last executing test programs: 2.429981958s ago: executing program 1 (id=12742): mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) sysfs$auto(0x2, 0x44, 0x0) fsopen$auto(0x0, 0x1) close_range$auto(0x2, 0x8, 0x0) 2.288003523s ago: executing program 1 (id=12745): mmap$auto(0x0, 0x20009, 0x10000000000df, 0xeb2, 0x401, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'netdevsim0\x00', 0x0}) bpf$auto(0x5, &(0x7f0000000300)=@bpf_attr_3={0x3, 0x4, 0xf, 0x63, 0x400, 0xfffffffd, 0x1, 0x80f0c8, 0x0, "38c1d5cbcb9f6b5e511f0cd8ed068f65", r1, 0x2, 0xffffffffffffffff, 0xe4, 0x2, 0x5, 0x3ad, 0x3, 0x0, 0x3, @attach_prog_fd, 0x6, 0xffff, 0x2, 0x81, 0xfffffffe}, 0x4a) 2.090716426s ago: executing program 1 (id=12747): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) r0 = socket(0x2, 0x1, 0x0) getsockopt$auto(r0, 0x6, 0x23, 0x0, &(0x7f0000000100)=0x3b) 1.946900921s ago: executing program 1 (id=12759): bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x40}, 0x6a) r0 = socket(0xa, 0x2, 0x0) sendmmsg$auto(r0, &(0x7f0000000180)={{&(0x7f0000000040), 0xb8, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x9}, 0x1, 0x8008) close_range$auto(0x2, 0x8, 0x0) 1.832689252s ago: executing program 0 (id=12753): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) quotactl$auto(0x9, 0x0, 0x62a0, 0x0) io_destroy$auto(0x0) 1.674568676s ago: executing program 1 (id=12756): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) sysfs$auto(0x2, 0x1a, 0x0) r0 = fsopen$auto(0x0, 0x1) fsconfig$auto(r0, 0x8, 0x0, 0x0, 0x0) 1.509327937s ago: executing program 0 (id=12766): r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r0, &(0x7f00000000c0)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x2) mmap$auto(0x8, 0x8000, 0x117a, 0x12, r0, 0xa) epoll_create$auto(0x2000007) 1.465654262s ago: executing program 1 (id=12760): r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r0, &(0x7f0000000180)='7\x00\\\xa0\x04|4\x00\x00\x03\x00\x00\x00\x10\x01\x00\x00\x00\x00\x00\x00\x00\x00rRVr\xc4O\xdc1\x9b%\x10Z\'\xb9\'\xa3stC=\x85\xc6\xf6\x13 \xeb\xff%\x11\x82\x05\xdfV\x02\xca&\xd8$<\xab&\xc8B-\xcc\x15\x04&\x13;\xfe\xbdQ\xaa\x16o\x1f\xc7\x94\xa3\xc9\x9a\xe1d\xf5\n\xe2\x88\x84\vT?\x98\xa2\x00'/206, 0x5) shmctl$auto_IPC_INFO(0x7, 0x3, 0x0) setfsgid$auto(0xee01) 1.290671341s ago: executing program 0 (id=12763): mmap$auto(0x0, 0x101, 0x4000000000df, 0xeb1, 0x401, 0x8000) sysfs$auto(0x2, 0x4a, 0x0) r0 = fsopen$auto(0x0, 0x1) fsconfig$auto_EROFS_MOUNT_DAX_NEVER(r0, 0x4, &(0x7f0000000040)='-%\xe0\x00', &(0x7f0000000080), 0x80) 1.265404229s ago: executing program 2 (id=12764): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) capget$auto(0x0, 0xfffffffffffffffe) r0 = socket(0xa, 0x1, 0x84) getsockopt$auto(r0, 0x84, 0x7, 0x0, 0x0) 761.234459ms ago: executing program 0 (id=12767): sendmsg$auto_L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[], 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) mmap$auto(0x0, 0x2020006, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/afs/sysname\x00', 0x80002, 0x0) writev$auto(r0, &(0x7f0000000240)={0x0, 0x9}, 0xb) 760.762107ms ago: executing program 2 (id=12768): sendmsg$auto_NETDEV_CMD_QUEUE_GET(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20004080) r0 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0xb213, 0x2c, 0x800}) sendmmsg$auto(r0, &(0x7f0000000100)={{&(0x7f0000000000), 0x5aa, &(0x7f00000000c0)={&(0x7f0000000040)='f', 0x49}, 0x1, &(0x7f0000000200), 0x5, 0x3}, 0x4}, 0x2, 0x100) 605.852923ms ago: executing program 0 (id=12770): mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = socket(0x11, 0x2, 0x40000e) capset$auto(0x0, &(0x7f0000000000)={0xfffffffe, 0x41, 0x4a}) sendmmsg$auto(r0, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5aa, 0x0, 0x30, 0x0, 0x9, 0x8}, 0x5}, 0x20000002, 0x100) 605.66414ms ago: executing program 3 (id=12771): mmap$auto(0x0, 0x200, 0x3, 0xf8, 0xffffffffffffffff, 0x8000) io_uring_setup$auto(0x6, 0x0) r0 = openat$auto_proc_pid_smaps_operations_internal(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/smaps\x00', 0x42000, 0x0) read$auto_proc_pid_smaps_operations_internal(r0, &(0x7f00000002c0)=""/190, 0xfffffe39) 548.641063ms ago: executing program 3 (id=12772): r0 = openat$auto_mISDN_fops_timerdev(0xffffffffffffff9c, &(0x7f0000000080), 0x20900, 0x0) ioctl$auto_IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0x7) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001480), 0xffffffffffffffff) close_range$auto(0x2, 0x8, 0x0) 474.321592ms ago: executing program 3 (id=12773): r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/fail-nth\x00', 0x2, 0x0) write$auto(r0, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) getpid() io_uring_setup$auto(0x1, &(0x7f0000000000)={0x3, 0x10002, 0x7f, 0x5, 0x6, 0x5, 0xffffffffffffffff, [], {0x2, 0x2005, 0x2, 0x8, 0x400, 0xb533, 0x7, 0x5, 0x80000000}, {0x7, 0xd, 0x6e68, 0x8, 0x6b, 0x86fe, 0x0, 0x0, 0xb1}}) 450.811182ms ago: executing program 2 (id=12774): setresuid$auto(0x2, 0x7, 0x8080) r0 = socket(0x10, 0x2, 0x9) sendmsg$auto_NL80211_CMD_SET_COALESCE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000005304"], 0x5f}, 0x1, 0x0, 0x0, 0x400400d4}, 0x40) write$auto(r0, &(0x7f0000000000)='-\x00', 0x2fb) 321.238978ms ago: executing program 3 (id=12775): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0xa, 0x3, 0x5) sendmmsg$auto(r0, &(0x7f0000000180)={{&(0x7f0000000040), 0x200001, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x8000005}, 0x3b8b, 0xa) ioctl$auto(0x3, 0x80000541b, 0x38) 298.64426ms ago: executing program 2 (id=12776): close_range$auto(0x0, 0xfffffffffffff000, 0x0) bpf$auto(0x0, &(0x7f00000001c0)=@bpf_attr_0={0xa, 0xb8, 0x10, 0x4, 0x4, 0xffffffffffffffff, 0xa, "2af051b26b658a20d8dc6b36c83ce63f", 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x7, 0x6}, 0xf) bpf$auto(0x19, &(0x7f0000000380)=@token_create, 0x92) socket(0x10, 0x2, 0xc) 203.609214ms ago: executing program 3 (id=12777): r0 = socket(0x10, 0x2, 0x4) io_submit$auto(0x2, 0x7f, &(0x7f0000000040)=&(0x7f0000000000)={0x2, 0xb, 0x8, 0x3, 0x2, 0x3b, 0xfffffffffffffc00, 0x2, 0x1001, 0x0, 0x6}) sendmsg$auto_NFSD_CMD_THREADS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001400c7"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c801) write$auto(r0, &(0x7f0000000000)='r\x02', 0x2fb) 157.522667ms ago: executing program 2 (id=12778): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_GET_RADIO(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000280)={0x14, r1, 0xf3e97f51700e57cf, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x8020) read$auto(r0, &(0x7f0000000000)='*`@\\!#.\\\x00', 0x3) 150.777976ms ago: executing program 0 (id=12786): sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20004050}, 0x4000084) lstat$auto(0x0, &(0x7f0000000180)={0xf, 0x200000000018, 0x9, 0x63, 0x0, 0x0, 0x0, 0xffc, 0x5, 0x80000000000000a, 0x0, 0x9, 0x9, 0xffffffff80000000, 0xd, 0x6, 0x200000100103}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) 593.774µs ago: executing program 3 (id=12779): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) r0 = pidfd_open$auto(0x1, 0x0) open_by_handle_at$auto(r0, 0x0, 0x800) 0s ago: executing program 2 (id=12780): ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000200)={{@raw=0x7, 0x1, 0xfffffffb, 0x480008, "3112d58500a8b47148e22af9ffb683dbede3d0bf828bbf100000e5e2f96ee50484b075ad15e48d00", @raw=0xfffffffe}, 0x2, 0x80, 0x4, @inferred, @integer64={0x5, 0x0, 0xd}, "7a9fc199a16a2311eacf2fc7ae1da978dc3e8090d70925450ece0bb32777702b07552d000000000000000000ebff0000000000000059a200"}) rt_sigqueueinfo$auto(0x0, 0xffff7b6f, &(0x7f0000000000)={@siginfo_0_0={0xf9, 0xd, 0x1, @_sigpoll={0xd}}}) r0 = socket(0x11, 0x3, 0x9) sendmmsg$auto(r0, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x22}, 0x5, &(0x7f00000003c0), 0x5, 0xe}, 0x400005}, 0x2, 0x100) kernel console output (not intermixed with test programs): ind+0x45e/0x8e0 [ 599.639469][T28570] ? __pfx___handle_mm_fault+0x10/0x10 [ 599.639485][T28570] ? __pfx_mt_find+0x10/0x10 [ 599.639512][T28570] ? find_vma+0xbf/0x140 [ 599.639532][T28570] ? __pfx_find_vma+0x10/0x10 [ 599.639555][T28570] handle_mm_fault+0x36d/0xa20 [ 599.639578][T28570] do_user_addr_fault+0x74c/0x12f0 [ 599.639606][T28570] exc_page_fault+0x6f/0xd0 [ 599.639623][T28570] asm_exc_page_fault+0x26/0x30 [ 599.639637][T28570] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 599.639658][T28570] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 bd 93 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 599.639673][T28570] RSP: 0018:ffffc90004a97d80 EFLAGS: 00050246 [ 599.639685][T28570] RAX: 0000000000000000 RBX: 0000000000000008 RCX: 0000000000000008 [ 599.639694][T28570] RDX: 0000000000000001 RSI: ffffc90004a97e10 RDI: 0000000000000004 [ 599.639703][T28570] RBP: 0000000000000004 R08: 0000000000000000 R09: fffff52000952fc2 [ 599.639711][T28570] R10: ffffc90004a97e17 R11: 0000000000000000 R12: ffffc90004a97e10 [ 599.639720][T28570] R13: 000000000000000c R14: 00007ffffffff000 R15: 0000000000000000 [ 599.639738][T28570] _copy_to_user+0xa4/0xd0 [ 599.639762][T28570] do_fcntl+0xfc1/0x1670 [ 599.639781][T28570] ? __pfx_do_fcntl+0x10/0x10 [ 599.639804][T28570] ? __fget_files+0x215/0x3d0 [ 599.639833][T28570] ? tomoyo_file_fcntl+0x6c/0xc0 [ 599.639854][T28570] __x64_sys_fcntl+0x163/0x200 [ 599.639874][T28570] do_syscall_64+0x106/0xf80 [ 599.639889][T28570] ? clear_bhb_loop+0x40/0x90 [ 599.639906][T28570] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 599.639921][T28570] RIP: 0033:0x7f4d4299c629 [ 599.639934][T28570] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 599.639948][T28570] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 599.639961][T28570] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 599.639970][T28570] RDX: 0000000000000004 RSI: 000000000000040b RDI: 0000000000000003 [ 599.639979][T28570] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 599.639987][T28570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 599.639995][T28570] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 599.640014][T28570] [ 599.980729][T28566] bridge0: port 3(veth0_to_bridge) entered blocking state [ 599.988228][T28566] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 602.034746][T28662] netlink: 'syz.2.10951': attribute type 4 has an invalid length. [ 602.080054][T28662] netlink: 62 bytes leftover after parsing attributes in process `syz.2.10951'. [ 603.636846][T28726] netlink: 350 bytes leftover after parsing attributes in process `syz.3.10973'. [ 604.179661][T28744] netlink: 206 bytes leftover after parsing attributes in process `syz.3.10982'. [ 604.225956][T28750] syz_tun: tun_chr_ioctl cmd 1074025678 [ 604.246130][T28750] syz_tun: group set to 23693 [ 604.387333][T28754] sd 0:0:1:0: PR command failed: 1026 [ 604.409492][T28756] FAULT_INJECTION: forcing a failure. [ 604.409492][T28756] name failslab, interval 1, probability 0, space 0, times 0 [ 604.425622][T28754] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 604.449281][T28758] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10989'. [ 604.458499][T28754] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 604.468781][T28756] CPU: 0 UID: 0 PID: 28756 Comm: syz.2.10988 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 604.468809][T28756] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 604.468816][T28756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 604.468825][T28756] Call Trace: [ 604.468831][T28756] [ 604.468837][T28756] dump_stack_lvl+0x100/0x190 [ 604.468864][T28756] should_fail_ex.cold+0x5/0xa [ 604.468883][T28756] should_failslab+0xc2/0x120 [ 604.468898][T28756] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 604.468918][T28756] ? prepare_creds+0x2c/0x950 [ 604.468940][T28756] ? __x64_sys_futex+0x34f/0x4d0 [ 604.468958][T28756] ? __x64_sys_futex+0x358/0x4d0 [ 604.468978][T28756] prepare_creds+0x2c/0x950 [ 604.469001][T28756] __sys_setreuid+0x109/0xb00 [ 604.469018][T28756] do_syscall_64+0x106/0xf80 [ 604.469033][T28756] ? clear_bhb_loop+0x40/0x90 [ 604.469051][T28756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 604.469066][T28756] RIP: 0033:0x7f8bc839c629 [ 604.469080][T28756] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 604.469095][T28756] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000071 [ 604.469109][T28756] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 604.469119][T28756] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 604.469127][T28756] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 604.469135][T28756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 604.469144][T28756] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 604.469163][T28756] [ 604.780311][T28764] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10992'. [ 605.945401][T28805] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11009'. [ 606.995579][T28833] FAULT_INJECTION: forcing a failure. [ 606.995579][T28833] name failslab, interval 1, probability 0, space 0, times 0 [ 607.098078][T28833] CPU: 0 UID: 0 PID: 28833 Comm: syz.2.11019 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 607.098109][T28833] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 607.098116][T28833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 607.098125][T28833] Call Trace: [ 607.098130][T28833] [ 607.098137][T28833] dump_stack_lvl+0x100/0x190 [ 607.098164][T28833] should_fail_ex.cold+0x5/0xa [ 607.098183][T28833] should_failslab+0xc2/0x120 [ 607.098197][T28833] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 607.098217][T28833] ? copy_pid_ns+0x32b/0x10a0 [ 607.098233][T28833] ? find_held_lock+0x2b/0x80 [ 607.098246][T28833] ? rcu_read_unlock+0x17/0x60 [ 607.098264][T28833] copy_pid_ns+0x32b/0x10a0 [ 607.098281][T28833] ? __pfx_copy_pid_ns+0x10/0x10 [ 607.098298][T28833] ? rcu_is_watching+0x12/0xc0 [ 607.098328][T28833] ? copy_mnt_ns+0x106/0xc30 [ 607.098344][T28833] ? create_new_namespaces+0x30/0xac0 [ 607.098363][T28833] create_new_namespaces+0x2aa/0xac0 [ 607.098383][T28833] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 607.098401][T28833] ksys_unshare+0x455/0xab0 [ 607.098420][T28833] ? __pfx_ksys_unshare+0x10/0x10 [ 607.098444][T28833] __x64_sys_unshare+0x31/0x40 [ 607.098461][T28833] do_syscall_64+0x106/0xf80 [ 607.098476][T28833] ? clear_bhb_loop+0x40/0x90 [ 607.098494][T28833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 607.098508][T28833] RIP: 0033:0x7f8bc839c629 [ 607.098522][T28833] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 607.098536][T28833] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 607.098551][T28833] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 607.098560][T28833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 607.098569][T28833] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 607.098578][T28833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 607.098586][T28833] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 607.098606][T28833] [ 608.489773][T28870] FAULT_INJECTION: forcing a failure. [ 608.489773][T28870] name failslab, interval 1, probability 0, space 0, times 0 [ 608.519936][T28872] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11039'. [ 608.546032][T28872] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11039'. [ 