2120 [ 473.927570][T12978] ? find_held_lock+0x2b/0x80 [ 473.927586][T12978] ? __pfx_ioctx_alloc+0x10/0x10 [ 473.927605][T12978] ? __might_fault+0x13b/0x190 [ 473.927634][T12978] __x64_sys_io_setup+0xc9/0x210 [ 473.927657][T12978] do_syscall_64+0xcd/0x490 [ 473.927675][T12978] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.927694][T12978] RIP: 0033:0x7f0675d8e929 [ 473.927708][T12978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.927724][T12978] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 473.927741][T12978] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 473.927752][T12978] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 000000000000ffff [ 473.927762][T12978] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 473.927773][T12978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 473.927782][T12978] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 473.927804][T12978] [ 474.176832][T12982] FAULT_INJECTION: forcing a failure. [ 474.176832][T12982] name failslab, interval 1, probability 0, space 0, times 0 [ 474.189549][T12982] CPU: 1 UID: 0 PID: 12982 Comm: syz.3.2806 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 474.189575][T12982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 474.189586][T12982] Call Trace: [ 474.189595][T12982] [ 474.189603][T12982] dump_stack_lvl+0x16c/0x1f0 [ 474.189633][T12982] should_fail_ex+0x512/0x640 [ 474.189658][T12982] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 474.189683][T12982] should_failslab+0xc2/0x120 [ 474.189707][T12982] __kmalloc_cache_noprof+0x6a/0x3e0 [ 474.189728][T12982] ? __lock_acquire+0xb8a/0x1c90 [ 474.189749][T12982] ? snd_timer_instance_new+0x47/0x2e0 [ 474.189771][T12982] snd_timer_instance_new+0x47/0x2e0 [ 474.189790][T12982] snd_seq_timer_open+0x1cc/0x5e0 [ 474.189817][T12982] ? __pfx_snd_seq_timer_open+0x10/0x10 [ 474.189844][T12982] ? find_held_lock+0x2b/0x80 [ 474.189863][T12982] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 474.189886][T12982] ? lockdep_hardirqs_on+0x7c/0x110 [ 474.189910][T12982] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 474.189936][T12982] queue_use+0xe3/0x250 [ 474.189956][T12982] snd_seq_queue_alloc+0x2e5/0x550 [ 474.189981][T12982] snd_seq_ioctl_create_queue+0xa9/0x380 [ 474.190008][T12982] snd_seq_kernel_client_ctl+0x10a/0x1c0 [ 474.190028][T12982] alloc_seq_queue+0xda/0x180 [ 474.190046][T12982] ? __pfx_alloc_seq_queue+0x10/0x10 [ 474.190076][T12982] ? mark_held_locks+0x49/0x80 [ 474.190096][T12982] ? _raw_spin_unlock_irq+0x23/0x50 [ 474.190120][T12982] snd_seq_oss_open+0x38c/0xa20 [ 474.190142][T12982] odev_open+0x6f/0x90 [ 474.190156][T12982] ? __pfx_odev_open+0x10/0x10 [ 474.190171][T12982] soundcore_open+0x40c/0x580 [ 474.190189][T12982] ? __pfx_soundcore_open+0x10/0x10 [ 474.190204][T12982] chrdev_open+0x234/0x6a0 [ 474.190228][T12982] ? __pfx_apparmor_file_open+0x10/0x10 [ 474.190249][T12982] ? __pfx_chrdev_open+0x10/0x10 [ 474.190275][T12982] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 474.190300][T12982] do_dentry_open+0x741/0x1c10 [ 474.190324][T12982] ? __pfx_chrdev_open+0x10/0x10 [ 474.190353][T12982] vfs_open+0x82/0x3f0 [ 474.190373][T12982] path_openat+0x1de4/0x2cb0 [ 474.190403][T12982] ? __pfx_path_openat+0x10/0x10 [ 474.190427][T12982] ? __lock_acquire+0xb8a/0x1c90 [ 474.190451][T12982] do_filp_open+0x20b/0x470 [ 474.190475][T12982] ? __pfx_do_filp_open+0x10/0x10 [ 474.190514][T12982] ? alloc_fd+0x471/0x7d0 [ 474.190542][T12982] do_sys_openat2+0x11b/0x1d0 [ 474.190560][T12982] ? __pfx_do_sys_openat2+0x10/0x10 [ 474.190587][T12982] __x64_sys_openat+0x174/0x210 [ 474.190605][T12982] ? __pfx___x64_sys_openat+0x10/0x10 [ 474.190633][T12982] do_syscall_64+0xcd/0x490 [ 474.190650][T12982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 474.190668][T12982] RIP: 0033:0x7f2ea098e929 [ 474.190684][T12982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 474.190706][T12982] RSP: 002b:00007f2ea174c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 474.190723][T12982] RAX: ffffffffffffffda RBX: 00007f2ea0bb5fa0 RCX: 00007f2ea098e929 [ 474.190733][T12982] RDX: 0000000000000080 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 474.190744][T12982] RBP: 00007f2ea0a10b39 R08: 0000000000000000 R09: 0000000000000000 [ 474.190754][T12982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 474.190764][T12982] R13: 0000000000000000 R14: 00007f2ea0bb5fa0 R15: 00007ffd21f309d8 [ 474.190787][T12982] [ 475.512980][T12991] netlink: 330 bytes leftover after parsing attributes in process `syz.3.2810'. [ 475.976583][T13000] netlink: 'syz.3.2813': attribute type 16 has an invalid length. [ 476.123986][T13000] netlink: 306 bytes leftover after parsing attributes in process `syz.3.2813'. [ 476.449542][T12462] Bluetooth: hci1: unexpected event 0x3e length: 508 > 260 [ 476.449571][T12462] Bluetooth: hci1: unexpected subevent 0x02 length: 507 > 260 [ 476.464865][T12462] Bluetooth: hci1: Dropping invalid advertising data [ 476.472853][T12462] Bluetooth: hci1: unknown advertising packet type: 0xe9 [ 476.472875][T12462] Bluetooth: hci1: Dropping invalid advertising data [ 476.492811][T12462] Bluetooth: hci1: Malformed LE Event: 0x02 [ 476.559294][T13008] netlink: 266 bytes leftover after parsing attributes in process `syz.1.2816'. [ 476.641576][T13008] IPv6: NLM_F_CREATE should be specified when creating new route [ 477.190230][T13019] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2821'. [ 480.067880][T13053] FAULT_INJECTION: forcing a failure. [ 480.067880][T13053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.288426][T13053] CPU: 1 UID: 0 PID: 13053 Comm: syz.0.2831 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 480.288455][T13053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 480.288465][T13053] Call Trace: [ 480.288472][T13053] [ 480.288480][T13053] dump_stack_lvl+0x16c/0x1f0 [ 480.288511][T13053] should_fail_ex+0x512/0x640 [ 480.288539][T13053] should_fail_alloc_page+0xe7/0x130 [ 480.288557][T13053] prepare_alloc_pages+0x3c2/0x610 [ 480.288576][T13053] ? rcu_is_watching+0x12/0xc0 [ 480.288596][T13053] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 480.288625][T13053] ? rcu_is_watching+0x12/0xc0 [ 480.288641][T13053] ? trace_mm_page_alloc+0x11f/0x1a0 [ 480.288659][T13053] ? __alloc_frozen_pages_noprof+0x294/0x23f0 [ 480.288683][T13053] ? lockdep_hardirqs_on+0x7c/0x110 [ 480.288707][T13053] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 480.288732][T13053] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 480.288763][T13053] ? alloc_vmap_area+0x645/0x29c0 [ 480.288780][T13053] ? __vmalloc_node_range_noprof+0x271/0x14b0 [ 480.288800][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.288819][T13053] ? do_syscall_64+0xcd/0x490 [ 480.288833][T13053] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.288859][T13053] alloc_pages_bulk_noprof+0x71c/0x1410 [ 480.288883][T13053] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 480.288909][T13053] ? policy_nodemask+0xea/0x4e0 [ 480.288945][T13053] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 480.288970][T13053] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 480.289005][T13053] kasan_populate_vmalloc+0xf1/0x1f0 [ 480.289032][T13053] alloc_vmap_area+0x959/0x29c0 [ 480.289059][T13053] ? __pfx_alloc_vmap_area+0x10/0x10 [ 480.289082][T13053] __get_vm_area_node+0x1ca/0x330 [ 480.289105][T13053] __vmalloc_node_range_noprof+0x271/0x14b0 [ 480.289126][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.289152][T13053] ? __lock_acquire+0xb8a/0x1c90 [ 480.289173][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.289198][T13053] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 480.289220][T13053] ? __alloc_pages_noprof+0xb/0x1b0 [ 480.289243][T13053] ? ___kmalloc_large_node+0x84/0x1e0 [ 480.289260][T13053] ? find_held_lock+0x2b/0x80 [ 480.289280][T13053] __kvmalloc_node_noprof+0x30a/0x620 [ 480.289303][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.289323][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.289347][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 480.289365][T13053] __do_sys_listmount+0x1c2/0xec0 [ 480.289389][T13053] ? __x64_sys_futex+0x1e0/0x4c0 [ 480.289408][T13053] ? __x64_sys_futex+0x1e9/0x4c0 [ 480.289431][T13053] ? __pfx___do_sys_listmount+0x10/0x10 [ 480.289463][T13053] do_syscall_64+0xcd/0x490 [ 480.289480][T13053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.289496][T13053] RIP: 0033:0x7f9407b8e929 [ 480.289511][T13053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.289527][T13053] RSP: 002b:00007f94089fb038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ca [ 480.289544][T13053] RAX: ffffffffffffffda RBX: 00007f9407db6080 RCX: 00007f9407b8e929 [ 480.289554][T13053] RDX: 00000000000f4240 RSI: 0000000000000000 RDI: 0000200000000100 [ 480.289565][T13053] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 480.289575][T13053] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 480.289584][T13053] R13: 0000000000000000 R14: 00007f9407db6080 R15: 00007fffae5731a8 [ 480.289606][T13053] [ 480.290429][T13053] syz.0.2831: vmalloc error: size 8000000, vm_struct allocation failed, mode:0x400cc0(GFP_KERNEL_ACCOUNT), nodemask=(null) [ 480.944357][T13057] netlink: 342 bytes leftover after parsing attributes in process `syz.3.2833'. [ 481.355396][T13063] netlink: 326 bytes leftover after parsing attributes in process `syz.3.2836'. [ 482.712280][T13053] ,cpuset=/,mems_allowed=0-1 [ 482.756560][T13053] CPU: 1 UID: 0 PID: 13053 Comm: syz.0.2831 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 482.756589][T13053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 482.756599][T13053] Call Trace: [ 482.756605][T13053] [ 482.756611][T13053] dump_stack_lvl+0x16c/0x1f0 [ 482.756642][T13053] warn_alloc+0x248/0x3a0 [ 482.756678][T13053] ? __pfx_warn_alloc+0x10/0x10 [ 482.756704][T13053] ? kfree+0x2b4/0x4d0 [ 482.756729][T13053] ? __get_vm_area_node+0x208/0x330 [ 482.756754][T13053] __vmalloc_node_range_noprof+0xb2d/0x14b0 [ 482.756781][T13053] ? __lock_acquire+0xb8a/0x1c90 [ 482.756803][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 482.756829][T13053] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 482.756852][T13053] ? __alloc_pages_noprof+0xb/0x1b0 [ 482.756876][T13053] ? ___kmalloc_large_node+0x84/0x1e0 [ 482.756894][T13053] ? find_held_lock+0x2b/0x80 [ 482.756915][T13053] __kvmalloc_node_noprof+0x30a/0x620 [ 482.756938][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 482.756960][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 482.756984][T13053] ? __do_sys_listmount+0x1c2/0xec0 [ 482.757004][T13053] __do_sys_listmount+0x1c2/0xec0 [ 482.757028][T13053] ? __x64_sys_futex+0x1e0/0x4c0 [ 482.757048][T13053] ? __x64_sys_futex+0x1e9/0x4c0 [ 482.757068][T13053] ? __pfx___do_sys_listmount+0x10/0x10 [ 482.757100][T13053] do_syscall_64+0xcd/0x490 [ 482.757118][T13053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.757136][T13053] RIP: 0033:0x7f9407b8e929 [ 482.757151][T13053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.757167][T13053] RSP: 002b:00007f94089fb038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ca [ 482.757184][T13053] RAX: ffffffffffffffda RBX: 00007f9407db6080 RCX: 00007f9407b8e929 [ 482.757195][T13053] RDX: 00000000000f4240 RSI: 0000000000000000 RDI: 0000200000000100 [ 482.757206][T13053] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 482.757216][T13053] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 482.757225][T13053] R13: 0000000000000000 R14: 00007f9407db6080 R15: 00007fffae5731a8 [ 482.757246][T13053] [ 482.757252][T13053] Mem-Info: [ 483.041174][T13079] netlink: 146 bytes leftover after parsing attributes in process `syz.1.2842'. [ 484.144498][T13053] active_anon:81405 inactive_anon:0 isolated_anon:0 [ 484.144498][T13053] active_file:18046 inactive_file:40350 isolated_file:0 [ 484.144498][T13053] unevictable:768 dirty:339 writeback:0 [ 484.144498][T13053] slab_reclaimable:11813 slab_unreclaimable:92683 [ 484.144498][T13053] mapped:37071 shmem:72777 pagetables:1308 [ 484.144498][T13053] sec_pagetables:0 bounce:0 [ 484.144498][T13053] kernel_misc_reclaimable:0 [ 484.144498][T13053] free:1253512 free_pcp:11434 free_cma:0 [ 484.286309][T13089] Â: entered promiscuous mode [ 484.458782][T13053] Node 0 active_anon:322604kB inactive_anon:0kB active_file:72184kB inactive_file:161256kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:132580kB dirty:1356kB writeback:0kB shmem:286504kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:10768kB pagetables:5136kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 484.579638][T13095] FAULT_INJECTION: forcing a failure. [ 484.579638][T13095] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 484.663924][T13095] CPU: 1 UID: 0 PID: 13095 Comm: syz.1.2848 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 484.663953][T13095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 484.663964][T13095] Call Trace: [ 484.663971][T13095] [ 484.663979][T13095] dump_stack_lvl+0x16c/0x1f0 [ 484.664010][T13095] should_fail_ex+0x512/0x640 [ 484.664038][T13095] _copy_from_user+0x2e/0xd0 [ 484.664065][T13095] ? __pfx_do_get_feature_msr+0x10/0x10 [ 484.664085][T13095] memdup_user+0x6b/0xe0 [ 484.664110][T13095] msr_io+0xea/0x2a0 [ 484.664129][T13095] ? __pfx_msr_io+0x10/0x10 [ 484.664146][T13095] ? tomoyo_path_number_perm+0x18d/0x580 [ 484.664170][T13095] kvm_arch_dev_ioctl+0x39b/0x760 [ 484.664186][T13095] ? __pfx_kvm_arch_dev_ioctl+0x10/0x10 [ 484.664203][T13095] ? do_vfs_ioctl+0x523/0x1a60 [ 484.664222][T13095] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 