last executing test programs: 3m40.448863708s ago: executing program 2 (id=1490): openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2a801, 0x0) socket(0xa, 0x3, 0x3b) openat$auto_udmabuf_fops_udmabuf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000040)='/dev/binderfs/binder1\x00', 0x189160, 0x0) ioctl$auto_BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000140)={[0x1ff, 0xb, 0xd, 0x2007d48, 0x948b, 0x4, 0x0, 0x4b, 0x3, 0x0, 0x80000001, 0x7, 0x4, 0x5, 0x2, 0x1]}, 0x0) 3m40.258140109s ago: executing program 2 (id=1491): mmap$auto(0x0, 0x2000a, 0x7e, 0xeb2, 0x401, 0x8000) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x141207, 0x0) socket(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup$auto(0x2, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) select$auto(0x8, &(0x7f00000000c0)={[0xeeda, 0x7, 0x4, 0x9, 0x6, 0x1ff, 0x6, 0x3, 0x3, 0x4618ecd2, 0x87, 0x84, 0x7, 0x9a8c, 0x9, 0x10001]}, 0x0, 0x0, 0x0) 3m40.035474534s ago: executing program 2 (id=1492): set_mempolicy$auto(0x2005, &(0x7f0000000080)=0x87e, 0x4) close_range$auto(0x0, 0xffffffffffffffff, 0x2) socket(0x2, 0x1, 0x0) socket(0x18, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) memfd_create$auto(&(0x7f0000000000)='\xc4--:\xdd:,./-${\x00', 0x4) mmap$auto(0x0, 0x8, 0x1000000016, 0x13, 0x3, 0x400180000000) fallocate$auto(0x8000000000000003, 0x0, 0xf, 0x200000002) 3m39.817948213s ago: executing program 2 (id=1494): close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x3, 0x6) lsm_list_modules$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x401c5820, 0x0) mkdir$auto(0x0, 0x353) 3m39.326112924s ago: executing program 2 (id=1498): r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x276, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22040, 0x75) socket(0x840000000002, 0x3, 0xff) connect$auto(0x3, &(0x7f00000018c0)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x55) sendmsg$auto_ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={&(0x7f0000001800)={0x14, 0x0, 0x301, 0x70bd26, 0x25dfdbff}, 0x14}}, 0x4008010) 3m38.770670927s ago: executing program 2 (id=1503): openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000180), 0x109802, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = socketcall$auto(0x4, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x7, 0x0, [{0x40000108, 0x2, 0x6}]}) 3m38.288699447s ago: executing program 32 (id=1503): openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000180), 0x109802, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = socketcall$auto(0x4, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x7, 0x0, [{0x40000108, 0x2, 0x6}]}) 12.541773603s ago: executing program 0 (id=2753): unshare$auto(0x40000080) lstat$auto(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), 0xffffffffffffffff) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system/cpu/smt/control\x00', 0x2ab42, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r2, &(0x7f0000000040)='1', 0x1) sendmsg$auto_NL80211_CMD_VENDOR(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000000240)=ANY=[@ANYRES64=r0, @ANYRES16=r1, @ANYRES8=r0, @ANYRESHEX, @ANYRESHEX=r0, @ANYRESDEC=r0], 0x1c}, 0x1, 0x0, 0x0, 0x5004}, 0x80) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) capget$auto(&(0x7f0000000140)={0x6, 0xffffffffffffffff}, &(0x7f0000000180)={0x1, 0x3, 0x7}) rt_tgsigqueueinfo$auto_SIGCONT(r3, 0x0, 0x12, &(0x7f00000001c0)={@_si_pad}) 11.55624153s ago: executing program 1 (id=2746): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptya1\x00', 0x20080, 0x0) socket(0x2, 0x5, 0x0) io_uring_setup$auto(0x101, 0x0) ioctl$auto(0x3, 0x5420, 0x38) socket(0x29, 0x2, 0x0) openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000400), 0x189002, 0x0) select$auto(0x8, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x0, 0xd, 0x2, 0x948b, 0x3, 0x15f4da0a, 0x1, 0x3, 0x62, 0x80000001, 0x4, 0x6d3f, 0x6, 0x5, 0x5]}, 0x0) ioctl$auto_SNDCTL_TMR_CONTINUE(r0, 0x5404, 0x0) 11.484751772s ago: executing program 0 (id=2747): unshare$auto(0x40000080) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xed\xf8\xe1\xbc\x1d\x91D\xe7R\x12\xc4\xcd\xc6\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY2@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(', 0x100000a3dd) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x281, 0x0) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40802, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/controlC2\x00', 0x8100, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0xc0100, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0x0, 0x1, 0x2, 0x9, 0x15f4da07, 0x6, 0x10001, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0xd8]}, 0x0) 11.157536667s ago: executing program 4 (id=2751): mmap$auto(0x0, 0x20009, 0x10000000000df, 0xeb2, 0x401, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x6a2, 0x2000000000002) socket(0x26, 0x80805, 0x0) socket(0x28, 0x1, 0x0) socket(0x1, 0x1, 0x1) open(&(0x7f0000000000)='./bus\x00', 0x22042, 0x45) fanotify_mark$auto(0x0, 0x1, 0x9, 0x4, 0x0) close_range$auto(0x2, 0x8, 0x0) readv$auto(0x0, &(0x7f0000000080)={0x0, 0x60}, 0x3) 10.931945963s ago: executing program 1 (id=2754): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) bpf$auto(0x1, &(0x7f0000000000)=@batch={0xfffffffffffffffb, 0x44, 0x2, 0x9, 0x81, r0, 0x2, 0x8}, 0x100000cf) r1 = socket(0x29, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200"], 0x1ac}}, 0x40000) recvmmsg$auto(r2, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x13}, 0x803}, 0xfffffff9, 0x10, 0x0) ioctl$auto(r1, 0x89f0, 0x24) ioctl$auto(r0, 0x89f1, 0x24) 10.810004482s ago: executing program 4 (id=2755): r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) io_uring_setup$auto(0xa, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) socket(0x2, 0x1, 0x84) setsockopt$auto(0x3, 0x10000000084, 0x81, 0x0, 0x8) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x66) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x14, 0x0, 0x73b, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x400c880) 10.459659767s ago: executing program 4 (id=2756): socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) io_uring_setup$auto(0x7, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) close_range$auto(0x2, 0x8, 0x0) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/virtual/block/nbd10/queue/zone_append_max_bytes\x00', 0x80, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) 10.01838701s ago: executing program 3 (id=2757): r0 = socket(0xa, 0x1, 0x84) mmap$auto(0x0, 0x20004, 0x1ff, 0xeb1, 0x8000000000000024, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x13}, 0x6}, 0xfffffff9, 0x10, 0x0) getsockopt$auto(r0, 0x84, 0x7c, 0x0, &(0x7f0000000000)=0x7ffe) 10.017888806s ago: executing program 0 (id=2765): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv6/conf/geneve0/disable_ipv6\x00', 0x40001, 0x0) close_range$auto(0x2, 0xa, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40602, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) r1 = socket(0xa, 0x5, 0x0) getsockopt$auto(r1, 0x84, 0x11, 0x0, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xf15a}, 0x6, 0x8, 0x5) pwritev$auto(r0, &(0x7f0000000040)={0x0, 0x1}, 0x9, 0x3, 0xd3b8) 10.017563805s ago: executing program 4 (id=2758): openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/tty43\x00', 0x101401, 0x0) socket(0xa, 0x1, 0x100) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x60042, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x10000000000001ff, 0x7, 0xd3e, 0x20, 0x9687, 0x100000000000003, 0x3c2a19d5, 0x6, 0x3, 0x62, 0x8, 0x7, 0x6d3f, 0x6, 0xa, 0xfffffffffffffffe]}, 0x0) close_range$auto(0x2, 0x8, 0x0) syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) 9.949022693s ago: executing program 1 (id=2759): close_range$auto(0x2, 0x8, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000080), 0x88000, 0x0) ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{0x400000ff, 0x400, 0x9}]}) 9.745309534s ago: executing program 1 (id=2760): close_range$auto(0x2, 0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x126, 0xf8, 0xffffffffffffffff, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) bpf$auto(0x0, 0x0, 0x14) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) getsockname$auto(r0, 0x0, 0x0) 9.251201829s ago: executing program 0 (id=2761): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0x8, 0x8000) unshare$auto(0x40000080) clock_nanosleep$auto(0x2, 0x6, &(0x7f0000000840)={0x0, 0xc025}, 0x0) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff000, 0x2) landlock_create_ruleset$auto(&(0x7f0000000000)={0x81, 0x8000000000001, 0xa}, 0xb, 0x0) landlock_restrict_self$auto(r0, 0x8) 9.170698108s ago: executing program 4 (id=2762): mmap$auto(0x0, 0x2020009, 0x40000003, 0xeb1, 0xffffffffffffffff, 0x8000) timer_create$auto(0xfffffffc, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) timer_settime$auto(0x0, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x83}}, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0xa) close_range$auto(0x2, 0x8, 0x0) 9.130327907s ago: executing program 1 (id=2763): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/platform/dummy_hcd.0/usb1/1-0:1.0/usb1-port1/quirks\x00', 0x103a42, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r1}, 0x6a) sendto$auto(r0, 0x0, 0x6fffff9, 0xfffffff8, &(0x7f0000000440)=@can, 0x36) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) 8.885928456s ago: executing program 1 (id=2764): openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon33\x00', 0x121200, 0x0) mmap$auto(0x0, 0x4000002, 0xfffffffffffffe01, 0x8051, 0x3, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) unshare$auto(0x40000080) sendmsg$auto_NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_MAX_CSMA_BACKOFFS={0x5, 0x12, 0x40}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x40000) io_setup$auto(0x7ffe, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$auto_F_SETOWN(0xffffffffffffffff, 0x8, 0x0) 8.885827185s ago: executing program 3 (id=2766): close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = socketcall$auto(0x8000, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0x4008ae8a, &(0x7f0000000140)) 8.647817905s ago: executing program 3 (id=2767): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) bpf$auto(0x1, &(0x7f0000000000)=@batch={0xfffffffffffffffb, 0x44, 0x2, 0x9, 0x81, 0xffffffffffffffff, 0x2, 0x8}, 0x100000cf) r0 = socket(0x29, 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmsg$auto_MAC802154_HWSIM_CMD_DEL_RADIO(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x45840}, 0x40) recvmmsg$auto(r1, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x800}, 0x6}, 0xfffffdf9, 0x10, 0x0) capset$auto(0x0, 0x0) ioctl$auto(r0, 0x89f1, 0x24) 8.528526767s ago: executing program 0 (id=2768): mmap$auto(0x0, 0xdb3, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = mq_open$auto(&(0x7f00000000c0)='\x12\xe6D\b\x9e\x00\x80\x8d\f\xb9w-\xbd!\x9eb\xed\xfb\x0f\xe5\x9dZ\xc2\xd1\x01wBV\x91\x8f_\xc0.\x84\xfe\x84\xd1se\x01\x06\x00\xb3\x13_Y&\xa9\x88\xe4\xa2\xb0V\x85\x92<\xb6\xdcT \\\xf2\v\xb1\xe2\xd8\xfa\xd8V\xe5\x00\xfa\xe9!\xc5<\xce\x18=\x06\xdagq\xb5\r\t\xb2\xde\x99\xd50\xbb\x192\x1c4\x86\xc0\xc1-\xd5\x10\xc3\xfc*[8\x89h\xc5\xba\xff\xc8u5 [ 430.718524][T12877] netlink: 202 bytes leftover after parsing attributes in process `syz.1.2318'. [ 430.929394][T12884] netlink: 186 bytes leftover after parsing attributes in process `syz.0.2317'. [ 431.790550][T12908] netlink: 'syz.3.2328': attribute type 1 has an invalid length. [ 431.835677][T12908] netlink: 'syz.3.2328': attribute type 6 has an invalid length. [ 432.207343][T12918] netlink: 342 bytes leftover after parsing attributes in process `syz.3.2331'. [ 432.294469][T12918] netlink: 150 bytes leftover after parsing attributes in process `syz.3.2331'. [ 432.449027][T12921] FAULT_INJECTION: forcing a failure. [ 432.449027][T12921] name failslab, interval 1, probability 0, space 0, times 0 [ 432.495286][T12921] CPU: 0 UID: 0 PID: 12921 Comm: syz.0.2340 Tainted: P L syzkaller #0 PREEMPT(full) [ 432.495315][T12921] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 432.495321][T12921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 432.495331][T12921] Call Trace: [ 432.495337][T12921] [ 432.495343][T12921] dump_stack_lvl+0x100/0x190 [ 432.495365][T12921] should_fail_ex.cold+0x5/0xa [ 432.495384][T12921] should_failslab+0xc2/0x120 [ 432.495401][T12921] __kmalloc_node_track_caller_noprof+0xe3/0x850 [ 432.495426][T12921] ? key_alloc+0xc6d/0x1310 [ 432.495439][T12921] ? kmem_cache_alloc_noprof+0x292/0x6e0 [ 432.495464][T12921] kmemdup_noprof+0x29/0x60 [ 432.495479][T12921] key_alloc+0xc6d/0x1310 [ 432.495499][T12921] ? __pfx_key_alloc+0x10/0x10 [ 432.495511][T12921] ? __asan_memcpy+0x3c/0x60 [ 432.495537][T12921] keyring_alloc+0x44/0xc0 [ 432.495553][T12921] keyctl_get_persistent+0x779/0x8b0 [ 432.495572][T12921] ? __pfx_keyctl_get_persistent+0x10/0x10 [ 432.495590][T12921] ? __x64_sys_futex+0x34f/0x4d0 [ 432.495607][T12921] ? __x64_sys_futex+0x358/0x4d0 [ 432.495631][T12921] __do_sys_keyctl+0x3b2/0x5a0 [ 432.495651][T12921] do_syscall_64+0x10b/0xf80 [ 432.495671][T12921] ? clear_bhb_loop+0x40/0x90 [ 432.495689][T12921] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 432.495705][T12921] RIP: 0033:0x7ff45199c819 [ 432.495719][T12921] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 432.495734][T12921] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 432.495749][T12921] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 432.495758][T12921] RDX: fffffffffffffffb RSI: 000000000000ee00 RDI: 0000000000000016 [ 432.495768][T12921] RBP: 00007ff451a32c91 R08: 0810000000000004 R09: 0000000000000000 [ 432.495777][T12921] R10: ffffffffffffe6d6 R11: 0000000000000246 R12: 0000000000000000 [ 432.495786][T12921] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 432.495805][T12921] [ 434.363397][T12942] FAULT_INJECTION: forcing a failure. [ 434.363397][T12942] name failslab, interval 1, probability 0, space 0, times 0 [ 434.440025][T12942] CPU: 0 UID: 0 PID: 12942 Comm: syz.0.2347 Tainted: P L syzkaller #0 PREEMPT(full) [ 434.440055][T12942] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 434.440062][T12942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 434.440071][T12942] Call Trace: [ 434.440077][T12942] [ 434.440083][T12942] dump_stack_lvl+0x100/0x190 [ 434.440106][T12942] should_fail_ex.cold+0x5/0xa [ 434.440126][T12942] ? acpi_ex_allocate_name_string+0x8c/0x340 [ 434.440144][T12942] should_failslab+0xc2/0x120 [ 434.440167][T12942] __kmalloc_noprof+0xe0/0x850 [ 434.440195][T12942] acpi_ex_allocate_name_string+0x8c/0x340 [ 434.440216][T12942] acpi_ex_get_name_string+0x322/0xb90 [ 434.440236][T12942] ? __pfx_acpi_ex_get_name_string+0x10/0x10 [ 434.440259][T12942] acpi_ds_create_operand+0x3fd/0xc20 [ 434.440282][T12942] ? __pfx_acpi_ds_create_operand+0x10/0x10 [ 434.440303][T12942] ? acpi_ut_trace_ptr+0x1d2/0x2a0 [ 434.440320][T12942] ? __pfx_acpi_ut_trace_ptr+0x10/0x10 [ 434.440334][T12942] ? __pfx_acpi_ns_lookup+0x10/0x10 [ 434.440350][T12942] ? acpi_ut_track_stack_ptr+0x114/0x180 [ 434.440369][T12942] acpi_ds_evaluate_name_path+0x158/0x4a0 [ 434.440392][T12942] ? __pfx_acpi_ds_evaluate_name_path+0x10/0x10 [ 434.440416][T12942] ? acpi_ps_get_next_namepath+0x1f6/0xa10 [ 434.440438][T12942] ? acpi_ut_trace_ptr+0x121/0x2a0 [ 434.440455][T12942] acpi_ds_exec_end_op+0xb78/0x1e60 [ 434.440480][T12942] ? __pfx_acpi_ds_exec_end_op+0x10/0x10 [ 434.440502][T12942] acpi_ps_parse_loop+0x5dd/0x24a0 [ 434.440531][T12942] ? __pfx_acpi_ps_parse_loop+0x10/0x10 [ 434.440553][T12942] ? kmem_cache_alloc_noprof+0x292/0x6e0 [ 434.440574][T12942] ? acpi_ut_create_thread_state+0x6d/0x170 [ 434.440603][T12942] acpi_ps_parse_aml+0x81e/0x1120 [ 434.440621][T12942] acpi_ps_execute_method+0x5c4/0xe90 [ 434.440642][T12942] acpi_ns_evaluate+0x640/0x1670 [ 434.440664][T12942] acpi_evaluate_object+0x420/0xe00 [ 434.440684][T12942] ? kasan_save_stack+0x30/0x50 [ 434.440697][T12942] ? kasan_save_track+0x14/0x30 [ 434.440709][T12942] ? __kasan_kmalloc+0xaa/0xb0 [ 434.440722][T12942] ? __kvmalloc_node_noprof+0x360/0xa00 [ 434.440747][T12942] ? __pfx_acpi_evaluate_object+0x10/0x10 [ 434.440767][T12942] ? lock_acquire+0x1b1/0x370 [ 434.440795][T12942] acpi_evaluate_integer+0xdf/0x220 [ 434.440815][T12942] ? __pfx_acpi_evaluate_integer+0x10/0x10 [ 434.440842][T12942] ? __pfx_status_show+0x10/0x10 [ 434.440863][T12942] status_show+0xa0/0x120 [ 434.440883][T12942] ? __pfx_status_show+0x10/0x10 [ 434.440909][T12942] dev_attr_show+0x52/0xa0 [ 434.440925][T12942] ? __pfx_dev_attr_show+0x10/0x10 [ 434.440940][T12942] sysfs_kf_seq_show+0x217/0x3a0 [ 434.440967][T12942] seq_read_iter+0x32f/0x1270 [ 434.440982][T12942] ? lock_acquire+0x1b1/0x370 [ 434.441011][T12942] kernfs_fop_read_iter+0x46c/0x610 [ 434.441031][T12942] ? rw_verify_area+0xce/0x6d0 [ 434.441045][T12942] ? __pfx_kernfs_fop_read_iter+0x10/0x10 [ 434.441066][T12942] vfs_read+0x825/0xb30 [ 434.441088][T12942] ? __pfx_vfs_read+0x10/0x10 [ 434.441116][T12942] ksys_read+0x12a/0x250 [ 434.441132][T12942] ? __pfx_ksys_read+0x10/0x10 [ 434.441150][T12942] ? rcu_is_watching+0x12/0xc0 [ 434.441178][T12942] do_syscall_64+0x10b/0xf80 [ 434.441199][T12942] ? clear_bhb_loop+0x40/0x90 [ 434.441218][T12942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 434.441233][T12942] RIP: 0033:0x7ff45199c819 [ 434.441247][T12942] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 434.441261][T12942] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 434.441276][T12942] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 434.441287][T12942] RDX: 000000000000007a RSI: 0000200000000140 RDI: 0000000000000004 [ 434.441296][T12942] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 434.441305][T12942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 434.441314][T12942] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 434.441334][T12942] [ 434.441362][T12942] ACPI Error: [ 435.910063][T12965] FAULT_INJECTION: forcing a failure. [ 435.910063][T12965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.960769][T12942] Could not allocate size 7 (20251212/exnames-68) [ 435.979815][T12965] CPU: 0 UID: 0 PID: 12965 Comm: syz.4.2345 Tainted: P L syzkaller #0 PREEMPT(full) [ 435.979844][T12965] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 435.979850][T12965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 435.979860][T12965] Call Trace: [ 435.979866][T12965] [ 435.979872][T12965] dump_stack_lvl+0x100/0x190 [ 435.979895][T12965] should_fail_ex.cold+0x5/0xa [ 435.979912][T12965] ? prepare_alloc_pages+0x16d/0x5f0 [ 435.979932][T12965] should_fail_alloc_page+0xeb/0x140 [ 435.979951][T12965] prepare_alloc_pages+0x1f0/0x5f0 [ 435.979973][T12965] __alloc_frozen_pages_noprof+0x19a/0x2bc0 [ 435.980000][T12965] ? stack_trace_save+0x8e/0xc0 [ 435.980019][T12965] ? __pfx_stack_trace_save+0x10/0x10 [ 435.980037][T12965] ? __alloc_frozen_pages_noprof+0x2b1/0x2bc0 [ 435.980059][T12965] ? stack_depot_save_flags+0x27/0x9d0 [ 435.980084][T12965] ? __lock_acquire+0x4a5/0x2630 [ 435.980108][T12965] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 435.980130][T12965] ? kasan_save_track+0x14/0x30 [ 435.980143][T12965] ? __kasan_slab_alloc+0x89/0x90 [ 435.980156][T12965] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 435.980178][T12965] ? copy_page_range+0x418b/0x5b00 [ 435.980197][T12965] ? copy_process+0x7b37/0x7fa0 [ 435.980215][T12965] ? kernel_clone+0x12e/0x9c0 [ 435.980233][T12965] ? __do_sys_clone+0xd9/0x120 [ 435.980251][T12965] ? do_syscall_64+0x10b/0xf80 [ 435.980269][T12965] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.980293][T12965] ? __lock_acquire+0x4a5/0x2630 [ 435.980322][T12965] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 435.980346][T12965] ? policy_nodemask+0xed/0x4f0 [ 435.980364][T12965] alloc_pages_mpol+0x1fb/0x540 [ 435.980383][T12965] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 435.980405][T12965] alloc_pages_noprof+0x1a/0x160 [ 435.980424][T12965] pte_alloc_one+0x1c/0x3d0 [ 435.980444][T12965] __pte_alloc+0x6d/0x3e0 [ 435.980459][T12965] ? __pfx___pte_alloc+0x10/0x10 [ 435.980475][T12965] ? _raw_spin_unlock+0x28/0x50 [ 435.980495][T12965] ? __pmd_alloc+0x3fb/0x950 [ 435.980514][T12965] copy_page_range+0x3dbb/0x5b00 [ 435.980543][T12965] ? find_held_lock+0x2b/0x80 [ 435.980572][T12965] ? mas_wr_store_entry+0xa1/0x1e80 [ 435.980595][T12965] ? __pfx_copy_page_range+0x10/0x10 [ 435.980619][T12965] ? mas_store+0x666/0xac0 [ 435.980641][T12965] ? __pfx_mas_store+0x10/0x10 [ 435.980666][T12965] ? __pfx___vma_start_write+0x10/0x10 [ 435.980691][T12965] dup_mmap+0xd25/0x2180 [ 435.980717][T12965] ? __pfx_dup_mmap+0x10/0x10 [ 435.980734][T12965] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 435.980756][T12965] ? __lock_acquire+0x4a5/0x2630 [ 435.980778][T12965] ? find_held_lock+0x2b/0x80 [ 435.980796][T12965] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 435.980833][T12965] copy_process+0x7b37/0x7fa0 [ 435.980863][T12965] ? __pfx_copy_process+0x10/0x10 [ 435.980882][T12965] ? find_held_lock+0x2b/0x80 [ 435.980907][T12965] kernel_clone+0x12e/0x9c0 [ 435.980925][T12965] ? __pfx_futex_wait+0x10/0x10 [ 435.980944][T12965] ? __pfx_kernel_clone+0x10/0x10 [ 435.980974][T12965] __do_sys_clone+0xd9/0x120 [ 435.980994][T12965] ? __pfx___do_sys_clone+0x10/0x10 [ 435.981021][T12965] ? __task_pid_nr_ns+0x1ca/0x510 [ 435.981045][T12965] ? rcu_is_watching+0x12/0xc0 [ 435.981064][T12965] do_syscall_64+0x10b/0xf80 [ 435.981083][T12965] ? clear_bhb_loop+0x40/0x90 [ 435.981101][T12965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.981115][T12965] RIP: 0033:0x7f0bd5d9c819 [ 435.981129][T12965] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 435.981144][T12965] RSP: 002b:00007f0bd6bfffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 435.981159][T12965] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 435.981170][T12965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 435.981179][T12965] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 435.981188][T12965] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 435.981197][T12965] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 435.981217][T12965] [ 436.450237][T12942] ACPI Error: Aborting method \_SB.LNKA._STA due to previous error (AE_NO_MEMORY) (20251212/psparse-529) [ 439.767627][T13051] FAULT_INJECTION: forcing a failure. [ 439.767627][T13051] name failslab, interval 1, probability 0, space 0, times 0 [ 439.864674][T13051] CPU: 0 UID: 0 PID: 13051 Comm: syz.1.2371 Tainted: P L syzkaller #0 PREEMPT(full) [ 439.864703][T13051] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 439.864714][T13051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 439.864724][T13051] Call Trace: [ 439.864729][T13051] [ 439.864736][T13051] dump_stack_lvl+0x100/0x190 [ 439.864757][T13051] should_fail_ex.cold+0x5/0xa [ 439.864777][T13051] ? kobject_get_path+0xcf/0x2c0 [ 439.864802][T13051] should_failslab+0xc2/0x120 [ 439.864820][T13051] __kmalloc_noprof+0xe0/0x850 [ 439.864846][T13051] kobject_get_path+0xcf/0x2c0 [ 439.864870][T13051] kobject_uevent_env+0x287/0x18b0 [ 439.864889][T13051] ? kvm_uevent_notify_change.part.0+0x321/0x450 [ 439.864912][T13051] ? kfree+0x223/0x6c0 [ 439.864934][T13051] kvm_uevent_notify_change.part.0+0x3a6/0x450 [ 439.864957][T13051] ? __pfx_kvm_vm_release+0x10/0x10 [ 439.864977][T13051] kvm_put_kvm+0xe4/0xb10 [ 439.864995][T13051] ? lockdep_hardirqs_on+0x78/0x100 [ 439.865015][T13051] ? _raw_spin_unlock_irq+0x2e/0x50 [ 439.865034][T13051] ? __pfx_kvm_vm_release+0x10/0x10 [ 439.865053][T13051] kvm_vm_release+0x3c/0x50 [ 439.865080][T13051] __fput+0x3ff/0xb50 [ 439.865102][T13051] ? _raw_spin_unlock_irq+0x23/0x50 [ 439.865122][T13051] task_work_run+0x150/0x240 [ 439.865138][T13051] ? __pfx_task_work_run+0x10/0x10 [ 439.865154][T13051] ? rcu_is_watching+0x12/0xc0 [ 439.865173][T13051] exit_to_user_mode_loop+0x100/0x4a0 [ 439.865187][T13051] ? do_syscall_64+0x519/0xf80 [ 439.865207][T13051] do_syscall_64+0x6f2/0xf80 [ 439.865225][T13051] ? clear_bhb_loop+0x40/0x90 [ 439.865243][T13051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 439.865258][T13051] RIP: 0033:0x7f126e79c819 [ 439.865271][T13051] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 439.865285][T13051] RSP: 002b:00007f126f583028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 439.865301][T13051] RAX: 0000000000000000 RBX: 00007f126ea16090 RCX: 00007f126e79c819 [ 439.865311][T13051] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 439.865319][T13051] RBP: 00007f126e832c91 R08: 0000000000000000 R09: 0000000000000000 [ 439.865328][T13051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 439.865337][T13051] R13: 00007f126ea16128 R14: 00007f126ea16090 R15: 00007fff2851b8d8 [ 439.865356][T13051] [ 440.199449][T13034] kexec: Could not allocate control_code_buffer [ 440.290731][ T1316] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.297078][ T1316] ieee802154 phy1 wpan1: encryption failed: -22 syzkaller syzkaller login: [ 442.845835][T13100] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2387'. [ 442.918238][T13100] netlink: 25 bytes leftover after parsing attributes in process `syz.1.2387'. [ 442.930815][T13103] FAULT_INJECTION: forcing a failure. [ 442.930815][T13103] name failslab, interval 1, probability 0, space 0, times 0 [ 443.006277][T13103] CPU: 0 UID: 0 PID: 13103 Comm: syz.3.2386 Tainted: P L syzkaller #0 PREEMPT(full) [ 443.006307][T13103] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 443.006313][T13103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 443.006323][T13103] Call Trace: [ 443.006329][T13103] [ 443.006336][T13103] dump_stack_lvl+0x100/0x190 [ 443.006357][T13103] should_fail_ex.cold+0x5/0xa [ 443.006376][T13103] should_failslab+0xc2/0x120 [ 443.006394][T13103] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 443.006416][T13103] ? __alloc_skb+0x140/0x710 [ 443.006442][T13103] __alloc_skb+0x140/0x710 [ 443.006461][T13103] ? __alloc_skb+0x5b7/0x710 [ 443.006481][T13103] ? __pfx___alloc_skb+0x10/0x10 [ 443.006508][T13103] inet6_ifmcaddr_notify+0xd6/0x1d0 [ 443.006525][T13103] ? __pfx_inet6_ifmcaddr_notify+0x10/0x10 [ 443.006549][T13103] __ipv6_dev_mc_dec+0x297/0x340 [ 443.006573][T13103] ipv6_mc_destroy_dev+0x2cd/0x690 [ 443.006594][T13103] ? __local_bh_enable_ip+0x9e/0x120 [ 443.006615][T13103] addrconf_ifdown.isra.0+0x148a/0x1b70 [ 443.006644][T13103] ? __pfx_addrconf_ifdown.isra.0+0x10/0x10 [ 443.006668][T13103] addrconf_notify+0x4a3/0x1ba0 [ 443.006689][T13103] ? __pfx_tls_dev_event+0x10/0x10 [ 443.006712][T13103] ? __pfx_addrconf_notify+0x10/0x10 [ 443.006732][T13103] ? ip6mr_device_event+0x1bc/0x230 [ 443.006753][T13103] notifier_call_chain+0x99/0x400 [ 443.006779][T13103] call_netdevice_notifiers_info+0xbe/0x110 [ 443.006797][T13103] unregister_netdevice_many_notify+0x118f/0x24f0 [ 443.006819][T13103] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 443.006835][T13103] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 443.006864][T13103] unregister_netdevice_queue+0x30b/0x3c0 [ 443.006880][T13103] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 443.006895][T13103] ? __pfx_locks_remove_file+0x10/0x10 [ 443.006919][T13103] ppp_release+0x125/0x150 [ 443.006938][T13103] ? __pfx_ppp_release+0x10/0x10 [ 443.006956][T13103] __fput+0x3ff/0xb50 [ 443.006980][T13103] task_work_run+0x150/0x240 [ 443.006996][T13103] ? __pfx_task_work_run+0x10/0x10 [ 443.007012][T13103] ? rcu_is_watching+0x12/0xc0 [ 443.007032][T13103] exit_to_user_mode_loop+0x100/0x4a0 [ 443.007046][T13103] ? do_syscall_64+0x519/0xf80 [ 443.007067][T13103] do_syscall_64+0x6f2/0xf80 [ 443.007085][T13103] ? clear_bhb_loop+0x40/0x90 [ 443.007103][T13103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.007118][T13103] RIP: 0033:0x7fc05699c819 [ 443.007132][T13103] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 443.007147][T13103] RSP: 002b:00007fc0577cd028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 443.007162][T13103] RAX: 0000000000000000 RBX: 00007fc056c15fa0 RCX: 00007fc05699c819 [ 443.007172][T13103] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 443.007181][T13103] RBP: 00007fc056a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 443.007191][T13103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 443.007203][T13103] R13: 00007fc056c16038 R14: 00007fc056c15fa0 R15: 00007ffdc38cab98 [ 443.007222][T13103] [ 443.646570][T13117] FAULT_INJECTION: forcing a failure. [ 443.646570][T13117] name failslab, interval 1, probability 0, space 0, times 0 [ 443.720788][T13117] CPU: 0 UID: 0 PID: 13117 Comm: syz.0.2399 Tainted: P L syzkaller #0 PREEMPT(full) [ 443.720817][T13117] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 443.720824][T13117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 443.720834][T13117] Call Trace: [ 443.720840][T13117] [ 443.720847][T13117] dump_stack_lvl+0x100/0x190 [ 443.720869][T13117] should_fail_ex.cold+0x5/0xa [ 443.720889][T13117] ? tracepoint_add_func+0x3a8/0x1150 [ 443.720909][T13117] should_failslab+0xc2/0x120 [ 443.720926][T13117] __kmalloc_noprof+0xe0/0x850 [ 443.720952][T13117] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 443.720977][T13117] tracepoint_add_func+0x3a8/0x1150 [ 443.720998][T13117] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 443.721027][T13117] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 443.721052][T13117] tracepoint_probe_register+0xc4/0x110 [ 443.721074][T13117] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 443.721095][T13117] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 443.721115][T13117] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 443.721139][T13117] ? __pfx_probe_sched_switch+0x10/0x10 [ 443.721161][T13117] ? __lock_acquire+0x4a5/0x2630 [ 443.721187][T13117] trace_event_reg+0x209/0x350 [ 443.721206][T13117] __ftrace_event_enable_disable+0x211/0x6f0 [ 443.721235][T13117] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 443.721264][T13117] ftrace_set_clr_event+0x1b7/0x3f0 [ 443.721282][T13117] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 443.721298][T13117] ? trace_get_user+0x3ae/0xa70 [ 443.721324][T13117] ftrace_event_write+0x259/0x2c0 [ 443.721341][T13117] ? __pfx_ftrace_event_write+0x10/0x10 [ 443.721364][T13117] vfs_write+0x2aa/0x1070 [ 443.721382][T13117] ? __pfx_ftrace_event_write+0x10/0x10 [ 443.721399][T13117] ? __pfx_vfs_write+0x10/0x10 [ 443.721414][T13117] ? __fget_files+0x215/0x3d0 [ 443.721435][T13117] ? __fget_files+0x21f/0x3d0 [ 443.721456][T13117] ksys_write+0x12a/0x250 [ 443.721471][T13117] ? __pfx_ksys_write+0x10/0x10 [ 443.721489][T13117] ? rcu_is_watching+0x12/0xc0 [ 443.721508][T13117] do_syscall_64+0x10b/0xf80 [ 443.721527][T13117] ? clear_bhb_loop+0x40/0x90 [ 443.721545][T13117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.721561][T13117] RIP: 0033:0x7ff45199c819 [ 443.721574][T13117] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 443.721589][T13117] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 443.721603][T13117] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 443.721620][T13117] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 443.721629][T13117] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 443.721639][T13117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 443.721648][T13117] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 443.721669][T13117] [ 444.168161][T13120] FAULT_INJECTION: forcing a failure. [ 444.168161][T13120] name failslab, interval 1, probability 0, space 0, times 0 [ 444.180957][T13120] CPU: 0 UID: 0 PID: 13120 Comm: syz.3.2392 Tainted: P L syzkaller #0 PREEMPT(full) [ 444.180986][T13120] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 444.180992][T13120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 444.181002][T13120] Call Trace: [ 444.181008][T13120] [ 444.181014][T13120] dump_stack_lvl+0x100/0x190 [ 444.181036][T13120] should_fail_ex.cold+0x5/0xa [ 444.181057][T13120] should_failslab+0xc2/0x120 [ 444.181074][T13120] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 444.181096][T13120] ? anon_vma_fork+0x8d/0x6b0 [ 444.181121][T13120] anon_vma_fork+0x8d/0x6b0 [ 444.181142][T13120] ? vm_area_dup+0x59d/0x8e0 [ 444.181164][T13120] dup_mmap+0x141f/0x2180 [ 444.181190][T13120] ? __pfx_dup_mmap+0x10/0x10 [ 444.181207][T13120] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 444.181230][T13120] ? __lock_acquire+0x4a5/0x2630 [ 444.181253][T13120] ? find_held_lock+0x2b/0x80 [ 444.181270][T13120] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 444.181308][T13120] copy_process+0x7b37/0x7fa0 [ 444.181338][T13120] ? __pfx_copy_process+0x10/0x10 [ 444.181357][T13120] ? find_held_lock+0x2b/0x80 [ 444.181385][T13120] kernel_clone+0x12e/0x9c0 [ 444.181404][T13120] ? __pfx_futex_wait+0x10/0x10 [ 444.181423][T13120] ? __pfx_kernel_clone+0x10/0x10 [ 444.181456][T13120] __do_sys_clone+0xd9/0x120 [ 444.181477][T13120] ? __pfx___do_sys_clone+0x10/0x10 [ 444.181504][T13120] ? __task_pid_nr_ns+0x1ca/0x510 [ 444.181528][T13120] ? rcu_is_watching+0x12/0xc0 [ 444.181548][T13120] do_syscall_64+0x10b/0xf80 [ 444.181566][T13120] ? clear_bhb_loop+0x40/0x90 [ 444.181591][T13120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 444.181607][T13120] RIP: 0033:0x7fc05699c819 [ 444.181621][T13120] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 444.181636][T13120] RSP: 002b:00007fc0577ccfd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 444.181651][T13120] RAX: ffffffffffffffda RBX: 00007fc056c15fa0 RCX: 00007fc05699c819 [ 444.181662][T13120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 444.181671][T13120] RBP: 00007fc056a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 444.181680][T13120] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 444.181689][T13120] R13: 00007fc056c16038 R14: 00007fc056c15fa0 R15: 00007ffdc38cab98 [ 444.181709][T13120] [ 444.602706][T13127] netlink: 25 bytes leftover after parsing attributes in process `syz.1.2395'. [ 445.366427][T13117] event trace: Could not enable event nfsd_file_open [ 446.124254][T13131] Process accounting resumed [ 448.012657][T13183] netlink: 338 bytes leftover after parsing attributes in process `syz.4.2415'. [ 448.223228][T13187] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2417'. [ 451.489621][T13254] mkiss: ax0: crc mode is auto. [ 453.363843][T13306] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2447'. [ 454.329184][T13317] FAULT_INJECTION: forcing a failure. [ 454.329184][T13317] name failslab, interval 1, probability 0, space 0, times 0 [ 454.329277][T13317] CPU: 0 UID: 0 PID: 13317 Comm: syz.1.2449 Tainted: P L syzkaller #0 PREEMPT(full) [ 454.329303][T13317] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 454.329309][T13317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 454.329319][T13317] Call Trace: [ 454.329325][T13317] [ 454.329331][T13317] dump_stack_lvl+0x100/0x190 [ 454.329352][T13317] should_fail_ex.cold+0x5/0xa [ 454.329372][T13317] should_failslab+0xc2/0x120 [ 454.329390][T13317] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 454.329412][T13317] ? anon_vma_fork+0x8d/0x6b0 [ 454.329436][T13317] anon_vma_fork+0x8d/0x6b0 [ 454.329457][T13317] ? vm_area_dup+0x59d/0x8e0 [ 454.329479][T13317] dup_mmap+0x141f/0x2180 [ 454.329505][T13317] ? __pfx_dup_mmap+0x10/0x10 [ 454.329521][T13317] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 454.329544][T13317] ? __lock_acquire+0x4a5/0x2630 [ 454.329567][T13317] ? find_held_lock+0x2b/0x80 [ 454.329584][T13317] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 454.329621][T13317] copy_process+0x7b37/0x7fa0 [ 454.329651][T13317] ? __pfx_copy_process+0x10/0x10 [ 454.329675][T13317] ? find_held_lock+0x2b/0x80 [ 454.329701][T13317] kernel_clone+0x12e/0x9c0 [ 454.329719][T13317] ? __pfx_futex_wait+0x10/0x10 [ 454.329738][T13317] ? __pfx_kernel_clone+0x10/0x10 [ 454.329769][T13317] __do_sys_clone+0xd9/0x120 [ 454.329788][T13317] ? __pfx___do_sys_clone+0x10/0x10 [ 454.329815][T13317] ? __task_pid_nr_ns+0x1ca/0x510 [ 454.329839][T13317] ? rcu_is_watching+0x12/0xc0 [ 454.329858][T13317] do_syscall_64+0x10b/0xf80 [ 454.329877][T13317] ? clear_bhb_loop+0x40/0x90 [ 454.329895][T13317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 454.329910][T13317] RIP: 0033:0x7f126e79c819 [ 454.329924][T13317] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 454.329939][T13317] RSP: 002b:00007f126f5a3fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 454.329954][T13317] RAX: ffffffffffffffda RBX: 00007f126ea15fa0 RCX: 00007f126e79c819 [ 454.329964][T13317] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 454.329972][T13317] RBP: 00007f126e832c91 R08: 0000000000000000 R09: 0000000000000000 [ 454.329982][T13317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 454.329997][T13317] R13: 00007f126ea16038 R14: 00007f126ea15fa0 R15: 00007fff2851b8d8 [ 454.330018][T13317] [ 455.349915][T13333] netlink: 'syz.3.2457': attribute type 33 has an invalid length. [ 455.708331][T13340] netlink: 326 bytes leftover after parsing attributes in process `syz.3.2460'. [ 456.823017][T13359] FAULT_INJECTION: forcing a failure. [ 456.823017][T13359] name failslab, interval 1, probability 0, space 0, times 0 [ 456.903818][T13359] CPU: 0 UID: 0 PID: 13359 Comm: syz.4.2465 Tainted: P L syzkaller #0 PREEMPT(full) [ 456.903848][T13359] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 456.903855][T13359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 456.903864][T13359] Call Trace: [ 456.903870][T13359] [ 456.903877][T13359] dump_stack_lvl+0x100/0x190 [ 456.903899][T13359] should_fail_ex.cold+0x5/0xa [ 456.903919][T13359] ? tracepoint_add_func+0x3a8/0x1150 [ 456.903940][T13359] should_failslab+0xc2/0x120 [ 456.903957][T13359] __kmalloc_noprof+0xe0/0x850 [ 456.903983][T13359] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 456.904009][T13359] tracepoint_add_func+0x3a8/0x1150 [ 456.904029][T13359] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 456.904057][T13359] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 456.904081][T13359] tracepoint_probe_register+0xc4/0x110 [ 456.904103][T13359] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 456.904123][T13359] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 456.904144][T13359] ? __pfx_trace_event_raw_event_nfsd_file_open_class+0x10/0x10 [ 456.904167][T13359] ? __pfx_probe_sched_switch+0x10/0x10 [ 456.904189][T13359] ? __lock_acquire+0x4a5/0x2630 [ 456.904214][T13359] trace_event_reg+0x209/0x350 [ 456.904234][T13359] __ftrace_event_enable_disable+0x211/0x6f0 [ 456.904259][T13359] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 456.904288][T13359] ftrace_set_clr_event+0x1b7/0x3f0 [ 456.904306][T13359] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 456.904322][T13359] ? trace_get_user+0x3ae/0xa70 [ 456.904348][T13359] ftrace_event_write+0x259/0x2c0 [ 456.904364][T13359] ? __pfx_ftrace_event_write+0x10/0x10 [ 456.904388][T13359] vfs_write+0x2aa/0x1070 [ 456.904406][T13359] ? __pfx_ftrace_event_write+0x10/0x10 [ 456.904424][T13359] ? __pfx_vfs_write+0x10/0x10 [ 456.904439][T13359] ? __fget_files+0x215/0x3d0 [ 456.904461][T13359] ? __fget_files+0x21f/0x3d0 [ 456.904482][T13359] ksys_write+0x12a/0x250 [ 456.904497][T13359] ? __pfx_ksys_write+0x10/0x10 [ 456.904515][T13359] ? rcu_is_watching+0x12/0xc0 [ 456.904534][T13359] do_syscall_64+0x10b/0xf80 [ 456.904553][T13359] ? clear_bhb_loop+0x40/0x90 [ 456.904571][T13359] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.904586][T13359] RIP: 0033:0x7f0bd5d9c819 [ 456.904600][T13359] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 456.904616][T13359] RSP: 002b:00007f0bd6c00028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 456.904631][T13359] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 456.904641][T13359] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 456.904650][T13359] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 456.904659][T13359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 456.904668][T13359] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 456.904688][T13359] [ 456.904699][T13359] event trace: Could not enable event nfsd_file_opened [ 458.677383][T13390] netlink: 322 bytes leftover after parsing attributes in process `syz.3.2478'. [ 459.147266][T13400] netlink: 252 bytes leftover after parsing attributes in process `syz.3.2481'. [ 459.187422][T13400] unsupported nla_type 65535 [ 460.487336][T13425] vivid-007: ================= START STATUS ================= [ 460.531397][T13425] vivid-007: Generate PTS: true [ 460.570403][T13425] vivid-007: Generate SCR: true [ 460.606218][T13425] tpg source WxH: 320x240 (Y'CbCr) [ 460.632763][T13425] tpg field: 1 [ 460.648293][T13425] tpg crop: (0,0)/320x240 [ 460.667474][T13425] tpg compose: (0,0)/320x240 [ 460.691184][T13425] tpg colorspace: 8 [ 460.713514][T13425] tpg transfer function: 0/0 [ 460.732773][T13425] tpg Y'CbCr encoding: 0/0 [ 460.753858][T13425] tpg quantization: 0/0 [ 460.771493][T13425] tpg RGB range: 0/2 [ 460.795336][T13425] vivid-007: ================== END STATUS ================== [ 460.887774][T13433] FAULT_INJECTION: forcing a failure. [ 460.887774][T13433] name failslab, interval 1, probability 0, space 0, times 0 [ 461.095753][T13433] CPU: 0 UID: 0 PID: 13433 Comm: syz.0.2492 Tainted: P L syzkaller #0 PREEMPT(full) [ 461.095788][T13433] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 461.095795][T13433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 461.095804][T13433] Call Trace: [ 461.095810][T13433] [ 461.095818][T13433] dump_stack_lvl+0x100/0x190 [ 461.095841][T13433] should_fail_ex.cold+0x5/0xa [ 461.095861][T13433] should_failslab+0xc2/0x120 [ 461.095879][T13433] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 461.095902][T13433] ? __kernfs_new_node+0xd2/0x9f0 [ 461.095921][T13433] __kernfs_new_node+0xd2/0x9f0 [ 461.095938][T13433] ? __pfx___kernfs_new_node+0x10/0x10 [ 461.095958][T13433] ? find_held_lock+0x2b/0x80 [ 461.095976][T13433] ? kernfs_root+0xee/0x2a0 [ 461.095990][T13433] ? kernfs_root+0xee/0x2a0 [ 461.096008][T13433] kernfs_new_node+0x11b/0x1a0 [ 461.096028][T13433] __kernfs_create_file+0x53/0x350 [ 461.096051][T13433] sysfs_add_file_mode_ns+0x207/0x3c0 [ 461.096078][T13433] sysfs_merge_group+0x194/0x340 [ 461.096095][T13433] ? __pfx_sysfs_merge_group+0x10/0x10 [ 461.096110][T13433] ? bus_add_device+0x368/0x6b0 [ 461.096131][T13433] ? __pfx_bus_add_device+0x10/0x10 [ 461.096150][T13433] ? __pfx_dev_add_physical_location+0x10/0x10 [ 461.096170][T13433] dpm_sysfs_add+0x237/0x280 [ 461.096186][T13433] device_add+0x9ef/0x1950 [ 461.096204][T13433] ? __pfx_device_add+0x10/0x10 [ 461.096219][T13433] ? __pfx___might_resched+0x10/0x10 [ 461.096234][T13433] ? lockdep_hardirqs_on+0x78/0x100 [ 461.096261][T13433] __add_disk+0x518/0xe40 [ 461.096282][T13433] add_disk_fwnode+0x118/0x5c0 [ 461.096301][T13433] loop_add+0x90b/0xb60 [ 461.096320][T13433] ? __pfx_loop_add+0x10/0x10 [ 461.096352][T13433] ? find_held_lock+0x2b/0x80 [ 461.096370][T13433] ? __fget_files+0x215/0x3d0 [ 461.096388][T13433] loop_control_ioctl+0xae/0x620 [ 461.096408][T13433] ? __pfx_loop_control_ioctl+0x10/0x10 [ 461.096430][T13433] ? __pfx_loop_control_ioctl+0x10/0x10 [ 461.096451][T13433] __x64_sys_ioctl+0x18e/0x210 [ 461.096475][T13433] do_syscall_64+0x10b/0xf80 [ 461.096494][T13433] ? clear_bhb_loop+0x40/0x90 [ 461.096512][T13433] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 461.096527][T13433] RIP: 0033:0x7ff45199c819 [ 461.096540][T13433] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 461.096555][T13433] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.096569][T13433] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 461.096579][T13433] RDX: fffffffffffffffd RSI: 0000000000004c80 RDI: 0000000000000005 [ 461.096589][T13433] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 461.096598][T13433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 461.096607][T13433] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 461.096627][T13433] [ 461.978652][T13441] netlink: 'syz.0.2494': attribute type 33 has an invalid length. [ 462.047264][T13441] netlink: 322 bytes leftover after parsing attributes in process `syz.0.2494'. [ 462.266556][T13443] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2495'. [ 464.326122][T13474] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2505'. [ 464.397322][T13475] netlink: 13 bytes leftover after parsing attributes in process `syz.4.2505'. [ 464.926649][T13463] kexec: Could not allocate control_code_buffer [ 466.202263][T13490] random: crng reseeded on system resumption [ 466.387759][T13484] FAULT_INJECTION: forcing a failure. [ 466.387759][T13484] name failslab, interval 1, probability 0, space 0, times 0 [ 466.504928][T13484] CPU: 0 UID: 0 PID: 13484 Comm: syz.4.2508 Tainted: P L syzkaller #0 PREEMPT(full) [ 466.504958][T13484] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 466.504965][T13484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 466.504975][T13484] Call Trace: [ 466.504980][T13484] [ 466.504987][T13484] dump_stack_lvl+0x100/0x190 [ 466.505009][T13484] should_fail_ex.cold+0x5/0xa [ 466.505029][T13484] should_failslab+0xc2/0x120 [ 466.505047][T13484] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 466.505069][T13484] ? vm_area_dup+0x27/0x8e0 [ 466.505088][T13484] ? rcu_is_watching+0x12/0xc0 [ 466.505104][T13484] ? percpu_counter_add_batch+0xb9/0x230 [ 466.505129][T13484] vm_area_dup+0x27/0x8e0 [ 466.505150][T13484] dup_mmap+0x6f6/0x2180 [ 466.505177][T13484] ? __pfx_dup_mmap+0x10/0x10 [ 466.505193][T13484] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 466.505216][T13484] ? __lock_acquire+0x4a5/0x2630 [ 466.505239][T13484] ? find_held_lock+0x2b/0x80 [ 466.505256][T13484] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 466.505293][T13484] copy_process+0x7b37/0x7fa0 [ 466.505324][T13484] ? __pfx_copy_process+0x10/0x10 [ 466.505344][T13484] ? find_held_lock+0x2b/0x80 [ 466.505369][T13484] kernel_clone+0x12e/0x9c0 [ 466.505387][T13484] ? __pfx_futex_wait+0x10/0x10 [ 466.505407][T13484] ? __pfx_kernel_clone+0x10/0x10 [ 466.505439][T13484] ? clockevents_program_event+0x23e/0x820 [ 466.505462][T13484] __do_sys_clone+0xd9/0x120 [ 466.505483][T13484] ? __pfx___do_sys_clone+0x10/0x10 [ 466.505511][T13484] ? __hrtimer_rearm_deferred+0x24d/0x740 [ 466.505534][T13484] ? rcu_is_watching+0x12/0xc0 [ 466.505553][T13484] do_syscall_64+0x10b/0xf80 [ 466.505572][T13484] ? clear_bhb_loop+0x40/0x90 [ 466.505590][T13484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 466.505605][T13484] RIP: 0033:0x7f0bd5d9c819 [ 466.505618][T13484] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 466.505633][T13484] RSP: 002b:00007f0bd6bfffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 466.505648][T13484] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 466.505658][T13484] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 466.505667][T13484] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 466.505676][T13484] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 466.505685][T13484] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 466.505705][T13484] [ 468.359260][T13495] FAULT_INJECTION: forcing a failure. [ 468.359260][T13495] name failslab, interval 1, probability 0, space 0, times 0 [ 468.508119][T13495] CPU: 0 UID: 0 PID: 13495 Comm: syz.0.2511 Tainted: P L syzkaller #0 PREEMPT(full) [ 468.508149][T13495] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 468.508156][T13495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 468.508165][T13495] Call Trace: [ 468.508171][T13495] [ 468.508177][T13495] dump_stack_lvl+0x100/0x190 [ 468.508199][T13495] should_fail_ex.cold+0x5/0xa [ 468.508218][T13495] should_failslab+0xc2/0x120 [ 468.508237][T13495] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 468.508258][T13495] ? security_file_alloc+0x34/0x2c0 [ 468.508273][T13495] ? trace_kmem_cache_alloc+0xd5/0x100 [ 468.508299][T13495] security_file_alloc+0x34/0x2c0 [ 468.508315][T13495] init_file+0x95/0x480 [ 468.508335][T13495] alloc_empty_file+0x79/0x1c0 [ 468.508357][T13495] path_openat+0xe8/0x31a0 [ 468.508374][T13495] ? kasan_save_stack+0x3f/0x50 [ 468.508387][T13495] ? kasan_save_stack+0x30/0x50 [ 468.508399][T13495] ? kasan_save_track+0x14/0x30 [ 468.508412][T13495] ? __kasan_slab_alloc+0x89/0x90 [ 468.508425][T13495] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 468.508445][T13495] ? do_getname+0x35/0x390 [ 468.508464][T13495] ? do_sys_openat2+0xc5/0x1e0 [ 468.508484][T13495] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.508502][T13495] ? __pfx_path_openat+0x10/0x10 [ 468.508526][T13495] do_file_open+0x20e/0x430 [ 468.508544][T13495] ? __pfx_do_file_open+0x10/0x10 [ 468.508574][T13495] ? alloc_fd+0x476/0x790 [ 468.508592][T13495] ? do_getname+0x191/0x390 [ 468.508614][T13495] do_sys_openat2+0x10d/0x1e0 [ 468.508635][T13495] ? __pfx_do_sys_openat2+0x10/0x10 [ 468.508657][T13495] ? __fget_files+0x21f/0x3d0 [ 468.508676][T13495] __x64_sys_openat+0x12d/0x210 [ 468.508697][T13495] ? __pfx___x64_sys_openat+0x10/0x10 [ 468.508721][T13495] ? rcu_is_watching+0x12/0xc0 [ 468.508741][T13495] do_syscall_64+0x10b/0xf80 [ 468.508760][T13495] ? clear_bhb_loop+0x40/0x90 [ 468.508777][T13495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.508792][T13495] RIP: 0033:0x7ff45199c819 [ 468.508806][T13495] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 468.508820][T13495] RSP: 002b:00007ff452875028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 468.508835][T13495] RAX: ffffffffffffffda RBX: 00007ff451c16090 RCX: 00007ff45199c819 [ 468.508846][T13495] RDX: 0000000000101901 RSI: 0000200000002c00 RDI: ffffffffffffff9c [ 468.508856][T13495] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 468.508866][T13495] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 468.508875][T13495] R13: 00007ff451c16128 R14: 00007ff451c16090 R15: 00007ffd325fbd08 [ 468.508894][T13495] [ 471.269078][T13520] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2519'. [ 472.995317][T13575] FAULT_INJECTION: forcing a failure. [ 472.995317][T13575] name failslab, interval 1, probability 0, space 0, times 0 [ 473.088127][T13575] CPU: 0 UID: 0 PID: 13575 Comm: syz.1.2542 Tainted: P L syzkaller #0 PREEMPT(full) [ 473.088159][T13575] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 473.088165][T13575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 473.088176][T13575] Call Trace: [ 473.088182][T13575] [ 473.088189][T13575] dump_stack_lvl+0x100/0x190 [ 473.088213][T13575] should_fail_ex.cold+0x5/0xa [ 473.088233][T13575] should_failslab+0xc2/0x120 [ 473.088251][T13575] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 473.088274][T13575] ? __kernfs_new_node+0xd2/0x9f0 [ 473.088294][T13575] __kernfs_new_node+0xd2/0x9f0 [ 473.088313][T13575] ? __pfx___kernfs_new_node+0x10/0x10 [ 473.088333][T13575] ? find_held_lock+0x2b/0x80 [ 473.088354][T13575] ? kernfs_root+0xee/0x2a0 [ 473.088367][T13575] ? kernfs_root+0xee/0x2a0 [ 473.088386][T13575] kernfs_new_node+0x11b/0x1a0 [ 473.088406][T13575] __kernfs_create_file+0x53/0x350 [ 473.088429][T13575] sysfs_add_file_mode_ns+0x207/0x3c0 [ 473.088456][T13575] internal_create_group+0x593/0xf40 [ 473.088476][T13575] ? __pfx_internal_create_group+0x10/0x10 [ 473.088495][T13575] ? kernfs_create_link+0x1bd/0x240 [ 473.088518][T13575] internal_create_groups+0x9d/0x150 [ 473.088535][T13575] device_add+0x7c8/0x1950 [ 473.088553][T13575] ? __pfx_device_add+0x10/0x10 [ 473.088569][T13575] ? lockdep_init_map_type+0x5c/0x250 [ 473.088585][T13575] ? __init_waitqueue_head+0xca/0x150 [ 473.088605][T13575] netdev_register_kobject+0x1a9/0x3d0 [ 473.088626][T13575] register_netdevice+0x12e0/0x2210 [ 473.088643][T13575] ? idr_alloc+0xdd/0x130 [ 473.088663][T13575] ? __pfx_register_netdevice+0x10/0x10 [ 473.088676][T13575] ? net_generic+0xea/0x2a0 [ 473.088702][T13575] ppp_dev_configure+0x986/0xcb0 [ 473.088728][T13575] ppp_ioctl+0x9d7/0x27c0 [ 473.088751][T13575] ? find_held_lock+0x2b/0x80 [ 473.088774][T13575] ? __pfx_ppp_ioctl+0x10/0x10 [ 473.088801][T13575] ? __fget_files+0x21f/0x3d0 [ 473.088820][T13575] ? __pfx_ppp_ioctl+0x10/0x10 [ 473.088843][T13575] __x64_sys_ioctl+0x18e/0x210 [ 473.088870][T13575] do_syscall_64+0x10b/0xf80 [ 473.088889][T13575] ? clear_bhb_loop+0x40/0x90 [ 473.088908][T13575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.088923][T13575] RIP: 0033:0x7f126e79c819 [ 473.088938][T13575] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 473.088954][T13575] RSP: 002b:00007f126f5a4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 473.088970][T13575] RAX: ffffffffffffffda RBX: 00007f126ea15fa0 RCX: 00007f126e79c819 [ 473.088980][T13575] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000006 [ 473.088991][T13575] RBP: 00007f126e832c91 R08: 0000000000000000 R09: 0000000000000000 [ 473.089001][T13575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 473.089011][T13575] R13: 00007f126ea16038 R14: 00007f126ea15fa0 R15: 00007fff2851b8d8 [ 473.089031][T13575] [ 473.789811][T13581] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2543'. [ 475.745379][T13615] netlink: 334 bytes leftover after parsing attributes in process `syz.0.2554'. [ 476.553632][T13625] Process accounting paused [ 477.687819][T13657] netlink: 334 bytes leftover after parsing attributes in process `syz.4.2571'. [ 478.305090][T13675] netlink: 'syz.4.2577': attribute type 16 has an invalid length. [ 478.361168][T13675] netlink: 330 bytes leftover after parsing attributes in process `syz.4.2577'. [ 479.849680][T13708] binder: 13706:13708 ioctl 400c620e 0 returned -14 [ 480.387476][T13715] FAULT_INJECTION: forcing a failure. [ 480.387476][T13715] name failslab, interval 1, probability 0, space 0, times 0 [ 480.461398][T13715] CPU: 0 UID: 0 PID: 13715 Comm: syz.0.2593 Tainted: P L syzkaller #0 PREEMPT(full) [ 480.461428][T13715] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 480.461436][T13715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 480.461446][T13715] Call Trace: [ 480.461452][T13715] [ 480.461459][T13715] dump_stack_lvl+0x100/0x190 [ 480.461480][T13715] should_fail_ex.cold+0x5/0xa [ 480.461501][T13715] should_failslab+0xc2/0x120 [ 480.461518][T13715] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 480.461542][T13715] ? __kernfs_new_node+0xd2/0x9f0 [ 480.461562][T13715] __kernfs_new_node+0xd2/0x9f0 [ 480.461579][T13715] ? __pfx___kernfs_new_node+0x10/0x10 [ 480.461600][T13715] ? find_held_lock+0x2b/0x80 [ 480.461619][T13715] ? kernfs_root+0xee/0x2a0 [ 480.461634][T13715] ? kernfs_root+0xee/0x2a0 [ 480.461654][T13715] kernfs_new_node+0x11b/0x1a0 [ 480.461675][T13715] __kernfs_create_file+0x53/0x350 [ 480.461698][T13715] sysfs_add_file_mode_ns+0x207/0x3c0 [ 480.461726][T13715] internal_create_group+0x593/0xf40 [ 480.461747][T13715] ? __pfx_internal_create_group+0x10/0x10 [ 480.461766][T13715] ? kernfs_create_link+0x1bd/0x240 [ 480.461790][T13715] internal_create_groups+0x9d/0x150 [ 480.461808][T13715] device_add+0x7c8/0x1950 [ 480.461827][T13715] ? __pfx_device_add+0x10/0x10 [ 480.461842][T13715] ? lockdep_init_map_type+0x5c/0x250 [ 480.461858][T13715] ? __init_waitqueue_head+0xca/0x150 [ 480.461879][T13715] netdev_register_kobject+0x1a9/0x3d0 [ 480.461900][T13715] register_netdevice+0x12e0/0x2210 [ 480.461917][T13715] ? idr_alloc+0xdd/0x130 [ 480.461937][T13715] ? __pfx_register_netdevice+0x10/0x10 [ 480.461951][T13715] ? net_generic+0xea/0x2a0 [ 480.461977][T13715] ppp_dev_configure+0x986/0xcb0 [ 480.462004][T13715] ppp_ioctl+0x9d7/0x27c0 [ 480.462027][T13715] ? find_held_lock+0x2b/0x80 [ 480.462045][T13715] ? __pfx_ppp_ioctl+0x10/0x10 [ 480.462070][T13715] ? __fget_files+0x21f/0x3d0 [ 480.462093][T13715] ? __pfx_ppp_ioctl+0x10/0x10 [ 480.462116][T13715] __x64_sys_ioctl+0x18e/0x210 [ 480.462142][T13715] do_syscall_64+0x10b/0xf80 [ 480.462162][T13715] ? clear_bhb_loop+0x40/0x90 [ 480.462180][T13715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.462196][T13715] RIP: 0033:0x7ff45199c819 [ 480.462209][T13715] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 480.462225][T13715] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 480.462240][T13715] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 480.462251][T13715] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000006 [ 480.462260][T13715] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 480.462270][T13715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 480.462279][T13715] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 480.462300][T13715] [ 481.432509][T13725] Invalid ELF header magic: != ELF [ 482.678826][T13746] FAULT_INJECTION: forcing a failure. [ 482.678826][T13746] name failslab, interval 1, probability 0, space 0, times 0 [ 482.722187][T13746] CPU: 0 UID: 0 PID: 13746 Comm: syz.4.2604 Tainted: P L syzkaller #0 PREEMPT(full) [ 482.722218][T13746] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 482.722225][T13746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 482.722236][T13746] Call Trace: [ 482.722242][T13746] [ 482.722249][T13746] dump_stack_lvl+0x100/0x190 [ 482.722272][T13746] should_fail_ex.cold+0x5/0xa [ 482.722292][T13746] should_failslab+0xc2/0x120 [ 482.722311][T13746] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 482.722334][T13746] ? __kernfs_new_node+0xd2/0x9f0 [ 482.722354][T13746] __kernfs_new_node+0xd2/0x9f0 [ 482.722372][T13746] ? __pfx___kernfs_new_node+0x10/0x10 [ 482.722392][T13746] ? find_held_lock+0x2b/0x80 [ 482.722410][T13746] ? kernfs_root+0xee/0x2a0 [ 482.722424][T13746] ? kernfs_root+0xee/0x2a0 [ 482.722443][T13746] kernfs_new_node+0x11b/0x1a0 [ 482.722463][T13746] __kernfs_create_file+0x53/0x350 [ 482.722487][T13746] sysfs_add_file_mode_ns+0x207/0x3c0 [ 482.722514][T13746] internal_create_group+0x593/0xf40 [ 482.722536][T13746] ? __pfx_internal_create_group+0x10/0x10 [ 482.722555][T13746] ? kernfs_create_link+0x1bd/0x240 [ 482.722579][T13746] internal_create_groups+0x9d/0x150 [ 482.722597][T13746] device_add+0x7c8/0x1950 [ 482.722615][T13746] ? __pfx_device_add+0x10/0x10 [ 482.722632][T13746] ? lockdep_init_map_type+0x5c/0x250 [ 482.722647][T13746] ? __init_waitqueue_head+0xca/0x150 [ 482.722668][T13746] netdev_register_kobject+0x1a9/0x3d0 [ 482.722689][T13746] register_netdevice+0x12e0/0x2210 [ 482.722707][T13746] ? idr_alloc+0xdd/0x130 [ 482.722727][T13746] ? __pfx_register_netdevice+0x10/0x10 [ 482.722741][T13746] ? net_generic+0xea/0x2a0 [ 482.722767][T13746] ppp_dev_configure+0x986/0xcb0 [ 482.722794][T13746] ppp_ioctl+0x9d7/0x27c0 [ 482.722817][T13746] ? find_held_lock+0x2b/0x80 [ 482.722835][T13746] ? __pfx_ppp_ioctl+0x10/0x10 [ 482.722860][T13746] ? __fget_files+0x21f/0x3d0 [ 482.722880][T13746] ? __pfx_ppp_ioctl+0x10/0x10 [ 482.722902][T13746] __x64_sys_ioctl+0x18e/0x210 [ 482.722927][T13746] do_syscall_64+0x10b/0xf80 [ 482.722947][T13746] ? clear_bhb_loop+0x40/0x90 [ 482.722965][T13746] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.722981][T13746] RIP: 0033:0x7f0bd5d9c819 [ 482.722995][T13746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 482.723010][T13746] RSP: 002b:00007f0bd6c00028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.723026][T13746] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 482.723036][T13746] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000006 [ 482.723045][T13746] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 482.723054][T13746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 482.723064][T13746] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 482.723088][T13746] [ 483.718823][T13753] FAULT_INJECTION: forcing a failure. [ 483.718823][T13753] name failslab, interval 1, probability 0, space 0, times 0 [ 483.745239][T13753] CPU: 0 UID: 0 PID: 13753 Comm: syz.4.2606 Tainted: P L syzkaller #0 PREEMPT(full) [ 483.745268][T13753] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 483.745275][T13753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 483.745285][T13753] Call Trace: [ 483.745291][T13753] [ 483.745298][T13753] dump_stack_lvl+0x100/0x190 [ 483.745319][T13753] should_fail_ex.cold+0x5/0xa [ 483.745340][T13753] should_failslab+0xc2/0x120 [ 483.745359][T13753] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 483.745381][T13753] ? anon_vma_fork+0x8d/0x6b0 [ 483.745407][T13753] anon_vma_fork+0x8d/0x6b0 [ 483.745427][T13753] ? vm_area_dup+0x59d/0x8e0 [ 483.745449][T13753] dup_mmap+0x141f/0x2180 [ 483.745476][T13753] ? __pfx_dup_mmap+0x10/0x10 [ 483.745493][T13753] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 483.745516][T13753] ? __lock_acquire+0x4a5/0x2630 [ 483.745540][T13753] ? find_held_lock+0x2b/0x80 [ 483.745558][T13753] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 483.745595][T13753] copy_process+0x7b37/0x7fa0 [ 483.745626][T13753] ? __pfx_copy_process+0x10/0x10 [ 483.745646][T13753] ? find_held_lock+0x2b/0x80 [ 483.745673][T13753] kernel_clone+0x12e/0x9c0 [ 483.745693][T13753] ? __pfx_futex_wait+0x10/0x10 [ 483.745713][T13753] ? __pfx_kernel_clone+0x10/0x10 [ 483.745744][T13753] __do_sys_clone+0xd9/0x120 [ 483.745764][T13753] ? __pfx___do_sys_clone+0x10/0x10 [ 483.745792][T13753] ? __task_pid_nr_ns+0x1ca/0x510 [ 483.745817][T13753] ? rcu_is_watching+0x12/0xc0 [ 483.745836][T13753] do_syscall_64+0x10b/0xf80 [ 483.745856][T13753] ? clear_bhb_loop+0x40/0x90 [ 483.745875][T13753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.745891][T13753] RIP: 0033:0x7f0bd5d9c819 [ 483.745905][T13753] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 483.745920][T13753] RSP: 002b:00007f0bd6bfffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 483.745935][T13753] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 483.745946][T13753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 483.745955][T13753] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 483.745964][T13753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 483.745973][T13753] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 483.745994][T13753] [ 484.260063][T13758] FAULT_INJECTION: forcing a failure. [ 484.260063][T13758] name fail_futex, interval 1, probability 0, space 0, times 0 [ 484.285280][T13758] CPU: 0 UID: 0 PID: 13758 Comm: syz.3.2607 Tainted: P L syzkaller #0 PREEMPT(full) [ 484.285312][T13758] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 484.285319][T13758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 484.285329][T13758] Call Trace: [ 484.285334][T13758] [ 484.285341][T13758] dump_stack_lvl+0x100/0x190 [ 484.285364][T13758] should_fail_ex.cold+0x5/0xa [ 484.285385][T13758] get_futex_key+0x1d2/0x1510 [ 484.285403][T13758] ? __pfx_get_futex_key+0x10/0x10 [ 484.285424][T13758] futex_wake+0xea/0x530 [ 484.285442][T13758] ? rcu_is_watching+0x12/0xc0 [ 484.285461][T13758] ? __pfx_futex_wake+0x10/0x10 [ 484.285482][T13758] ? putname+0xb1/0x110 [ 484.285499][T13758] ? kmem_cache_free+0x127/0x6c0 [ 484.285523][T13758] do_futex+0x32b/0x350 [ 484.285540][T13758] ? __pfx_do_futex+0x10/0x10 [ 484.285554][T13758] ? __pfx_do_sys_openat2+0x10/0x10 [ 484.285577][T13758] ? __fget_files+0x21f/0x3d0 [ 484.285595][T13758] __x64_sys_futex+0x34f/0x4d0 [ 484.285612][T13758] ? __x64_sys_openat+0x12d/0x210 [ 484.285633][T13758] ? __pfx___x64_sys_futex+0x10/0x10 [ 484.285653][T13758] ? rcu_is_watching+0x12/0xc0 [ 484.285672][T13758] do_syscall_64+0x10b/0xf80 [ 484.285691][T13758] ? clear_bhb_loop+0x40/0x90 [ 484.285709][T13758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.285724][T13758] RIP: 0033:0x7fc05699c819 [ 484.285739][T13758] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 484.285753][T13758] RSP: 002b:00007fc0577ac0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 484.285768][T13758] RAX: ffffffffffffffda RBX: 00007fc056c16098 RCX: 00007fc05699c819 [ 484.285778][T13758] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc056c1609c [ 484.285788][T13758] RBP: 00007fc056c16090 R08: 0000000000000001 R09: 0000000000000000 [ 484.285797][T13758] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 [ 484.285806][T13758] R13: 00007fc056c16128 R14: 00007ffdc38caab0 R15: 00007ffdc38cab98 [ 484.285826][T13758] [ 485.319298][T13780] FAULT_INJECTION: forcing a failure. [ 485.319298][T13780] name failslab, interval 1, probability 0, space 0, times 0 [ 485.455627][T13780] CPU: 0 UID: 0 PID: 13780 Comm: syz.4.2625 Tainted: P L syzkaller #0 PREEMPT(full) [ 485.455658][T13780] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 485.455669][T13780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 485.455679][T13780] Call Trace: [ 485.455685][T13780] [ 485.455692][T13780] dump_stack_lvl+0x100/0x190 [ 485.455714][T13780] should_fail_ex.cold+0x5/0xa [ 485.455735][T13780] should_failslab+0xc2/0x120 [ 485.455754][T13780] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 485.455776][T13780] ? __kernfs_new_node+0xd2/0x9f0 [ 485.455796][T13780] __kernfs_new_node+0xd2/0x9f0 [ 485.455814][T13780] ? __pfx___kernfs_new_node+0x10/0x10 [ 485.455847][T13780] ? find_held_lock+0x2b/0x80 [ 485.455866][T13780] ? kernfs_root+0xee/0x2a0 [ 485.455881][T13780] ? kernfs_root+0xee/0x2a0 [ 485.455902][T13780] kernfs_new_node+0x11b/0x1a0 [ 485.455924][T13780] __kernfs_create_file+0x53/0x350 [ 485.455948][T13780] sysfs_add_file_mode_ns+0x207/0x3c0 [ 485.455981][T13780] internal_create_group+0x593/0xf40 [ 485.456003][T13780] ? __pfx_internal_create_group+0x10/0x10 [ 485.456023][T13780] ? kernfs_create_link+0x1bd/0x240 [ 485.456048][T13780] internal_create_groups+0x9d/0x150 [ 485.456067][T13780] device_add+0x7c8/0x1950 [ 485.456086][T13780] ? __pfx_device_add+0x10/0x10 [ 485.456102][T13780] ? lockdep_init_map_type+0x5c/0x250 [ 485.456118][T13780] ? __init_waitqueue_head+0xca/0x150 [ 485.456140][T13780] netdev_register_kobject+0x1a9/0x3d0 [ 485.456160][T13780] register_netdevice+0x12e0/0x2210 [ 485.456178][T13780] ? idr_alloc+0xdd/0x130 [ 485.456198][T13780] ? __pfx_register_netdevice+0x10/0x10 [ 485.456212][T13780] ? net_generic+0xea/0x2a0 [ 485.456238][T13780] ppp_dev_configure+0x986/0xcb0 [ 485.456265][T13780] ppp_ioctl+0x9d7/0x27c0 [ 485.456288][T13780] ? find_held_lock+0x2b/0x80 [ 485.456306][T13780] ? __pfx_ppp_ioctl+0x10/0x10 [ 485.456331][T13780] ? __fget_files+0x21f/0x3d0 [ 485.456351][T13780] ? __pfx_ppp_ioctl+0x10/0x10 [ 485.456373][T13780] __x64_sys_ioctl+0x18e/0x210 [ 485.456398][T13780] do_syscall_64+0x10b/0xf80 [ 485.456418][T13780] ? clear_bhb_loop+0x40/0x90 [ 485.456436][T13780] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.456451][T13780] RIP: 0033:0x7f0bd5d9c819 [ 485.456466][T13780] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 485.456481][T13780] RSP: 002b:00007f0bd6c00028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 485.456496][T13780] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 485.456506][T13780] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000005 [ 485.456515][T13780] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 485.456524][T13780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 485.456533][T13780] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 485.456554][T13780] [ 485.815657][T13787] FAULT_INJECTION: forcing a failure. [ 485.815657][T13787] name failslab, interval 1, probability 0, space 0, times 0 [ 485.828754][T13787] CPU: 0 UID: 0 PID: 13787 Comm: syz.1.2619 Tainted: P L syzkaller #0 PREEMPT(full) [ 485.828783][T13787] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 485.828790][T13787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 485.828800][T13787] Call Trace: [ 485.828806][T13787] [ 485.828814][T13787] dump_stack_lvl+0x100/0x190 [ 485.828835][T13787] should_fail_ex.cold+0x5/0xa [ 485.828856][T13787] should_failslab+0xc2/0x120 [ 485.828875][T13787] __kmalloc_cache_noprof+0x7a/0x6f0 [ 485.828895][T13787] ? cec_open+0xdb/0x690 [ 485.828917][T13787] ? __lock_acquire+0x4a5/0x2630 [ 485.828943][T13787] cec_open+0xdb/0x690 [ 485.828967][T13787] ? __pfx_cec_open+0x10/0x10 [ 