608.579173][T28870] CPU: 0 UID: 0 PID: 28870 Comm: syz.2.11038 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 608.579205][T28870] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 608.579214][T28870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 608.579226][T28870] Call Trace: [ 608.579232][T28870] [ 608.579239][T28870] dump_stack_lvl+0x100/0x190 [ 608.579270][T28870] should_fail_ex.cold+0x5/0xa [ 608.579291][T28870] ? sk_prot_alloc+0x10b/0x2a0 [ 608.579310][T28870] should_failslab+0xc2/0x120 [ 608.579325][T28870] __kmalloc_noprof+0xe0/0x850 [ 608.579352][T28870] sk_prot_alloc+0x10b/0x2a0 [ 608.579381][T28870] sk_alloc+0x36/0xe80 [ 608.579401][T28870] pfkey_create+0x105/0x600 [ 608.579422][T28870] __sock_create+0x339/0x860 [ 608.579447][T28870] __sys_socket+0x14d/0x260 [ 608.579473][T28870] ? __pfx___sys_socket+0x10/0x10 [ 608.579504][T28870] __x64_sys_socket+0x72/0xb0 [ 608.579529][T28870] ? lockdep_hardirqs_on+0x78/0x100 [ 608.579544][T28870] do_syscall_64+0x106/0xf80 [ 608.579560][T28870] ? clear_bhb_loop+0x40/0x90 [ 608.579577][T28870] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 608.579593][T28870] RIP: 0033:0x7f8bc839c629 [ 608.579606][T28870] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 608.579620][T28870] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 608.579634][T28870] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 608.579644][T28870] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 000000000000000f [ 608.579652][T28870] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 608.579661][T28870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 608.579670][T28870] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 608.579692][T28870] [ 609.289145][T28884] netlink: 29 bytes leftover after parsing attributes in process `syz.0.11044'. [ 609.808052][T28904] sctp: [Deprecated]: syz.0.11055 (pid 28904) Use of struct sctp_assoc_value in delayed_ack socket option. [ 609.808052][T28904] Use struct sctp_sack_info instead [ 609.859615][T28907] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11056'. [ 611.998715][T28973] netlink: 'syz.2.11084': attribute type 2 has an invalid length. [ 612.811224][T28994] zswap: compressor not available [ 614.060656][T29052] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11123'. [ 617.657905][T29168] device-mapper: ioctl: device name cannot be "control", ".", or ".." [ 619.036188][T29210] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11195'. [ 619.166203][T29210] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11195'. [ 619.498971][T29228] FAULT_INJECTION: forcing a failure. [ 619.498971][T29228] name failslab, interval 1, probability 0, space 0, times 0 [ 619.549910][T29228] CPU: 0 UID: 0 PID: 29228 Comm: syz.2.11206 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 619.549942][T29228] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 619.549950][T29228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 619.549959][T29228] Call Trace: [ 619.549964][T29228] [ 619.549971][T29228] dump_stack_lvl+0x100/0x190 [ 619.549997][T29228] should_fail_ex.cold+0x5/0xa [ 619.550016][T29228] should_failslab+0xc2/0x120 [ 619.550030][T29228] __kmalloc_cache_noprof+0x7a/0x6f0 [ 619.550048][T29228] ? __do_sys_fanotify_init+0x5cf/0xe50 [ 619.550067][T29228] ? get_mem_cgroup_from_mm+0x88/0x600 [ 619.550087][T29228] ? get_mem_cgroup_from_mm+0x132/0x600 [ 619.550115][T29228] __do_sys_fanotify_init+0x5cf/0xe50 [ 619.550139][T29228] do_syscall_64+0x106/0xf80 [ 619.550154][T29228] ? clear_bhb_loop+0x40/0x90 [ 619.550171][T29228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 619.550187][T29228] RIP: 0033:0x7f8bc839c629 [ 619.550201][T29228] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 619.550216][T29228] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 000000000000012c [ 619.550231][T29228] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 619.550241][T29228] RDX: 0000000000000000 RSI: 0002000000000002 RDI: 0000000000000005 [ 619.550249][T29228] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 619.550258][T29228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 619.550266][T29228] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 619.550285][T29228] [ 619.918764][T29230] FAULT_INJECTION: forcing a failure. [ 619.918764][T29230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.026999][T29230] CPU: 0 UID: 0 PID: 29230 Comm: syz.3.11207 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 620.027030][T29230] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 620.027043][T29230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 620.027052][T29230] Call Trace: [ 620.027057][T29230] [ 620.027074][T29230] dump_stack_lvl+0x100/0x190 [ 620.027101][T29230] should_fail_ex.cold+0x5/0xa [ 620.027122][T29230] ? prepare_alloc_pages+0x16d/0x5f0 [ 620.027140][T29230] should_fail_alloc_page+0xeb/0x140 [ 620.027157][T29230] prepare_alloc_pages+0x1f0/0x5f0 [ 620.027176][T29230] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 620.027199][T29230] ? mas_next_slot+0x1003/0x18b0 [ 620.027220][T29230] ? __pfx___up_read+0x10/0x10 [ 620.027239][T29230] ? validate_mm+0x261/0x4e0 [ 620.027257][T29230] ? validate_mm+0x261/0x4e0 [ 620.027277][T29230] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 620.027299][T29230] ? validate_mm+0x392/0x4e0 [ 620.027317][T29230] ? vma_interval_tree_insert+0x240/0x410 [ 620.027337][T29230] ? __pfx_validate_mm+0x10/0x10 [ 620.027362][T29230] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 620.027386][T29230] ? policy_nodemask+0xed/0x4f0 [ 620.027402][T29230] alloc_pages_mpol+0x1fb/0x550 [ 620.027417][T29230] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 620.027436][T29230] alloc_pages_noprof+0x131/0x390 [ 620.027451][T29230] __pmd_alloc+0x3b/0x9c0 [ 620.027468][T29230] move_page_tables+0x3224/0x4500 [ 620.027490][T29230] ? __pfx_copy_vma+0x10/0x10 [ 620.027516][T29230] ? __pfx_move_page_tables+0x10/0x10 [ 620.027545][T29230] ? finish_task_switch.isra.0+0x200/0xb80 [ 620.027563][T29230] copy_vma_and_data+0x25c/0x7c0 [ 620.027584][T29230] ? __pfx_copy_vma_and_data+0x10/0x10 [ 620.027612][T29230] ? __vma_start_write+0x17f/0x280 [ 620.027629][T29230] ? __pfx___vma_start_write+0x10/0x10 [ 620.027646][T29230] ? __pfx_arch_get_unmapped_area_topdown+0x10/0x10 [ 620.027673][T29230] move_vma+0x51b/0x1890 [ 620.027696][T29230] ? __pfx_move_vma+0x10/0x10 [ 620.027716][T29230] ? thp_get_unmapped_area_vmflags+0x27f/0x2d0 [ 620.027734][T29230] ? cap_mmap_addr+0x4b/0x120 [ 620.027752][T29230] ? bpf_lsm_mmap_addr+0x9/0x30 [ 620.027773][T29230] ? security_mmap_addr+0x71/0x1e0 [ 620.027796][T29230] ? __get_unmapped_area+0x255/0x3e0 [ 620.027813][T29230] ? vrm_set_new_addr+0x204/0x290 [ 620.027833][T29230] mremap_to+0x1b7/0x450 [ 620.027853][T29230] do_mremap+0xb76/0x2130 [ 620.027881][T29230] ? __pfx_do_mremap+0x10/0x10 [ 620.027905][T29230] ? ksys_write+0x190/0x250 [ 620.027930][T29230] __do_sys_mremap+0x126/0x170 [ 620.027950][T29230] ? __pfx___do_sys_mremap+0x10/0x10 [ 620.027975][T29230] ? __x64_sys_futex+0x34f/0x4d0 [ 620.028004][T29230] do_syscall_64+0x106/0xf80 [ 620.028020][T29230] ? clear_bhb_loop+0x40/0x90 [ 620.028038][T29230] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.028052][T29230] RIP: 0033:0x7fce9d39c629 [ 620.028072][T29230] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 620.028087][T29230] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 620.028103][T29230] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 620.028113][T29230] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000110c231000 [ 620.028123][T29230] RBP: 00007fce9d432b39 R08: 0000000100000000 R09: 0000000000000000 [ 620.028132][T29230] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 620.028141][T29230] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 620.028161][T29230] [ 620.423217][T29238] FAULT_INJECTION: forcing a failure. [ 620.423217][T29238] name failslab, interval 1, probability 0, space 0, times 0 [ 620.436485][T29238] CPU: 0 UID: 0 PID: 29238 Comm: syz.1.11211 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 620.436515][T29238] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 620.436522][T29238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 620.436531][T29238] Call Trace: [ 620.436536][T29238] [ 620.436542][T29238] dump_stack_lvl+0x100/0x190 [ 620.436569][T29238] should_fail_ex.cold+0x5/0xa [ 620.436587][T29238] should_failslab+0xc2/0x120 [ 620.436602][T29238] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 620.436621][T29238] ? sk_prot_alloc+0x60/0x2a0 [ 620.436645][T29238] sk_prot_alloc+0x60/0x2a0 [ 620.436665][T29238] sk_alloc+0x36/0xe80 [ 620.436680][T29238] rds_create+0x9e/0x5f0 [ 620.436701][T29238] __sock_create+0x339/0x860 [ 620.436725][T29238] __sys_socket+0x14d/0x260 [ 620.436746][T29238] ? __pfx___sys_socket+0x10/0x10 [ 620.436772][T29238] __x64_sys_socket+0x72/0xb0 [ 620.436792][T29238] ? lockdep_hardirqs_on+0x78/0x100 [ 620.436808][T29238] do_syscall_64+0x106/0xf80 [ 620.436823][T29238] ? clear_bhb_loop+0x40/0x90 [ 620.436840][T29238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.436855][T29238] RIP: 0033:0x7f4d4299c629 [ 620.436873][T29238] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 620.436887][T29238] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 620.436902][T29238] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 620.436912][T29238] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000015 [ 620.436921][T29238] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 620.436930][T29238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 620.436939][T29238] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 620.436958][T29238] [ 620.726179][T29244] NFSD: Failed to start, no listeners configured. [ 620.867336][T29255] ovs_: entered promiscuous mode [ 621.466777][T29267] FAULT_INJECTION: forcing a failure. [ 621.466777][T29267] name failslab, interval 1, probability 0, space 0, times 0 [ 621.495759][T29267] CPU: 0 UID: 0 PID: 29267 Comm: syz.1.11223 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 621.495790][T29267] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 621.495798][T29267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 621.495808][T29267] Call Trace: [ 621.495813][T29267] [ 621.495820][T29267] dump_stack_lvl+0x100/0x190 [ 621.495848][T29267] should_fail_ex.cold+0x5/0xa [ 621.495865][T29267] should_failslab+0xc2/0x120 [ 621.495880][T29267] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 621.495901][T29267] ? key_alloc+0x3c5/0x1310 [ 621.495918][T29267] ? rcu_is_watching+0x12/0xc0 [ 621.495945][T29267] key_alloc+0x3c5/0x1310 [ 621.495970][T29267] ? __pfx_key_alloc+0x10/0x10 [ 621.495998][T29267] keyring_alloc+0x44/0xc0 [ 621.496016][T29267] lookup_user_key+0x9b8/0x1300 [ 621.496041][T29267] ? __pfx_lookup_user_key+0x10/0x10 [ 621.496063][T29267] ? do_futex+0x192/0x350 [ 621.496082][T29267] ? __pfx_do_futex+0x10/0x10 [ 621.496101][T29267] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 621.496138][T29267] ? __x64_sys_futex+0x34f/0x4d0 [ 621.496160][T29267] ? __x64_sys_futex+0x358/0x4d0 [ 621.496187][T29267] keyctl_watch_key+0x52/0x500 [ 621.496212][T29267] __do_sys_keyctl+0x29f/0x5a0 [ 621.496232][T29267] do_syscall_64+0x106/0xf80 [ 621.496250][T29267] ? clear_bhb_loop+0x40/0x90 [ 621.496268][T29267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 621.496283][T29267] RIP: 0033:0x7f4d4299c629 [ 621.496296][T29267] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 621.496310][T29267] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 621.496325][T29267] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 621.496335][T29267] RDX: 0000000000000005 RSI: ffffffffffffffff RDI: 0200000000000020 [ 621.496344][T29267] RBP: 00007f4d42a32b39 R08: 0000000000000008 R09: 0000000000000000 [ 621.496353][T29267] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000 [ 621.496361][T29267] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 621.496380][T29267] [ 622.198452][ T29] audit: type=1800 audit(2147483658.080:36): pid=29275 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.11227" name="SYSV00000008" dev="tmpfs" ino=0 res=0 errno=0 [ 623.824421][T29348] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11260'. [ 624.256230][T29368] netlink: 'syz.1.11269': attribute type 1 has an invalid length. [ 624.384714][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.391050][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 624.941970][T29396] FAULT_INJECTION: forcing a failure. [ 624.941970][T29396] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 624.982553][T29396] CPU: 0 UID: 0 PID: 29396 Comm: syz.2.11282 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 624.982584][T29396] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 624.982598][T29396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 624.982607][T29396] Call Trace: [ 624.982613][T29396] [ 624.982620][T29396] dump_stack_lvl+0x100/0x190 [ 624.982646][T29396] should_fail_ex.cold+0x5/0xa [ 624.982661][T29396] ? prepare_alloc_pages+0x16d/0x5f0 [ 624.982679][T29396] should_fail_alloc_page+0xeb/0x140 [ 624.982694][T29396] prepare_alloc_pages+0x1f0/0x5f0 [ 624.982711][T29396] ? trace_ignore_this_task+0xbc/0x100 [ 624.982734][T29396] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 624.982756][T29396] ? lock_acquire+0x1cf/0x380 [ 624.982774][T29396] ? find_held_lock+0x2b/0x80 [ 624.982787][T29396] ? finish_task_switch.isra.0+0x200/0xb80 [ 624.982804][T29396] ? mark_held_locks+0x40/0x70 [ 624.982821][T29396] ? finish_task_switch.isra.0+0x205/0xb80 [ 624.982836][T29396] ? lockdep_hardirqs_on+0x78/0x100 [ 624.982852][T29396] ? finish_task_switch.isra.0+0x205/0xb80 [ 624.982867][T29396] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 624.982886][T29396] ? rcu_is_watching+0x12/0xc0 [ 624.982910][T29396] ? __schedule+0x1000/0x60e0 [ 624.982928][T29396] ? folio_remove_rmap_pmd+0x69c/0xed0 [ 624.982950][T29396] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 624.982975][T29396] ? policy_nodemask+0xed/0x4f0 [ 624.982990][T29396] alloc_pages_mpol+0x1fb/0x550 [ 624.983005][T29396] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 624.983019][T29396] ? preempt_schedule_thunk+0x16/0x30 [ 624.983041][T29396] alloc_pages_noprof+0x131/0x390 [ 624.983056][T29396] pte_alloc_one+0x1e/0x3e0 [ 624.983073][T29396] __pte_alloc+0x6d/0x3f0 [ 624.983087][T29396] ? __pfx___pte_alloc+0x10/0x10 [ 624.983100][T29396] ? _raw_spin_unlock+0x28/0x50 [ 624.983121][T29396] ? __pmd_alloc+0x6aa/0x9c0 [ 624.983138][T29396] move_page_tables+0x257e/0x4500 [ 624.983159][T29396] ? __pfx_copy_vma+0x10/0x10 [ 624.983188][T29396] ? __pfx_move_page_tables+0x10/0x10 [ 624.983218][T29396] ? finish_task_switch.isra.0+0x200/0xb80 [ 624.983235][T29396] copy_vma_and_data+0x25c/0x7c0 [ 624.983256][T29396] ? __pfx_copy_vma_and_data+0x10/0x10 [ 624.983284][T29396] ? __vma_start_write+0x17f/0x280 [ 624.983301][T29396] ? __pfx___vma_start_write+0x10/0x10 [ 624.983323][T29396] move_vma+0x51b/0x1890 [ 624.983346][T29396] ? __pfx_move_vma+0x10/0x10 [ 624.983366][T29396] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 624.983382][T29396] ? cap_mmap_addr+0x4b/0x120 [ 