484.664248][T13095] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 484.664275][T13095] kvm_dev_ioctl+0x787/0x1ad0 [ 484.664304][T13095] ? find_held_lock+0x2b/0x80 [ 484.664320][T13095] ? hook_file_ioctl_common+0x145/0x410 [ 484.664338][T13095] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 484.664366][T13095] ? __fget_files+0x20e/0x3c0 [ 484.664391][T13095] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 484.664417][T13095] __x64_sys_ioctl+0x18e/0x210 [ 484.664438][T13095] do_syscall_64+0xcd/0x490 [ 484.664456][T13095] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.664473][T13095] RIP: 0033:0x7f0675d8e929 [ 484.664488][T13095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.664504][T13095] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 484.664521][T13095] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 484.664532][T13095] RDX: 0000200000000040 RSI: 00000000c008ae88 RDI: 0000000000000005 [ 484.664541][T13095] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 484.664551][T13095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 484.664561][T13095] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 484.664582][T13095] [ 485.123473][T13053] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:144kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:48kB pagetables:148kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 485.235402][T13053] Node 0 DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 485.350117][T13101] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2850'. [ 485.370088][T13053] lowmem_reserve[]: 0 2481 2482 2482 2482 [ 485.401047][T13053] Node 0 DMA32 free:1159296kB boost:0kB min:34092kB low:42612kB high:51132kB reserved_highatomic:0KB free_highatomic:0KB active_anon:247908kB inactive_anon:0kB active_file:72184kB inactive_file:159688kB unevictable:1536kB writepending:1392kB present:3129332kB managed:2540900kB mlocked:0kB bounce:0kB free_pcp:42612kB local_pcp:42612kB free_cma:0kB [ 485.437007][T13101] : renamed from gre0 [ 485.506971][T13053] lowmem_reserve[]: 0 0 1 1 1 [ 485.523434][T13053] Node 0 Normal free:20kB boost:0kB min:20kB low:24kB high:28kB reserved_highatomic:0KB free_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:1568kB unevictable:0kB writepending:0kB present:1048580kB managed:1644kB mlocked:0kB bounce:0kB free_pcp:12kB local_pcp:12kB free_cma:0kB [ 485.601935][T13105] netlink: 330 bytes leftover after parsing attributes in process `syz.3.2853'. [ 485.613248][T13053] lowmem_reserve[]: 0 0 0 0 0 [ 485.624885][T13053] Node 1 Normal free:3919444kB boost:0kB min:55788kB low:69732kB high:83676kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:144kB unevictable:1536kB writepending:0kB present:4194300kB managed:4111164kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 485.721630][T13053] lowmem_reserve[]: 0 0 0 0 0 [ 485.731238][T13053] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 485.761976][T13053] Node 0 DMA32: 3745*4kB (UME) 2004*8kB (UME) 1280*16kB (ME) 1427*32kB (UME) 818*64kB (UME) 276*128kB (UM) 204*256kB (UM) 165*512kB (UM) 85*1024kB (UM) 27*2048kB (UME) 173*4096kB (M) = 1172484kB [ 485.804751][T13053] Node 0 Normal: 1*4kB (M) 0*8kB 1*16kB (M) 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 20kB [ 485.831891][T13101] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2850'. [ 485.933515][T13053] Node 1 Normal: 207*4kB (UME) 55*8kB (UME) 32*16kB (UME) 241*32kB (UME) 111*64kB (UME) 41*128kB (UME) 13*256kB (UME) 8*512kB (UM) 3*1024kB (UME) 2*2048kB (UE) 948*4096kB (M) = 3919444kB [ 486.076780][T13053] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 486.145052][T13053] Node 0 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 486.165306][T13113] snd_aloop snd_aloop.0: Parsing timer source '' failed with -22 [ 486.204761][T13053] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 486.279619][T13053] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 486.336924][T13053] 105633 total pagecache pages [ 486.352271][T13053] 0 pages in swap cache [ 486.388624][T13053] Free swap = 124996kB [ 486.412290][T13053] Total swap = 124996kB [ 486.458850][T13053] 2097051 pages RAM [ 486.474295][T13053] 0 pages HighMem/MovableOnly [ 486.509817][T13053] 429784 pages reserved [ 486.530706][T13053] 0 pages cma reserved [ 486.932186][T13125] netlink: zone id is out of range [ 486.967261][T13125] netlink: zone id is out of range [ 487.003026][T13125] netlink: zone id is out of range [ 487.061771][T13125] netlink: zone id is out of range [ 487.089008][T13125] netlink: zone id is out of range [ 487.123199][T13125] netlink: zone id is out of range [ 487.159224][T13125] netlink: zone id is out of range [ 487.198222][T13125] netlink: zone id is out of range [ 487.228940][T13125] netlink: zone id is out of range [ 487.289644][T13125] netlink: zone id is out of range [ 487.555120][T13136] netlink: 326 bytes leftover after parsing attributes in process `syz.3.2863'. [ 487.725239][T13140] netlink: 222 bytes leftover after parsing attributes in process `syz.2.2865'. [ 487.879967][T13143] netlink: 222 bytes leftover after parsing attributes in process `syz.2.2865'. [ 491.029391][T13169] Process accounting paused [ 492.787471][T13188] Process accounting resumed [ 493.250475][T13220] program syz.3.2896 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 494.367350][T13232] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2899'. [ 494.802036][T13241] netlink: 326 bytes leftover after parsing attributes in process `syz.1.2904'. [ 496.509414][T13260] bridge0: port 3(veth0_to_bridge) entered blocking state [ 496.595243][T13260] bridge0: port 3(veth0_to_bridge) entered disabled state [ 496.647901][T13260] veth0_to_bridge: entered allmulticast mode [ 496.694797][T13260] veth0_to_bridge: entered promiscuous mode [ 496.718566][T13260] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.789659][T13262] sctp: [Deprecated]: syz.2.2911 (pid 13262) Use of struct sctp_assoc_value in delayed_ack socket option. [ 496.789659][T13262] Use struct sctp_sack_info instead [ 496.819014][T13260] bridge0: port 3(veth0_to_bridge) entered blocking state [ 496.827056][T13260] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 497.335987][T13271] FAULT_INJECTION: forcing a failure. [ 497.335987][T13271] name failslab, interval 1, probability 0, space 0, times 0 [ 497.420296][T13271] CPU: 1 UID: 0 PID: 13271 Comm: syz.1.2916 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 497.420325][T13271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 497.420337][T13271] Call Trace: [ 497.420343][T13271] [ 497.420350][T13271] dump_stack_lvl+0x16c/0x1f0 [ 497.420382][T13271] should_fail_ex+0x512/0x640 [ 497.420407][T13271] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 497.420432][T13271] should_failslab+0xc2/0x120 [ 497.420448][T13271] __kmalloc_cache_noprof+0x6a/0x3e0 [ 497.420469][T13271] ? __lock_acquire+0xb8a/0x1c90 [ 497.420490][T13271] ? snd_timer_instance_new+0x47/0x2e0 [ 497.420512][T13271] snd_timer_instance_new+0x47/0x2e0 [ 497.420531][T13271] snd_seq_timer_open+0x1cc/0x5e0 [ 497.420566][T13271] ? __pfx_snd_seq_timer_open+0x10/0x10 [ 497.420592][T13271] ? find_held_lock+0x2b/0x80 [ 497.420612][T13271] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 497.420636][T13271] ? lockdep_hardirqs_on+0x7c/0x110 [ 497.420662][T13271] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 497.420689][T13271] queue_use+0xe3/0x250 [ 497.420709][T13271] snd_seq_queue_alloc+0x2e5/0x550 [ 497.420735][T13271] snd_seq_ioctl_create_queue+0xa9/0x380 [ 497.420763][T13271] snd_seq_kernel_client_ctl+0x10a/0x1c0 [ 497.420784][T13271] alloc_seq_queue+0xda/0x180 [ 497.420801][T13271] ? __pfx_alloc_seq_queue+0x10/0x10 [ 497.420831][T13271] ? mark_held_locks+0x49/0x80 [ 497.420851][T13271] ? _raw_spin_unlock_irq+0x23/0x50 [ 497.420876][T13271] snd_seq_oss_open+0x38c/0xa20 [ 497.420897][T13271] odev_open+0x6f/0x90 [ 497.420912][T13271] ? __pfx_odev_open+0x10/0x10 [ 497.420927][T13271] soundcore_open+0x40c/0x580 [ 497.420944][T13271] ? __pfx_soundcore_open+0x10/0x10 [ 497.420960][T13271] chrdev_open+0x234/0x6a0 [ 497.420984][T13271] ? __pfx_apparmor_file_open+0x10/0x10 [ 497.421006][T13271] ? __pfx_chrdev_open+0x10/0x10 [ 497.421031][T13271] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 497.421057][T13271] do_dentry_open+0x741/0x1c10 [ 497.421081][T13271] ? __pfx_chrdev_open+0x10/0x10 [ 497.421110][T13271] vfs_open+0x82/0x3f0 [ 497.421130][T13271] path_openat+0x1de4/0x2cb0 [ 497.421160][T13271] ? __pfx_path_openat+0x10/0x10 [ 497.421185][T13271] ? __lock_acquire+0xb8a/0x1c90 [ 497.421208][T13271] do_filp_open+0x20b/0x470 [ 497.421231][T13271] ? __pfx_do_filp_open+0x10/0x10 [ 497.421270][T13271] ? alloc_fd+0x471/0x7d0 [ 497.421297][T13271] do_sys_openat2+0x11b/0x1d0 [ 497.421315][T13271] ? __pfx_do_sys_openat2+0x10/0x10 [ 497.421342][T13271] __x64_sys_openat+0x174/0x210 [ 497.421361][T13271] ? __pfx___x64_sys_openat+0x10/0x10 [ 497.421388][T13271] do_syscall_64+0xcd/0x490 [ 497.421405][T13271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 497.421423][T13271] RIP: 0033:0x7f0675d8e929 [ 497.421438][T13271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.421454][T13271] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 497.421471][T13271] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 497.421482][T13271] RDX: 0000000000000080 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 497.421492][T13271] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 497.421502][T13271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 497.421512][T13271] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 497.421534][T13271] [ 501.325766][T13306] program syz.1.2926 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 502.574305][T13319] FAULT_INJECTION: forcing a failure. [ 502.574305][T13319] name failslab, interval 1, probability 0, space 0, times 0 [ 502.776143][T13319] CPU: 1 UID: 0 PID: 13319 Comm: syz.0.2928 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 502.776172][T13319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 502.776183][T13319] Call Trace: [ 502.776189][T13319] [ 502.776197][T13319] dump_stack_lvl+0x16c/0x1f0 [ 502.776228][T13319] should_fail_ex+0x512/0x640 [ 502.776251][T13319] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 502.776276][T13319] should_failslab+0xc2/0x120 [ 502.776292][T13319] __kmalloc_cache_noprof+0x6a/0x3e0 [ 502.776313][T13319] ? __lock_acquire+0xb8a/0x1c90 [ 502.776335][T13319] ? snd_timer_instance_new+0x47/0x2e0 [ 502.776357][T13319] snd_timer_instance_new+0x47/0x2e0 [ 502.776376][T13319] snd_seq_timer_open+0x1cc/0x5e0 [ 502.776401][T13319] ? __pfx_snd_seq_timer_open+0x10/0x10 [ 502.776427][T13319] ? find_held_lock+0x2b/0x80 [ 502.776446][T13319] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 502.776469][T13319] ? lockdep_hardirqs_on+0x7c/0x110 [ 502.776494][T13319] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 502.776520][T13319] queue_use+0xe3/0x250 [ 502.776540][T13319] snd_seq_queue_alloc+0x2e5/0x550 [ 502.776565][T13319] snd_seq_ioctl_create_queue+0xa9/0x380 [ 502.776593][T13319] snd_seq_kernel_client_ctl+0x10a/0x1c0 [ 502.776614][T13319] alloc_seq_queue+0xda/0x180 [ 502.776632][T13319] ? __pfx_alloc_seq_queue+0x10/0x10 [ 502.776663][T13319] ? mark_held_locks+0x49/0x80 [ 502.776683][T13319] ? _raw_spin_unlock_irq+0x23/0x50 [ 502.776715][T13319] snd_seq_oss_open+0x38c/0xa20 [ 502.776737][T13319] odev_open+0x6f/0x90 [ 502.776752][T13319] ? __pfx_odev_open+0x10/0x10 [ 502.776767][T13319] soundcore_open+0x40c/0x580 [ 502.776786][T13319] ? __pfx_soundcore_open+0x10/0x10 [ 502.776808][T13319] chrdev_open+0x234/0x6a0 [ 502.776832][T13319] ? __pfx_apparmor_file_open+0x10/0x10 [ 502.776853][T13319] ? __pfx_chrdev_open+0x10/0x10 [ 502.776880][T13319] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 502.776906][T13319] do_dentry_open+0x741/0x1c10 [ 502.776931][T13319] ? __pfx_chrdev_open+0x10/0x10 [ 502.776961][T13319] vfs_open+0x82/0x3f0 [ 502.776981][T13319] path_openat+0x1de4/0x2cb0 [ 502.777012][T13319] ? __pfx_path_openat+0x10/0x10 [ 502.777037][T13319] ? __lock_acquire+0xb8a/0x1c90 [ 502.777173][T13319] do_filp_open+0x20b/0x470 [ 502.777237][T13319] ? __pfx_do_filp_open+0x10/0x10 [ 502.777281][T13319] ? alloc_fd+0x471/0x7d0 [ 502.777313][T13319] do_sys_openat2+0x11b/0x1d0 [ 502.777340][T13319] ? __pfx_do_sys_openat2+0x10/0x10 [ 502.777371][T13319] __x64_sys_openat+0x174/0x210 [ 502.777392][T13319] ? __pfx___x64_sys_openat+0x10/0x10 [ 502.777423][T13319] do_syscall_64+0xcd/0x490 [ 502.777444][T13319] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 502.777464][T13319] RIP: 0033:0x7f9407b8e929 [ 502.777501][T13319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.777522][T13319] RSP: 002b:00007f9408a1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 502.777541][T13319] RAX: ffffffffffffffda RBX: 00007f9407db5fa0 RCX: 00007f9407b8e929 [ 502.777553][T13319] RDX: 0000000000000080 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 502.777565][T13319] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 502.777576][T13319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 502.777587][T13319] R13: 0000000000000000 R14: 00007f9407db5fa0 R15: 00007fffae5731a8 [ 502.777612][T13319] [ 503.744817][T13325] netlink: 146 bytes leftover after parsing attributes in process `syz.3.2933'. [ 504.309839][T13333] FAULT_INJECTION: forcing a failure. [ 504.309839][T13333] name failslab, interval 1, probability 0, space 0, times 0 [ 504.444795][T13333] CPU: 1 UID: 0 PID: 