485.828990][T13787] ? kobject_get_unless_zero+0x156/0x200 [ 485.829014][T13787] ? find_held_lock+0x2b/0x80 [ 485.829031][T13787] ? chrdev_open+0x10b/0x6a0 [ 485.829055][T13787] ? chrdev_open+0x10b/0x6a0 [ 485.829075][T13787] ? __pfx_cec_open+0x10/0x10 [ 485.829098][T13787] chrdev_open+0x234/0x6a0 [ 485.829115][T13787] ? __pfx_apparmor_file_open+0x10/0x10 [ 485.829137][T13787] ? __pfx_chrdev_open+0x10/0x10 [ 485.829156][T13787] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 485.829179][T13787] do_dentry_open+0x6d8/0x1660 [ 485.829196][T13787] ? __pfx_chrdev_open+0x10/0x10 [ 485.829218][T13787] vfs_open+0x82/0x3f0 [ 485.829241][T13787] path_openat+0x208c/0x31a0 [ 485.829265][T13787] ? __pfx_path_openat+0x10/0x10 [ 485.829289][T13787] do_file_open+0x20e/0x430 [ 485.829308][T13787] ? __pfx_do_file_open+0x10/0x10 [ 485.829339][T13787] ? alloc_fd+0x476/0x790 [ 485.829357][T13787] ? do_getname+0x191/0x390 [ 485.829379][T13787] do_sys_openat2+0x10d/0x1e0 [ 485.829400][T13787] ? __pfx_do_sys_openat2+0x10/0x10 [ 485.829423][T13787] ? __fget_files+0x21f/0x3d0 [ 485.829442][T13787] __x64_sys_openat+0x12d/0x210 [ 485.829464][T13787] ? __pfx___x64_sys_openat+0x10/0x10 [ 485.829489][T13787] ? rcu_is_watching+0x12/0xc0 [ 485.829509][T13787] do_syscall_64+0x10b/0xf80 [ 485.829528][T13787] ? clear_bhb_loop+0x40/0x90 [ 485.829546][T13787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.829562][T13787] RIP: 0033:0x7f126e79c819 [ 485.829577][T13787] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 485.829591][T13787] RSP: 002b:00007f126f583028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 485.829607][T13787] RAX: ffffffffffffffda RBX: 00007f126ea16090 RCX: 00007f126e79c819 [ 485.829618][T13787] RDX: 0000000000101901 RSI: 0000200000002c00 RDI: ffffffffffffff9c [ 485.829628][T13787] RBP: 00007f126e832c91 R08: 0000000000000000 R09: 0000000000000000 [ 485.829637][T13787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 485.829646][T13787] R13: 00007f126ea16128 R14: 00007f126ea16090 R15: 00007fff2851b8d8 [ 485.829667][T13787] [ 486.205630][T13789] FAULT_INJECTION: forcing a failure. [ 486.205630][T13789] name failslab, interval 1, probability 0, space 0, times 0 [ 486.219179][T13789] CPU: 0 UID: 0 PID: 13789 Comm: syz.4.2620 Tainted: P L syzkaller #0 PREEMPT(full) [ 486.219208][T13789] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 486.219215][T13789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 486.219225][T13789] Call Trace: [ 486.219231][T13789] [ 486.219237][T13789] dump_stack_lvl+0x100/0x190 [ 486.219259][T13789] should_fail_ex.cold+0x5/0xa [ 486.219280][T13789] should_failslab+0xc2/0x120 [ 486.219299][T13789] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 486.219323][T13789] ? anon_vma_fork+0x8d/0x6b0 [ 486.219348][T13789] anon_vma_fork+0x8d/0x6b0 [ 486.219368][T13789] ? vm_area_dup+0x59d/0x8e0 [ 486.219390][T13789] dup_mmap+0x141f/0x2180 [ 486.219416][T13789] ? __pfx_dup_mmap+0x10/0x10 [ 486.219434][T13789] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 486.219457][T13789] ? __lock_acquire+0x4a5/0x2630 [ 486.219481][T13789] ? find_held_lock+0x2b/0x80 [ 486.219498][T13789] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 486.219536][T13789] copy_process+0x7b37/0x7fa0 [ 486.219567][T13789] ? __pfx_copy_process+0x10/0x10 [ 486.219587][T13789] ? find_held_lock+0x2b/0x80 [ 486.219613][T13789] kernel_clone+0x12e/0x9c0 [ 486.219631][T13789] ? __pfx_futex_wait+0x10/0x10 [ 486.219651][T13789] ? __pfx_kernel_clone+0x10/0x10 [ 486.219682][T13789] __do_sys_clone+0xd9/0x120 [ 486.219702][T13789] ? __pfx___do_sys_clone+0x10/0x10 [ 486.219730][T13789] ? __task_pid_nr_ns+0x1ca/0x510 [ 486.219754][T13789] ? rcu_is_watching+0x12/0xc0 [ 486.219774][T13789] do_syscall_64+0x10b/0xf80 [ 486.219793][T13789] ? clear_bhb_loop+0x40/0x90 [ 486.219812][T13789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.219828][T13789] RIP: 0033:0x7f0bd5d9c819 [ 486.219843][T13789] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 486.219858][T13789] RSP: 002b:00007f0bd6bfffd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 486.219874][T13789] RAX: ffffffffffffffda RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 486.219885][T13789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000021000000 [ 486.219895][T13789] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 486.219904][T13789] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 486.219913][T13789] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 486.219934][T13789] [ 486.975027][T13803] netlink: 334 bytes leftover after parsing attributes in process `syz.1.2623'. [ 487.067523][T13798] FAULT_INJECTION: forcing a failure. [ 487.067523][T13798] name failslab, interval 1, probability 0, space 0, times 0 [ 487.151861][T13798] CPU: 0 UID: 0 PID: 13798 Comm: syz.4.2631 Tainted: P L syzkaller #0 PREEMPT(full) [ 487.151891][T13798] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 487.151898][T13798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 487.151909][T13798] Call Trace: [ 487.151915][T13798] [ 487.151921][T13798] dump_stack_lvl+0x100/0x190 [ 487.151943][T13798] should_fail_ex.cold+0x5/0xa [ 487.151963][T13798] should_failslab+0xc2/0x120 [ 487.151981][T13798] __kmalloc_cache_noprof+0x7a/0x6f0 [ 487.152001][T13798] ? snd_pcm_oss_change_params_locked+0x247/0x39f0 [ 487.152025][T13798] snd_pcm_oss_change_params_locked+0x247/0x39f0 [ 487.152044][T13798] ? trace_contention_end+0x65/0x170 [ 487.152064][T13798] ? snd_pcm_oss_get_active_substream+0x153/0x1d0 [ 487.152084][T13798] ? kasan_quarantine_put+0x104/0x240 [ 487.152108][T13798] ? __pfx_snd_pcm_oss_change_params_locked+0x10/0x10 [ 487.152135][T13798] ? __pfx___mutex_lock+0x10/0x10 [ 487.152157][T13798] ? find_held_lock+0x2b/0x80 [ 487.152176][T13798] ? tomoyo_path_number_perm+0x28f/0x580 [ 487.152199][T13798] ? tomoyo_path_number_perm+0x28f/0x580 [ 487.152226][T13798] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 487.152247][T13798] ? futex_wait+0x11e/0x370 [ 487.152271][T13798] snd_pcm_oss_get_active_substream+0x175/0x1d0 [ 487.152294][T13798] snd_pcm_oss_get_formats+0x7d/0x350 [ 487.152313][T13798] ? do_vfs_ioctl+0x226/0x13e0 [ 487.152335][T13798] ? __pfx_snd_pcm_oss_get_formats+0x10/0x10 [ 487.152359][T13798] snd_pcm_oss_ioctl+0x1702/0x3700 [ 487.152378][T13798] ? find_held_lock+0x2b/0x80 [ 487.152396][T13798] ? __fget_files+0x215/0x3d0 [ 487.152412][T13798] ? hook_file_ioctl_common+0x149/0x410 [ 487.152435][T13798] ? __pfx_snd_pcm_oss_ioctl+0x10/0x10 [ 487.152456][T13798] ? __fget_files+0x21f/0x3d0 [ 487.152475][T13798] ? __pfx_snd_pcm_oss_ioctl+0x10/0x10 [ 487.152495][T13798] __x64_sys_ioctl+0x18e/0x210 [ 487.152519][T13798] do_syscall_64+0x10b/0xf80 [ 487.152539][T13798] ? clear_bhb_loop+0x40/0x90 [ 487.152557][T13798] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 487.152573][T13798] RIP: 0033:0x7f0bd5d9c819 [ 487.152587][T13798] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 487.152601][T13798] RSP: 002b:00007f0bd6bdf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 487.152617][T13798] RAX: ffffffffffffffda RBX: 00007f0bd6016090 RCX: 00007f0bd5d9c819 [ 487.152627][T13798] RDX: 0000000000000000 RSI: 000000008004500b RDI: 0000000000000003 [ 487.152636][T13798] RBP: 00007f0bd5e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 487.152646][T13798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 487.152655][T13798] R13: 00007f0bd6016128 R14: 00007f0bd6016090 R15: 00007ffe5ef70158 [ 487.152676][T13798] [ 488.927634][T13840] netlink: 21 bytes leftover after parsing attributes in process `syz.3.2635'. [ 491.054036][T13894] binder: 13893:13894 ioctl 400c620e 0 returned -14 [ 492.035130][T13905] netlink: 334 bytes leftover after parsing attributes in process `syz.3.2654'. [ 493.235192][T13931] zswap: compressor  not available [ 493.434550][T13948] netlink: 334 bytes leftover after parsing attributes in process `syz.3.2670'. [ 493.941390][T13956] netlink: 186 bytes leftover after parsing attributes in process `syz.3.2673'. [ 494.004865][T13958] netlink: 342 bytes leftover after parsing attributes in process `syz.4.2674'. [ 494.331300][T13962] FAULT_INJECTION: forcing a failure. [ 494.331300][T13962] name failslab, interval 1, probability 0, space 0, times 0 [ 494.403454][T13962] CPU: 0 UID: 0 PID: 13962 Comm: syz.3.2675 Tainted: P L syzkaller #0 PREEMPT(full) [ 494.403485][T13962] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 494.403492][T13962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 494.403501][T13962] Call Trace: [ 494.403508][T13962] [ 494.403514][T13962] dump_stack_lvl+0x100/0x190 [ 494.403537][T13962] should_fail_ex.cold+0x5/0xa [ 494.403557][T13962] ? tracepoint_add_func+0x3a8/0x1150 [ 494.403579][T13962] should_failslab+0xc2/0x120 [ 494.403596][T13962] __kmalloc_noprof+0xe0/0x850 [ 494.403622][T13962] ? __pfx_trace_event_raw_event_nfsd_file_fsnotify_handle_event+0x10/0x10 [ 494.403642][T13962] tracepoint_add_func+0x3a8/0x1150 [ 494.403662][T13962] ? __pfx_trace_event_raw_event_nfsd_file_fsnotify_handle_event+0x10/0x10 [ 494.403686][T13962] ? __pfx_trace_event_raw_event_nfsd_file_fsnotify_handle_event+0x10/0x10 [ 494.403706][T13962] tracepoint_probe_register+0xc4/0x110 [ 494.403728][T13962] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 494.403749][T13962] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 494.403770][T13962] ? __pfx_trace_event_raw_event_nfsd_file_fsnotify_handle_event+0x10/0x10 [ 494.403789][T13962] ? __pfx_probe_sched_switch+0x10/0x10 [ 494.403810][T13962] ? __lock_acquire+0x4a5/0x2630 [ 494.403836][T13962] trace_event_reg+0x209/0x350 [ 494.403856][T13962] __ftrace_event_enable_disable+0x211/0x6f0 [ 494.403881][T13962] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 494.403911][T13962] ftrace_set_clr_event+0x1b7/0x3f0 [ 494.403929][T13962] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 494.403945][T13962] ? trace_get_user+0x3ae/0xa70 [ 494.403972][T13962] ftrace_event_write+0x259/0x2c0 [ 494.403989][T13962] ? __pfx_ftrace_event_write+0x10/0x10 [ 494.404013][T13962] vfs_write+0x2aa/0x1070 [ 494.404030][T13962] ? __pfx_ftrace_event_write+0x10/0x10 [ 494.404049][T13962] ? __pfx_vfs_write+0x10/0x10 [ 494.404064][T13962] ? __fget_files+0x215/0x3d0 [ 494.404085][T13962] ? __fget_files+0x21f/0x3d0 [ 494.404107][T13962] ksys_write+0x12a/0x250 [ 494.404123][T13962] ? __pfx_ksys_write+0x10/0x10 [ 494.404141][T13962] ? rcu_is_watching+0x12/0xc0 [ 494.404161][T13962] do_syscall_64+0x10b/0xf80 [ 494.404180][T13962] ? clear_bhb_loop+0x40/0x90 [ 494.404199][T13962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.404214][T13962] RIP: 0033:0x7fc05699c819 [ 494.404228][T13962] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 494.404243][T13962] RSP: 002b:00007fc0577cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 494.404258][T13962] RAX: ffffffffffffffda RBX: 00007fc056c15fa0 RCX: 00007fc05699c819 [ 494.404268][T13962] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 494.404278][T13962] RBP: 00007fc056a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 494.404288][T13962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.404298][T13962] R13: 00007fc056c16038 R14: 00007fc056c15fa0 R15: 00007ffdc38cab98 [ 494.404319][T13962] [ 494.404330][T13962] event trace: Could not enable event nfsd_file_fsnotify_handle_event [ 494.721794][T13965] KVM: debugfs: duplicate directory 13965-3 [ 494.930489][T13969] FAULT_INJECTION: forcing a failure. [ 494.930489][T13969] name failslab, interval 1, probability 0, space 0, times 0 [ 494.954457][T13973] FAULT_INJECTION: forcing a failure. [ 494.954457][T13973] name failslab, interval 1, probability 0, space 0, times 0 [ 494.968630][T13969] CPU: 0 UID: 0 PID: 13969 Comm: syz.0.2678 Tainted: P L syzkaller #0 PREEMPT(full) [ 494.968666][T13969] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 494.968673][T13969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 494.968683][T13969] Call Trace: [ 494.968689][T13969] [ 494.968695][T13969] dump_stack_lvl+0x100/0x190 [ 494.968718][T13969] should_fail_ex.cold+0x5/0xa [ 494.968738][T13969] ? kobject_get_path+0xcf/0x2c0 [ 494.968761][T13969] should_failslab+0xc2/0x120 [ 494.968779][T13969] __kmalloc_noprof+0xe0/0x850 [ 494.968806][T13969] kobject_get_path+0xcf/0x2c0 [ 494.968831][T13969] kobject_uevent_env+0x287/0x18b0 [ 494.968849][T13969] ? kvm_uevent_notify_change.part.0+0x321/0x450 [ 494.968872][T13969] ? kfree+0x223/0x6c0 [ 494.968895][T13969] kvm_uevent_notify_change.part.0+0x3a6/0x450 [ 494.968918][T13969] ? __pfx_kvm_vm_release+0x10/0x10 [ 494.968938][T13969] kvm_put_kvm+0xe4/0xb10 [ 494.968957][T13969] ? lockdep_hardirqs_on+0x78/0x100 [ 494.968977][T13969] ? _raw_spin_unlock_irq+0x2e/0x50 [ 494.968995][T13969] ? __pfx_kvm_vm_release+0x10/0x10 [ 494.969015][T13969] kvm_vm_release+0x3c/0x50 [ 494.969034][T13969] __fput+0x3ff/0xb50 [ 494.969055][T13969] ? _raw_spin_unlock_irq+0x23/0x50 [ 494.969074][T13969] task_work_run+0x150/0x240 [ 494.969090][T13969] ? __pfx_task_work_run+0x10/0x10 [ 494.969106][T13969] ? rcu_is_watching+0x12/0xc0 [ 494.969126][T13969] exit_to_user_mode_loop+0x100/0x4a0 [ 494.969140][T13969] ? do_syscall_64+0x519/0xf80 [ 494.969162][T13969] do_syscall_64+0x6f2/0xf80 [ 494.969182][T13969] ? clear_bhb_loop+0x40/0x90 [ 494.969201][T13969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.969216][T13969] RIP: 0033:0x7ff45199c819 [ 494.969230][T13969] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 494.969245][T13969] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 494.969260][T13969] RAX: 0000000000000000 RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 494.969271][T13969] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 494.969279][T13969] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 494.969289][T13969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.969298][T13969] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 494.969317][T13969] [ 495.211280][T13973] CPU: 0 UID: 0 PID: 13973 Comm: syz.1.2679 Tainted: P L syzkaller #0 PREEMPT(full) [ 495.211315][T13973] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 495.211322][T13973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 495.211332][T13973] Call Trace: [ 495.211338][T13973] [ 495.211344][T13973] dump_stack_lvl+0x100/0x190 [ 495.211370][T13973] should_fail_ex.cold+0x5/0xa [ 495.211391][T13973] should_failslab+0xc2/0x120 [ 495.211409][T13973] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 495.211436][T13973] ? __kernfs_new_node+0xd2/0x9f0 [ 495.211456][T13973] __kernfs_new_node+0xd2/0x9f0 [ 495.211474][T13973] ? __pfx___kernfs_new_node+0x10/0x10 [ 495.211494][T13973] ? find_held_lock+0x2b/0x80 [ 495.211512][T13973] ? kernfs_root+0xee/0x2a0 [ 495.211526][T13973] ? kernfs_root+0xee/0x2a0 [ 495.211545][T13973] kernfs_new_node+0x11b/0x1a0 [ 495.211566][T13973] __kernfs_create_file+0x53/0x350 [ 495.211589][T13973] sysfs_add_file_mode_ns+0x207/0x3c0 [ 495.211617][T13973] internal_create_group+0x593/0xf40 [ 495.211638][T13973] ? __pfx_internal_create_group+0x10/0x10 [ 495.211657][T13973] ? kernfs_create_link+0x1bd/0x240 [ 495.211687][T13973] internal_create_groups+0x9d/0x150 [ 495.211707][T13973] device_add+0x7c8/0x1950 [ 495.211727][T13973] ? __pfx_device_add+0x10/0x10 [ 495.211744][T13973] ? lockdep_init_map_type+0x5c/0x250 [ 495.211759][T13973] ? __init_waitqueue_head+0xca/0x150 [ 495.211781][T13973] netdev_register_kobject+0x1a9/0x3d0 [ 495.211801][T13973] register_netdevice+0x12e0/0x2210 [ 495.211819][T13973] ? idr_alloc+0xdd/0x130 [ 495.211839][T13973] ? __pfx_register_netdevice+0x10/0x10 [ 495.211853][T13973] ? net_generic+0xea/0x2a0 [ 495.211878][T13973] ppp_dev_configure+0x986/0xcb0 [ 495.211904][T13973] ppp_ioctl+0x9d7/0x27c0 [ 495.211928][T13973] ? find_held_lock+0x2b/0x80 [ 495.211947][T13973] ? __pfx_ppp_ioctl+0x10/0x10 [ 495.211972][T13973] ? __fget_files+0x21f/0x3d0 [ 495.211991][T13973] ? __pfx_ppp_ioctl+0x10/0x10 [ 495.212014][T13973] __x64_sys_ioctl+0x18e/0x210 [ 495.212039][T13973] do_syscall_64+0x10b/0xf80 [ 495.212059][T13973] ? clear_bhb_loop+0x40/0x90 [ 495.212077][T13973] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.212092][T13973] RIP: 0033:0x7f126e79c819 [ 495.212106][T13973] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 495.212121][T13973] RSP: 002b:00007f126f5a4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 495.212136][T13973] RAX: ffffffffffffffda RBX: 00007f126ea15fa0 RCX: 00007f126e79c819 [ 495.212147][T13973] RDX: 0000000000000000 RSI: 00000000c004743e RDI: 0000000000000005 [ 495.212157][T13973] RBP: 00007f126e832c91 R08: 0000000000000000 R09: 0000000000000000 [ 495.212166][T13973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 495.212175][T13973] R13: 00007f126ea16038 R14: 00007f126ea15fa0 R15: 00007fff2851b8d8 [ 495.212197][T13973] [ 495.591257][T13976] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2680'. [ 495.601837][T13976] ipvlan0: entered promiscuous mode [ 495.607090][T13976] ipvlan0: entered allmulticast mode [ 495.612569][T13976] veth0_vlan: entered allmulticast mode [ 495.861731][T13983] netlink: 346 bytes leftover after parsing attributes in process `syz.1.2691'. [ 496.466554][T14001] netlink: 334 bytes leftover after parsing attributes in process `syz.4.2689'. [ 496.607426][T14000] FAULT_INJECTION: forcing a failure. [ 496.607426][T14000] name failslab, interval 1, probability 0, space 0, times 0 [ 496.699272][T14000] CPU: 0 UID: 0 PID: 14000 Comm: syz.0.2692 Tainted: P L syzkaller #0 PREEMPT(full) [ 496.699307][T14000] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 496.699314][T14000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 496.699324][T14000] Call Trace: [ 496.699330][T14000] [ 496.699337][T14000] dump_stack_lvl+0x100/0x190 [ 496.699359][T14000] should_fail_ex.cold+0x5/0xa [ 496.699383][T14000] ? tracepoint_add_func+0x3a8/0x1150 [ 496.699405][T14000] should_failslab+0xc2/0x120 [ 496.699423][T14000] __kmalloc_noprof+0xe0/0x850 [ 496.699449][T14000] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 496.699468][T14000] tracepoint_add_func+0x3a8/0x1150 [ 496.699488][T14000] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 496.699511][T14000] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 496.699529][T14000] tracepoint_probe_register+0xc4/0x110 [ 496.699552][T14000] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 496.699574][T14000] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 496.699596][T14000] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 496.699613][T14000] ? __pfx_probe_sched_switch+0x10/0x10 [ 496.699635][T14000] ? __lock_acquire+0x4a5/0x2630 [ 496.699663][T14000] trace_event_reg+0x209/0x350 [ 496.699683][T14000] __ftrace_event_enable_disable+0x211/0x6f0 [ 496.699713][T14000] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 496.699743][T14000] ftrace_set_clr_event+0x1b7/0x3f0 [ 496.699762][T14000] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 496.699778][T14000] ? trace_get_user+0x3ae/0xa70 [ 496.699804][T14000] ftrace_event_write+0x259/0x2c0 [ 496.699822][T14000] ? __pfx_ftrace_event_write+0x10/0x10 [ 496.699846][T14000] vfs_write+0x2aa/0x1070 [ 496.699864][T14000] ? __pfx_ftrace_event_write+0x10/0x10 [ 496.699882][T14000] ? __pfx_vfs_write+0x10/0x10 [ 496.699898][T14000] ? __fget_files+0x215/0x3d0 [ 496.699919][T14000] ? __fget_files+0x21f/0x3d0 [ 496.699941][T14000] ksys_write+0x12a/0x250 [ 496.699957][T14000] ? __pfx_ksys_write+0x10/0x10 [ 496.699975][T14000] ? rcu_is_watching+0x12/0xc0 [ 496.699996][T14000] do_syscall_64+0x10b/0xf80 [ 496.700015][T14000] ? clear_bhb_loop+0x40/0x90 [ 496.700033][T14000] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 496.700049][T14000] RIP: 0033:0x7ff45199c819 [ 496.700063][T14000] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 496.700078][T14000] RSP: 002b:00007ff452896028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 496.700094][T14000] RAX: ffffffffffffffda RBX: 00007ff451c15fa0 RCX: 00007ff45199c819 [ 496.700105][T14000] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 496.700115][T14000] RBP: 00007ff451a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 496.700124][T14000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 496.700134][T14000] R13: 00007ff451c16038 R14: 00007ff451c15fa0 R15: 00007ffd325fbd08 [ 496.700154][T14000] [ 496.700193][T14000] event trace: Could not enable event nfsd_file_lru_add [ 497.884495][T14022] bridge0: port 3(veth0_to_bridge) entered blocking state [ 497.892432][T14022] bridge0: port 3(veth0_to_bridge) entered disabled state [ 497.906199][T14022] veth0_to_bridge: entered allmulticast mode [ 497.947863][T14022] veth0_to_bridge: entered promiscuous mode [ 497.991089][T14022] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 498.062784][T14022] bridge0: port 3(veth0_to_bridge) entered blocking state [ 498.070069][T14022] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 499.832219][T14065] netlink: 334 bytes leftover after parsing attributes in process `syz.0.2713'. [ 501.183624][T14089] netlink: 'syz.1.2718': attribute type 1 has an invalid length. [ 501.224061][T14089] netlink: 'syz.1.2718': attribute type 6 has an invalid length. [ 501.501338][T14097] FAULT_INJECTION: forcing a failure. [ 501.501338][T14097] name failslab, interval 1, probability 0, space 0, times 0 [ 501.554819][T14097] CPU: 0 UID: 0 PID: 14097 Comm: syz.3.2720 Tainted: P L syzkaller #0 PREEMPT(full) [ 501.554866][T14097] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 501.554874][T14097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 501.554884][T14097] Call Trace: [ 501.554889][T14097] [ 501.554896][T14097] dump_stack_lvl+0x100/0x190 [ 501.554918][T14097] should_fail_ex.cold+0x5/0xa [ 501.554938][T14097] ? kobject_get_path+0xcf/0x2c0 [ 501.554960][T14097] should_failslab+0xc2/0x120 [ 501.554978][T14097] __kmalloc_noprof+0xe0/0x850 [ 501.555005][T14097] kobject_get_path+0xcf/0x2c0 [ 501.555035][T14097] kobject_uevent_env+0x287/0x18b0 [ 501.555053][T14097] ? kvm_uevent_notify_change.part.0+0x321/0x450 [ 501.555078][T14097] ? kfree+0x223/0x6c0 [ 501.555101][T14097] kvm_uevent_notify_change.part.0+0x3a6/0x450 [ 501.555127][T14097] ? __pfx_kvm_vm_release+0x10/0x10 [ 501.555147][T14097] kvm_put_kvm+0xe4/0xb10 [ 501.555166][T14097] ? lockdep_hardirqs_on+0x78/0x100 [ 501.555186][T14097] ? _raw_spin_unlock_irq+0x2e/0x50 [ 501.555205][T14097] ? __pfx_kvm_vm_release+0x10/0x10 [ 501.555225][T14097] kvm_vm_release+0x3c/0x50 [ 501.555244][T14097] __fput+0x3ff/0xb50 [ 501.555265][T14097] ? _raw_spin_unlock_irq+0x23/0x50 [ 501.555284][T14097] task_work_run+0x150/0x240 [ 501.555300][T14097] ? __pfx_task_work_run+0x10/0x10 [ 501.555316][T14097] ? rcu_is_watching+0x12/0xc0 [ 501.555336][T14097] exit_to_user_mode_loop+0x100/0x4a0 [ 501.555350][T14097] ? do_syscall_64+0x519/0xf80 [ 501.555371][T14097] do_syscall_64+0x6f2/0xf80 [ 501.555390][T14097] ? clear_bhb_loop+0x40/0x90 [ 501.555408][T14097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.555423][T14097] RIP: 0033:0x7fc05699c819 [ 501.555437][T14097] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 501.555452][T14097] RSP: 002b:00007fc0577ac028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 501.555468][T14097] RAX: 0000000000000000 RBX: 00007fc056c16090 RCX: 00007fc05699c819 [ 501.555478][T14097] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 501.555486][T14097] RBP: 00007fc056a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 501.555495][T14097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 501.555504][T14097] R13: 00007fc056c16128 R14: 00007fc056c16090 R15: 00007ffdc38cab98 [ 501.555523][T14097] [ 501.850155][ T1316] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.856962][ T1316] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.978276][T14104] netlink: 342 bytes leftover after parsing attributes in process `syz.3.2722'. [ 502.524316][T14109] zswap: compressor not available [ 504.927022][T14172] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2737'. [ 504.973379][T14172] ipvlan0: entered promiscuous mode [ 505.000451][T14172] ipvlan0: entered allmulticast mode [ 505.031522][T14172] veth0_vlan: entered allmulticast mode [ 505.122926][T14177] bridge0: port 3(veth0_to_bridge) entered blocking state [ 505.156618][T14177] bridge0: port 3(veth0_to_bridge) entered disabled state [ 505.204023][T14177] veth0_to_bridge: entered allmulticast mode [ 505.250581][T14177] veth0_to_bridge: entered promiscuous mode [ 505.274709][T14177] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 505.329794][T14177] bridge0: port 3(veth0_to_bridge) entered blocking state [ 505.337060][T14177] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 505.911176][T14190] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2750'. [ 505.960307][T14190] netlink: 302 bytes leftover after parsing attributes in process `syz.1.2750'. [ 506.034242][T14189] FAULT_INJECTION: forcing a failure. [ 506.034242][T14189] name failslab, interval 1, probability 0, space 0, times 0 [ 506.105089][T14189] CPU: 0 UID: 0 PID: 14189 Comm: syz.3.2742 Tainted: P L syzkaller #0 PREEMPT(full) [ 506.105119][T14189] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 506.105126][T14189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 506.105136][T14189] Call Trace: [ 506.105142][T14189] [ 506.105149][T14189] dump_stack_lvl+0x100/0x190 [ 506.105170][T14189] should_fail_ex.cold+0x5/0xa [ 506.105191][T14189] should_failslab+0xc2/0x120 [ 506.105209][T14189] __kmalloc_node_track_caller_noprof+0xe3/0x850 [ 506.105234][T14189] ? parse_pred+0x2d4/0x3070 [ 506.105257][T14189] kmemdup_nul+0x49/0xd0 [ 506.105273][T14189] parse_pred+0x2d4/0x3070 [ 506.105297][T14189] ? __pfx_parse_pred+0x10/0x10 [ 506.105322][T14189] ? rcu_is_watching+0x12/0xc0 [ 506.105340][T14189] ? trace_kmalloc+0xe3/0x110 [ 506.105358][T14189] ? __kmalloc_noprof+0x320/0x850 [ 506.105384][T14189] process_preds+0x6a6/0x1d90 [ 506.105407][T14189] ? create_filter_start.constprop.0+0x134/0x310 [ 506.105426][T14189] ? __mutex_lock+0x26d/0x1b10 [ 506.105449][T14189] create_filter+0x140/0x210 [ 506.105469][T14189] ? __pfx_create_filter+0x10/0x10 [ 506.105490][T14189] ? find_held_lock+0x2b/0x80 [ 506.105511][T14189] apply_event_filter+0x220/0x500 [ 506.105532][T14189] ? __pfx_apply_event_filter+0x10/0x10 [ 506.105559][T14189] event_filter_write+0x16d/0x290 [ 506.105575][T14189] vfs_write+0x2aa/0x1070 [ 506.105593][T14189] ? __pfx_event_filter_write+0x10/0x10 [ 506.105610][T14189] ? __pfx_vfs_write+0x10/0x10 [ 506.105630][T14189] ? __fget_files+0x215/0x3d0 [ 506.105652][T14189] ? __fget_files+0x21f/0x3d0 [ 506.105674][T14189] ksys_write+0x12a/0x250 [ 506.105690][T14189] ? __pfx_ksys_write+0x10/0x10 [ 506.105715][T14189] ? rcu_is_watching+0x12/0xc0 [ 506.105736][T14189] do_syscall_64+0x10b/0xf80 [ 506.105756][T14189] ? clear_bhb_loop+0x40/0x90 [ 506.105776][T14189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 506.105792][T14189] RIP: 0033:0x7fc05699c819 [ 506.105806][T14189] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 506.105821][T14189] RSP: 002b:00007fc0577cd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 506.105836][T14189] RAX: ffffffffffffffda RBX: 00007fc056c15fa0 RCX: 00007fc05699c819 [ 506.105846][T14189] RDX: 00000000000005c8 RSI: 0000000000000000 RDI: 0000000000000003 [ 506.105856][T14189] RBP: 00007fc056a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 506.105865][T14189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 506.105874][T14189] R13: 00007fc056c16038 R14: 00007fc056c15fa0 R15: 00007ffdc38cab98 [ 506.105895][T14189] [ 507.937712][T14201] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 507.944176][T14201] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 507.956364][T14201] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 507.997993][T14201] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 508.030738][T14199] Process accounting resumed [ 509.364296][ T5162] Bluetooth: hci2: command 0x0406 tx timeout [ 510.004790][ T8334] Bluetooth: hci3: command 0x0c1a tx timeout [ 510.011186][ T8334] Bluetooth: hci1: command 0x0c1a tx timeout [ 510.017332][ T5162] Bluetooth: hci4: command 0x0c1a tx timeout [ 511.843841][T14291] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(4.128.4294967291), cmd(3) [ 511.927046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.939327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.951676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.963889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.976176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.988451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.000722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.012887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.025226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 512.037512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.938062][ C0] net_ratelimit: 22730 callbacks suppressed [ 516.938081][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.956307][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.968556][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.980863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.993095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.005453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.017723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.029930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.042462][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.054789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 517.288030][ C0] sched: DL replenish lagged too much [ 521.950479][ C0] net_ratelimit: 22366 callbacks suppressed [ 521.950497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.968647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.980874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.993066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.005425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.017653][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.029870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.042071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.054296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 522.066493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.962871][ C0] net_ratelimit: 22645 callbacks suppressed [ 526.962890][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.981075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.993319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.005545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.017766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.030256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.042482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.054749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.066923][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 527.079133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.975439][ C0] net_ratelimit: 22565 callbacks suppressed [ 531.975458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.993584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.005781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.017957][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.030138][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.042356][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.054553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.066755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.078932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 532.091099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.987938][ C0] net_ratelimit: 22559 callbacks suppressed [ 536.987955][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.006180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.018426][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.030629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.042804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.054994][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.067167][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.079365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.091531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 537.103746][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.000464][ C0] net_ratelimit: 23966 callbacks suppressed [ 542.000487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.018636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 542.030868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.043093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.055317][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 542.067661][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.079897][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.092085][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 542.104307][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 542.116539][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.013024][ C0] net_ratelimit: 24281 callbacks suppressed [ 547.013043][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.031262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 547.043536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.055754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.067925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 547.080164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.092363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.104539][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 547.116870][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 547.129127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.025438][ C0] net_ratelimit: 24219 callbacks suppressed [ 552.025456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 552.043660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.055875][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.068094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 