624.983399][T29396] ? bpf_lsm_mmap_addr+0x9/0x30 [ 624.983420][T29396] ? security_mmap_addr+0x71/0x1e0 [ 624.983442][T29396] ? __get_unmapped_area+0x255/0x3e0 [ 624.983459][T29396] ? vrm_set_new_addr+0x204/0x290 [ 624.983479][T29396] mremap_to+0x1b7/0x450 [ 624.983499][T29396] do_mremap+0xb76/0x2130 [ 624.983526][T29396] ? __pfx_do_mremap+0x10/0x10 [ 624.983550][T29396] ? ksys_write+0x190/0x250 [ 624.983575][T29396] __do_sys_mremap+0x126/0x170 [ 624.983600][T29396] ? __pfx___do_sys_mremap+0x10/0x10 [ 624.983626][T29396] ? __x64_sys_futex+0x34f/0x4d0 [ 624.983657][T29396] do_syscall_64+0x106/0xf80 [ 624.983673][T29396] ? clear_bhb_loop+0x40/0x90 [ 624.983691][T29396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 624.983706][T29396] RIP: 0033:0x7f8bc839c629 [ 624.983720][T29396] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 624.983734][T29396] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 624.983749][T29396] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 624.983758][T29396] RDX: 0000000000000013 RSI: 0000000000000004 RDI: 0000200000000000 [ 624.983768][T29396] RBP: 00007f8bc8432b39 R08: 0000000100000000 R09: 0000000000000000 [ 624.983777][T29396] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 624.983786][T29396] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 624.983806][T29396] [ 626.001740][T29407] zswap: compressor 1 not available [ 626.183872][T29411] zswap: compressor 140 not available [ 627.797473][T29491] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11324'. [ 628.189686][T29513] FAULT_INJECTION: forcing a failure. [ 628.189686][T29513] name failslab, interval 1, probability 0, space 0, times 0 [ 628.239765][T29513] CPU: 0 UID: 0 PID: 29513 Comm: syz.2.11333 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 628.239799][T29513] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 628.239806][T29513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 628.239815][T29513] Call Trace: [ 628.239820][T29513] [ 628.239826][T29513] dump_stack_lvl+0x100/0x190 [ 628.239854][T29513] should_fail_ex.cold+0x5/0xa [ 628.239873][T29513] ? lsm_blob_alloc+0x68/0x90 [ 628.239889][T29513] should_failslab+0xc2/0x120 [ 628.239904][T29513] __kmalloc_noprof+0xe0/0x850 [ 628.239925][T29513] ? trace_kmem_cache_alloc+0xf3/0x120 [ 628.239942][T29513] lsm_blob_alloc+0x68/0x90 [ 628.239959][T29513] security_sk_alloc+0x2d/0x290 [ 628.239979][T29513] sk_prot_alloc+0x1d1/0x2a0 [ 628.240001][T29513] sk_alloc+0x36/0xe80 [ 628.240016][T29513] inet6_create+0x385/0x12b0 [ 628.240038][T29513] ? inet6_create+0x7f/0x12b0 [ 628.240056][T29513] __sock_create+0x339/0x860 [ 628.240082][T29513] udp_sock_create6+0xc7/0x6a0 [ 628.240100][T29513] ? __pfx_udp_sock_create6+0x10/0x10 [ 628.240120][T29513] ? crng_make_state+0x477/0x6c0 [ 628.240139][T29513] ? lockdep_hardirqs_on+0x78/0x100 [ 628.240155][T29513] ? crng_make_state+0x2b0/0x6c0 [ 628.240176][T29513] rxrpc_open_socket+0x206/0x6b0 [ 628.240198][T29513] ? __pfx_rxrpc_open_socket+0x10/0x10 [ 628.240226][T29513] ? rcu_is_watching+0x12/0xc0 [ 628.240251][T29513] rxrpc_lookup_local+0xac7/0x1220 [ 628.240274][T29513] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 628.240296][T29513] ? __local_bh_enable_ip+0x9e/0x120 [ 628.240314][T29513] rxrpc_sendmsg+0x34a/0x680 [ 628.240338][T29513] sock_write_iter+0x566/0x610 [ 628.240358][T29513] ? __pfx_sock_write_iter+0x10/0x10 [ 628.240385][T29513] ? bpf_lsm_file_permission+0x9/0x10 [ 628.240405][T29513] ? security_file_permission+0x76/0x210 [ 628.240429][T29513] ? rw_verify_area+0xce/0x6d0 [ 628.240450][T29513] vfs_write+0x6ac/0x1070 [ 628.240471][T29513] ? __pfx_sock_write_iter+0x10/0x10 [ 628.240492][T29513] ? __pfx_vfs_write+0x10/0x10 [ 628.240512][T29513] ? find_held_lock+0x2b/0x80 [ 628.240538][T29513] ksys_write+0x1f8/0x250 [ 628.240558][T29513] ? __pfx_ksys_write+0x10/0x10 [ 628.240585][T29513] do_syscall_64+0x106/0xf80 [ 628.240600][T29513] ? clear_bhb_loop+0x40/0x90 [ 628.240618][T29513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 628.240633][T29513] RIP: 0033:0x7f8bc839c629 [ 628.240647][T29513] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 628.240661][T29513] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 628.240677][T29513] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 628.240687][T29513] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 628.240696][T29513] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 628.240705][T29513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 628.240714][T29513] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 628.240734][T29513] [ 629.108714][T29544] bridge0: port 3(ipvlan0) entered blocking state [ 629.130598][T29544] bridge0: port 3(ipvlan0) entered disabled state [ 629.151911][T29544] ipvlan0: entered allmulticast mode [ 629.170474][T29544] veth0_vlan: entered allmulticast mode [ 629.216190][T29544] ipvlan0: left allmulticast mode [ 629.226808][T29544] veth0_vlan: left allmulticast mode [ 629.518203][T16348] Bluetooth: hci3: unexpected event 0x03 length: 43 > 11 [ 629.743296][T29570] UHID_CREATE from different security context by process 5835 (syz.1.11359), this is not allowed. [ 629.779054][T29572] bridge0: port 4(team0) entered blocking state [ 629.793538][T29572] bridge0: port 4(team0) entered disabled state [ 629.814371][T29572] team0: entered allmulticast mode [ 629.830246][T29572] team_slave_0: entered allmulticast mode [ 629.836017][T29572] team_slave_1: entered allmulticast mode [ 629.886170][T29572] team0: entered promiscuous mode [ 629.927114][T29572] team_slave_0: entered promiscuous mode [ 629.945787][T29572] team_slave_1: entered promiscuous mode [ 629.969104][T29572] bridge0: port 4(team0) entered blocking state [ 629.975470][T29572] bridge0: port 4(team0) entered forwarding state [ 630.212840][T29588] netlink: 206 bytes leftover after parsing attributes in process `syz.0.11368'. [ 630.731800][T29617] bridge0: port 3(hsr0) entered blocking state [ 630.765592][T29617] bridge0: port 3(hsr0) entered disabled state [ 630.793550][T29617] hsr0: entered allmulticast mode [ 630.813011][T29617] hsr_slave_0: entered allmulticast mode [ 630.845007][T29617] hsr_slave_1: entered allmulticast mode [ 630.878198][T29617] hsr0: entered promiscuous mode [ 630.902629][T29617] bridge0: port 3(hsr0) entered blocking state [ 630.908911][T29617] bridge0: port 3(hsr0) entered listening state [ 630.988873][T29625] netlink: 2468 bytes leftover after parsing attributes in process `syz.1.11385'. [ 632.047274][T29669] bridge0: port 3(bond0) entered blocking state [ 632.072564][T29669] bridge0: port 3(bond0) entered disabled state [ 632.105413][T29669] bond0: entered allmulticast mode [ 632.128817][T29669] bond_slave_0: entered allmulticast mode [ 632.166528][T29669] bond_slave_1: entered allmulticast mode [ 632.188482][T29669] bond0: entered promiscuous mode [ 632.218651][T29669] bond_slave_0: entered promiscuous mode [ 632.239228][T29669] bond_slave_1: entered promiscuous mode [ 632.275411][T29669] bridge0: port 3(bond0) entered blocking state [ 632.281767][T29669] bridge0: port 3(bond0) entered forwarding state [ 633.219629][T29719] FAULT_INJECTION: forcing a failure. [ 633.219629][T29719] name failslab, interval 1, probability 0, space 0, times 0 [ 633.268130][T29719] CPU: 0 UID: 0 PID: 29719 Comm: syz.3.11428 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 633.268160][T29719] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 633.268168][T29719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 633.268177][T29719] Call Trace: [ 633.268182][T29719] [ 633.268189][T29719] dump_stack_lvl+0x100/0x190 [ 633.268216][T29719] should_fail_ex.cold+0x5/0xa [ 633.268235][T29719] ? lsm_blob_alloc+0x68/0x90 [ 633.268253][T29719] should_failslab+0xc2/0x120 [ 633.268268][T29719] __kmalloc_noprof+0xe0/0x850 [ 633.268290][T29719] ? trace_kmem_cache_alloc+0xf3/0x120 [ 633.268307][T29719] lsm_blob_alloc+0x68/0x90 [ 633.268323][T29719] security_sk_alloc+0x2d/0x290 [ 633.268344][T29719] sk_prot_alloc+0x1d1/0x2a0 [ 633.268366][T29719] sk_alloc+0x36/0xe80 [ 633.268381][T29719] inet_create+0x3a0/0x1060 [ 633.268403][T29719] ? inet_create+0x94/0x1060 [ 633.268426][T29719] __sock_create+0x339/0x860 [ 633.268450][T29719] mptcp_subflow_create_socket+0xec/0xa30 [ 633.268472][T29719] ? __pfx_mptcp_subflow_create_socket+0x10/0x10 [ 633.268492][T29719] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 633.268515][T29719] ? __futex_wait+0x256/0x300 [ 633.268540][T29719] __mptcp_nmpc_sk+0x17f/0x870 [ 633.268570][T29719] ? __pfx___mptcp_nmpc_sk+0x10/0x10 [ 633.268591][T29719] ? register_lock_class+0x40/0x560 [ 633.268617][T29719] mptcp_connect+0x7e/0xad0 [ 633.268641][T29719] __inet_stream_connect+0x208/0xfa0 [ 633.268667][T29719] ? __pfx___inet_stream_connect+0x10/0x10 [ 633.268687][T29719] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 633.268709][T29719] ? __pfx_inet_stream_connect+0x10/0x10 [ 633.268730][T29719] ? __local_bh_enable_ip+0x9e/0x120 [ 633.268747][T29719] ? __pfx_inet_stream_connect+0x10/0x10 [ 633.268766][T29719] inet_stream_connect+0x57/0xa0 [ 633.268787][T29719] __sys_connect_file+0x141/0x1a0 [ 633.268812][T29719] __sys_connect+0x141/0x170 [ 633.268825][T29719] ? __pfx___sys_connect+0x10/0x10 [ 633.268860][T29719] __x64_sys_connect+0x72/0xb0 [ 633.268873][T29719] ? lockdep_hardirqs_on+0x78/0x100 [ 633.268889][T29719] do_syscall_64+0x106/0xf80 [ 633.268904][T29719] ? clear_bhb_loop+0x40/0x90 [ 633.268922][T29719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 633.268938][T29719] RIP: 0033:0x7fce9d39c629 [ 633.268952][T29719] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 633.268966][T29719] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 633.268981][T29719] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 633.268992][T29719] RDX: 0000000000000002 RSI: 0000200000000080 RDI: 0000000000000003 [ 633.269001][T29719] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 633.269010][T29719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 633.269019][T29719] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 633.269039][T29719] [ 635.358470][T29798] netlink: 350 bytes leftover after parsing attributes in process `syz.0.11465'. [ 636.513585][T29852] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11492'. [ 636.940801][ T29] audit: type=1800 audit(4294967311.250:37): pid=29869 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.11500" name="dbroot" dev="configfs" ino=89016 res=0 errno=0 [ 637.035886][T29872] bridge0: port 5(dummy0) entered blocking state [ 637.070597][T29872] bridge0: port 5(dummy0) entered disabled state [ 637.096395][T29872] dummy0: entered allmulticast mode [ 637.126171][T29872] dummy0: entered promiscuous mode [ 637.146441][T29872] bridge0: port 5(dummy0) entered blocking state [ 637.152906][T29872] bridge0: port 5(dummy0) entered forwarding state [ 637.622156][T29897] netlink: 21 bytes leftover after parsing attributes in process `syz.2.11514'. [ 638.907029][T29953] input: 9%vJ,6 as /devices/virtual/input/input42 [ 640.990287][T30048] netlink: set zone limit has 8 unknown bytes [ 642.457738][T30120] random: crng reseeded on system resumption [ 643.026192][T16348] Bluetooth: hci0: Malformed Event: 0x13 [ 644.329335][T30201] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11654'. [ 645.591708][T30240] FAULT_INJECTION: forcing a failure. [ 645.591708][T30240] name failslab, interval 1, probability 0, space 0, times 0 [ 645.652711][T30240] CPU: 0 UID: 0 PID: 30240 Comm: syz.1.11671 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 645.652741][T30240] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 645.652748][T30240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 645.652758][T30240] Call Trace: [ 645.652764][T30240] [ 645.652770][T30240] dump_stack_lvl+0x100/0x190 [ 645.652798][T30240] should_fail_ex.cold+0x5/0xa [ 645.652817][T30240] should_failslab+0xc2/0x120 [ 645.652831][T30240] __kmalloc_cache_noprof+0x7a/0x6f0 [ 645.652850][T30240] ? allocate_file_region_entries+0x1a0/0x620 [ 645.652877][T30240] allocate_file_region_entries+0x1a0/0x620 [ 645.652901][T30240] ? __pfx_allocate_file_region_entries+0x10/0x10 [ 645.652928][T30240] region_chg+0x85/0x140 [ 645.652948][T30240] __vma_reservation_common+0x376/0x720 [ 645.652970][T30240] ? __pfx___vma_reservation_common+0x10/0x10 [ 645.652991][T30240] ? __pfx___might_resched+0x10/0x10 [ 645.653015][T30240] hugetlb_no_page+0xb2b/0x1970 [ 645.653038][T30240] hugetlb_fault+0x5df/0x1450 [ 645.653057][T30240] ? __pfx_hugetlb_fault+0x10/0x10 [ 645.653082][T30240] ? find_vma+0xbf/0x140 [ 645.653102][T30240] ? __pfx_find_vma+0x10/0x10 [ 645.653126][T30240] handle_mm_fault+0x5f1/0xa20 [ 645.653147][T30240] do_user_addr_fault+0x74c/0x12f0 [ 645.653175][T30240] exc_page_fault+0x6f/0xd0 [ 645.653192][T30240] asm_exc_page_fault+0x26/0x30 [ 645.653206][T30240] RIP: 0010:__put_user_4+0xd/0x20 [ 645.653223][T30240] Code: 66 89 01 31 c9 0f 01 ca e9 80 d0 03 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca e9 57 d0 03 00 0f 1f 80 00 00 00 00 90 90 90 [ 645.653238][T30240] RSP: 0018:ffffc900049bfe58 EFLAGS: 00050202 [ 645.653251][T30240] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000007 [ 645.653260][T30240] RDX: 0000000000000000 RSI: ffffffff8255c271 RDI: ffff8880275da3dc [ 645.653269][T30240] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000000001c5 [ 645.653277][T30240] R10: 0000000000000200 R11: 0000000000000000 R12: 1ffff92000937fce [ 645.653286][T30240] R13: 0000000000000007 R14: 0000000000000000 R15: dffffc0000000000 [ 645.653300][T30240] ? __might_fault+0x111/0x140 [ 645.653322][T30240] __do_sys_prctl+0xd67/0x2330 [ 645.653343][T30240] ? __pfx___do_sys_prctl+0x10/0x10 [ 645.653369][T30240] do_syscall_64+0x106/0xf80 [ 645.653383][T30240] ? clear_bhb_loop+0x40/0x90 [ 645.653401][T30240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 645.653416][T30240] RIP: 0033:0x7f4d4299c629 [ 645.653428][T30240] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 645.653441][T30240] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 645.653454][T30240] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 645.653463][T30240] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000002 [ 645.653472][T30240] RBP: 00007f4d42a32b39 R08: 0000000000000001 R09: 0000000000000000 [ 645.653480][T30240] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 [ 645.653488][T30240] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 645.653508][T30240] [ 646.137913][ C0] bridge0: port 3(hsr0) entered learning state [ 648.652449][T30325] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 648.658892][T30325] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 649.182173][T30341] netlink: 338 bytes leftover after parsing attributes in process `syz.1.11725'. [ 649.271500][T30345] syz.3.11719 (30345) used obsolete PPPIOCDETACH ioctl [ 650.861064][T30397] FAULT_INJECTION: forcing a failure. [ 650.861064][T30397] name failslab, interval 1, probability 0, space 0, times 0 [ 650.917795][T30397] CPU: 0 UID: 0 PID: 30397 Comm: syz.3.11744 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 650.917827][T30397] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 