13333 Comm: syz.0.2942 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 504.444823][T13333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 504.444834][T13333] Call Trace: [ 504.444841][T13333] [ 504.444848][T13333] dump_stack_lvl+0x16c/0x1f0 [ 504.444881][T13333] should_fail_ex+0x512/0x640 [ 504.444906][T13333] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 504.444933][T13333] should_failslab+0xc2/0x120 [ 504.444948][T13333] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 504.444971][T13333] ? __asan_memcpy+0x3c/0x60 [ 504.444992][T13333] ? __kernfs_new_node+0xd2/0x8e0 [ 504.445018][T13333] __kernfs_new_node+0xd2/0x8e0 [ 504.445042][T13333] ? __pfx_number+0x10/0x10 [ 504.445061][T13333] ? __pfx___kernfs_new_node+0x10/0x10 [ 504.445091][T13333] ? find_held_lock+0x2b/0x80 [ 504.445107][T13333] ? kernfs_root+0xee/0x2a0 [ 504.445134][T13333] kernfs_new_node+0x13c/0x1e0 [ 504.445163][T13333] kernfs_create_dir_ns+0x4c/0x1a0 [ 504.445191][T13333] sysfs_create_dir_ns+0x13a/0x2b0 [ 504.445213][T13333] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 504.445233][T13333] ? find_held_lock+0x2b/0x80 [ 504.445252][T13333] ? do_raw_spin_unlock+0x172/0x230 [ 504.445279][T13333] kobject_add_internal+0x2c4/0x9b0 [ 504.445300][T13333] kobject_init_and_add+0x11b/0x190 [ 504.445320][T13333] ? __pfx_kobject_init_and_add+0x10/0x10 [ 504.445337][T13333] ? __x64_sys_ioctl+0x18e/0x210 [ 504.445368][T13333] net_rx_queue_update_kobjects+0x380/0x770 [ 504.445392][T13333] ? kset_register+0x1bb/0x2b0 [ 504.445412][T13333] netdev_register_kobject+0x269/0x3a0 [ 504.445434][T13333] register_netdevice+0x13dc/0x2270 [ 504.445456][T13333] ? idr_alloc+0xdd/0x130 [ 504.445479][T13333] ? __pfx_register_netdevice+0x10/0x10 [ 504.445503][T13333] ppp_dev_configure+0x99b/0xc80 [ 504.445535][T13333] ppp_ioctl+0x17e0/0x2660 [ 504.445557][T13333] ? find_held_lock+0x2b/0x80 [ 504.445572][T13333] ? __pfx_ppp_ioctl+0x10/0x10 [ 504.445596][T13333] ? __fget_files+0x20e/0x3c0 [ 504.445621][T13333] ? __pfx_ppp_ioctl+0x10/0x10 [ 504.445642][T13333] __x64_sys_ioctl+0x18e/0x210 [ 504.445663][T13333] do_syscall_64+0xcd/0x490 [ 504.445681][T13333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.445699][T13333] RIP: 0033:0x7f9407b8e929 [ 504.445715][T13333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.445731][T13333] RSP: 002b:00007f9408a1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 504.445748][T13333] RAX: ffffffffffffffda RBX: 00007f9407db5fa0 RCX: 00007f9407b8e929 [ 504.445759][T13333] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000005 [ 504.445769][T13333] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 504.445779][T13333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 504.445794][T13333] R13: 0000000000000000 R14: 00007f9407db5fa0 R15: 00007fffae5731a8 [ 504.445815][T13333] [ 505.049501][T13333] kobject: kobject_add_internal failed for rx-0 (error: -12 parent: queues) [ 505.547645][T13345] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2939'. [ 505.625311][T13345] netlink: 354 bytes leftover after parsing attributes in process `syz.0.2939'. [ 506.105379][T13354] FAULT_INJECTION: forcing a failure. [ 506.105379][T13354] name failslab, interval 1, probability 0, space 0, times 0 [ 506.173710][T13354] CPU: 1 UID: 0 PID: 13354 Comm: syz.1.2944 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 506.173739][T13354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 506.173750][T13354] Call Trace: [ 506.173756][T13354] [ 506.173763][T13354] dump_stack_lvl+0x16c/0x1f0 [ 506.173795][T13354] should_fail_ex+0x512/0x640 [ 506.173824][T13354] should_failslab+0xc2/0x120 [ 506.173840][T13354] __kmalloc_cache_noprof+0x6a/0x3e0 [ 506.173864][T13354] ? sctp_add_bind_addr+0xae/0x3f0 [ 506.173893][T13354] sctp_add_bind_addr+0xae/0x3f0 [ 506.173921][T13354] sctp_copy_local_addr_list+0x39d/0x5a0 [ 506.173943][T13354] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 506.173966][T13354] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 506.173989][T13354] ? sctp_bind_addr_copy+0xe0/0x530 [ 506.174004][T13354] sctp_bind_addr_copy+0xe0/0x530 [ 506.174023][T13354] sctp_connect_new_asoc+0x1d7/0x790 [ 506.174047][T13354] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 506.174072][T13354] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 506.174098][T13354] ? sctp_get_af_specific+0x62/0x70 [ 506.174118][T13354] __sctp_connect+0x3f3/0xc60 [ 506.174142][T13354] ? do_raw_spin_lock+0x12c/0x2b0 [ 506.174168][T13354] ? __pfx___sctp_connect+0x10/0x10 [ 506.174192][T13354] ? __pfx_sctp_inet_connect+0x10/0x10 [ 506.174214][T13354] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 506.174240][T13354] ? __pfx_sctp_inet_connect+0x10/0x10 [ 506.174260][T13354] sctp_inet_connect+0x15f/0x200 [ 506.174282][T13354] __sys_connect_file+0x141/0x1a0 [ 506.174309][T13354] __sys_connect+0x13b/0x160 [ 506.174331][T13354] ? __pfx___sys_connect+0x10/0x10 [ 506.174361][T13354] ? xfd_validate_state+0x61/0x180 [ 506.174381][T13354] ? __pfx_do_writev+0x10/0x10 [ 506.174407][T13354] __x64_sys_connect+0x72/0xb0 [ 506.174429][T13354] ? lockdep_hardirqs_on+0x7c/0x110 [ 506.174454][T13354] do_syscall_64+0xcd/0x490 [ 506.174471][T13354] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 506.174488][T13354] RIP: 0033:0x7f0675d8e929 [ 506.174502][T13354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.174518][T13354] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 506.174542][T13354] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 506.174554][T13354] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 506.174564][T13354] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 506.174574][T13354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 506.174583][T13354] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 506.174605][T13354] [ 506.823919][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 506.830232][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 507.538678][T13366] netlink: 146 bytes leftover after parsing attributes in process `syz.0.2955'. [ 507.762676][T13365] netlink: 330 bytes leftover after parsing attributes in process `syz.2.2947'. [ 507.883871][T13372] serio: Serial port pty233 [ 509.239952][T13389] netlink: 29 bytes leftover after parsing attributes in process `syz.0.2958'. [ 509.939601][ T60] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 510.196286][ T60] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 510.468389][ T60] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 510.755802][T13412] netlink: 'syz.0.2967': attribute type 19 has an invalid length. [ 510.806684][ T60] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 510.835073][T13412] netlink: 114 bytes leftover after parsing attributes in process `syz.0.2967'. [ 511.437820][ T60] macvlan0: left allmulticast mode [ 511.482433][ T60] veth1_vlan: left allmulticast mode [ 511.530346][ T60] macvlan0: left promiscuous mode [ 511.570592][ T60] bridge0: port 3(macvlan0) entered disabled state [ 511.820231][ T60] bridge_slave_1: left allmulticast mode [ 511.862718][ T60] bridge_slave_1: left promiscuous mode [ 511.930140][ T5841] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 511.942995][ T5841] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 511.952490][ T5841] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 511.960182][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.973471][ T5841] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 511.982827][ T5841] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 512.062958][ T60] bridge_slave_0: left allmulticast mode [ 512.119195][ T60] bridge_slave_0: left promiscuous mode [ 512.156235][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 512.395433][T13449] zram: Removed device: zram0 [ 512.810600][T13454] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2978'. [ 513.255144][T13460] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2978'. [ 513.796642][ T60] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 513.837236][ T60] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 513.897626][ T60] bond0 (unregistering): Released all slaves [ 513.951445][ T30] audit: type=1800 audit(4294967552.235:16): pid=13464 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.2979" name="dbroot" dev="configfs" ino=66738 res=0 errno=0 [ 514.096562][ T5841] Bluetooth: hci1: command tx timeout [ 514.405617][T13470] netlink: 330 bytes leftover after parsing attributes in process `syz.2.2981'. [ 514.748056][T13478] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2984'. [ 516.071216][T13435] chnl_net:caif_netlink_parms(): no params data found [ 516.185131][ T5841] Bluetooth: hci1: command tx timeout [ 516.398662][ T60] veth1_macvtap: left promiscuous mode [ 516.486162][ T60] veth0_macvtap: left promiscuous mode [ 516.491875][ T60] veth1_vlan: left promiscuous mode [ 516.575351][ T60] veth0_vlan: left promiscuous mode [ 517.853094][T13545] netlink: 'syz.1.3005': attribute type 21 has an invalid length. [ 517.899511][T13545] netlink: 326 bytes leftover after parsing attributes in process `syz.1.3005'. [ 518.253500][ T5841] Bluetooth: hci1: command tx timeout [ 518.343233][T13551] FAULT_INJECTION: forcing a failure. [ 518.343233][T13551] name failslab, interval 1, probability 0, space 0, times 0 [ 518.412319][T13551] CPU: 1 UID: 0 PID: 13551 Comm: syz.1.3007 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 518.412348][T13551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 518.412359][T13551] Call Trace: [ 518.412365][T13551] [ 518.412373][T13551] dump_stack_lvl+0x16c/0x1f0 [ 518.412404][T13551] should_fail_ex+0x512/0x640 [ 518.412437][T13551] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 518.412461][T13551] ? __pfx_mon_text_open+0x10/0x10 [ 518.412486][T13551] should_failslab+0xc2/0x120 [ 518.412503][T13551] __kmalloc_cache_noprof+0x6a/0x3e0 [ 518.412526][T13551] ? mon_text_open+0x1cb/0x4f0 [ 518.412553][T13551] ? __pfx_mon_text_open+0x10/0x10 [ 518.412578][T13551] mon_text_open+0x1cb/0x4f0 [ 518.412603][T13551] ? __pfx_mon_text_open+0x10/0x10 [ 518.412627][T13551] ? __debugfs_file_get+0x1fe/0x840 [ 518.412643][T13551] ? __pfx___debugfs_file_get+0x10/0x10 [ 518.412659][T13551] ? __pfx_apparmor_file_open+0x10/0x10 [ 518.412679][T13551] ? lockdown_is_locked_down+0x3f/0x130 [ 518.412702][T13551] ? bpf_lsm_locked_down+0x9/0x10 [ 518.412724][T13551] ? __pfx_mon_text_open+0x10/0x10 [ 518.412748][T13551] full_proxy_open_regular+0x1b6/0x360 [ 518.412767][T13551] do_dentry_open+0x741/0x1c10 [ 518.412792][T13551] ? __pfx_full_proxy_open_regular+0x10/0x10 [ 518.412814][T13551] vfs_open+0x82/0x3f0 [ 518.412835][T13551] path_openat+0x1de4/0x2cb0 [ 518.412866][T13551] ? __pfx_path_openat+0x10/0x10 [ 518.412890][T13551] ? __lock_acquire+0xb8a/0x1c90 [ 518.412914][T13551] do_filp_open+0x20b/0x470 [ 518.412937][T13551] ? __pfx_do_filp_open+0x10/0x10 [ 518.412976][T13551] ? alloc_fd+0x471/0x7d0 [ 518.413003][T13551] do_sys_openat2+0x11b/0x1d0 [ 518.413022][T13551] ? __pfx_do_sys_openat2+0x10/0x10 [ 518.413038][T13551] ? ktime_get+0x1a7/0x310 [ 518.413065][T13551] __x64_sys_openat+0x174/0x210 [ 518.413084][T13551] ? __pfx___x64_sys_openat+0x10/0x10 [ 518.413111][T13551] do_syscall_64+0xcd/0x490 [ 518.413129][T13551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 518.413146][T13551] RIP: 0033:0x7f0675d8e929 [ 518.413160][T13551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.413176][T13551] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 518.413193][T13551] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 518.413204][T13551] RDX: 0000000000000800 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 518.413214][T13551] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 518.413224][T13551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 518.413234][T13551] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 518.413256][T13551] [ 519.513952][ T60] team0 (unregistering): Port device team_slave_1 removed [ 519.748673][ T60] team0 (unregistering): Port device team_slave_0 removed [ 520.334301][ T5841] Bluetooth: hci1: command tx timeout [ 520.431863][T13583] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3020'. [ 521.910553][T13590] FAULT_INJECTION: forcing a failure. [ 521.910553][T13590] name failslab, interval 1, probability 0, space 0, times 0 [ 522.026988][T13590] CPU: 1 UID: 0 PID: 13590 Comm: syz.1.3021 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 522.027017][T13590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 522.027028][T13590] Call Trace: [ 522.027034][T13590] [ 522.027042][T13590] dump_stack_lvl+0x16c/0x1f0 [ 522.027074][T13590] should_fail_ex+0x512/0x640 [ 522.027098][T13590] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 522.027123][T13590] should_failslab+0xc2/0x120 [ 522.027140][T13590] __kmalloc_cache_noprof+0x6a/0x3e0 [ 522.027162][T13590] ? snd_seq_port_connect+0x61/0x550 [ 522.027183][T13590] snd_seq_port_connect+0x61/0x550 [ 522.027199][T13590] ? _raw_read_unlock+0x28/0x50 [ 522.027223][T13590] ? check_subscription_permission.isra.0+0xf5/0x240 [ 522.027244][T13590] snd_seq_ioctl_subscribe_port+0x211/0x450 [ 522.027266][T13590] ? __pfx_snd_seq_ioctl_subscribe_port+0x10/0x10 [ 522.027294][T13590] snd_seq_kernel_client_ctl+0x10a/0x1c0 [ 522.027315][T13590] snd_seq_oss_midi_open+0x442/0x660 [ 522.027339][T13590] ? __pfx_snd_seq_oss_midi_open+0x10/0x10 [ 522.027369][T13590] ? rcu_is_watching+0x12/0xc0 [ 522.027386][T13590] ? trace_contention_end+0xdd/0x130 [ 522.027411][T13590] snd_seq_oss_synth_reset+0x437/0x880 [ 