552.080414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.092641][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.105018][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 552.117278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.129512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 552.141690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 557.038035][ C0] net_ratelimit: 24331 callbacks suppressed [ 557.038053][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.056163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 557.068398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.080603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.092916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 557.105282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.117617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.129905][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 557.142521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 557.154912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.050505][ C0] net_ratelimit: 24511 callbacks suppressed [ 562.050528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.068689][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.080870][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 562.093115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.105288][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.117455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 562.129694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.141872][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.154109][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 562.166319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.313331][ T1316] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.338724][ T1316] ieee802154 phy1 wpan1: encryption failed: -22 [ 567.063109][ C0] net_ratelimit: 24353 callbacks suppressed [ 567.063129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.081906][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.094211][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 567.106506][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.118717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.130948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 567.143268][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.155510][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 567.167690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 567.179947][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.075454][ C0] net_ratelimit: 24479 callbacks suppressed [ 572.075473][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.093685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.105984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 572.118330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.130572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.142793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 572.155048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.167336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 572.179533][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 572.191766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.088092][ C0] net_ratelimit: 24328 callbacks suppressed [ 577.088112][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 577.106297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.118490][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.130696][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 577.142904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.155104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.167267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 577.179495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.191699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 577.203876][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 582.100513][ C0] net_ratelimit: 24318 callbacks suppressed [ 582.100532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.118677][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.130840][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 582.143092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.155291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.167465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 582.179704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.191889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 582.204050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 582.216279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.113393][ C0] net_ratelimit: 16630 callbacks suppressed [ 587.113411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 587.131591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.143802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.156556][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 587.168815][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.181106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.194007][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 587.206249][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.218458][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 587.231303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 592.126184][ C0] net_ratelimit: 13361 callbacks suppressed [ 592.126203][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 592.144493][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.156685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.169487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 592.181925][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.194190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.206993][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 592.219274][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.231583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 592.244305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 597.137974][ C0] net_ratelimit: 15125 callbacks suppressed [ 597.137994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.156142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.168488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.180679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.193494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 597.205730][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.218065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.230387][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.242690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 597.255510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 602.150457][ C0] net_ratelimit: 16720 callbacks suppressed [ 602.150475][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.168968][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 602.181218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.193497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.205764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.218083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.230877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 602.243087][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 602.255328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 602.267519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.163123][ C0] net_ratelimit: 17247 callbacks suppressed [ 607.163141][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 607.181316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.193548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.205737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.217958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.230715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 607.242948][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 607.255199][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.267383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 607.279518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.175557][ C0] net_ratelimit: 17324 callbacks suppressed [ 612.175576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 612.193786][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.206016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.218184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.230376][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.243070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 612.255451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 612.267764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.280029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 612.292189][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.188301][ C0] net_ratelimit: 17453 callbacks suppressed [ 617.188319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.206469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 617.218716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.230903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.243021][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.255227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 617.267453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 617.280148][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 617.292402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 617.304620][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.200673][ C0] net_ratelimit: 17763 callbacks suppressed [ 622.200692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.218843][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 622.231124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.243309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.255450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.267694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 622.279920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.292643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 622.304932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 622.317293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.213108][ C0] net_ratelimit: 17819 callbacks suppressed [ 627.213127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.231275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 627.243649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.255929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.268076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.280346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 627.292809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 627.305711][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 627.318062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 627.330331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.225663][ C0] net_ratelimit: 17795 callbacks suppressed [ 632.225682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.243789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 632.256047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.269027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 632.281291][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 632.293584][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.305766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.318010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 632.330267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 632.342514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.238012][ C0] net_ratelimit: 17994 callbacks suppressed [ 637.238030][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.256180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 637.268409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.281153][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 637.293386][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 637.305740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.318070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.330249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 637.342423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 637.354665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.309016][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 639.315996][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P14283/1:b..l P13993/1:b..l [ 639.325587][ C0] rcu: (detected by 0, t=10502 jiffies, g=151409, q=524 ncpus=1) [ 639.333405][ C0] task:syz.4.2686 state:R running task stack:22936 pid:13993 tgid:13993 ppid:10237 task_flags:0x40064c flags:0x00080001 [ 639.347721][ C0] Call Trace: [ 639.351000][ C0] [ 639.353923][ C0] __schedule+0x10e9/0x6820 [ 639.358439][ C0] ? lock_acquire+0x1b1/0x370 [ 639.363114][ C0] ? __pfx___schedule+0x10/0x10 [ 639.367951][ C0] ? rcu_is_watching+0x12/0xc0 [ 639.372700][ C0] preempt_schedule_irq+0x50/0x90 [ 639.377717][ C0] irqentry_exit+0x1fe/0x790 [ 639.382304][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 639.388271][ C0] RIP: 0010:lock_acquire+0x5e/0x370 [ 639.393460][ C0] Code: 05 3b b9 2e 12 83 f8 07 0f 87 d9 02 00 00 48 0f a3 05 46 72 f7 0e 0f 82 a4 02 00 00 8b 35 ae a5 f7 0e 85 f6 0f 85 bf 00 00 00 <48> 8b 44 24 30 65 48 2b 05 dd b8 2e 12 0f 85 ed 02 00 00 48 83 c4 [ 639.413051][ C0] RSP: 0018:ffffc90004496ec0 EFLAGS: 00000206 [ 639.419099][ C0] RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000000 [ 639.427064][ C0] RDX: 0000000000000000 RSI: ffffffff8df2ef4f RDI: ffffffff8c1c0e00 [ 639.435024][ C0] RBP: ffffffff8e7e5260 R08: 0000000086db7919 R09: 0000000000000007 [ 639.442975][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 [ 639.450929][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 639.458893][ C0] ? unwind_next_frame+0x3be/0x2090 [ 639.464085][ C0] ? unwind_next_frame+0x3be/0x2090 [ 639.469287][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 639.475458][ C0] unwind_next_frame+0xd1/0x2090 [ 639.480380][ C0] ? unwind_next_frame+0xbd/0x2090 [ 639.485489][ C0] ? dput+0x1f/0x30 [ 639.489285][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 639.495426][ C0] arch_stack_walk+0x94/0xf0 [ 639.500009][ C0] ? dput+0x1f/0x30 [ 639.503805][ C0] stack_trace_save+0x8e/0xc0 [ 639.508471][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 639.513827][ C0] ? __lock_acquire+0x4a5/0x2630 [ 639.518755][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 639.524547][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 639.529749][ C0] save_stack+0x162/0x1e0 [ 639.534059][ C0] ? __pfx_save_stack+0x10/0x10 [ 639.538891][ C0] ? free_unref_folios+0xa0d/0x16f0 [ 639.544074][ C0] ? folios_put_refs+0x571/0xa90 [ 639.548999][ C0] ? shmem_undo_range+0x5e5/0x1570 [ 639.554088][ C0] ? shmem_evict_inode+0x3f3/0xc40 [ 639.559188][ C0] ? evict+0x3c2/0xad0 [ 639.563242][ C0] ? iput.part.0+0x605/0xf50 [ 639.567815][ C0] ? iput+0x35/0x40 [ 639.571618][ C0] ? dentry_unlink_inode+0x2a1/0x490 [ 639.576886][ C0] ? __dentry_kill+0x1d0/0x600 [ 639.581649][ C0] ? finish_dput+0x76/0x480 [ 639.586137][ C0] ? dput.part.0+0x456/0x570 [ 639.590714][ C0] ? dput+0x1f/0x30 [ 639.594528][ C0] ? page_ext_put+0x3e/0xd0 [ 639.599017][ C0] __reset_page_owner+0x84/0x190 [ 639.603960][ C0] free_unref_folios+0xa0d/0x16f0 [ 639.608980][ C0] ? __print_lock_name+0x60/0x80 [ 639.613906][ C0] ? folios_put_refs+0x50a/0xa90 [ 639.618841][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 639.624642][ C0] folios_put_refs+0x571/0xa90 [ 639.629402][ C0] ? __pfx_folios_put_refs+0x10/0x10 [ 639.634689][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0 [ 639.641015][ C0] shmem_undo_range+0x5e5/0x1570 [ 639.645940][ C0] ? __pfx_shmem_undo_range+0x10/0x10 [ 639.651331][ C0] shmem_evict_inode+0x3f3/0xc40 [ 639.656255][ C0] ? inode_wait_for_writeback+0x171/0x390 [ 639.661952][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 639.667396][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 639.673458][ C0] ? find_held_lock+0x2b/0x80 [ 639.678136][ C0] ? evict+0x37e/0xad0 [ 639.682190][ C0] ? evict+0x37e/0xad0 [ 639.686262][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 639.691712][ C0] evict+0x3c2/0xad0 [ 639.695594][ C0] ? find_held_lock+0x2b/0x80 [ 639.700290][ C0] ? __pfx_evict+0x10/0x10 [ 639.704694][ C0] ? iput.part.0+0x5fd/0xf50 [ 639.709294][ C0] iput.part.0+0x605/0xf50 [ 639.713694][ C0] ? __pfx_inode_just_drop+0x10/0x10 [ 639.718963][ C0] iput+0x35/0x40 [ 639.722584][ C0] dentry_unlink_inode+0x2a1/0x490 [ 639.727686][ C0] __dentry_kill+0x1d0/0x600 [ 639.732265][ C0] finish_dput+0x76/0x480 [ 639.736585][ C0] dput.part.0+0x456/0x570 [ 639.740989][ C0] dput+0x1f/0x30 [ 639.744609][ C0] __fput+0x519/0xb50 [ 639.748579][ C0] task_work_run+0x150/0x240 [ 639.753151][ C0] ? __pfx_task_work_run+0x10/0x10 [ 639.758249][ C0] do_exit+0x8d2/0x2a60 [ 639.762394][ C0] ? __pfx_do_exit+0x10/0x10 [ 639.766968][ C0] ? __pfx_proc_coredump_connector+0x10/0x10 [ 639.772939][ C0] do_group_exit+0xd5/0x2a0 [ 639.777445][ C0] get_signal+0x1ec7/0x21e0 [ 639.781957][ C0] ? __pfx_get_signal+0x10/0x10 [ 639.786793][ C0] ? bad_area_access_error+0xab/0x1d0 [ 639.792147][ C0] ? fixup_vdso_exception+0x2d1/0x370 [ 639.797509][ C0] arch_do_signal_or_restart+0x91/0x770 [ 639.803056][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 639.809207][ C0] ? rcu_is_watching+0x12/0xc0 [ 639.813956][ C0] irqentry_exit+0x403/0x790 [ 639.818533][ C0] asm_exc_page_fault+0x26/0x30 [ 639.823382][ C0] RIP: 0033:0x0 [ 639.826834][ C0] RSP: 002b:000000000000000a EFLAGS: 00010217 [ 639.832880][ C0] RAX: 0000000000000000 RBX: 00007f0bd6015fa0 RCX: 00007f0bd5d9c819 [ 639.840831][ C0] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000020003b46 [ 639.848781][ C0] RBP: 00007f0bd5e32c91 R08: 0000000000000002 R09: 0000000000000000 [ 639.856742][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 639.864717][ C0] R13: 00007f0bd6016038 R14: 00007f0bd6015fa0 R15: 00007ffe5ef70158 [ 639.872702][ C0] [ 639.875715][ C0] task:syz.4.2769 state:R running task stack:24808 pid:14283 tgid:14283 ppid:10237 task_flags:0x40044c flags:0x00080002 [ 639.889198][ C0] Call Trace: [ 639.892482][ C0] [ 639.895402][ C0] __schedule+0x10e9/0x6820 [ 639.899901][ C0] ? bpf_ksym_find+0x124/0x1c0 [ 639.904677][ C0] ? arch_stack_walk+0xa6/0xf0 [ 639.909435][ C0] ? __pfx___schedule+0x10/0x10 [ 639.914271][ C0] ? mark_held_locks+0x40/0x70 [ 639.919030][ C0] preempt_schedule_irq+0x50/0x90 [ 639.924043][ C0] irqentry_exit+0x1fe/0x790 [ 639.928621][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 639.934599][ C0] RIP: 0010:lock_acquire+0x5e/0x370 [ 639.939788][ C0] Code: 05 3b b9 2e 12 83 f8 07 0f 87 d9 02 00 00 48 0f a3 05 46 72 f7 0e 0f 82 a4 02 00 00 8b 35 ae a5 f7 0e 85 f6 0f 85 bf 00 00 00 <48> 8b 44 24 30 65 48 2b 05 dd b8 2e 12 0f 85 ed 02 00 00 48 83 c4 [ 639.959382][ C0] RSP: 0018:ffffc9000590f3e8 EFLAGS: 00000206 [ 639.965434][ C0] RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000001 [ 639.973385][ C0] RDX: 0000000000000000 RSI: ffffffff8df2ef4f RDI: ffffffff8c1c0e00 [ 639.981352][ C0] RBP: ffffffff8e7e5260 R08: 00000000a1bbbf67 R09: 0000000000000007 [ 639.989315][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 [ 639.997294][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 640.005259][ C0] ? unwind_next_frame+0x3be/0x2090 [ 640.010448][ C0] ? unwind_next_frame+0x3be/0x2090 [ 640.015644][ C0] unwind_next_frame+0xd1/0x2090 [ 640.020579][ C0] ? unwind_next_frame+0xbd/0x2090 [ 640.025675][ C0] ? arch_stack_walk+0x73/0xf0 [ 640.030446][ C0] __unwind_start+0x3d1/0x7f0 [ 640.035108][ C0] ? unwind_get_return_address+0x59/0xa0 [ 640.040737][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 640.046881][ C0] arch_stack_walk+0x73/0xf0 [ 640.051459][ C0] ? arch_stack_walk+0x73/0xf0 [ 640.056209][ C0] ? tear_down_vmas+0x2a5/0x600 [ 640.061043][ C0] stack_trace_save+0x8e/0xc0 [ 640.065726][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 640.071132][ C0] ? tear_down_vmas+0x2a5/0x600 [ 640.075975][ C0] ? kasan_save_stack+0x3f/0x50 [ 640.080815][ C0] ? kasan_save_stack+0x30/0x50 [ 640.085659][ C0] kasan_save_stack+0x30/0x50 [ 640.090346][ C0] kasan_record_aux_stack+0xa7/0xc0 [ 640.095536][ C0] kmem_cache_free+0x433/0x6c0 [ 640.100294][ C0] tear_down_vmas+0x2a5/0x600 [ 640.104980][ C0] exit_mmap+0x469/0xa10 [ 640.109230][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 640.113992][ C0] ? rcu_is_watching+0x12/0xc0 [ 640.118751][ C0] ? uprobe_clear_state+0x5f/0x260 [ 640.123854][ C0] ? uprobe_clear_state+0x5f/0x260 [ 640.128959][ C0] ? __lock_acquire+0x4a5/0x2630 [ 640.133892][ C0] ? arch_uprobe_clear_state+0x107/0x150 [ 640.139513][ C0] __mmput+0x12a/0x410 [ 640.143579][ C0] mmput+0x67/0x80 [ 640.147283][ C0] do_exit+0x833/0x2a60 [ 640.151441][ C0] ? __pfx_do_exit+0x10/0x10 [ 640.156019][ C0] ? do_raw_spin_lock+0x128/0x260 [ 640.161025][ C0] ? find_held_lock+0x2b/0x80 [ 640.165708][ C0] ? get_signal+0x7e0/0x21e0 [ 640.170302][ C0] do_group_exit+0xd5/0x2a0 [ 640.174801][ C0] get_signal+0x1ec7/0x21e0 [ 640.179291][ C0] ? rcu_is_watching+0x12/0xc0 [ 640.184062][ C0] ? trace_sched_exit_tp+0x11c/0x160 [ 640.189336][ C0] ? __pfx_get_signal+0x10/0x10 [ 640.194225][ C0] arch_do_signal_or_restart+0x91/0x770 [ 640.199777][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 640.205925][ C0] ? trace_irq_enable.constprop.0+0x31/0x160 [ 640.211895][ C0] ? rcu_is_watching+0x12/0xc0 [ 640.216647][ C0] irqentry_exit+0x403/0x790 [ 640.221228][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 640.227209][ C0] RIP: 0033:0x7f0bd5c6ccc4 [ 640.231622][ C0] RSP: 002b:00007ffe5ef70090 EFLAGS: 00000287 [ 640.237689][ C0] RAX: 00007f0bd54260c8 RBX: 00007f0bd54255c8 RCX: ffffffff824cd6b4 [ 640.245656][ C0] RDX: ffffffff824dce06 RSI: 00007f0bd54260c8 RDI: 00007f0bd5423ff0 [ 640.253616][ C0] RBP: 00007f0bd5420cb8 R08: 00007f0bd6000000 R09: 00007f0bd6016128 [ 640.261571][ C0] R10: 0000000000000003 R11: 0000000000000004 R12: 00007f0bd5427328 [ 640.269522][ C0] R13: 0000000000000013 R14: 0000000000000cce R15: 0000000000000003 [ 640.277486][ C0] ? shrink_folio_list+0x1fe4/0x60c0 [ 640.282774][ C0] ? folio_isolate_lru+0x7d6/0xe90 [ 640.287877][ C0] [ 640.290916][ C0] rcu: rcu_preempt kthread starved for 434 jiffies! g151409 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 640.302016][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 640.311971][ C0] rcu: RCU grace-period kthread stack dump: [ 640.317854][ C0] task:rcu_preempt state:R running task stack:27848 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 640.331319][ C0] Call Trace: [ 640.334595][ C0] [ 640.337525][ C0] __schedule+0x10e9/0x6820 [ 640.342051][ C0] ? __pfx___schedule+0x10/0x10 [ 640.346897][ C0] ? find_held_lock+0x2b/0x80 [ 640.351564][ C0] ? schedule+0x2bf/0x390 [ 640.355879][ C0] schedule+0xdd/0x390 [ 640.359930][ C0] schedule_timeout+0x127/0x280 [ 640.364761][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 640.370119][ C0] ? __pfx_process_timeout+0x10/0x10 [ 640.375395][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 640.381268][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 640.386753][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 640.391508][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 640.396782][ C0] ? prepare_to_swait_event+0xae/0x4a0 [ 640.402246][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 640.407179][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 640.412367][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 640.418160][ C0] rcu_gp_kthread+0x179/0x230 [ 640.422825][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 640.428008][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 640.433818][ C0] ? __kthread_parkme+0x18c/0x230 [ 640.438853][ C0] ? kthread+0x13a/0x450 [ 640.443098][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 640.448294][ C0] kthread+0x370/0x450 [ 640.452354][ C0] ? __pfx_kthread+0x10/0x10 [ 640.456939][ C0] ret_from_fork+0x72b/0xd50 [ 640.461525][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 640.466619][ C0] ? __switch_to+0x800/0x1100 [ 640.471282][ C0] ? __switch_to_asm+0x39/0x70 [ 640.476033][ C0] ? __pfx_kthread+0x10/0x10 [ 640.480625][ C0] ret_from_fork_asm+0x1a/0x30 [ 640.485387][ C0] [ 640.488388][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 640.494694][ C0] CPU: 0 UID: 0 PID: 3427 Comm: kworker/R-bat_e Tainted: P L syzkaller #0 PREEMPT(full) [ 640.505958][ C0] Tainted: [P]=PROPRIETARY_MODULE, [L]=SOFTLOCKUP [ 640.512354][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 640.522405][ C0] Workqueue: bat_events batadv_tt_purge [ 640.527954][ C0] RIP: 0010:passthru_features_check+0x0/0x20 [ 640.533923][ C0] Code: e9 c5 0d 37 02 e8 00 fd 11 f9 eb ce e8 e9 fd 11 f9 eb 96 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 53 48 89 d3 e8 d3 39 a5 f8 48 89 d8 5b e9 8a 0d 37 02 [ 640.553513][ C0] RSP: 0018:ffffc90000006948 EFLAGS: 00000246 [ 640.559562][ C0] RAX: 0000000000000000 RBX: ffff8880af92ca00 RCX: ffffffff89668cfc [ 640.567513][ C0] RDX: 0000612e4fdd09e9 RSI: ffff888077db8000 RDI: ffff8880af92ca00 [ 640.575488][ C0] RBP: 0000612e4fdd09e9 R08: 0000000000000003 R09: 000000000000a888 [ 640.583460][ C0] R10: 000000000000dd86 R11: 0000000000000000 R12: ffff888077db8000 [ 640.591441][ C0] R13: 0000000000000000 R14: ffffffff89638d40 R15: 000000000000dd86 [ 640.599499][ C0] FS: 0000000000000000(0000) GS:ffff8881242e8000(0000) knlGS:0000000000000000 [ 640.608426][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 640.614998][ C0] CR2: 00007fc31cac9160 CR3: 0000000036752000 CR4: 00000000003526f0 [ 640.622957][ C0] Call Trace: [ 640.626233][ C0] [ 640.629058][ C0] netif_skb_features+0x94e/0x13f0 [ 640.634163][ C0] ? find_held_lock+0x2b/0x80 [ 640.638825][ C0] ? __pfx_netif_skb_features+0x10/0x10 [ 640.644405][ C0] ? netdev_pick_tx+0x138/0xe50 [ 640.649249][ C0] validate_xmit_skb+0x8c/0x1590 [ 640.654197][ C0] __dev_queue_xmit+0x60e/0x4950 [ 640.659128][ C0] ? do_softirq+0xac/0xe0 [ 640.663485][ C0] ? __local_bh_enable_ip+0xf8/0x120 [ 640.668761][ C0] ? batadv_tt_purge+0x25d/0xbd0 [ 640.673787][ C0] ? process_one_work+0xa0e/0x1980 [ 640.678883][ C0] ? rescuer_thread+0x905/0x14a0 [ 640.684010][ C0] ? kthread+0x370/0x450 [ 640.688244][ C0] ? ret_from_fork+0x72b/0xd50 [ 640.692997][ C0] ? __pfx___dev_queue_xmit+0x10/0x10 [ 640.698399][ C0] ? __skb_ext_put+0x102/0x2f0 [ 640.703172][ C0] ? mark_held_locks+0x40/0x70 [ 640.707926][ C0] ? kasan_quarantine_put+0x104/0x240 [ 640.713287][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 640.718496][ C0] ? __skb_ext_put+0x102/0x2f0 [ 640.723263][ C0] ? kmem_cache_free+0x127/0x6c0 [ 640.728194][ C0] ? __skb_ext_put+0x107/0x2f0 [ 640.732947][ C0] br_dev_queue_push_xmit+0x361/0x530 [ 640.738316][ C0] br_nf_dev_queue_xmit+0x73b/0x2730 [ 640.744120][ C0] ? find_held_lock+0x2b/0x80 [ 640.748824][ C0] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 640.754530][ C0] ? br_nf_post_routing+0xafb/0x16a0 [ 640.759804][ C0] br_nf_post_routing+0xcbb/0x16a0 [ 640.764902][ C0] ? __pfx_br_nf_post_routing+0x10/0x10 [ 640.770439][ C0] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 640.776142][ C0] ? lock_acquire+0x1b1/0x370 [ 640.780807][ C0] nf_hook_slow+0xbf/0x220 [ 640.785211][ C0] br_forward_finish+0x261/0x4d0 [ 640.790131][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 640.795595][ C0] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 640.801475][ C0] ? nf_hook_slow+0x167/0x220 [ 640.806136][ C0] br_nf_hook_thresh+0x30d/0x420 [ 640.811062][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 640.816507][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 640.821955][ C0] ? lock_acquire+0x1b1/0x370 [ 640.826624][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 640.832070][ C0] ? net_generic+0xea/0x2a0 [ 640.836566][ C0] br_nf_forward_finish+0x693/0xb30 [ 640.841752][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 640.847201][ C0] br_nf_forward_ip.part.0+0x61e/0x820 [ 640.852693][ C0] br_nf_forward+0xfe5/0x19f0 [ 640.857363][ C0] nf_hook_slow+0xbf/0x220 [ 640.861784][ C0] __br_forward+0x2f7/0x970 [ 640.866302][ C0] ? __pfx___br_forward+0x10/0x10 [ 640.871315][ C0] ? __asan_memcpy+0x3c/0x60 [ 640.875901][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 640.881350][ C0] ? __skb_clone+0x570/0x760 [ 640.885961][ C0] maybe_deliver+0xf0/0x180 [ 640.890451][ C0] br_flood+0x193/0x650 [ 640.894599][ C0] br_handle_frame_finish+0xff4/0x1f60 [ 640.900065][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 640.905965][ C0] ? __local_bh_enable_ip+0x9e/0x120 [ 640.911277][ C0] ? ip6t_do_table+0xc1d/0x1c90 [ 640.916113][ C0] ? __pfx_ip6t_do_table+0x10/0x10 [ 640.921231][ C0] ? nf_hook_slow+0x167/0x220 [ 640.925909][ C0] br_nf_hook_thresh+0x30d/0x420 [ 640.930834][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 640.936714][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 640.942159][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 640.948040][ C0] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 640.953229][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 640.959108][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 640.964993][ C0] br_nf_pre_routing_finish_ipv6+0x659/0xdd0 [ 640.970962][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 640.976847][ C0] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 640.982213][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 640.988093][ C0] ? lock_acquire+0x1b1/0x370 [ 640.992764][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 640.999256][ C0] ? net_generic+0xea/0x2a0 [ 641.003749][ C0] br_nf_pre_routing+0x90f/0x1560 [ 641.008864][ C0] br_handle_frame+0xcdd/0x1520 [ 641.013702][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 641.018992][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 641.024873][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 641.030155][ C0] __netif_receive_skb_core.constprop.0+0x6c5/0x3530 [ 641.036838][ C0] ? kmem_cache_free+0x127/0x6c0 [ 641.041779][ C0] ? skb_release_data+0x6ca/0x8e0 [ 641.046820][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 641.053930][ C0] ? kfree_skbmem+0x19f/0x210 [ 641.058769][ C0] ? sk_skb_reason_drop+0x114/0x1b0 [ 641.063952][ C0] ? ip6_mc_input+0x51a/0xf50 [ 641.068628][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 641.073639][ C0] ? __lock_acquire+0x4a5/0x2630 [ 641.078570][ C0] ? process_backlog+0x32a/0x1580 [ 641.083588][ C0] __netif_receive_skb_one_core+0xb0/0x1e0 [ 641.089384][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 641.095802][ C0] ? lock_acquire+0x1b1/0x370 [ 641.100471][ C0] ? process_backlog+0x32a/0x1580 [ 641.105484][ C0] ? process_backlog+0x32a/0x1580 [ 641.110492][ C0] __netif_receive_skb+0x1f/0x120 [ 641.115507][ C0] process_backlog+0x37a/0x1580 [ 641.120348][ C0] __napi_poll.constprop.0+0xaf/0x450 [ 641.125707][ C0] net_rx_action+0xa40/0xf20 [ 641.130292][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 641.135389][ C0] ? __print_lock_name+0x60/0x80 [ 641.140319][ C0] ? try_to_wake_up+0x153/0x1900 [ 641.145242][ C0] ? kvm_sched_clock_read+0x11/0x20 [ 641.150428][ C0] ? sched_clock+0x38/0x60 [ 641.154842][ C0] ? sched_clock_cpu+0x6c/0x570 [ 641.159691][ C0] ? mark_held_locks+0x40/0x70 [ 641.164445][ C0] handle_softirqs+0x1ea/0xa00 [ 641.169197][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 641.174467][ C0] ? batadv_tt_purge+0x25d/0xbd0 [ 641.179387][ C0] do_softirq+0xac/0xe0 [ 641.183536][ C0] [ 641.186449][ C0] [ 641.189364][ C0] __local_bh_enable_ip+0xf8/0x120 [ 641.194467][ C0] batadv_tt_purge+0x25d/0xbd0 [ 641.199217][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 641.204489][ C0] ? rcu_is_watching+0x12/0xc0 [ 641.209244][ C0] process_one_work+0xa0e/0x1980 [ 641.214191][ C0] ? __pfx_process_one_work+0x10/0x10 [ 641.219567][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 641.224856][ C0] rescuer_thread+0x905/0x14a0 [ 641.229607][ C0] ? rescuer_thread+0x240/0x14a0 [ 641.234563][ C0] ? rescuer_thread+0x118/0x14a0 [ 641.239485][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 641.244755][ C0] ? __kthread_parkme+0x18c/0x230 [ 641.249786][ C0] ? kthread+0x13a/0x450 [ 641.254014][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 641.259199][ C0] kthread+0x370/0x450 [ 641.263274][ C0] ? __pfx_kthread+0x10/0x10 [ 641.267851][ C0] ret_from_fork+0x72b/0xd50 [ 641.272429][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 641.277524][ C0] ? __switch_to+0x800/0x1100 [ 641.282188][ C0] ? __switch_to_asm+0x39/0x70 [ 641.286943][ C0] ? __pfx_kthread+0x10/0x10 [ 641.291568][ C0] ret_from_fork_asm+0x1a/0x30 [ 641.296385][ C0] [ 642.250785][ C0] net_ratelimit: 9709 callbacks suppressed [ 642.250803][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 642.269962][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 642.282384][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.294643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.306983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.319273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 642.331535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 642.344467][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 642.356768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 642.369083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.263069][ C0] net_ratelimit: 12500 callbacks suppressed [ 647.263090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 647.281433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.293760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.306028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.318716][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:42:14:28:0d:17:ad, vlan:0) [ 647.331982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.344942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 647.357341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:12:fe:90:52:63:ed, vlan:0) [ 647.369686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 647.382076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)