650.917834][T30397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 650.917843][T30397] Call Trace: [ 650.917849][T30397] [ 650.917855][T30397] dump_stack_lvl+0x100/0x190 [ 650.917890][T30397] should_fail_ex.cold+0x5/0xa [ 650.917907][T30397] should_failslab+0xc2/0x120 [ 650.917921][T30397] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 650.917942][T30397] ? alloc_empty_file+0x55/0x1c0 [ 650.917963][T30397] alloc_empty_file+0x55/0x1c0 [ 650.917980][T30397] alloc_file_pseudo+0x13a/0x230 [ 650.917998][T30397] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 650.918015][T30397] ? _raw_spin_unlock+0x28/0x50 [ 650.918038][T30397] ? alloc_fd+0x476/0x790 [ 650.918060][T30397] __anon_inode_getfile+0xe8/0x280 [ 650.918079][T30397] do_epoll_create+0x329/0x4b0 [ 650.918102][T30397] __x64_sys_epoll_create+0x45/0x70 [ 650.918116][T30397] do_syscall_64+0x106/0xf80 [ 650.918131][T30397] ? clear_bhb_loop+0x40/0x90 [ 650.918149][T30397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.918164][T30397] RIP: 0033:0x7fce9d39c629 [ 650.918177][T30397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 650.918191][T30397] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 650.918205][T30397] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 650.918215][T30397] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002000007 [ 650.918223][T30397] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 650.918232][T30397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 650.918240][T30397] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 650.918259][T30397] [ 653.984728][T30501] binder: 30498:30501 ioctl c0306201 2000000000c0 returned -14 [ 654.132462][T30506] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11794'. [ 654.838248][T30530] device-mapper: ioctl: Invalid new mapped device name or uuid string supplied. [ 657.224921][T30620] FAULT_INJECTION: forcing a failure. [ 657.224921][T30620] name failslab, interval 1, probability 0, space 0, times 0 [ 657.327827][T30620] CPU: 0 UID: 0 PID: 30620 Comm: syz.1.11848 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 657.327879][T30620] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 657.327886][T30620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 657.327895][T30620] Call Trace: [ 657.327900][T30620] [ 657.327906][T30620] dump_stack_lvl+0x100/0x190 [ 657.327933][T30620] should_fail_ex.cold+0x5/0xa [ 657.327951][T30620] ? sk_prot_alloc+0x10b/0x2a0 [ 657.327970][T30620] should_failslab+0xc2/0x120 [ 657.327985][T30620] __kmalloc_noprof+0xe0/0x850 [ 657.328009][T30620] sk_prot_alloc+0x10b/0x2a0 [ 657.328029][T30620] sk_alloc+0x36/0xe80 [ 657.328044][T30620] packet_create+0x127/0x8e0 [ 657.328067][T30620] __sock_create+0x339/0x860 [ 657.328092][T30620] __sys_socket+0x14d/0x260 [ 657.328113][T30620] ? __pfx___sys_socket+0x10/0x10 [ 657.328140][T30620] __x64_sys_socket+0x72/0xb0 [ 657.328160][T30620] ? lockdep_hardirqs_on+0x78/0x100 [ 657.328176][T30620] do_syscall_64+0x106/0xf80 [ 657.328191][T30620] ? clear_bhb_loop+0x40/0x90 [ 657.328209][T30620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 657.328224][T30620] RIP: 0033:0x7f4d4299c629 [ 657.328237][T30620] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 657.328252][T30620] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 657.328266][T30620] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 657.328276][T30620] RDX: 0000000000000004 RSI: 0000000000000003 RDI: 0000000000000011 [ 657.328284][T30620] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 657.328292][T30620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 657.328301][T30620] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 657.328320][T30620] [ 658.612368][T30665] FAULT_INJECTION: forcing a failure. [ 658.612368][T30665] name failslab, interval 1, probability 0, space 0, times 0 [ 658.671120][T30665] CPU: 0 UID: 0 PID: 30665 Comm: syz.3.11870 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 658.671151][T30665] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 658.671158][T30665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 658.671168][T30665] Call Trace: [ 658.671173][T30665] [ 658.671179][T30665] dump_stack_lvl+0x100/0x190 [ 658.671206][T30665] should_fail_ex.cold+0x5/0xa [ 658.671224][T30665] should_failslab+0xc2/0x120 [ 658.671239][T30665] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 658.671259][T30665] ? alloc_inode+0x183/0x250 [ 658.671278][T30665] ? do_raw_spin_lock+0x128/0x260 [ 658.671301][T30665] alloc_inode+0x183/0x250 [ 658.671318][T30665] alloc_anon_inode+0x2a/0x3e0 [ 658.671342][T30665] anon_inode_make_secure_inode+0x2f/0x140 [ 658.671361][T30665] __anon_inode_getfile+0x1cf/0x280 [ 658.671378][T30665] new_userfaultfd+0x255/0x400 [ 658.671399][T30665] __x64_sys_userfaultfd+0x4b/0xb0 [ 658.671421][T30665] do_syscall_64+0x106/0xf80 [ 658.671436][T30665] ? clear_bhb_loop+0x40/0x90 [ 658.671453][T30665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.671469][T30665] RIP: 0033:0x7fce9d39c629 [ 658.671482][T30665] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 658.671496][T30665] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000143 [ 658.671510][T30665] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 658.671520][T30665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 658.671528][T30665] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 658.671537][T30665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 658.671545][T30665] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 658.671564][T30665] [ 660.963808][T30714] device-mapper: ioctl: device name cannot be "control", ".", or ".." [ 661.499186][ C0] bridge0: port 3(hsr0) entered forwarding state [ 661.505536][ C0] bridge0: topology change detected, propagating [ 663.354403][T30795] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11928'. [ 663.385144][T30795] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11928'. [ 663.409288][T30797] ovs_: entered promiscuous mode [ 663.547242][T30803] FAULT_INJECTION: forcing a failure. [ 663.547242][T30803] name failslab, interval 1, probability 0, space 0, times 0 [ 663.579433][T30803] CPU: 0 UID: 0 PID: 30803 Comm: syz.3.11934 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 663.579464][T30803] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 663.579471][T30803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 663.579481][T30803] Call Trace: [ 663.579486][T30803] [ 663.579493][T30803] dump_stack_lvl+0x100/0x190 [ 663.579520][T30803] should_fail_ex.cold+0x5/0xa [ 663.579539][T30803] should_failslab+0xc2/0x120 [ 663.579553][T30803] __kmalloc_cache_noprof+0x7a/0x6f0 [ 663.579572][T30803] ? __do_sys_fanotify_init+0x5cf/0xe50 [ 663.579592][T30803] ? get_mem_cgroup_from_mm+0x88/0x600 [ 663.579612][T30803] ? get_mem_cgroup_from_mm+0x132/0x600 [ 663.579634][T30803] __do_sys_fanotify_init+0x5cf/0xe50 [ 663.579664][T30803] do_syscall_64+0x106/0xf80 [ 663.579681][T30803] ? clear_bhb_loop+0x40/0x90 [ 663.579698][T30803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 663.579713][T30803] RIP: 0033:0x7fce9d39c629 [ 663.579726][T30803] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 663.579741][T30803] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000012c [ 663.579755][T30803] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 663.579765][T30803] RDX: 0000000000000000 RSI: 0002000000000002 RDI: 0000000000000005 [ 663.579773][T30803] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 663.579782][T30803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 663.579790][T30803] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 663.579809][T30803] [ 665.074511][T30832] FAULT_INJECTION: forcing a failure. [ 665.074511][T30832] name failslab, interval 1, probability 0, space 0, times 0 [ 665.116446][T30832] CPU: 0 UID: 0 PID: 30832 Comm: syz.2.11944 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 665.116477][T30832] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 665.116490][T30832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 665.116500][T30832] Call Trace: [ 665.116506][T30832] [ 665.116512][T30832] dump_stack_lvl+0x100/0x190 [ 665.116540][T30832] should_fail_ex.cold+0x5/0xa [ 665.116558][T30832] should_failslab+0xc2/0x120 [ 665.116572][T30832] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 665.116594][T30832] ? sk_prot_alloc+0x60/0x2a0 [ 665.116616][T30832] sk_prot_alloc+0x60/0x2a0 [ 665.116635][T30832] sk_alloc+0x36/0xe80 [ 665.116650][T30832] rds_create+0x9e/0x5f0 [ 665.116672][T30832] __sock_create+0x339/0x860 [ 665.116696][T30832] __sys_socket+0x14d/0x260 [ 665.116717][T30832] ? __pfx___sys_socket+0x10/0x10 [ 665.116743][T30832] __x64_sys_socket+0x72/0xb0 [ 665.116762][T30832] ? lockdep_hardirqs_on+0x78/0x100 [ 665.116778][T30832] do_syscall_64+0x106/0xf80 [ 665.116793][T30832] ? clear_bhb_loop+0x40/0x90 [ 665.116811][T30832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 665.116825][T30832] RIP: 0033:0x7f8bc839c629 [ 665.116842][T30832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 665.116856][T30832] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 665.116871][T30832] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 665.116881][T30832] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000015 [ 665.116890][T30832] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 665.116899][T30832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 665.116908][T30832] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 665.116927][T30832] [ 665.623799][T30848] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11954'. [ 665.660189][T30848] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11954'. [ 665.944874][T30862] ovs_: entered promiscuous mode [ 667.440765][T30909] ovs_: entered promiscuous mode [ 667.767210][T30921] FAULT_INJECTION: forcing a failure. [ 667.767210][T30921] name failslab, interval 1, probability 0, space 0, times 0 [ 667.820619][T30921] CPU: 0 UID: 0 PID: 30921 Comm: syz.3.11983 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 667.820649][T30921] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 667.820656][T30921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 667.820666][T30921] Call Trace: [ 667.820671][T30921] [ 667.820677][T30921] dump_stack_lvl+0x100/0x190 [ 667.820703][T30921] should_fail_ex.cold+0x5/0xa [ 667.820723][T30921] should_failslab+0xc2/0x120 [ 667.820737][T30921] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 667.820757][T30921] ? sk_prot_alloc+0x60/0x2a0 [ 667.820780][T30921] sk_prot_alloc+0x60/0x2a0 [ 667.820800][T30921] sk_alloc+0x36/0xe80 [ 667.820815][T30921] rds_create+0x9e/0x5f0 [ 667.820836][T30921] __sock_create+0x339/0x860 [ 667.820860][T30921] __sys_socket+0x14d/0x260 [ 667.820882][T30921] ? __pfx___sys_socket+0x10/0x10 [ 667.820908][T30921] __x64_sys_socket+0x72/0xb0 [ 667.820927][T30921] ? lockdep_hardirqs_on+0x78/0x100 [ 667.820944][T30921] do_syscall_64+0x106/0xf80 [ 667.820959][T30921] ? clear_bhb_loop+0x40/0x90 [ 667.820976][T30921] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 667.820991][T30921] RIP: 0033:0x7fce9d39c629 [ 667.821003][T30921] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 667.821017][T30921] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 667.821032][T30921] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 667.821041][T30921] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000015 [ 667.821049][T30921] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 667.821058][T30921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 667.821066][T30921] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 667.821085][T30921] [ 668.113934][T30928] FAULT_INJECTION: forcing a failure. [ 668.113934][T30928] name failslab, interval 1, probability 0, space 0, times 0 [ 668.126620][T30928] CPU: 0 UID: 0 PID: 30928 Comm: syz.3.12002 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 668.126650][T30928] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 668.126658][T30928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 668.126667][T30928] Call Trace: [ 668.126674][T30928] [ 668.126680][T30928] dump_stack_lvl+0x100/0x190 [ 668.126707][T30928] should_fail_ex.cold+0x5/0xa [ 668.126725][T30928] should_failslab+0xc2/0x120 [ 668.126739][T30928] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 668.126759][T30928] ? key_alloc+0x3c5/0x1310 [ 668.126772][T30928] ? rcu_is_watching+0x12/0xc0 [ 668.126796][T30928] key_alloc+0x3c5/0x1310 [ 668.126817][T30928] ? __pfx_key_alloc+0x10/0x10 [ 668.126849][T30928] keyring_alloc+0x44/0xc0 [ 668.126866][T30928] lookup_user_key+0x9b8/0x1300 [ 668.126889][T30928] ? __pfx_lookup_user_key+0x10/0x10 [ 668.126910][T30928] ? do_futex+0x192/0x350 [ 668.126928][T30928] ? __pfx_do_futex+0x10/0x10 [ 668.126947][T30928] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 668.126970][T30928] ? __x64_sys_futex+0x34f/0x4d0 [ 668.126987][T30928] ? __x64_sys_futex+0x358/0x4d0 [ 668.127009][T30928] keyctl_watch_key+0x52/0x500 [ 668.127030][T30928] __do_sys_keyctl+0x29f/0x5a0 [ 668.127050][T30928] do_syscall_64+0x106/0xf80 [ 668.127066][T30928] ? clear_bhb_loop+0x40/0x90 [ 668.127083][T30928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 668.127099][T30928] RIP: 0033:0x7fce9d39c629 [ 668.127113][T30928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 668.127127][T30928] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 668.127141][T30928] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 668.127150][T30928] RDX: 0000000000000005 RSI: ffffffffffffffff RDI: 0200000000000020 [ 668.127159][T30928] RBP: 00007fce9d432b39 R08: 0000000000000008 R09: 0000000000000000 [ 668.127168][T30928] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000 [ 668.127177][T30928] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 668.127196][T30928] [ 668.361708][ T29] audit: type=1800 audit(4294967298.950:38): pid=30925 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.11986" name="SYSV00000000" dev="tmpfs" ino=0 res=0 errno=0 [ 668.867533][T30944] FAULT_INJECTION: forcing a failure. [ 668.867533][T30944] name failslab, interval 1, probability 0, space 0, times 0 [ 668.964125][T30944] CPU: 0 UID: 0 PID: 30944 Comm: syz.2.11999 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 668.964156][T30944] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 668.964163][T30944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 668.964173][T30944] Call Trace: [ 668.964179][T30944] [ 668.964185][T30944] dump_stack_lvl+0x100/0x190 [ 668.964212][T30944] should_fail_ex.cold+0x5/0xa [ 668.964231][T30944] should_failslab+0xc2/0x120 [ 668.964247][T30944] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 668.964267][T30944] ? __pmd_alloc+0xbf/0x9c0 [ 668.964286][T30944] __pmd_alloc+0xbf/0x9c0 [ 668.964304][T30944] move_page_tables+0x3224/0x4500 [ 668.964324][T30944] ? __pfx_copy_vma+0x10/0x10 [ 668.964351][T30944] ? __pfx_move_page_tables+0x10/0x10 [ 668.964381][T30944] ? finish_task_switch.isra.0+0x200/0xb80 [ 668.964399][T30944] copy_vma_and_data+0x25c/0x7c0 [ 668.964420][T30944] ? __pfx_copy_vma_and_data+0x10/0x10 [ 668.964448][T30944] ? __vma_start_write+0x17f/0x280 [ 668.964465][T30944] ? __pfx___vma_start_write+0x10/0x10 [ 