522.027435][T13590] ? __pfx_snd_seq_oss_synth_reset+0x10/0x10 [ 522.027458][T13590] ? __pfx___fsnotify_parent+0x10/0x10 [ 522.027483][T13590] snd_seq_oss_reset+0x73/0x290 [ 522.027502][T13590] ? __pfx_odev_release+0x10/0x10 [ 522.027518][T13590] snd_seq_oss_release+0x7c/0x180 [ 522.027537][T13590] odev_release+0x4c/0x70 [ 522.027552][T13590] __fput+0x402/0xb70 [ 522.027574][T13590] task_work_run+0x150/0x240 [ 522.027599][T13590] ? __pfx_task_work_run+0x10/0x10 [ 522.027623][T13590] ? __pfx___do_sys_close_range+0x10/0x10 [ 522.027652][T13590] exit_to_user_mode_loop+0xeb/0x110 [ 522.027678][T13590] do_syscall_64+0x3f6/0x490 [ 522.027696][T13590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 522.027721][T13590] RIP: 0033:0x7f0675d8e929 [ 522.027736][T13590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 522.027753][T13590] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 522.027770][T13590] RAX: 0000000000000000 RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 522.027781][T13590] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 522.027791][T13590] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 522.027801][T13590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 522.027811][T13590] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 522.027833][T13590] [ 523.982073][T13435] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.005546][T13601] Process accounting paused [ 524.044273][T13435] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.051675][T13435] bridge_slave_0: entered allmulticast mode [ 524.166756][T13607] netlink: 146 bytes leftover after parsing attributes in process `syz.2.3023'. [ 524.184547][T13435] bridge_slave_0: entered promiscuous mode [ 524.251622][T13435] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.333529][T13435] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.340720][T13435] bridge_slave_1: entered allmulticast mode [ 524.350039][T13611] netlink: 350 bytes leftover after parsing attributes in process `syz.1.3026'. [ 524.420309][T13613] netlink: 266 bytes leftover after parsing attributes in process `syz.0.3027'. [ 524.460955][T13435] bridge_slave_1: entered promiscuous mode [ 524.505674][T13613] IPv6: NLM_F_CREATE should be specified when creating new route [ 524.727821][T13618] FAULT_INJECTION: forcing a failure. [ 524.727821][T13618] name failslab, interval 1, probability 0, space 0, times 0 [ 524.835729][T13618] CPU: 1 UID: 0 PID: 13618 Comm: syz.1.3029 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 524.835757][T13618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 524.835767][T13618] Call Trace: [ 524.835774][T13618] [ 524.835781][T13618] dump_stack_lvl+0x16c/0x1f0 [ 524.835819][T13618] should_fail_ex+0x512/0x640 [ 524.835844][T13618] ? fs_reclaim_acquire+0xae/0x150 [ 524.835865][T13618] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 524.835889][T13618] should_failslab+0xc2/0x120 [ 524.835904][T13618] __kmalloc_noprof+0xd2/0x510 [ 524.835934][T13618] tomoyo_realpath_from_path+0xc2/0x6e0 [ 524.835964][T13618] tomoyo_check_open_permission+0x2ab/0x3c0 [ 524.835984][T13618] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 524.836027][T13618] ? find_held_lock+0x2b/0x80 [ 524.836050][T13618] tomoyo_file_open+0x6b/0x90 [ 524.836076][T13618] security_file_open+0x84/0x1e0 [ 524.836097][T13618] do_dentry_open+0x596/0x1c10 [ 524.836128][T13618] vfs_open+0x82/0x3f0 [ 524.836149][T13618] path_openat+0x1de4/0x2cb0 [ 524.836179][T13618] ? __pfx_path_openat+0x10/0x10 [ 524.836204][T13618] ? __lock_acquire+0xb8a/0x1c90 [ 524.836228][T13618] do_filp_open+0x20b/0x470 [ 524.836251][T13618] ? __pfx_do_filp_open+0x10/0x10 [ 524.836290][T13618] ? alloc_fd+0x471/0x7d0 [ 524.836318][T13618] do_sys_openat2+0x11b/0x1d0 [ 524.836336][T13618] ? __pfx_do_sys_openat2+0x10/0x10 [ 524.836363][T13618] __x64_sys_openat+0x174/0x210 [ 524.836381][T13618] ? __pfx___x64_sys_openat+0x10/0x10 [ 524.836409][T13618] do_syscall_64+0xcd/0x490 [ 524.836426][T13618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.836450][T13618] RIP: 0033:0x7f0675d8e929 [ 524.836465][T13618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 524.836481][T13618] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 524.836500][T13618] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 524.836511][T13618] RDX: 00000000001c5041 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 524.836522][T13618] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 524.836532][T13618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 524.836542][T13618] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 524.836565][T13618] [ 524.836572][T13618] ERROR: Out of memory at tomoyo_realpath_from_path. [ 525.091299][T13622] netlink: 186 bytes leftover after parsing attributes in process `syz.0.3030'. [ 525.297695][T13626] netlink: 'syz.0.3031': attribute type 27 has an invalid length. [ 525.330399][T13626] netlink: 334 bytes leftover after parsing attributes in process `syz.0.3031'. [ 525.481858][T13435] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 525.564446][T13435] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 525.961342][T13435] team0: Port device team_slave_0 added [ 526.016189][T13435] team0: Port device team_slave_1 added [ 526.805828][T13435] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 526.812802][T13435] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 527.017187][T13648] FAULT_INJECTION: forcing a failure. [ 527.017187][T13648] name failslab, interval 1, probability 0, space 0, times 0 [ 527.112164][T13435] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 527.123153][T13648] CPU: 1 UID: 0 PID: 13648 Comm: syz.1.3037 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 527.123179][T13648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 527.123189][T13648] Call Trace: [ 527.123195][T13648] [ 527.123202][T13648] dump_stack_lvl+0x16c/0x1f0 [ 527.123234][T13648] should_fail_ex+0x512/0x640 [ 527.123259][T13648] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 527.123289][T13648] should_failslab+0xc2/0x120 [ 527.123306][T13648] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 527.123330][T13648] ? copy_net_ns+0xe8/0x5f0 [ 527.123354][T13648] copy_net_ns+0xe8/0x5f0 [ 527.123371][T13648] ? copy_cgroup_ns+0x71/0x700 [ 527.123391][T13648] create_new_namespaces+0x3ea/0xa90 [ 527.123414][T13648] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 527.123441][T13648] ksys_unshare+0x45b/0xa40 [ 527.123463][T13648] ? __pfx_ksys_unshare+0x10/0x10 [ 527.123486][T13648] ? xfd_validate_state+0x61/0x180 [ 527.123513][T13648] __x64_sys_unshare+0x31/0x40 [ 527.123535][T13648] do_syscall_64+0xcd/0x490 [ 527.123552][T13648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.123570][T13648] RIP: 0033:0x7f0675d8e929 [ 527.123584][T13648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.123602][T13648] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 527.123619][T13648] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 527.123629][T13648] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 527.123639][T13648] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 527.123649][T13648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 527.123659][T13648] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 527.123680][T13648] [ 527.332676][T13650] netlink: 146 bytes leftover after parsing attributes in process `syz.0.3038'. [ 527.504812][T13435] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 527.511783][T13435] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 527.644824][T13435] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 527.727545][T13656] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3041'. [ 528.297839][T13435] hsr_slave_0: entered promiscuous mode [ 528.309048][T13435] hsr_slave_1: entered promiscuous mode [ 528.355188][T13435] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 528.362774][T13435] Cannot create hsr debugfs directory [ 529.906671][T13688] netlink: 146 bytes leftover after parsing attributes in process `syz.2.3051'. [ 529.926301][T13435] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 530.032528][T13435] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 530.152021][T13435] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 530.266327][T13435] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 530.338616][T13699] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3055'. [ 530.909931][T13435] 8021q: adding VLAN 0 to HW filter on device bond0 [ 531.104418][T13435] 8021q: adding VLAN 0 to HW filter on device team0 [ 531.224578][T13346] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.231868][T13346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.346505][T13346] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.353694][T13346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.813950][T13731] FAULT_INJECTION: forcing a failure. [ 531.813950][T13731] name failslab, interval 1, probability 0, space 0, times 0 [ 531.949558][T13731] CPU: 1 UID: 0 PID: 13731 Comm: syz.0.3065 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 531.949588][T13731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 531.949599][T13731] Call Trace: [ 531.949605][T13731] [ 531.949613][T13731] dump_stack_lvl+0x16c/0x1f0 [ 531.949645][T13731] should_fail_ex+0x512/0x640 [ 531.949670][T13731] ? fs_reclaim_acquire+0xae/0x150 [ 531.949693][T13731] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 531.949716][T13731] should_failslab+0xc2/0x120 [ 531.949732][T13731] __kmalloc_noprof+0xd2/0x510 [ 531.949753][T13731] ? __lock_acquire+0x622/0x1c90 [ 531.949780][T13731] tomoyo_realpath_from_path+0xc2/0x6e0 [ 531.949805][T13731] ? tomoyo_profile+0x47/0x60 [ 531.949832][T13731] tomoyo_path_number_perm+0x245/0x580 [ 531.949850][T13731] ? tomoyo_path_number_perm+0x237/0x580 [ 531.949872][T13731] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 531.949913][T13731] ? d_alloc_parallel+0x979/0x12e0 [ 531.949933][T13731] ? current_check_access_path+0x33c/0x460 [ 531.949955][T13731] ? __pfx_current_check_access_path+0x10/0x10 [ 531.949982][T13731] tomoyo_path_mknod+0x10c/0x190 [ 531.950008][T13731] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 531.950034][T13731] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 531.950062][T13731] security_path_mknod+0x161/0x310 [ 531.950084][T13731] lookup_open.isra.0+0xc17/0x1580 [ 531.950110][T13731] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 531.950142][T13731] ? __pfx_down_write+0x10/0x10 [ 531.950158][T13731] ? mnt_get_write_access+0x20c/0x300 [ 531.950180][T13731] path_openat+0x893/0x2cb0 [ 531.950211][T13731] ? __pfx_path_openat+0x10/0x10 [ 531.950240][T13731] do_filp_open+0x20b/0x470 [ 531.950264][T13731] ? __pfx_do_filp_open+0x10/0x10 [ 531.950303][T13731] ? _raw_spin_unlock+0x28/0x50 [ 531.950324][T13731] ? alloc_fd+0x471/0x7d0 [ 531.950352][T13731] do_sys_openat2+0x11b/0x1d0 [ 531.950370][T13731] ? __pfx_do_sys_openat2+0x10/0x10 [ 531.950407][T13731] __x64_sys_open+0x153/0x1e0 [ 531.950425][T13731] ? __pfx___x64_sys_open+0x10/0x10 [ 531.950450][T13731] ? rcu_is_watching+0x12/0xc0 [ 531.950469][T13731] do_syscall_64+0xcd/0x490 [ 531.950487][T13731] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.950505][T13731] RIP: 0033:0x7f9407b8e929 [ 531.950521][T13731] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 531.950541][T13731] RSP: 002b:00007f9408a1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 531.950558][T13731] RAX: ffffffffffffffda RBX: 00007f9407db5fa0 RCX: 00007f9407b8e929 [ 531.950569][T13731] RDX: 5d745cb200ae4d7b RSI: 0000000000022ac2 RDI: 0000000000000000 [ 531.950579][T13731] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 531.950589][T13731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 531.950599][T13731] R13: 0000000000000000 R14: 00007f9407db5fa0 R15: 00007fffae5731a8 [ 531.950621][T13731] [ 531.951018][T13731] ERROR: Out of memory at tomoyo_realpath_from_path. [ 532.946559][T13743] netlink: 10 bytes leftover after parsing attributes in process `syz.1.3068'. [ 533.147092][T13435] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 534.243335][T13770] netlink: 334 bytes leftover after parsing attributes in process `syz.0.3073'. [ 534.531428][T13777] netlink: 'syz.1.3074': attribute type 5 has an invalid length. [ 534.594877][T13777] netlink: 314 bytes leftover after parsing attributes in process `syz.1.3074'. [ 534.778313][T13435] veth0_vlan: entered promiscuous mode [ 534.887069][T13435] veth1_vlan: entered promiscuous mode [ 535.048982][T13783] FAULT_INJECTION: forcing a failure. [ 535.048982][T13783] name failslab, interval 1, probability 0, space 0, times 0 [ 535.122324][T13435] veth0_macvtap: entered promiscuous mode [ 535.158184][T13783] CPU: 1 UID: 0 PID: 13783 Comm: syz.0.3076 Not tainted 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 535.158213][T13783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 535.158224][T13783] Call Trace: [ 535.158230][T13783] [ 535.158237][T13783] dump_stack_lvl+0x16c/0x1f0 [ 535.158269][T13783] should_fail_ex+0x512/0x640 [ 535.158295][T13783] ? __kmalloc_node_noprof+0xc5/0x500 [ 535.158322][T13783] should_failslab+0xc2/0x120 [ 535.158338][T13783] __kmalloc_node_noprof+0xd8/0x500 [ 535.158423][T13783] ? alloc_slab_obj_exts+0x41/0xa0 [ 535.158448][T13783] alloc_slab_obj_exts+0x41/0xa0 [ 535.158469][T13783] __memcg_slab_post_alloc_hook+0x255/0x960 [ 535.158492][T13783] ? kasan_unpoison+0x27/0x60 [ 535.158515][T13783] ? __register_sysctl_table+0xb3/0x1900 [ 535.158542][T13783] __kmalloc_noprof+0x3f9/0x510 [ 535.158570][T13783] __register_sysctl_table+0xb3/0x1900 [ 535.158597][T13783] ? rcu_is_watching+0x12/0xc0 [ 535.158614][T13783] ? trace_kmalloc+0x2b/0xd0 [ 535.158631][T13783] ? __pfx___register_sysctl_table+0x10/0x10 [ 535.158656][T13783] ? register_pidns_sysctls+0x4b/0x1b0 [ 535.158681][T13783] ? __asan_memcpy+0x3c/0x60 [ 535.158704][T13783] register_pidns_sysctls+0x119/0x1b0 [ 535.158730][T13783] copy_pid_ns+0x564/0xce0 [ 535.158750][T13783] ? __pfx_copy_pid_ns+0x10/0x10 [ 535.158769][T13783] ? copy_mnt_ns+0xac/0xac0 [ 535.158791][T13783] ? trace_kmem_cache_alloc+0x28/0xc0 [ 535.158808][T13783] ? trace_cap_capable+0x18d/0x200 [ 535.158825][T13783] ? copy_ipcs+0xb6/0x610 [ 535.158844][T13783] create_new_namespaces+0x2aa/0xa90 [ 535.158867][T13783] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 535.158886][T13783] ksys_unshare+0x45b/0xa40 [ 535.158908][T13783] ? __pfx_ksys_unshare+0x10/0x10 [ 535.158930][T13783] ? xfd_validate_state+0x61/0x180 [ 535.158958][T13783] __x64_sys_unshare+0x31/0x40 [ 535.158979][T13783] do_syscall_64+0xcd/0x490 [ 535.158996][T13783] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 535.159013][T13783] RIP: 0033:0x7f9407b8e929 [ 535.159028][T13783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.159045][T13783] RSP: 002b:00007f9408a1c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 535.159062][T13783] RAX: ffffffffffffffda RBX: 00007f9407db5fa0 RCX: 00007f9407b8e929 [ 535.159072][T13783] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 535.159082][T13783] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 535.159092][T13783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 535.159101][T13783] R13: 0000000000000000 R14: 00007f9407db5fa0 R15: 00007fffae5731a8 [ 535.159123][T13783] [ 535.433645][T13435] veth1_macvtap: entered promiscuous mode [ 535.448572][T13435] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 535.459600][T13435] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 535.469174][T13435] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.478173][T13435] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.486933][T13435] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.495737][T13435] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 535.591638][T13786] virtio-pci 0000:00:04.0: [Firmware Bug]: Overriding NUMA node to 0. Contact your vendor for updates. [ 535.683495][T13788] netlink: 186 bytes leftover after parsing attributes in process `syz.1.3080'. [ 536.196429][T13798] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3084'. [ 536.704734][T13346] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 536.763081][T13346] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 536.943434][ T2984] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 537.011158][ T2984] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 537.037005][T13812] netlink: 326 bytes leftover after parsing attributes in process `syz.1.3089'. [ 538.111265][T13833] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3093'. [ 538.203546][T13833] veth1_macvtap: entered allmulticast mode [ 538.686383][T13846] netlink: 504 bytes leftover after parsing attributes in process `syz.4.3099'. [ 538.764512][T13846] netlink: 504 bytes leftover after parsing attributes in process `syz.4.3099'. [ 539.320163][T13857] netlink: 110 bytes leftover after parsing attributes in process `syz.4.3100'. [ 543.294904][T13926] FAULT_INJECTION: forcing a failure. [ 543.294904][T13926] name failslab, interval 1, probability 0, space 0, times 0 [ 543.444559][T13926] CPU: 1 UID: 0 PID: 13926 Comm: syz.4.3121 Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 543.444593][T13926] Tainted: [I]=FIRMWARE_WORKAROUND [ 543.444599][T13926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 543.444609][T13926] Call Trace: [ 543.444616][T13926] [ 543.444623][T13926] dump_stack_lvl+0x16c/0x1f0 [ 543.444654][T13926] should_fail_ex+0x512/0x640 [ 543.444679][T13926] ? kmem_cache_alloc_lru_noprof+0x5f/0x3b0 [ 543.444706][T13926] should_failslab+0xc2/0x120 [ 543.444722][T13926] kmem_cache_alloc_lru_noprof+0x72/0x3b0 [ 543.444746][T13926] ? alloc_inode+0xc3/0x240 [ 543.444767][T13926] alloc_inode+0xc3/0x240 [ 543.444784][T13926] path_from_stashed+0x2be/0xb00 [ 543.444808][T13926] ? do_raw_spin_lock+0x12c/0x2b0 [ 543.444835][T13926] ? __pfx_path_from_stashed+0x10/0x10 [ 543.444860][T13926] ? do_raw_spin_unlock+0x172/0x230 [ 543.444889][T13926] ns_get_path+0x5f/0x80 [ 543.444910][T13926] proc_ns_get_link+0x121/0x260 [ 543.444932][T13926] ? __pfx_proc_ns_get_link+0x10/0x10 [ 543.444956][T13926] ? atime_needs_update+0x8b/0x710 [ 543.444975][T13926] ? __pfx_proc_ns_get_link+0x10/0x10 [ 543.444996][T13926] step_into+0x1a29/0x2270 [ 543.445022][T13926] ? __pfx_step_into+0x10/0x10 [ 543.445041][T13926] ? find_held_lock+0x2b/0x80 [ 543.445063][T13926] path_openat+0x6db/0x2cb0 [ 543.445094][T13926] ? __pfx_path_openat+0x10/0x10 [ 543.445118][T13926] ? __lock_acquire+0xb8a/0x1c90 [ 543.445140][T13926] do_filp_open+0x20b/0x470 [ 543.445164][T13926] ? __pfx_do_filp_open+0x10/0x10 [ 543.445202][T13926] ? alloc_fd+0x471/0x7d0 [ 543.445229][T13926] do_sys_openat2+0x11b/0x1d0 [ 543.445247][T13926] ? __pfx_do_sys_openat2+0x10/0x10 [ 543.445264][T13926] ? find_held_lock+0x2b/0x80 [ 543.445279][T13926] ? handle_mm_fault+0x2ab/0xd10 [ 543.445306][T13926] __x64_sys_openat+0x174/0x210 [ 543.445324][T13926] ? __pfx___x64_sys_openat+0x10/0x10 [ 543.445353][T13926] ? do_user_addr_fault+0x843/0x1370 [ 543.445381][T13926] do_syscall_64+0xcd/0x490 [ 543.445398][T13926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.445416][T13926] RIP: 0033:0x7f930a78d290 [ 543.445431][T13926] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 543.445447][T13926] RSP: 002b:00007f930b6abf10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 543.445464][T13926] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f930a78d290 [ 543.445474][T13926] RDX: 0000000000000002 RSI: 00007f930b6abfa0 RDI: 00000000ffffff9c [ 543.445484][T13926] RBP: 00007f930b6abfa0 R08: 0000000000000000 R09: 0000000000000000 [ 543.445494][T13926] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000 [ 543.445504][T13926] R13: 0000000000000000 R14: 00007f930a9b5fa0 R15: 00007ffd2d91aef8 [ 543.445525][T13926] [ 543.764728][T13934] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3124'. [ 545.558582][T13966] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3134'. [ 545.644052][T13966] netlink: 25 bytes leftover after parsing attributes in process `syz.4.3134'. [ 546.046339][T13974] FAULT_INJECTION: forcing a failure. [ 546.046339][T13974] name failslab, interval 1, probability 0, space 0, times 0 [ 546.103200][T13971] netlink: 'syz.2.3136': attribute type 21 has an invalid length. [ 546.161615][T13974] CPU: 1 UID: 0 PID: 13974 Comm: syz.1.3138 Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 546.161650][T13974] Tainted: [I]=FIRMWARE_WORKAROUND [ 546.161657][T13974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 546.161667][T13974] Call Trace: [ 546.161673][T13974] [ 546.161680][T13974] dump_stack_lvl+0x16c/0x1f0 [ 546.161712][T13974] should_fail_ex+0x512/0x640 [ 546.161737][T13974] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 546.161764][T13974] should_failslab+0xc2/0x120 [ 546.161779][T13974] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 546.161804][T13974] ? __kernfs_new_node+0xd2/0x8e0 [ 546.161831][T13974] __kernfs_new_node+0xd2/0x8e0 [ 546.161856][T13974] ? __pfx___kernfs_new_node+0x10/0x10 [ 546.161883][T13974] ? find_held_lock+0x2b/0x80 [ 546.161901][T13974] ? kernfs_root+0xee/0x2a0 [ 546.161927][T13974] kernfs_new_node+0x13c/0x1e0 [ 546.161956][T13974] __kernfs_create_file+0x53/0x350 [ 546.161977][T13974] sysfs_add_file_mode_ns+0x207/0x3c0 [ 546.162003][T13974] internal_create_group+0x578/0xf30 [ 546.162032][T13974] ? __pfx_internal_create_group+0x10/0x10 [ 546.162059][T13974] ? kernfs_create_link+0x1bd/0x240 [ 546.162081][T13974] internal_create_groups+0x9d/0x150 [ 546.162106][T13974] device_add+0x77f/0x1a70 [ 546.162127][T13974] ? __pfx_device_add+0x10/0x10 [ 546.162145][T13974] ? lockdep_init_map_type+0x5c/0x280 [ 546.162168][T13974] ? __init_waitqueue_head+0xca/0x150 [ 546.162198][T13974] netdev_register_kobject+0x182/0x3a0 [ 546.162221][T13974] register_netdevice+0x13dc/0x2270 [ 546.162241][T13974] ? idr_alloc+0xdd/0x130 [ 546.162264][T13974] ? __pfx_register_netdevice+0x10/0x10 [ 546.162307][T13974] ppp_dev_configure+0x99b/0xc80 [ 546.162333][T13974] ppp_ioctl+0x17e0/0x2660 [ 546.162355][T13974] ? find_held_lock+0x2b/0x80 [ 546.162370][T13974] ? __pfx_ppp_ioctl+0x10/0x10 [ 546.162394][T13974] ? __fget_files+0x20e/0x3c0 [ 546.162419][T13974] ? __pfx_ppp_ioctl+0x10/0x10 [ 546.162440][T13974] __x64_sys_ioctl+0x18e/0x210 [ 546.162462][T13974] do_syscall_64+0xcd/0x490 [ 546.162480][T13974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.162497][T13974] RIP: 0033:0x7f0675d8e929 [ 546.162512][T13974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.162528][T13974] RSP: 002b:00007f0676c86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.162545][T13974] RAX: ffffffffffffffda RBX: 00007f0675fb5fa0 RCX: 00007f0675d8e929 [ 546.162556][T13974] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000006 [ 546.162566][T13974] RBP: 00007f0675e10b39 R08: 0000000000000000 R09: 0000000000000000 [ 546.162576][T13974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 546.162591][T13974] R13: 0000000000000000 R14: 00007f0675fb5fa0 R15: 00007ffe30e333c8 [ 546.162613][T13974] [ 546.744068][T13971] netlink: 334 bytes leftover after parsing attributes in process `syz.2.3136'. [ 548.538550][T14002] netlink: 146 bytes leftover after parsing attributes in process `syz.4.3147'. [ 548.722229][T14007] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3148'. [ 548.807459][T14007] netlink: 25 bytes leftover after parsing attributes in process `syz.1.3148'. [ 549.173120][T14014] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3150'. [ 549.308314][T14019] FAULT_INJECTION: forcing a failure. [ 549.308314][T14019] name failslab, interval 1, probability 0, space 0, times 0 [ 549.509167][T14019] CPU: 1 UID: 0 PID: 14019 Comm: syz.0.3151 Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 549.509201][T14019] Tainted: [I]=FIRMWARE_WORKAROUND [ 549.509208][T14019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 549.509218][T14019] Call Trace: [ 549.509225][T14019] [ 549.509232][T14019] dump_stack_lvl+0x16c/0x1f0 [ 549.509263][T14019] should_fail_ex+0x512/0x640 [ 549.509288][T14019] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 549.509323][T14019] should_failslab+0xc2/0x120 [ 549.509340][T14019] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 549.509364][T14019] ? __pfx___might_resched+0x10/0x10 [ 549.509381][T14019] ? __anon_vma_prepare+0xae/0x5e0 [ 549.509407][T14019] __anon_vma_prepare+0xae/0x5e0 [ 549.509429][T14019] ? __filemap_get_folio+0x32b/0xc30 [ 549.509448][T14019] __vmf_anon_prepare+0x11c/0x240 [ 549.509468][T14019] hugetlb_fault+0x1fd9/0x3070 [ 549.509494][T14019] ? __pfx_hugetlb_fault+0x10/0x10 [ 549.509524][T14019] ? find_vma+0xbf/0x140 [ 549.509539][T14019] ? __pfx_find_vma+0x10/0x10 [ 549.509558][T14019] handle_mm_fault+0xbfa/0xd10 [ 549.509580][T14019] ? __pkru_allows_pkey+0x21/0xb0 [ 549.509604][T14019] do_user_addr_fault+0x7a6/0x1370 [ 549.509628][T14019] ? rcu_is_watching+0x12/0xc0 [ 549.509647][T14019] exc_page_fault+0x5c/0xb0 [ 549.509672][T14019] asm_exc_page_fault+0x26/0x30 [ 549.509689][T14019] RIP: 0010:rep_movs_alternative+0x11/0x90 [ 549.509711][T14019] Code: c3 cc cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 83 f9 40 73 44 83 f9 08 73 25 85 c9 74 0f 8a 06 <88> 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 bd 10 04 00 66 66 2e 0f [ 549.509727][T14019] RSP: 0018:ffffc90004917e98 EFLAGS: 00050206 [ 549.509741][T14019] RAX: 0000000000000068 RBX: 0000000000000005 RCX: 0000000000000005 [ 549.509751][T14019] RDX: fffffbfff178c5e0 RSI: ffffffff8bc62f00 RDI: 0000000000000000 [ 549.509762][T14019] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff178c5e0 [ 549.509771][T14019] R10: 0000000000000004 R11: 0000000000000001 R12: ffffffff8bc62f00 [ 549.509781][T14019] R13: 0000000000000005 R14: 00007ffffffff000 R15: 0000000000000000 [ 549.509805][T14019] _copy_to_user+0xbb/0xd0 [ 549.509832][T14019] fs_name+0x172/0x220 [ 549.509858][T14019] __x64_sys_sysfs+0xbf/0x1a0 [ 549.509884][T14019] do_syscall_64+0xcd/0x490 [ 549.509901][T14019] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.509918][T14019] RIP: 0033:0x7f9407b8e929 [ 549.509931][T14019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.509946][T14019] RSP: 002b:00007f9408a1c038 EFLAGS: 00000246 ORIG_RAX: 000000000000008b [ 549.509961][T14019] RAX: ffffffffffffffda RBX: 00007f9407db5fa0 RCX: 00007f9407b8e929 [ 549.509971][T14019] RDX: 0000000000000000 RSI: 0000000000000027 RDI: 0000000000000002 [ 549.509981][T14019] RBP: 00007f9407c10b39 R08: 0000000000000000 R09: 0000000000000000 [ 549.509991][T14019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 549.510000][T14019] R13: 0000000000000000 R14: 00007f9407db5fa0 R15: 00007fffae5731a8 [ 549.510022][T14019] [ 550.438561][T14028] FAULT_INJECTION: forcing a failure. [ 550.438561][T14028] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 550.486100][T14028] CPU: 1 UID: 0 PID: 14028 Comm: syz.4.3154 Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 550.486133][T14028] Tainted: [I]=FIRMWARE_WORKAROUND [ 550.486140][T14028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 550.486150][T14028] Call Trace: [ 550.486157][T14028] [ 550.486163][T14028] dump_stack_lvl+0x16c/0x1f0 [ 550.486196][T14028] should_fail_ex+0x512/0x640 [ 550.486225][T14028] should_fail_alloc_page+0xe7/0x130 [ 550.486244][T14028] prepare_alloc_pages+0x3c2/0x610 [ 550.486267][T14028] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 550.486291][T14028] ? __alloc_frozen_pages_noprof+0x294/0x23f0 [ 550.486319][T14028] ? rcu_is_watching+0x12/0xc0 [ 550.486336][T14028] ? trace_kmem_cache_alloc+0x28/0xc0 [ 550.486353][T14028] ? kmem_cache_alloc_noprof+0x21e/0x3b0 [ 550.486377][T14028] ? mas_alloc_nodes+0x18b/0x8b0 [ 550.486401][T14028] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 550.486425][T14028] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 550.486450][T14028] ? mas_destroy+0x5de/0xa20 [ 550.486477][T14028] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 550.486503][T14028] ? policy_nodemask+0xea/0x4e0 [ 550.486531][T14028] alloc_pages_mpol+0x1fb/0x550 [ 550.486566][T14028] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 550.486592][T14028] ? do_raw_spin_lock+0x12c/0x2b0 [ 550.486615][T14028] ? find_held_lock+0x2b/0x80 [ 550.486635][T14028] alloc_pages_noprof+0x131/0x390 [ 550.486662][T14028] __pmd_alloc+0x3b/0x930 [ 550.486678][T14028] ? __pud_alloc+0x526/0x750 [ 550.486698][T14028] __handle_mm_fault+0xaac/0x5490 [ 550.486725][T14028] ? __pfx___handle_mm_fault+0x10/0x10 [ 550.486766][T14028] handle_mm_fault+0x589/0xd10 [ 550.486793][T14028] __get_user_pages+0x589/0x3b80 [ 550.486819][T14028] ? __pfx_mt_find+0x10/0x10 [ 550.486836][T14028] ? __pfx___get_user_pages+0x10/0x10 [ 550.486862][T14028] populate_vma_page_range+0x278/0x3a0 [ 550.486884][T14028] ? __pfx_populate_vma_page_range+0x10/0x10 [ 550.486903][T14028] ? __pfx_find_vma_intersection+0x10/0x10 [ 550.486923][T14028] ? do_mmap+0x69c/0x1210 [ 550.486942][T14028] __mm_populate+0x1d8/0x380 [ 550.486963][T14028] ? __pfx___mm_populate+0x10/0x10 [ 550.486984][T14028] ? up_write+0x1b2/0x520 [ 550.487009][T14028] vm_mmap_pgoff+0x362/0x450 [ 550.487029][T14028] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 550.487050][T14028] ? __x64_sys_futex+0x1e0/0x4c0 [ 550.487069][T14028] ? __x64_sys_futex+0x1e9/0x4c0 [ 550.487091][T14028] ksys_mmap_pgoff+0x7d/0x5c0 [ 550.487108][T14028] ? xfd_validate_state+0x61/0x180 [ 550.487128][T14028] ? __pfx___do_sys_close_range+0x10/0x10 [ 550.487155][T14028] __x64_sys_mmap+0x125/0x190 [ 550.487179][T14028] do_syscall_64+0xcd/0x490 [ 550.487197][T14028] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 550.487214][T14028] RIP: 0033:0x7f930a78e929 [ 550.487229][T14028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.487245][T14028] RSP: 002b:00007f930b6ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 550.487262][T14028] RAX: ffffffffffffffda RBX: 00007f930a9b5fa0 RCX: 00007f930a78e929 [ 550.487273][T14028] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000400000000000 [ 550.487283][T14028] RBP: 00007f930a810b39 R08: 0000000000000002 R09: 0000000000008000 [ 550.487293][T14028] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 550.487302][T14028] R13: 0000000000000000 R14: 00007f930a9b5fa0 R15: 00007ffd2d91aef8 [ 550.487324][T14028] [ 551.696541][T14042] netlink: 146 bytes leftover after parsing attributes in process `syz.4.3158'. [ 552.602109][T14047] netlink: 342 bytes leftover after parsing attributes in process `syz.1.3161'. [ 553.784399][ T30] audit: type=1800 audit(4294967592.075:17): pid=14072 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.4.3168" name="lu_gp_id" dev="configfs" ino=78328 res=0 errno=0 [ 553.844777][T14072] ALUA LU Group already has a valid ID, ignoring request [ 554.033722][T14074] Process accounting resumed [ 554.186693][T14082] FAULT_INJECTION: forcing a failure. [ 554.186693][T14082] name failslab, interval 1, probability 0, space 0, times 0 [ 554.293418][T14082] CPU: 1 UID: 0 PID: 14082 Comm: syz.4.3173 Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 554.293449][T14082] Tainted: [I]=FIRMWARE_WORKAROUND [ 554.293457][T14082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 554.293467][T14082] Call Trace: [ 554.293474][T14082] [ 554.293481][T14082] dump_stack_lvl+0x16c/0x1f0 [ 554.293512][T14082] should_fail_ex+0x512/0x640 [ 554.293537][T14082] ? __kmalloc_noprof+0xbf/0x510 [ 554.293563][T14082] ? memcg_list_lru_alloc+0x4e9/0x740 [ 554.293593][T14082] should_failslab+0xc2/0x120 [ 554.293609][T14082] __kmalloc_noprof+0xd2/0x510 [ 554.293633][T14082] ? __lock_acquire+0x622/0x1c90 [ 554.293658][T14082] memcg_list_lru_alloc+0x4e9/0x740 [ 554.293688][T14082] ? __pfx_memcg_list_lru_alloc+0x10/0x10 [ 554.293719][T14082] ? get_mem_cgroup_from_objcg+0xd3/0x330 [ 554.293745][T14082] __memcg_slab_post_alloc_hook+0x133/0x960 [ 554.293766][T14082] ? kasan_save_track+0x14/0x30 [ 554.293792][T14082] kmem_cache_alloc_lru_noprof+0x30f/0x3b0 [ 554.293816][T14082] ? pcpu_alloc_noprof+0x1f5/0x1470 [ 554.293837][T14082] ? alloc_inode+0xc3/0x240 [ 554.293857][T14082] alloc_inode+0xc3/0x240 [ 554.293874][T14082] alloc_anon_inode+0x28/0x3e0 [ 554.293898][T14082] ioctx_alloc+0x4ad/0x2120 [ 554.293927][T14082] ? find_held_lock+0x2b/0x80 [ 554.293943][T14082] ? __pfx_ioctx_alloc+0x10/0x10 [ 554.293962][T14082] ? __might_fault+0x13b/0x190 [ 554.293990][T14082] __x64_sys_io_setup+0xc9/0x210 [ 554.294013][T14082] do_syscall_64+0xcd/0x490 [ 554.294031][T14082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.294048][T14082] RIP: 0033:0x7f930a78e929 [ 554.294063][T14082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 554.294079][T14082] RSP: 002b:00007f930b6ac038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 554.294096][T14082] RAX: ffffffffffffffda RBX: 00007f930a9b5fa0 RCX: 00007f930a78e929 [ 554.294107][T14082] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 000000000000ffff [ 554.294117][T14082] RBP: 00007f930a810b39 R08: 0000000000000000 R09: 0000000000000000 [ 554.294127][T14082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 554.294136][T14082] R13: 0000000000000000 R14: 00007f930a9b5fa0 R15: 00007ffd2d91aef8 [ 554.294158][T14082] [ 555.581227][T14105] netlink: 'syz.4.3180': attribute type 20 has an invalid length. [ 555.617958][T14105] netlink: 330 bytes leftover after parsing attributes in process `syz.4.3180'. [ 555.652401][T14107] netlink: 342 bytes leftover after parsing attributes in process `syz.0.3181'. [ 555.685276][T14105] IPv6: NLM_F_CREATE should be specified when creating new route [ 556.024802][T14114] netlink: 30 bytes leftover after parsing attributes in process `syz.4.3183'. [ 556.374641][T14121] netlink: 330 bytes leftover after parsing attributes in process `syz.4.3186'. [ 556.455640][T14121] IPv6: NLM_F_CREATE should be specified when creating new route [ 557.708033][T14149] netlink: 'syz.0.3197': attribute type 21 has an invalid length. [ 557.763551][T14149] netlink: 334 bytes leftover after parsing attributes in process `syz.0.3197'. [ 558.178122][T14156] netlink: 302 bytes leftover after parsing attributes in process `syz.0.3200'. [ 559.230794][T14183] netlink: 342 bytes leftover after parsing attributes in process `syz.0.3207'. [ 559.340890][T14183] IPv6: Can't replace route, no match found [ 559.720020][T14193] netlink: 146 bytes leftover after parsing attributes in process `syz.1.3209'. [ 561.029362][T14210] snd_aloop snd_aloop.0: Parsing timer source '' failed with -22 [ 562.024536][T14224] zswap: compressor not available [ 562.950812][T14253] netlink: 146 bytes leftover after parsing attributes in process `syz.4.3226'. [ 563.054695][ C1] net_ratelimit: 20 callbacks suppressed [ 563.054714][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.073157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.085706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.098068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.110449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.122819][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.135142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.147387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.159726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 563.172109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.063512][ C1] net_ratelimit: 19680 callbacks suppressed [ 568.063532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.081772][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.094046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.106313][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.118554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.130821][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.143163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.155659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.167994][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.180329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 568.794479][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 569.103290][ C1] sched: DL replenish lagged too much [ 569.780288][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 573.073287][ C1] net_ratelimit: 20103 callbacks suppressed [ 573.073306][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.091543][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.103834][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.116162][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.128476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.140876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.153320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.165675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.178024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 573.190312][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.083421][ C1] net_ratelimit: 19563 callbacks suppressed [ 578.083442][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.101634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.114054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.126362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.138823][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.151206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.163737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.176082][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.188362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 578.200687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.093427][ C1] net_ratelimit: 20802 callbacks suppressed [ 583.093447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.111638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.123906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.136208][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.148444][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.160672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.172899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.185161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.197442][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 583.209768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.103282][ C1] net_ratelimit: 20899 callbacks suppressed [ 588.103303][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.121482][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.133713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.146046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.158294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.170736][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.183016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.195272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.207599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 588.219832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.113404][ C1] net_ratelimit: 21326 callbacks suppressed [ 593.113425][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.131707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.143944][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.156249][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.168661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.181052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.193340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.205619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.218140][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 593.230393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.123314][ C1] net_ratelimit: 21232 callbacks suppressed [ 598.123334][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.141507][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.153885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.166296][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.178581][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.190962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.203282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.215524][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.227786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 598.240210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.133328][ C1] net_ratelimit: 21128 callbacks suppressed [ 603.133347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.151596][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.163836][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.176103][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.188350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.200614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.212867][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.225107][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.237491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 