668.964481][T30944] ? __pfx_arch_get_unmapped_area_topdown+0x10/0x10 [ 668.964509][T30944] move_vma+0x51b/0x1890 [ 668.964531][T30944] ? __pfx_move_vma+0x10/0x10 [ 668.964551][T30944] ? thp_get_unmapped_area_vmflags+0x27f/0x2d0 [ 668.964570][T30944] ? cap_mmap_addr+0x4b/0x120 [ 668.964588][T30944] ? bpf_lsm_mmap_addr+0x9/0x30 [ 668.964607][T30944] ? security_mmap_addr+0x71/0x1e0 [ 668.964630][T30944] ? __get_unmapped_area+0x255/0x3e0 [ 668.964647][T30944] ? vrm_set_new_addr+0x204/0x290 [ 668.964667][T30944] mremap_to+0x1b7/0x450 [ 668.964687][T30944] do_mremap+0xb76/0x2130 [ 668.964714][T30944] ? __pfx_do_mremap+0x10/0x10 [ 668.964737][T30944] ? ksys_write+0x190/0x250 [ 668.964763][T30944] __do_sys_mremap+0x126/0x170 [ 668.964783][T30944] ? __pfx___do_sys_mremap+0x10/0x10 [ 668.964807][T30944] ? __x64_sys_futex+0x34f/0x4d0 [ 668.964837][T30944] do_syscall_64+0x106/0xf80 [ 668.964853][T30944] ? clear_bhb_loop+0x40/0x90 [ 668.964870][T30944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 668.964885][T30944] RIP: 0033:0x7f8bc839c629 [ 668.964899][T30944] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 668.964913][T30944] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 668.964928][T30944] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 668.964939][T30944] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000110c231000 [ 668.964948][T30944] RBP: 00007f8bc8432b39 R08: 0000000100000000 R09: 0000000000000000 [ 668.964957][T30944] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 668.964966][T30944] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 668.964986][T30944] [ 670.331361][T30946] NFSD: Failed to start, no listeners configured. [ 671.064040][T31008] NFSD: Failed to start, no listeners configured. [ 671.942351][ T29] audit: type=1800 audit(4294967297.390:39): pid=31031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.12040" name="dbroot" dev="configfs" ino=92764 res=0 errno=0 [ 672.158755][T31038] NFSD: Failed to start, no listeners configured. [ 672.399731][T31050] netlink: 'syz.2.12060': attribute type 1 has an invalid length. [ 672.861410][ T29] audit: type=1800 audit(4294967298.310:40): pid=31060 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.12054" name="dbroot" dev="configfs" ino=92859 res=0 errno=0 [ 673.375018][T31075] FAULT_INJECTION: forcing a failure. [ 673.375018][T31075] name failslab, interval 1, probability 0, space 0, times 0 [ 673.434942][T31075] CPU: 0 UID: 0 PID: 31075 Comm: syz.1.12072 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 673.434973][T31075] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 673.434980][T31075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 673.434990][T31075] Call Trace: [ 673.434995][T31075] [ 673.435001][T31075] dump_stack_lvl+0x100/0x190 [ 673.435028][T31075] should_fail_ex.cold+0x5/0xa [ 673.435046][T31075] should_failslab+0xc2/0x120 [ 673.435061][T31075] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 673.435080][T31075] ? ptlock_alloc+0x1f/0x70 [ 673.435102][T31075] ptlock_alloc+0x1f/0x70 [ 673.435120][T31075] pte_alloc_one+0x84/0x3e0 [ 673.435137][T31075] __pte_alloc+0x6d/0x3f0 [ 673.435150][T31075] ? __pfx___pte_alloc+0x10/0x10 [ 673.435164][T31075] ? _raw_spin_unlock+0x28/0x50 [ 673.435186][T31075] ? __pmd_alloc+0x6aa/0x9c0 [ 673.435203][T31075] move_page_tables+0x257e/0x4500 [ 673.435224][T31075] ? __pfx_copy_vma+0x10/0x10 [ 673.435250][T31075] ? __pfx_move_page_tables+0x10/0x10 [ 673.435284][T31075] copy_vma_and_data+0x25c/0x7c0 [ 673.435305][T31075] ? __pfx_copy_vma_and_data+0x10/0x10 [ 673.435333][T31075] ? __vma_start_write+0x17f/0x280 [ 673.435350][T31075] ? __pfx___vma_start_write+0x10/0x10 [ 673.435372][T31075] move_vma+0x51b/0x1890 [ 673.435394][T31075] ? __pfx_move_vma+0x10/0x10 [ 673.435415][T31075] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 673.435431][T31075] ? cap_mmap_addr+0x4b/0x120 [ 673.435448][T31075] ? bpf_lsm_mmap_addr+0x9/0x30 [ 673.435469][T31075] ? security_mmap_addr+0x71/0x1e0 [ 673.435492][T31075] ? __get_unmapped_area+0x255/0x3e0 [ 673.435509][T31075] ? vrm_set_new_addr+0x204/0x290 [ 673.435530][T31075] mremap_to+0x1b7/0x450 [ 673.435549][T31075] do_mremap+0xb76/0x2130 [ 673.435577][T31075] ? __pfx_do_mremap+0x10/0x10 [ 673.435600][T31075] ? ksys_write+0x190/0x250 [ 673.435625][T31075] __do_sys_mremap+0x126/0x170 [ 673.435645][T31075] ? __pfx___do_sys_mremap+0x10/0x10 [ 673.435669][T31075] ? __x64_sys_futex+0x34f/0x4d0 [ 673.435707][T31075] do_syscall_64+0x106/0xf80 [ 673.435723][T31075] ? clear_bhb_loop+0x40/0x90 [ 673.435741][T31075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 673.435757][T31075] RIP: 0033:0x7f4d4299c629 [ 673.435771][T31075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 673.435785][T31075] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 673.435800][T31075] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 673.435810][T31075] RDX: 0000000000000013 RSI: 0000000000000004 RDI: 0000200000000000 [ 673.435820][T31075] RBP: 00007f4d42a32b39 R08: 0000000100000000 R09: 0000000000000000 [ 673.435829][T31075] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 673.435837][T31075] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 673.435858][T31075] [ 674.664878][T31117] netlink: 16 bytes leftover after parsing attributes in process `syz.3.12081'. [ 675.131497][T31139] netlink: 'syz.0.12101': attribute type 1 has an invalid length. [ 675.451293][T31152] netlink: 16 bytes leftover after parsing attributes in process `syz.1.12096'. [ 676.365251][T31161] FAULT_INJECTION: forcing a failure. [ 676.365251][T31161] name failslab, interval 1, probability 0, space 0, times 0 [ 676.420699][T31161] CPU: 0 UID: 0 PID: 31161 Comm: syz.3.12100 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 676.420731][T31161] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 676.420738][T31161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 676.420747][T31161] Call Trace: [ 676.420753][T31161] [ 676.420759][T31161] dump_stack_lvl+0x100/0x190 [ 676.420788][T31161] should_fail_ex.cold+0x5/0xa [ 676.420806][T31161] should_failslab+0xc2/0x120 [ 676.420821][T31161] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 676.420841][T31161] ? __pmd_alloc+0xbf/0x9c0 [ 676.420861][T31161] __pmd_alloc+0xbf/0x9c0 [ 676.420878][T31161] move_page_tables+0x3224/0x4500 [ 676.420899][T31161] ? __pfx_copy_vma+0x10/0x10 [ 676.420925][T31161] ? __pfx_move_page_tables+0x10/0x10 [ 676.420955][T31161] ? finish_task_switch.isra.0+0x200/0xb80 [ 676.420973][T31161] copy_vma_and_data+0x25c/0x7c0 [ 676.420994][T31161] ? __pfx_copy_vma_and_data+0x10/0x10 [ 676.421022][T31161] ? __vma_start_write+0x17f/0x280 [ 676.421039][T31161] ? __pfx___vma_start_write+0x10/0x10 [ 676.421061][T31161] move_vma+0x51b/0x1890 [ 676.421083][T31161] ? __pfx_move_vma+0x10/0x10 [ 676.421104][T31161] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 676.421119][T31161] ? cap_mmap_addr+0x4b/0x120 [ 676.421137][T31161] ? bpf_lsm_mmap_addr+0x9/0x30 [ 676.421157][T31161] ? security_mmap_addr+0x71/0x1e0 [ 676.421181][T31161] ? __get_unmapped_area+0x255/0x3e0 [ 676.421198][T31161] ? vrm_set_new_addr+0x204/0x290 [ 676.421218][T31161] mremap_to+0x1b7/0x450 [ 676.421238][T31161] do_mremap+0xb76/0x2130 [ 676.421265][T31161] ? __pfx_do_mremap+0x10/0x10 [ 676.421289][T31161] ? ksys_write+0x190/0x250 [ 676.421314][T31161] __do_sys_mremap+0x126/0x170 [ 676.421334][T31161] ? __pfx___do_sys_mremap+0x10/0x10 [ 676.421359][T31161] ? __x64_sys_futex+0x34f/0x4d0 [ 676.421389][T31161] do_syscall_64+0x106/0xf80 [ 676.421404][T31161] ? clear_bhb_loop+0x40/0x90 [ 676.421423][T31161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 676.421438][T31161] RIP: 0033:0x7fce9d39c629 [ 676.421451][T31161] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 676.421466][T31161] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 676.421481][T31161] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 676.421491][T31161] RDX: 0000000000000013 RSI: 0000000000000004 RDI: 0000200000000000 [ 676.421499][T31161] RBP: 00007fce9d432b39 R08: 0000000100000000 R09: 0000000000000000 [ 676.421508][T31161] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 676.421517][T31161] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 676.421537][T31161] [ 678.455113][T31238] zswap: compressor 1 not available [ 678.672626][T31240] zswap: compressor 140 not available [ 679.401027][T31279] FAULT_INJECTION: forcing a failure. [ 679.401027][T31279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.468319][T31279] CPU: 0 UID: 0 PID: 31279 Comm: syz.2.12155 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 679.468350][T31279] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 679.468357][T31279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 679.468367][T31279] Call Trace: [ 679.468373][T31279] [ 679.468378][T31279] dump_stack_lvl+0x100/0x190 [ 679.468406][T31279] should_fail_ex.cold+0x5/0xa [ 679.468421][T31279] ? prepare_alloc_pages+0x16d/0x5f0 [ 679.468438][T31279] should_fail_alloc_page+0xeb/0x140 [ 679.468454][T31279] prepare_alloc_pages+0x1f0/0x5f0 [ 679.468474][T31279] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 679.468495][T31279] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 679.468517][T31279] ? find_held_lock+0x2b/0x80 [ 679.468530][T31279] ? folios_put_refs+0x66d/0x840 [ 679.468553][T31279] ? __pfx_folios_put_refs+0x10/0x10 [ 679.468572][T31279] ? _raw_spin_unlock_irq+0x2e/0x50 [ 679.468586][T31279] ? mlock_folio_batch+0xca4/0x50d0 [ 679.468605][T31279] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 679.468625][T31279] ? munlock_folio+0x3a6/0x700 [ 679.468644][T31279] ? munlock_folio+0x3a6/0x700 [ 679.468667][T31279] ? munlock_folio+0x3d2/0x700 [ 679.468688][T31279] ? folio_remove_rmap_pmd+0x69c/0xed0 [ 679.468710][T31279] ? split_huge_pmd_locked+0x3ba/0x3cf0 [ 679.468728][T31279] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 679.468753][T31279] ? policy_nodemask+0xed/0x4f0 [ 679.468768][T31279] alloc_pages_mpol+0x1fb/0x550 [ 679.468783][T31279] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 679.468796][T31279] ? __split_huge_pmd+0x203/0x350 [ 679.468813][T31279] ? __split_huge_pmd+0x203/0x350 [ 679.468834][T31279] alloc_pages_noprof+0x131/0x390 [ 679.468850][T31279] pte_alloc_one+0x1e/0x3e0 [ 679.468866][T31279] __pte_alloc+0x6d/0x3f0 [ 679.468880][T31279] ? __pfx___pte_alloc+0x10/0x10 [ 679.468893][T31279] ? _raw_spin_unlock+0x28/0x50 [ 679.468915][T31279] ? __pmd_alloc+0x6aa/0x9c0 [ 679.468931][T31279] move_page_tables+0x257e/0x4500 [ 679.468952][T31279] ? __pfx_copy_vma+0x10/0x10 [ 679.468978][T31279] ? __pfx_move_page_tables+0x10/0x10 [ 679.469008][T31279] ? finish_task_switch.isra.0+0x200/0xb80 [ 679.469026][T31279] copy_vma_and_data+0x25c/0x7c0 [ 679.469048][T31279] ? __pfx_copy_vma_and_data+0x10/0x10 [ 679.469075][T31279] ? __vma_start_write+0x17f/0x280 [ 679.469092][T31279] ? __pfx___vma_start_write+0x10/0x10 [ 679.469114][T31279] move_vma+0x51b/0x1890 [ 679.469144][T31279] ? __pfx_move_vma+0x10/0x10 [ 679.469166][T31279] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 679.469183][T31279] ? cap_mmap_addr+0x4b/0x120 [ 679.469201][T31279] ? bpf_lsm_mmap_addr+0x9/0x30 [ 679.469221][T31279] ? security_mmap_addr+0x71/0x1e0 [ 679.469244][T31279] ? __get_unmapped_area+0x255/0x3e0 [ 679.469263][T31279] ? vrm_set_new_addr+0x204/0x290 [ 679.469283][T31279] mremap_to+0x1b7/0x450 [ 679.469303][T31279] do_mremap+0xb76/0x2130 [ 679.469330][T31279] ? __pfx_do_mremap+0x10/0x10 [ 679.469353][T31279] ? ksys_write+0x190/0x250 [ 679.469379][T31279] __do_sys_mremap+0x126/0x170 [ 679.469399][T31279] ? __pfx___do_sys_mremap+0x10/0x10 [ 679.469423][T31279] ? __x64_sys_futex+0x34f/0x4d0 [ 679.469453][T31279] do_syscall_64+0x106/0xf80 [ 679.469468][T31279] ? clear_bhb_loop+0x40/0x90 [ 679.469486][T31279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.469501][T31279] RIP: 0033:0x7f8bc839c629 [ 679.469515][T31279] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 679.469529][T31279] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 679.469544][T31279] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 679.469554][T31279] RDX: 0000000000000013 RSI: 0000000000000004 RDI: 0000200000000000 [ 679.469563][T31279] RBP: 00007f8bc8432b39 R08: 0000000100000000 R09: 0000000000000000 [ 679.469572][T31279] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 679.469581][T31279] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 679.469604][T31279] [ 681.037253][T31326] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12174'. [ 682.098849][T31370] bridge0: port 4(ipvlan0) entered blocking state [ 682.137465][T31370] bridge0: port 4(ipvlan0) entered disabled state [ 682.144063][T31370] ipvlan0: entered allmulticast mode [ 682.188442][T31370] veth0_vlan: entered allmulticast mode [ 682.213974][T31370] ipvlan0: left allmulticast mode [ 682.240236][T31370] veth0_vlan: left allmulticast mode [ 682.269209][T31376] FAULT_INJECTION: forcing a failure. [ 682.269209][T31376] name failslab, interval 1, probability 0, space 0, times 0 [ 682.319772][T31376] CPU: 0 UID: 0 PID: 31376 Comm: syz.2.12201 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 682.319812][T31376] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 682.319820][T31376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 682.319829][T31376] Call Trace: [ 682.319835][T31376] [ 682.319840][T31376] dump_stack_lvl+0x100/0x190 [ 682.319866][T31376] should_fail_ex.cold+0x5/0xa [ 682.319884][T31376] should_failslab+0xc2/0x120 [ 682.319899][T31376] __kmalloc_cache_noprof+0x7a/0x6f0 [ 682.319916][T31376] ? alloc_bprm+0x86/0x710 [ 682.319940][T31376] alloc_bprm+0x86/0x710 [ 682.319962][T31376] do_execveat_common.isra.0+0x19c/0x580 [ 682.319984][T31376] ? do_getname+0x191/0x390 [ 682.320002][T31376] __x64_sys_execve+0x93/0xd0 [ 682.320023][T31376] do_syscall_64+0x106/0xf80 [ 682.320038][T31376] ? clear_bhb_loop+0x40/0x90 [ 682.320056][T31376] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.320071][T31376] RIP: 0033:0x7f8bc839c629 [ 682.320083][T31376] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 682.320098][T31376] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 682.320112][T31376] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 682.320122][T31376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 682.320130][T31376] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 682.320139][T31376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 682.320147][T31376] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 682.320166][T31376] [ 683.388129][T16348] Bluetooth: hci1: unexpected event 0x03 length: 43 > 11 [ 683.718794][T31414] bridge0: port 4(team0) entered blocking state [ 683.788653][T31414] bridge0: port 4(team0) entered disabled state [ 683.821018][T31414] team0: entered allmulticast mode [ 683.826144][T31414] team_slave_0: entered allmulticast mode [ 683.850287][T31414] team_slave_1: entered allmulticast mode [ 683.869252][T31414] team0: entered promiscuous mode [ 683.913678][T31414] team_slave_0: entered promiscuous mode [ 683.937587][T31414] team_slave_1: entered promiscuous mode [ 683.969360][T31414] bridge0: port 4(team0) entered blocking state [ 683.975720][T31414] bridge0: port 4(team0) entered listening state [ 684.352859][T31444] FAULT_INJECTION: forcing a failure. [ 684.352859][T31444] name failslab, interval 1, probability 0, space 0, times 0 [ 684.409079][T31444] CPU: 0 UID: 0 PID: 31444 Comm: syz.3.12233 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 684.409111][T31444] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 684.409119][T31444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 684.409128][T31444] Call Trace: [ 684.409133][T31444] [ 684.409139][T31444] dump_stack_lvl+0x100/0x190 [ 684.409167][T31444] should_fail_ex.cold+0x5/0xa [ 684.409185][T31444] ? lsm_blob_alloc+0x68/0x90 [ 684.409201][T31444] should_failslab+0xc2/0x120 [ 684.409216][T31444] __kmalloc_noprof+0xe0/0x850 [ 684.409237][T31444] ? trace_kmem_cache_alloc+0xf3/0x120 [ 684.409254][T31444] lsm_blob_alloc+0x68/0x90 [ 684.409270][T31444] security_sk_alloc+0x2d/0x290 [ 684.409292][T31444] sk_prot_alloc+0x1d1/0x2a0 [ 684.409313][T31444] sk_alloc+0x36/0xe80 [ 684.409328][T31444] inet6_create+0x385/0x12b0 [ 684.409347][T31444] ? inet6_create+0x7f/0x12b0 [ 684.409365][T31444] __sock_create+0x339/0x860 [ 684.409389][T31444] udp_sock_create6+0xc7/0x6a0 [ 684.409407][T31444] ? __pfx_udp_sock_create6+0x10/0x10 [ 684.409426][T31444] ? crng_make_state+0x477/0x6c0 [ 684.409445][T31444] ? lockdep_hardirqs_on+0x78/0x100 [ 684.409461][T31444] ? crng_make_state+0x2b0/0x6c0 [ 684.409482][T31444] rxrpc_open_socket+0x206/0x6b0 [ 684.409503][T31444] ? __pfx_rxrpc_open_socket+0x10/0x10 [ 684.409532][T31444] ? rcu_is_watching+0x12/0xc0 [ 684.409556][T31444] rxrpc_lookup_local+0xac7/0x1220 [ 684.409584][T31444] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 684.409606][T31444] ? __local_bh_enable_ip+0x9e/0x120 [ 684.409625][T31444] rxrpc_sendmsg+0x34a/0x680 [ 684.409650][T31444] sock_write_iter+0x566/0x610 [ 684.409670][T31444] ? __pfx_sock_write_iter+0x10/0x10 [ 684.409697][T31444] ? bpf_lsm_file_permission+0x9/0x10 [ 684.409718][T31444] ? security_file_permission+0x76/0x210 [ 684.409742][T31444] ? rw_verify_area+0xce/0x6d0 [ 684.409763][T31444] vfs_write+0x6ac/0x1070 [ 684.409784][T31444] ? __pfx_sock_write_iter+0x10/0x10 [ 684.409805][T31444] ? __pfx_vfs_write+0x10/0x10 [ 684.409824][T31444] ? find_held_lock+0x2b/0x80 [ 684.409850][T31444] ksys_write+0x1f8/0x250 [ 684.409871][T31444] ? __pfx_ksys_write+0x10/0x10 [ 684.409898][T31444] do_syscall_64+0x106/0xf80 [ 684.409920][T31444] ? clear_bhb_loop+0x40/0x90 [ 684.409939][T31444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 684.409955][T31444] RIP: 0033:0x7fce9d39c629 [ 684.409969][T31444] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 684.409983][T31444] RSP: 002b:00007fce9b5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 684.409998][T31444] RAX: ffffffffffffffda RBX: 00007fce9d615fa0 RCX: 00007fce9d39c629 [ 684.410008][T31444] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 684.410016][T31444] RBP: 00007fce9d432b39 R08: 0000000000000000 R09: 0000000000000000 [ 684.410025][T31444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 684.410034][T31444] R13: 00007fce9d616038 R14: 00007fce9d615fa0 R15: 00007ffce6ba3608 [ 684.410054][T31444] [ 685.030471][T31465] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12251'. [ 685.789759][T31505] netlink: 206 bytes leftover after parsing attributes in process `syz.3.12262'. [ 685.836137][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.842686][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.099945][T31517] bridge0: port 6(hsr0) entered blocking state [ 686.132438][T31517] bridge0: port 6(hsr0) entered disabled state [ 686.159381][T31517] hsr0: entered allmulticast mode [ 686.183046][T31517] hsr_slave_0: entered allmulticast mode [ 686.197627][T31517] hsr_slave_1: entered allmulticast mode [ 686.217951][T31517] hsr0: entered promiscuous mode [ 686.227579][T31517] bridge0: port 6(hsr0) entered blocking state [ 686.233815][T31517] bridge0: port 6(hsr0) entered forwarding state [ 686.273417][T31521] bridge0: port 3(ipvlan0) entered blocking state [ 686.281610][T31521] bridge0: port 3(ipvlan0) entered disabled state [ 686.310966][T31521] ipvlan0: entered allmulticast mode [ 686.336334][T31521] veth0_vlan: entered allmulticast mode [ 686.367663][T31521] ipvlan0: left allmulticast mode [ 686.392563][T31521] veth0_vlan: left allmulticast mode [ 686.928511][T31557] FAULT_INJECTION: forcing a failure. [ 686.928511][T31557] name failslab, interval 1, probability 0, space 0, times 0 [ 686.997869][T31557] CPU: 0 UID: 0 PID: 31557 Comm: syz.1.12286 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 686.997901][T31557] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 686.997908][T31557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 686.997917][T31557] Call Trace: [ 686.997922][T31557] [ 686.997928][T31557] dump_stack_lvl+0x100/0x190 [ 686.997955][T31557] should_fail_ex.cold+0x5/0xa [ 686.997973][T31557] should_failslab+0xc2/0x120 [ 686.997989][T31557] __kmalloc_cache_noprof+0x7a/0x6f0 [ 686.998007][T31557] ? alloc_bprm+0x86/0x710 [ 686.998030][T31557] alloc_bprm+0x86/0x710 [ 686.998051][T31557] do_execveat_common.isra.0+0x19c/0x580 [ 686.998073][T31557] ? do_getname+0x191/0x390 [ 686.998091][T31557] __x64_sys_execve+0x93/0xd0 [ 686.998112][T31557] do_syscall_64+0x106/0xf80 [ 686.998127][T31557] ? clear_bhb_loop+0x40/0x90 [ 686.998145][T31557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 686.998160][T31557] RIP: 0033:0x7f4d4299c629 [ 686.998173][T31557] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 686.998187][T31557] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 686.998202][T31557] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 686.998212][T31557] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00002000000001c0 [ 686.998221][T31557] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 686.998229][T31557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 686.998237][T31557] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 686.998256][T31557] [ 687.376429][T16348] Bluetooth: hci2: unexpected event 0x03 length: 43 > 11 [ 687.563772][T31578] netlink: 2468 bytes leftover after parsing attributes in process `syz.3.12295'. [ 688.291038][T31609] FAULT_INJECTION: forcing a failure. [ 688.291038][T31609] name failslab, interval 1, probability 0, space 0, times 0 [ 688.346972][T31609] CPU: 0 UID: 0 PID: 31609 Comm: syz.1.12316 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 688.347005][T31609] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 688.347012][T31609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 688.347021][T31609] Call Trace: [ 688.347026][T31609] [ 688.347033][T31609] dump_stack_lvl+0x100/0x190 [ 688.347062][T31609] should_fail_ex.cold+0x5/0xa [ 688.347079][T31609] ? lsm_blob_alloc+0x68/0x90 [ 688.347095][T31609] should_failslab+0xc2/0x120 [ 688.347110][T31609] __kmalloc_noprof+0xe0/0x850 [ 688.347131][T31609] ? trace_kmem_cache_alloc+0xf3/0x120 [ 688.347148][T31609] lsm_blob_alloc+0x68/0x90 [ 688.347165][T31609] security_sk_alloc+0x2d/0x290 [ 688.347186][T31609] sk_prot_alloc+0x1d1/0x2a0 [ 688.347207][T31609] sk_alloc+0x36/0xe80 [ 688.347222][T31609] inet6_create+0x385/0x12b0 [ 688.347240][T31609] ? inet6_create+0x7f/0x12b0 [ 688.347258][T31609] __sock_create+0x339/0x860 [ 688.347287][T31609] udp_sock_create6+0xc7/0x6a0 [ 688.347306][T31609] ? __pfx_udp_sock_create6+0x10/0x10 [ 688.347326][T31609] ? crng_make_state+0x477/0x6c0 [ 688.347345][T31609] ? lockdep_hardirqs_on+0x78/0x100 [ 688.347361][T31609] ? crng_make_state+0x2b0/0x6c0 [ 688.347383][T31609] rxrpc_open_socket+0x206/0x6b0 [ 688.347403][T31609] ? __pfx_rxrpc_open_socket+0x10/0x10 [ 688.347433][T31609] ? rcu_is_watching+0x12/0xc0 [ 688.347457][T31609] rxrpc_lookup_local+0xac7/0x1220 [ 688.347480][T31609] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 688.347502][T31609] ? __local_bh_enable_ip+0x9e/0x120 [ 688.347520][T31609] rxrpc_sendmsg+0x34a/0x680 [ 688.347543][T31609] sock_write_iter+0x566/0x610 [ 688.347564][T31609] ? __pfx_sock_write_iter+0x10/0x10 [ 688.347591][T31609] ? bpf_lsm_file_permission+0x9/0x10 [ 688.347612][T31609] ? security_file_permission+0x76/0x210 [ 688.347635][T31609] ? rw_verify_area+0xce/0x6d0 [ 688.347657][T31609] vfs_write+0x6ac/0x1070 [ 688.347678][T31609] ? __pfx_sock_write_iter+0x10/0x10 [ 688.347699][T31609] ? __pfx_vfs_write+0x10/0x10 [ 688.347719][T31609] ? find_held_lock+0x2b/0x80 [ 688.347745][T31609] ksys_write+0x1f8/0x250 [ 688.347766][T31609] ? __pfx_ksys_write+0x10/0x10 [ 688.347792][T31609] do_syscall_64+0x106/0xf80 [ 688.347807][T31609] ? clear_bhb_loop+0x40/0x90 [ 688.347825][T31609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 688.347840][T31609] RIP: 0033:0x7f4d4299c629 [ 688.347854][T31609] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 688.347868][T31609] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 688.347883][T31609] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 688.347893][T31609] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 688.347901][T31609] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 688.347910][T31609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 688.347919][T31609] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 688.347939][T31609] [ 689.201533][T31619] bridge0: port 3(team0) entered blocking state [ 689.201592][T31619] bridge0: port 3(team0) entered disabled state [ 689.201711][T31619] team0: entered allmulticast mode [ 689.201723][T31619] team_slave_0: entered allmulticast mode [ 689.201736][T31619] team_slave_1: entered allmulticast mode [ 689.203038][T31619] team0: entered promiscuous mode [ 689.203050][T31619] team_slave_0: entered promiscuous mode [ 689.203156][T31619] team_slave_1: entered promiscuous mode [ 689.203591][T31619] bridge0: port 3(team0) entered blocking state [ 689.203677][T31619] bridge0: port 3(team0) entered forwarding state [ 690.308145][T31655] bridge0: port 4(team0) entered blocking state [ 690.314748][T31655] bridge0: port 4(team0) entered disabled state [ 690.357877][T31655] team0: entered allmulticast mode [ 690.363034][T31655] team_slave_0: entered allmulticast mode [ 690.400168][T31655] team_slave_1: entered allmulticast mode [ 690.432462][T31655] team0: entered promiscuous mode [ 690.467167][T31655] team_slave_0: entered promiscuous mode [ 690.482191][T31655] team_slave_1: entered promiscuous mode [ 690.517485][T31655] bridge0: port 4(team0) entered blocking state [ 690.523818][T31655] bridge0: port 4(team0) entered forwarding state [ 691.507019][T31695] bridge0: port 5(hsr0) entered blocking state [ 691.544363][T31695] bridge0: port 5(hsr0) entered disabled state [ 691.578649][T31695] hsr0: entered allmulticast mode [ 691.613090][T31695] hsr_slave_0: entered allmulticast mode [ 691.632430][T31695] hsr_slave_1: entered allmulticast mode [ 691.664142][T31695] hsr0: entered promiscuous mode [ 691.682042][T31695] bridge0: port 5(hsr0) entered blocking state [ 691.688331][T31695] bridge0: port 5(hsr0) entered forwarding state [ 691.721497][T31699] bridge0: port 7(bond0) entered blocking state [ 691.728007][T31699] bridge0: port 7(bond0) entered disabled state [ 691.765341][T31699] bond0: entered allmulticast mode [ 691.780762][T31699] bond_slave_0: entered allmulticast mode [ 691.806802][T31699] bond_slave_1: entered allmulticast mode [ 691.839916][T31699] bond0: entered promiscuous mode [ 691.859973][T31699] bond_slave_0: entered promiscuous mode [ 691.884200][T31699] bond_slave_1: entered promiscuous mode [ 691.899644][T31702] netlink: 206 bytes leftover after parsing attributes in process `syz.2.12351'. [ 691.921803][T31699] bridge0: port 7(bond0) entered blocking state [ 691.928168][T31699] bridge0: port 7(bond0) entered forwarding state [ 692.451792][T31732] FAULT_INJECTION: forcing a failure. [ 692.451792][T31732] name failslab, interval 1, probability 0, space 0, times 0 [ 692.518506][T31732] CPU: 0 UID: 0 PID: 31732 Comm: syz.2.12365 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 692.518538][T31732] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 692.518545][T31732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 692.518554][T31732] Call Trace: [ 692.518560][T31732] [ 692.518566][T31732] dump_stack_lvl+0x100/0x190 [ 692.518593][T31732] should_fail_ex.cold+0x5/0xa [ 692.518610][T31732] ? lsm_blob_alloc+0x68/0x90 [ 692.518625][T31732] should_failslab+0xc2/0x120 [ 692.518640][T31732] __kmalloc_noprof+0xe0/0x850 [ 692.518660][T31732] ? trace_kmem_cache_alloc+0xf3/0x120 [ 692.518678][T31732] lsm_blob_alloc+0x68/0x90 [ 692.518694][T31732] security_sk_alloc+0x2d/0x290 [ 692.518714][T31732] sk_prot_alloc+0x1d1/0x2a0 [ 692.518736][T31732] sk_alloc+0x36/0xe80 [ 692.518751][T31732] inet_create+0x3a0/0x1060 [ 692.518772][T31732] ? inet_create+0x94/0x1060 [ 692.518795][T31732] __sock_create+0x339/0x860 [ 692.518818][T31732] mptcp_subflow_create_socket+0xec/0xa30 [ 692.518840][T31732] ? __pfx_mptcp_subflow_create_socket+0x10/0x10 [ 692.518859][T31732] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 692.518881][T31732] ? __futex_wait+0x256/0x300 [ 692.518913][T31732] __mptcp_nmpc_sk+0x17f/0x870 [ 692.518936][T31732] ? __pfx___mptcp_nmpc_sk+0x10/0x10 [ 692.518956][T31732] ? register_lock_class+0x40/0x560 [ 692.518980][T31732] mptcp_connect+0x7e/0xad0 [ 692.519003][T31732] __inet_stream_connect+0x208/0xfa0 [ 692.519027][T31732] ? __pfx___inet_stream_connect+0x10/0x10 [ 692.519047][T31732] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 692.519069][T31732] ? __pfx_inet_stream_connect+0x10/0x10 [ 692.519090][T31732] ? __local_bh_enable_ip+0x9e/0x120 [ 692.519107][T31732] ? __pfx_inet_stream_connect+0x10/0x10 [ 692.519125][T31732] inet_stream_connect+0x57/0xa0 [ 692.519146][T31732] __sys_connect_file+0x141/0x1a0 [ 692.519170][T31732] __sys_connect+0x141/0x170 [ 692.519183][T31732] ? __pfx___sys_connect+0x10/0x10 [ 692.519218][T31732] __x64_sys_connect+0x72/0xb0 [ 692.519231][T31732] ? lockdep_hardirqs_on+0x78/0x100 [ 692.519247][T31732] do_syscall_64+0x106/0xf80 [ 692.519262][T31732] ? clear_bhb_loop+0x40/0x90 [ 692.519280][T31732] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 692.519295][T31732] RIP: 0033:0x7f8bc839c629 [ 692.519308][T31732] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 692.519322][T31732] RSP: 002b:00007f8bc919d028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 692.519336][T31732] RAX: ffffffffffffffda RBX: 00007f8bc8615fa0 RCX: 00007f8bc839c629 [ 692.519346][T31732] RDX: 0000000000000002 RSI: 0000200000000080 RDI: 0000000000000003 [ 692.519355][T31732] RBP: 00007f8bc8432b39 R08: 0000000000000000 R09: 0000000000000000 [ 692.519364][T31732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 692.519372][T31732] R13: 00007f8bc8616038 R14: 00007f8bc8615fa0 R15: 00007fff36905568 [ 692.519393][T31732] [ 693.820439][T31784] netlink: 2468 bytes leftover after parsing attributes in process `syz.2.12388'. [ 697.495321][T31884] netlink: 350 bytes leftover after parsing attributes in process `syz.2.12435'. [ 698.542512][T31919] bridge0: port 4(bond0) entered blocking state [ 698.573954][T31919] bridge0: port 4(bond0) entered disabled state [ 698.609382][T31919] bond0: entered allmulticast mode [ 698.628126][T31919] bond_slave_0: entered allmulticast mode [ 698.658944][T31919] bond_slave_1: entered allmulticast mode [ 698.689534][T31919] bond0: entered promiscuous mode [ 698.723554][T31919] bond_slave_0: entered promiscuous mode [ 698.733791][T31919] bond_slave_1: entered promiscuous mode [ 698.763122][T31919] bridge0: port 4(bond0) entered blocking state [ 698.769504][T31919] bridge0: port 4(bond0) entered forwarding state [ 699.257050][ C0] bridge0: port 4(team0) entered learning state [ 700.301332][T31983] bridge0: port 5(bond0) entered blocking state [ 700.328281][T31983] bridge0: port 5(bond0) entered disabled state [ 700.357056][T31983] bond0: entered allmulticast mode [ 700.378486][T31983] bond_slave_0: entered allmulticast mode [ 700.401468][T31983] bond_slave_1: entered allmulticast mode [ 700.429641][T31983] bond0: entered promiscuous mode [ 700.460864][T31983] bond_slave_0: entered promiscuous mode [ 700.487581][T31983] bond_slave_1: entered promiscuous mode [ 700.518462][T31983] bridge0: port 5(bond0) entered blocking state [ 700.524803][T31983] bridge0: port 5(bond0) entered listening state [ 701.400004][T32026] netlink: 8 bytes leftover after parsing attributes in process `syz.3.12512'. [ 702.156173][T32056] bridge0: port 6(dummy0) entered blocking state [ 702.177182][T32056] bridge0: port 6(dummy0) entered disabled state [ 702.183653][T32056] dummy0: entered allmulticast mode [ 702.238266][T32056] dummy0: entered promiscuous mode [ 702.262786][T32056] bridge0: port 6(dummy0) entered blocking state [ 702.269268][T32056] bridge0: port 6(dummy0) entered listening state [ 702.764502][T32079] netlink: 21 bytes leftover after parsing attributes in process `syz.3.12528'. [ 707.048795][T32227] netlink: set zone limit has 8 unknown bytes [ 708.637591][T32303] netlink: 350 bytes leftover after parsing attributes in process `syz.1.12635'. [ 708.674990][T16348] Bluetooth: hci3: Malformed Event: 0x13 [ 709.235437][T32330] syz_tun: tun_chr_ioctl cmd 1074025680 [ 710.259921][T32363] netlink: 8 bytes leftover after parsing attributes in process `syz.2.12664'. [ 712.676031][T32488] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 712.682528][T32488] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 713.016629][T32501] netlink: 338 bytes leftover after parsing attributes in process `syz.2.12729'. [ 714.616921][ C0] bridge0: port 4(team0) entered forwarding state [ 714.623372][ C0] bridge0: topology change detected, propagating [ 714.917664][T32572] FAULT_INJECTION: forcing a failure. [ 714.917664][T32572] name failslab, interval 1, probability 0, space 0, times 0 [ 715.038341][T32572] CPU: 0 UID: 0 PID: 32572 Comm: syz.1.12760 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 715.038373][T32572] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 715.038381][T32572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 715.038390][T32572] Call Trace: [ 715.038395][T32572] [ 715.038402][T32572] dump_stack_lvl+0x100/0x190 [ 715.038430][T32572] should_fail_ex.cold+0x5/0xa [ 715.038447][T32572] ? lsm_blob_alloc+0x68/0x90 [ 715.038463][T32572] should_failslab+0xc2/0x120 [ 715.038478][T32572] __kmalloc_noprof+0xe0/0x850 [ 715.038499][T32572] ? trace_kmem_cache_alloc+0xf3/0x120 [ 715.038516][T32572] lsm_blob_alloc+0x68/0x90 [ 715.038533][T32572] security_prepare_creds+0x2d/0x290 [ 715.038550][T32572] prepare_creds+0x5d6/0x950 [ 715.038572][T32572] __sys_setfsgid+0xe3/0x3b0 [ 715.038589][T32572] do_syscall_64+0x106/0xf80 [ 715.038605][T32572] ? clear_bhb_loop+0x40/0x90 [ 715.038622][T32572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 715.038637][T32572] RIP: 0033:0x7f4d4299c629 [ 715.038651][T32572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 715.038665][T32572] RSP: 002b:00007f4d437e3028 EFLAGS: 00000246 ORIG_RAX: 000000000000007b [ 715.038679][T32572] RAX: ffffffffffffffda RBX: 00007f4d42c15fa0 RCX: 00007f4d4299c629 [ 715.038689][T32572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000ee01 [ 715.038697][T32572] RBP: 00007f4d42a32b39 R08: 0000000000000000 R09: 0000000000000000 [ 715.038706][T32572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 715.038714][T32572] R13: 00007f4d42c16038 R14: 00007f4d42c15fa0 R15: 00007fffe1ba3048 [ 715.038740][T32572] [ 715.896956][ C0] bridge0: port 5(bond0) entered learning state [ 716.249418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.262485][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.276074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.288773][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.301601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.314316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.327054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.339863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.677273][ C0] net_ratelimit: 2019 callbacks suppressed [ 717.677290][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.695825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.708484][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.721132][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.733789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.746421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.759042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.772344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.785091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.797729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.817222][ C0] bridge0: port 6(dummy0) entered learning state [ 722.147720][ C0] sched: DL replenish lagged too much [ 722.687335][ C0] net_ratelimit: 7080 callbacks suppressed [ 722.687351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.705901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.718551][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.731289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.744001][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.756691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.769363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.782062][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.794765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 722.807430][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.696846][ C0] net_ratelimit: 7532 callbacks suppressed [ 727.696863][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.715341][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.728028][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.740654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.753365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.765986][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.778679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.791321][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.803890][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 727.816519][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 731.260689][ C0] bridge0: port 5(bond0) entered forwarding state [ 731.267192][ C0] bridge0: topology change detected, propagating [ 732.707209][ C0] net_ratelimit: 7644 callbacks suppressed [ 732.707226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.725737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.738297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.750906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.763595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.776236][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.788997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.801692][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.814605][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 732.827293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.184949][ C0] bridge0: port 6(dummy0) entered forwarding state [ 733.191513][ C0] bridge0: topology change detected, propagating [ 737.717046][ C0] net_ratelimit: 7628 callbacks suppressed [ 737.717063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.735510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.748155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.760898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.773524][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.786149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.798933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.811586][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.824239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 737.836887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.726914][ C0] net_ratelimit: 7659 callbacks suppressed [ 742.726930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.745458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.758087][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.770824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.783540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.796262][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.808934][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.821541][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.834186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 742.846905][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.373592][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.737020][ C0] net_ratelimit: 7664 callbacks suppressed [ 747.737037][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.755498][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.768138][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.780781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.793400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.805968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.818560][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.831220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.843877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 747.856638][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.747132][ C0] net_ratelimit: 7675 callbacks suppressed [ 752.747151][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.765618][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.778301][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.790936][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.803500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.816125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.828820][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.841446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.854016][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 752.866632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.757386][ C0] net_ratelimit: 7672 callbacks suppressed [ 757.757404][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.775894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.788564][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.801155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.813897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.826607][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.839173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.851784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.864614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 757.877323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.766982][ C0] net_ratelimit: 7692 callbacks suppressed [ 762.766999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.785541][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.798216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.810864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.823465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.836095][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.849231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.862045][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.874708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 762.887434][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.777351][ C0] net_ratelimit: 7668 callbacks suppressed [ 767.777368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.795905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.808507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.821111][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.833751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.847237][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.859829][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.872465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.885112][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 767.897699][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.787333][ C0] net_ratelimit: 7694 callbacks suppressed [ 772.787350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.805883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.818493][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.831087][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.843855][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.856537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.869133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.881723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.894377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 772.907031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.797246][ C0] net_ratelimit: 7673 callbacks suppressed [ 777.797263][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.815764][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.828386][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.840950][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.853569][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.866436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.879076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.891838][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.904525][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 777.917674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.807333][ C0] net_ratelimit: 7769 callbacks suppressed [ 782.807350][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.825809][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.838450][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.851110][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.863685][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.876289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.889442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.902195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.915114][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 782.927739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.816944][ C0] net_ratelimit: 7800 callbacks suppressed [ 787.816960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.835442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.848011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.860642][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.873294][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.885923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.898518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.911130][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.923793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 