603.249780][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.143430][ C1] net_ratelimit: 21365 callbacks suppressed [ 608.143449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.161589][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.173912][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.186199][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.198395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.210897][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.223201][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.235444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 608.247628][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 608.259837][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.153396][ C1] net_ratelimit: 21332 callbacks suppressed [ 613.153415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 613.171542][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.183722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 613.195949][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.208142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 613.220383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.232659][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 613.244848][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 613.257033][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 613.269230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.163269][ C1] net_ratelimit: 21629 callbacks suppressed [ 618.163287][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.181412][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 618.193619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.205788][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 618.218104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.230440][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 618.243039][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.255276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 618.267691][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 618.279901][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 623.173402][ C1] net_ratelimit: 21656 callbacks suppressed [ 623.173422][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.191529][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 623.203738][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.215934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 623.228133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.240315][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 623.252497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.264661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 623.276842][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 623.289040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.183468][ C1] net_ratelimit: 12479 callbacks suppressed [ 628.183489][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.201723][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.214512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.226711][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.239490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.251776][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.264522][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.276737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 628.289536][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 628.301749][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 629.724470][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 629.738867][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 633.193989][ C1] net_ratelimit: 9470 callbacks suppressed [ 633.194010][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 633.212062][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.224837][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 633.237035][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.249785][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 633.261989][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.274724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 633.286928][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 633.299670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 633.312046][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.203212][ C1] net_ratelimit: 12224 callbacks suppressed [ 638.203233][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.221476][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.234200][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 638.246407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.258703][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.270894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 638.283771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 638.295984][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.308168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.320357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.213429][ C1] net_ratelimit: 13358 callbacks suppressed [ 643.213449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.231814][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.244561][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 643.256845][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.269050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.281344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 643.294068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 643.306270][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.318453][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.330730][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.223898][ C1] net_ratelimit: 13264 callbacks suppressed [ 648.223917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 648.242052][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.254260][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.266575][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.279314][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 648.291502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.303677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.316342][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 648.329087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 648.341290][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.233401][ C1] net_ratelimit: 13206 callbacks suppressed [ 653.233421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 653.251543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.263724][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.275954][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.288706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 653.300919][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.313117][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.325329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 653.338148][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 653.350353][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.243598][ C1] net_ratelimit: 13134 callbacks suppressed [ 658.243618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 658.261721][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.273910][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.286128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.298859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 658.311047][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.323254][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.335449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 658.349278][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 658.361505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.253361][ C1] net_ratelimit: 13375 callbacks suppressed [ 663.253381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.271491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.283704][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.296452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 663.308659][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.320824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.333034][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 663.345771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 663.357966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.370167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.263335][ C1] net_ratelimit: 13280 callbacks suppressed [ 668.263355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.282149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 668.294383][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.306666][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.318983][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.331789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 668.344155][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.356454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.368679][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 668.381469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 673.273302][ C1] net_ratelimit: 13107 callbacks suppressed [ 673.273321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 673.291494][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.303776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.315991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.328730][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 673.340962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.353268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.365470][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 673.378476][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 673.390709][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.283425][ C1] net_ratelimit: 13088 callbacks suppressed [ 678.283445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.301592][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.314457][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 678.326765][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.338955][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.351167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 678.363936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 678.376222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.388418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.400624][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 682.223164][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 682.230159][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14259/1:b..l P14260/1:b..l [ 682.239720][ C1] rcu: (detected by 1, t=10502 jiffies, g=64745, q=1189 ncpus=1) [ 682.247525][ C1] task:modprobe state:R running task stack:25512 pid:14260 tgid:14260 ppid:2984 task_flags:0x40000c flags:0x00004002 [ 682.261684][ C1] Call Trace: [ 682.265005][ C1] [ 682.267973][ C1] __schedule+0x116a/0x5de0 [ 682.272536][ C1] ? __pfx___schedule+0x10/0x10 [ 682.277423][ C1] ? mark_held_locks+0x49/0x80 [ 682.282202][ C1] preempt_schedule_irq+0x51/0x90 [ 682.287251][ C1] irqentry_exit+0x36/0x90 [ 682.291676][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 682.297661][ C1] RIP: 0010:debug_lockdep_rcu_enabled+0x0/0x40 [ 682.303832][ C1] Code: 00 00 00 eb b6 e8 30 fa ff ff eb b6 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 8b 05 96 39 0c 05 85 c0 74 20 8b 05 70 6a 0c 05 85 c0 [ 682.323467][ C1] RSP: 0018:ffffc900051774d8 EFLAGS: 00000282 [ 682.329587][ C1] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 000000003c4bf156 [ 682.337590][ C1] RDX: 0000000000000000 RSI: ffffffff8dbedafe RDI: ffffffff8bf55a60 [ 682.345585][ C1] RBP: ffffc900051775a0 R08: a97a2e6c7ef646dd R09: 0000000000000000 [ 682.353571][ C1] R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff81a6f9a0 [ 682.361549][ C1] R13: ffffc90005177558 R14: 0000000000000000 R15: ffff888027f30000 [ 682.369533][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 682.375707][ C1] unwind_next_frame+0xd6/0x20a0 [ 682.380662][ C1] ? unwind_next_frame+0xbd/0x20a0 [ 682.385796][ C1] ? do_group_exit+0xd3/0x2a0 [ 682.390483][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 682.396723][ C1] arch_stack_walk+0x94/0x100 [ 682.401429][ C1] ? do_group_exit+0xd3/0x2a0 [ 682.406136][ C1] stack_trace_save+0x8e/0xc0 [ 682.410816][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 682.416198][ C1] kasan_save_stack+0x33/0x60 [ 682.420883][ C1] ? kasan_save_stack+0x33/0x60 [ 682.425743][ C1] ? kasan_save_track+0x14/0x30 [ 682.430616][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 682.435664][ C1] ? kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 682.441315][ C1] ? kmem_alloc_batch+0x49/0x170 [ 682.446254][ C1] ? debug_objects_fill_pool+0x228/0x500 [ 682.451890][ C1] ? debug_object_activate+0x10b/0x4c0 [ 682.457367][ C1] ? __call_rcu_common.constprop.0+0x2c/0x9f0 [ 682.463529][ C1] ? kmem_cache_free+0x16d/0x4d0 [ 682.468610][ C1] ? exit_mmap+0x511/0xb90 [ 682.473061][ C1] ? __mmput+0x12a/0x410 [ 682.477318][ C1] ? mmput+0x62/0x70 [ 682.481220][ C1] ? do_exit+0x7bc/0x2bd0 [ 682.485570][ C1] ? do_group_exit+0xd3/0x2a0 [ 682.490287][ C1] kasan_save_track+0x14/0x30 [ 682.494995][ C1] __kasan_slab_alloc+0x89/0x90 [ 682.499870][ C1] kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 682.505339][ C1] ? kmem_alloc_batch+0x49/0x170 [ 682.510287][ C1] kmem_alloc_batch+0x49/0x170 [ 682.515060][ C1] debug_objects_fill_pool+0x228/0x500 [ 682.520523][ C1] ? do_syscall_64+0xcd/0x490 [ 682.525201][ C1] ? __pfx_debug_objects_fill_pool+0x10/0x10 [ 682.531192][ C1] debug_object_activate+0x10b/0x4c0 [ 682.536483][ C1] ? __pfx_debug_object_activate+0x10/0x10 [ 682.542300][ C1] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 682.548609][ C1] __call_rcu_common.constprop.0+0x2c/0x9f0 [ 682.554552][ C1] kmem_cache_free+0x16d/0x4d0 [ 682.559333][ C1] ? exit_mmap+0x511/0xb90 [ 682.563773][ C1] exit_mmap+0x511/0xb90 [ 682.568031][ C1] ? __pfx_exit_mmap+0x10/0x10 [ 682.572856][ C1] __mmput+0x12a/0x410 [ 682.576932][ C1] mmput+0x62/0x70 [ 682.580655][ C1] do_exit+0x7bc/0x2bd0 [ 682.584830][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 682.589866][ C1] ? __pfx_do_exit+0x10/0x10 [ 682.594468][ C1] ? rcu_is_watching+0x12/0xc0 [ 682.599241][ C1] do_group_exit+0xd3/0x2a0 [ 682.603755][ C1] __x64_sys_exit_group+0x3e/0x50 [ 682.608805][ C1] x64_sys_call+0x1530/0x1730 [ 682.613500][ C1] do_syscall_64+0xcd/0x490 [ 682.618026][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.623927][ C1] RIP: 0033:0x7fab29c246c5 [ 682.628342][ C1] RSP: 002b:00007ffde0ba8528 EFLAGS: 00000202 ORIG_RAX: 00000000000000e7 [ 682.636753][ C1] RAX: ffffffffffffffda RBX: 00007fab29d25fe8 RCX: 00007fab29c246c5 [ 682.644726][ C1] RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000001 [ 682.652693][ C1] RBP: 0000000000000001 R08: 00007ffde0ba84b8 R09: 0000000000000000 [ 682.660666][ C1] R10: 00007ffde0ba8350 R11: 0000000000000202 R12: 0000000000000000 [ 682.668638][ C1] R13: 0000000000000001 R14: 00007fab29d24680 R15: 00007fab29d26000 [ 682.676703][ C1] [ 682.679725][ C1] task:rm state:R running task stack:25512 pid:14259 tgid:14259 ppid:14204 task_flags:0x400000 flags:0x00004002 [ 682.693213][ C1] Call Trace: [ 682.696493][ C1] [ 682.699435][ C1] __schedule+0x116a/0x5de0 [ 682.703949][ C1] ? find_held_lock+0x2b/0x80 [ 682.708645][ C1] ? unwind_next_frame+0x3fe/0x20a0 [ 682.713857][ C1] ? __pfx___schedule+0x10/0x10 [ 682.718801][ C1] ? arch_stack_walk+0x88/0x100 [ 682.723666][ C1] ? mark_held_locks+0x49/0x80 [ 682.728446][ C1] preempt_schedule_irq+0x51/0x90 [ 682.733480][ C1] irqentry_exit+0x36/0x90 [ 682.737907][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 682.743891][ C1] RIP: 0010:kasan_check_range+0x75/0x1b0 [ 682.749527][ C1] Code: 89 fd 48 b8 00 00 00 00 00 fc ff df 4d 89 d1 48 c1 ed 03 49 c1 e9 03 48 01 c5 49 01 c1 48 89 e8 49 8d 59 01 48 89 da 48 29 ea <48> 83 fa 10 0f 8e c7 00 00 00 41 89 eb 41 83 e3 07 0f 85 80 00 00 [ 682.769134][ C1] RSP: 0018:ffffc900052d7408 EFLAGS: 00000212 [ 682.775203][ C1] RAX: ffffed1003a3989f RBX: ffffed1003a398a0 RCX: ffffffff822d154c [ 682.783173][ C1] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff88801d1cc4f8 [ 682.791142][ C1] RBP: ffffed1003a3989f R08: 0000000000000000 R09: ffffed1003a3989f [ 682.799114][ C1] R10: ffff88801d1cc4fb R11: 0000000000000001 R12: ffff88801d1cc4b0 [ 682.807098][ C1] R13: ffff88801d1cc4ac R14: 0000000000000003 R15: dffffc0000000000 [ 682.815073][ C1] ? __page_table_check_zero+0x22c/0x5d0 [ 682.820722][ C1] __page_table_check_zero+0x22c/0x5d0 [ 682.826195][ C1] ? __pfx___page_table_check_zero+0x10/0x10 [ 682.832202][ C1] ? __reset_page_owner+0x137/0x1a0 [ 682.837407][ C1] __free_frozen_pages+0x7df/0x1180 [ 682.842615][ C1] ? __pfx_mod_node_page_state+0x10/0x10 [ 682.848278][ C1] __put_partials+0x16d/0x1c0 [ 682.852970][ C1] qlist_free_all+0x4d/0x120 [ 682.857570][ C1] kasan_quarantine_reduce+0x195/0x1e0 [ 682.863174][ C1] __kasan_slab_alloc+0x69/0x90 [ 682.868060][ C1] kmem_cache_alloc_bulk_noprof+0x41a/0xbc0 [ 682.873981][ C1] ? kmem_cache_alloc_noprof+0x21e/0x3b0 [ 682.879658][ C1] ? mas_alloc_nodes+0x18b/0x8b0 [ 682.884607][ C1] ? mas_alloc_nodes+0x2f1/0x8b0 [ 682.889556][ C1] mas_alloc_nodes+0x2f1/0x8b0 [ 682.894335][ C1] mas_node_count_gfp+0x105/0x130 [ 682.899385][ C1] mas_preallocate+0x77b/0xda0 [ 682.904157][ C1] ? __pfx_mas_preallocate+0x10/0x10 [ 682.909452][ C1] ? anon_vma_name+0x75/0x100 [ 682.914136][ C1] __split_vma+0x34a/0x1070 [ 682.918658][ C1] ? __pfx___split_vma+0x10/0x10 [ 682.923616][ C1] vma_modify+0xee1/0x20a0 [ 682.928140][ C1] ? __pfx_vma_modify+0x10/0x10 [ 682.933005][ C1] vma_modify_flags+0x212/0x2d0 [ 682.937869][ C1] ? __pfx_vma_modify_flags+0x10/0x10 [ 682.943266][ C1] mprotect_fixup+0x2b3/0xb10 [ 682.947960][ C1] ? __pfx_mprotect_fixup+0x10/0x10 [ 682.953173][ C1] do_mprotect_pkey+0x9ca/0xd50 [ 682.958044][ C1] ? __pfx_do_mprotect_pkey+0x10/0x10 [ 682.963525][ C1] ? __might_fault+0xe3/0x190 [ 682.968211][ C1] ? __might_fault+0xe3/0x190 [ 682.972994][ C1] ? __rseq_handle_notify_resume+0x681/0x10e0 [ 682.979098][ C1] ? xfd_validate_state+0x61/0x180 [ 682.984223][ C1] __x64_sys_mprotect+0x78/0xc0 [ 682.989083][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 682.994292][ C1] do_syscall_64+0xcd/0x490 [ 682.998801][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 683.004695][ C1] RIP: 0033:0x7fd6484342c7 [ 683.009124][ C1] RSP: 002b:00007fffd0d03298 EFLAGS: 00000206 ORIG_RAX: 000000000000000a [ 683.017548][ C1] RAX: ffffffffffffffda RBX: 00007fd648447da0 RCX: 00007fd6484342c7 [ 683.025520][ C1] RDX: 0000000000000001 RSI: 0000000000002000 RDI: 00007fd648445000 [ 683.033509][ C1] RBP: 00007fffd0d03560 R08: 000000003de00ec7 R09: 0000000000000000 [ 683.041480][ C1] R10: 00007fd648178c58 R11: 0000000000000206 R12: fffffffffffffff8 [ 683.049455][ C1] R13: 000001263cd59ad8 R14: 0000000000000000 R15: 00007fd648448310 [ 683.057438][ C1] [ 683.060457][ C1] rcu: rcu_preempt kthread starved for 262 jiffies! g64745 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 683.071563][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 683.081529][ C1] rcu: RCU grace-period kthread stack dump: [ 683.087412][ C1] task:rcu_preempt state:R running task stack:28872 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 [ 683.100905][ C1] Call Trace: [ 683.104215][ C1] [ 683.107168][ C1] __schedule+0x116a/0x5de0 [ 683.111714][ C1] ? __lock_acquire+0x622/0x1c90 [ 683.116696][ C1] ? __pfx___schedule+0x10/0x10 [ 683.121569][ C1] ? find_held_lock+0x2b/0x80 [ 683.126330][ C1] ? schedule+0x2d7/0x3a0 [ 683.130711][ C1] schedule+0xe7/0x3a0 [ 683.134887][ C1] schedule_timeout+0x123/0x290 [ 683.139744][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 683.145139][ C1] ? __pfx_process_timeout+0x10/0x10 [ 683.150457][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 683.156374][ C1] ? prepare_to_swait_event+0xf5/0x480 [ 683.161845][ C1] rcu_gp_fqs_loop+0x1ea/0xb00 [ 683.166627][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 683.171927][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 683.177141][ C1] ? __pfx_rcu_gp_init+0x10/0x10 [ 683.182173][ C1] ? rcu_gp_cleanup+0x7c1/0xd90 [ 683.187055][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 683.192889][ C1] rcu_gp_kthread+0x270/0x380 [ 683.197577][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 683.202785][ C1] ? rcu_is_watching+0x12/0xc0 [ 683.207553][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 683.212773][ C1] ? __kthread_parkme+0x19e/0x250 [ 683.217806][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 683.223013][ C1] kthread+0x3c2/0x780 [ 683.227090][ C1] ? __pfx_kthread+0x10/0x10 [ 683.231731][ C1] ? rcu_is_watching+0x12/0xc0 [ 683.236498][ C1] ? __pfx_kthread+0x10/0x10 [ 683.241099][ C1] ret_from_fork+0x5d4/0x6f0 [ 683.245696][ C1] ? __pfx_kthread+0x10/0x10 [ 683.250302][ C1] ret_from_fork_asm+0x1a/0x30 [ 683.255103][ C1] [ 683.258133][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 683.264460][ C1] CPU: 1 UID: 0 PID: 3404 Comm: kworker/R-bat_e Tainted: G I 6.16.0-rc1-syzkaller-00101-g27605c8c0f69 #0 PREEMPT(full) [ 683.278557][ C1] Tainted: [I]=FIRMWARE_WORKAROUND [ 683.283672][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 683.293733][ C1] Workqueue: bat_events batadv_dat_purge [ 683.299380][ C1] RIP: 0010:rcu_lockdep_current_cpu_online+0x0/0x150 [ 683.306061][ C1] Code: 48 89 ee 48 c7 c7 c0 ec 3c 8e e8 5b 9d 69 03 e9 6a ff ff ff 66 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 65 8b 15 b5 18 0b 12 81 e2 00 00 f0 00 b8 01 00 00 00 [ 683.326445][ C1] RSP: 0018:ffffc90000a084c0 EFLAGS: 00000202 [ 683.332523][ C1] RAX: 0000000000000001 RBX: ffff888034cd7c00 RCX: ffffffff8a2b1a4b [ 683.340517][ C1] RDX: 0000000000000000 RSI: ffffffff8bf559e0 RDI: ffffffff8dd1dda8 [ 683.348489][ C1] RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000000 [ 683.356556][ C1] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000001 [ 683.364545][ C1] R13: ffffc90000a087d8 R14: 0000000000000000 R15: ffff8880613f34c8 [ 683.372538][ C1] FS: 0000000000000000(0000) GS:ffff888124a61000(0000) knlGS:0000000000000000 [ 683.381470][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 683.388058][ C1] CR2: 00007ffe30e3266c CR3: 00000000293e4000 CR4: 00000000003526f0 [ 683.396028][ C1] Call Trace: [ 683.399479][ C1] [ 683.402345][ C1] rcu_read_lock_held+0x27/0x50 [ 683.407289][ C1] __find_rr_leaf+0x36c/0xe00 [ 683.411977][ C1] ? __pfx___find_rr_leaf+0x10/0x10 [ 683.417264][ C1] ? fib6_node_lookup+0x12d/0x190 [ 683.422286][ C1] ? __pfx_fib6_node_lookup+0x10/0x10 [ 683.427667][ C1] fib6_table_lookup+0x57c/0xa30 [ 683.432796][ C1] ? __pfx_fib6_table_lookup+0x10/0x10 [ 683.438410][ C1] ip6_pol_route+0x1cc/0x1230 [ 683.443121][ C1] ? __pfx_ip6_pol_route+0x10/0x10 [ 683.448251][ C1] ? __pfx_rt6_multipath_hash+0x10/0x10 [ 683.453817][ C1] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 683.459455][ C1] fib6_rule_lookup+0x536/0x720 [ 683.464313][ C1] ? __pfx_fib6_rule_lookup+0x10/0x10 [ 683.469693][ C1] ? nf_nat_ipv6_fn+0xff/0x2e0 [ 683.474467][ C1] ? __pfx_nf_nat_ipv6_fn+0x10/0x10 [ 683.479675][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 683.485581][ C1] ip6_route_input+0x662/0xc00 [ 683.490362][ C1] ? __pfx_ip6_route_input+0x10/0x10 [ 683.495743][ C1] ? lock_acquire+0x179/0x350 [ 683.500440][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 683.505657][ C1] ip6_rcv_finish_core.constprop.0+0x1a0/0x5d0 [ 683.511821][ C1] ipv6_rcv+0x1e8/0x680 [ 683.515991][ C1] ? __pfx_ipv6_rcv+0x10/0x10 [ 683.520683][ C1] __netif_receive_skb_one_core+0x12d/0x1e0 [ 683.526709][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 683.533174][ C1] ? lock_acquire+0x179/0x350 [ 683.537878][ C1] ? process_backlog+0x3f0/0x15e0 [ 683.542937][ C1] __netif_receive_skb+0x1d/0x160 [ 683.547973][ C1] process_backlog+0x442/0x15e0 [ 683.552952][ C1] __napi_poll.constprop.0+0xba/0x550 [ 683.558338][ C1] net_rx_action+0xa9f/0xfe0 [ 683.562945][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 683.568085][ C1] ? mark_held_locks+0x49/0x80 [ 683.572873][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 683.578104][ C1] ? tmigr_handle_remote+0x132/0x380 [ 683.583429][ C1] ? mark_held_locks+0x49/0x80 [ 683.588207][ C1] handle_softirqs+0x219/0x8e0 [ 683.592982][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 683.598271][ C1] ? __batadv_dat_purge.part.0+0x279/0x3a0 [ 683.604084][ C1] ? __pfx_batadv_dat_to_purge+0x10/0x10 [ 683.609725][ C1] do_softirq+0xb2/0xf0 [ 683.613885][ C1] [ 683.616834][ C1] [ 683.619766][ C1] __local_bh_enable_ip+0x100/0x120 [ 683.625058][ C1] __batadv_dat_purge.part.0+0x279/0x3a0 [ 683.630708][ C1] batadv_dat_purge+0x4b/0xa0 [ 683.635391][ C1] process_one_work+0x9cf/0x1b70 [ 683.640357][ C1] ? __pfx_process_one_work+0x10/0x10 [ 683.645743][ C1] ? assign_work+0x1a0/0x250 [ 683.650352][ C1] rescuer_thread+0x620/0xea0 [ 683.655055][ C1] ? rcu_is_watching+0x12/0xc0 [ 683.659830][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 683.665038][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 683.670247][ C1] ? __kthread_parkme+0x19e/0x250 [ 683.675284][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 683.680491][ C1] kthread+0x3c2/0x780 [ 683.684568][ C1] ? __pfx_kthread+0x10/0x10 [ 683.689171][ C1] ? rcu_is_watching+0x12/0xc0 [ 683.693948][ C1] ? __pfx_kthread+0x10/0x10 [ 683.698545][ C1] ret_from_fork+0x5d4/0x6f0 [ 683.703142][ C1] ? __pfx_kthread+0x10/0x10 [ 683.707745][ C1] ret_from_fork_asm+0x1a/0x30 [ 683.712608][ C1] [ 683.716046][ C1] net_ratelimit: 10242 callbacks suppressed [ 683.716061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.734263][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.747023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 683.759588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.771890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.784098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 683.796855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 683.809064][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.821550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.834024][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.723590][ C1] net_ratelimit: 11340 callbacks suppressed [ 688.723611][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 688.741999][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.754239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.766479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.779447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 688.791698][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.803983][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.816316][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 688.829397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:52:bd:21:ff:9c:4b, vlan:0) [ 688.841962][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)