787.936388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.827082][ C0] net_ratelimit: 7691 callbacks suppressed [ 792.827101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.845616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.858297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.871224][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.884230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.896939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.909625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.922347][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.935734][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 792.948536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.837382][ C0] net_ratelimit: 7638 callbacks suppressed [ 797.837400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.856407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.869205][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.882286][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.895090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.907839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.920722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.933535][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.946876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.959626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.847390][ C0] net_ratelimit: 7734 callbacks suppressed [ 802.847407][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.865866][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.878526][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.891225][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.903844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.916404][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.929012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.941799][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.954516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.967653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.856946][ C0] net_ratelimit: 7770 callbacks suppressed [ 807.856963][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.875416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.888024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.900745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.913390][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.925972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.938575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.951197][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.963818][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.976411][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.867217][ C0] net_ratelimit: 7692 callbacks suppressed [ 812.867234][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.885775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.899139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.911717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.924453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.937221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.949914][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.962847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.975728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.988481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.876901][ C0] net_ratelimit: 7640 callbacks suppressed [ 817.876918][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.895403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.908140][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.921154][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.933937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.946565][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.959231][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.972409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.985093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.997767][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.887320][ C0] net_ratelimit: 7703 callbacks suppressed [ 822.887337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.905800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.918547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.931174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.943760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.956481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.969171][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.981803][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.994377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.007034][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 823.836786][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 823.843751][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5981/1:b..l P32516/1:b..l [ 823.853363][ C0] rcu: (detected by 0, t=10502 jiffies, g=167441, q=916 ncpus=1) [ 823.861204][ C0] task:udevd state:R running task stack:27912 pid:32516 tgid:32516 ppid:5194 task_flags:0x40014c flags:0x00080000 [ 823.875851][ C0] Call Trace: [ 823.879127][ C0] [ 823.882044][ C0] __schedule+0xfee/0x60e0 [ 823.886451][ C0] ? arch_stack_walk+0xa6/0xf0 [ 823.891205][ C0] ? __pfx___schedule+0x10/0x10 [ 823.896043][ C0] ? mark_held_locks+0x40/0x70 [ 823.900880][ C0] preempt_schedule_irq+0x50/0x90 [ 823.905886][ C0] irqentry_exit+0x17b/0x670 [ 823.910463][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 823.916429][ C0] RIP: 0010:lock_acquire+0x1c/0x380 [ 823.921610][ C0] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 41 89 f6 41 55 45 89 c5 41 54 41 89 cc 55 48 89 fd 53 89 d3 <48> 83 ec 38 65 4c 8b 3d 60 ae 28 12 4c 89 7c 24 30 4d 89 cf 66 90 [ 823.941196][ C0] RSP: 0018:ffffc90004f77628 EFLAGS: 00000246 [ 823.947245][ C0] RAX: ffffffff81b7aadd RBX: 0000000000000000 RCX: 0000000000000002 [ 823.955195][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e7e9220 [ 823.963191][ C0] RBP: ffffffff8e7e9220 R08: 0000000000000000 R09: 0000000000000000 [ 823.971176][ C0] R10: 0000000000000200 R11: 000000000001676a R12: 0000000000000002 [ 823.979127][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88801e373c80 [ 823.987087][ C0] ? unwind_next_frame+0xbd/0x1ea0 [ 823.992194][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 823.998417][ C0] unwind_next_frame+0xd1/0x1ea0 [ 824.003334][ C0] ? unwind_next_frame+0xbd/0x1ea0 [ 824.008435][ C0] ? tear_down_vmas+0x2a5/0x600 [ 824.013274][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 824.019416][ C0] arch_stack_walk+0x94/0xf0 [ 824.024002][ C0] ? tear_down_vmas+0x2a5/0x600 [ 824.028833][ C0] ? tear_down_vmas+0x2a5/0x600 [ 824.033660][ C0] stack_trace_save+0x8e/0xc0 [ 824.038322][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 824.043678][ C0] ? __lock_acquire+0x4a5/0x2630 [ 824.048603][ C0] kasan_save_stack+0x30/0x50 [ 824.053273][ C0] ? kasan_save_stack+0x30/0x50 [ 824.058112][ C0] ? kasan_record_aux_stack+0xa7/0xc0 [ 824.063466][ C0] ? __call_rcu_common.constprop.0+0xa5/0x9b0 [ 824.069520][ C0] ? kmem_cache_free+0x44b/0x6a0 [ 824.074463][ C0] ? tear_down_vmas+0x2a5/0x600 [ 824.079320][ C0] kasan_record_aux_stack+0xa7/0xc0 [ 824.084509][ C0] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 824.090650][ C0] __call_rcu_common.constprop.0+0xa5/0x9b0 [ 824.096540][ C0] ? tear_down_vmas+0x2a5/0x600 [ 824.101842][ C0] kmem_cache_free+0x44b/0x6a0 [ 824.106603][ C0] tear_down_vmas+0x2a5/0x600 [ 824.111266][ C0] exit_mmap+0x469/0xa30 [ 824.115489][ C0] ? __pfx_exit_mmap+0x10/0x10 [ 824.120233][ C0] ? trace_contention_end+0x140/0x180 [ 824.125594][ C0] ? uprobe_clear_state+0x5f/0x360 [ 824.130689][ C0] ? uprobe_clear_state+0x5f/0x360 [ 824.135915][ C0] ? __lock_acquire+0x4a5/0x2630 [ 824.140842][ C0] ? arch_uprobe_clear_state+0x107/0x150 [ 824.146466][ C0] __mmput+0x12a/0x410 [ 824.150516][ C0] mmput+0x67/0x80 [ 824.154222][ C0] do_exit+0x78a/0x2aa0 [ 824.158363][ C0] ? do_raw_spin_lock+0x128/0x260 [ 824.163428][ C0] ? __pfx_do_exit+0x10/0x10 [ 824.168012][ C0] ? do_group_exit+0x1bd/0x2a0 [ 824.172852][ C0] ? rcu_is_watching+0x12/0xc0 [ 824.177618][ C0] do_group_exit+0xd5/0x2a0 [ 824.182109][ C0] __x64_sys_exit_group+0x3e/0x50 [ 824.187126][ C0] x64_sys_call+0x102c/0x1530 [ 824.191784][ C0] do_syscall_64+0x106/0xf80 [ 824.196358][ C0] ? clear_bhb_loop+0x40/0x90 [ 824.201024][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.206902][ C0] RIP: 0033:0x7f00b08f16c5 [ 824.211298][ C0] RSP: 002b:00007ffca567ecc8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 824.219689][ C0] RAX: ffffffffffffffda RBX: 000055e6c47df040 RCX: 00007f00b08f16c5 [ 824.227640][ C0] RDX: 00000000000000e7 RSI: fffffffffffffe68 RDI: 0000000000000000 [ 824.235589][ C0] RBP: 000055e6c47bd910 R08: 0000000000000000 R09: 0000000000000000 [ 824.243539][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 824.251489][ C0] R13: 00007ffca567ed10 R14: 0000000000000000 R15: 0000000000000000 [ 824.259454][ C0] [ 824.262459][ C0] task:syz-executor state:R running task stack:23864 pid:5981 tgid:5981 ppid:5978 task_flags:0x400140 flags:0x00080000 [ 824.275931][ C0] Call Trace: [ 824.279193][ C0] [ 824.282105][ C0] __schedule+0xfee/0x60e0 [ 824.286512][ C0] ? find_held_lock+0x2b/0x80 [ 824.291202][ C0] ? page_table_check_set+0x49a/0xa10 [ 824.296652][ C0] ? page_table_check_set+0x49a/0xa10 [ 824.302014][ C0] ? __pfx___schedule+0x10/0x10 [ 824.306846][ C0] ? find_held_lock+0x2b/0x80 [ 824.311502][ C0] ? preempt_schedule_thunk+0x16/0x30 [ 824.316867][ C0] preempt_schedule_common+0x42/0xc0 [ 824.322134][ C0] preempt_schedule_thunk+0x16/0x30 [ 824.327318][ C0] _raw_spin_unlock+0x3e/0x50 [ 824.331983][ C0] copy_page_range+0x1e72/0x6570 [ 824.336923][ C0] ? __pfx_copy_page_range+0x10/0x10 [ 824.342202][ C0] ? __pfx___might_resched+0x10/0x10 [ 824.347479][ C0] ? up_write+0x290/0x4f0 [ 824.351804][ C0] dup_mmap+0xd25/0x2180 [ 824.356039][ C0] ? __pfx_dup_mmap+0x10/0x10 [ 824.360698][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 824.366489][ C0] ? __lock_acquire+0x4a5/0x2630 [ 824.371415][ C0] ? find_held_lock+0x2b/0x80 [ 824.376070][ C0] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 824.381963][ C0] copy_process+0x73d7/0x7a10 [ 824.386631][ C0] ? __pfx_copy_process+0x10/0x10 [ 824.391636][ C0] ? do_raw_spin_lock+0x128/0x260 [ 824.396660][ C0] kernel_clone+0xfc/0x9a0 [ 824.401060][ C0] ? __pfx_kernel_clone+0x10/0x10 [ 824.406083][ C0] ? __lock_acquire+0x4a5/0x2630 [ 824.411013][ C0] ? find_held_lock+0x2b/0x80 [ 824.415670][ C0] ? __might_fault+0xc5/0x140 [ 824.420340][ C0] __do_sys_clone+0xd9/0x120 [ 824.424922][ C0] ? __pfx___do_sys_clone+0x10/0x10 [ 824.430117][ C0] do_syscall_64+0x106/0xf80 [ 824.434689][ C0] ? clear_bhb_loop+0x40/0x90 [ 824.439352][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.445229][ C0] RIP: 0033:0x7fce9d3c50d2 [ 824.449628][ C0] RSP: 002b:00007ffce6ba3820 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 824.458024][ C0] RAX: ffffffffffffffda RBX: 00007ffce6ba3820 RCX: 00007fce9d3c50d2 [ 824.465973][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 824.473925][ C0] RBP: 00007ffce6ba39ac R08: 0000000000000000 R09: 0000000000000001 [ 824.481876][ C0] R10: 0000555583e5c7d0 R11: 0000000000000246 R12: 0000000000000001 [ 824.489827][ C0] R13: 00000000000927c0 R14: 00000000000aed85 R15: 00007ffce6ba3a00 [ 824.497798][ C0] [ 824.500806][ C0] rcu: rcu_preempt kthread starved for 355 jiffies! g167441 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 824.511892][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 824.521838][ C0] rcu: RCU grace-period kthread stack dump: [ 824.527705][ C0] task:rcu_preempt state:R running task stack:28376 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 824.541172][ C0] Call Trace: [ 824.544518][ C0] [ 824.547434][ C0] __schedule+0xfee/0x60e0 [ 824.551833][ C0] ? __lock_acquire+0x4a5/0x2630 [ 824.556762][ C0] ? __pfx___schedule+0x10/0x10 [ 824.561595][ C0] ? find_held_lock+0x2b/0x80 [ 824.566252][ C0] ? schedule+0x2bf/0x390 [ 824.570569][ C0] schedule+0xdd/0x390 [ 824.574622][ C0] schedule_timeout+0x127/0x280 [ 824.579458][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 824.584820][ C0] ? __pfx_process_timeout+0x10/0x10 [ 824.590095][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 824.595884][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 824.601335][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 824.606082][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 824.611354][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 824.616275][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 824.621452][ C0] ? rcu_is_watching+0x12/0xc0 [ 824.626203][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 824.631990][ C0] rcu_gp_kthread+0x179/0x230 [ 824.636647][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 824.641824][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 824.647610][ C0] ? __kthread_parkme+0x18c/0x230 [ 824.652617][ C0] ? kthread+0x13a/0x450 [ 824.656848][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 824.662031][ C0] kthread+0x370/0x450 [ 824.666090][ C0] ? __pfx_kthread+0x10/0x10 [ 824.670664][ C0] ret_from_fork+0x754/0xd80 [ 824.675246][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 824.680346][ C0] ? __switch_to+0x7b4/0x1120 [ 824.685005][ C0] ? __pfx_kthread+0x10/0x10 [ 824.689578][ C0] ret_from_fork_asm+0x1a/0x30 [ 824.694330][ C0] [ 824.697328][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 824.703647][ C0] CPU: 0 UID: 0 PID: 3411 Comm: kworker/R-bat_e Tainted: G U I L syzkaller #0 PREEMPT(full) [ 824.714911][ C0] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 824.722255][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 824.732313][ C0] Workqueue: bat_events batadv_tt_purge [ 824.737849][ C0] RIP: 0010:lock_release+0x19e/0x320 [ 824.743119][ C0] Code: ff 65 0f c1 05 0b ef 28 12 83 f8 01 0f 85 3d 01 00 00 9c 58 f6 c4 02 0f 85 28 01 00 00 41 f7 c6 00 02 00 00 0f 85 de 00 00 00 <48> 8b 44 24 10 65 48 2b 05 5d a7 28 12 0f 85 63 01 00 00 48 83 c4 [ 824.762710][ C0] RSP: 0018:ffffc90000006c88 EFLAGS: 00000206 [ 824.768758][ C0] RAX: 0000000000000046 RBX: ffffffff8e7e9220 RCX: ffffc90000006c94 [ 824.776707][ C0] RDX: 0000000000000004 RSI: ffffffff8de54759 RDI: ffffffff8c1aee20 [ 824.784664][ C0] RBP: ffffffff81b7adde R08: 0000000000000001 R09: 0000000000000007 [ 824.792627][ C0] R10: 0000000000000200 R11: 00000000000167ac R12: ffff888033c70000 [ 824.800612][ C0] R13: ffffc90000006d40 R14: 0000000000000202 R15: 0000000000000005 [ 824.808573][ C0] FS: 0000000000000000(0000) GS:ffff888124351000(0000) knlGS:0000000000000000 [ 824.817499][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 824.824084][ C0] CR2: 000055e6c47c6a38 CR3: 00000000350c6000 CR4: 00000000003526f0 [ 824.832057][ C0] Call Trace: [ 824.835330][ C0] [ 824.838255][ C0] unwind_next_frame+0x3c3/0x1ea0 [ 824.843276][ C0] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 824.848967][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 824.855203][ C0] arch_stack_walk+0x94/0xf0 [ 824.859780][ C0] ? skb_ext_add+0xfa/0x810 [ 824.864293][ C0] stack_trace_save+0x8e/0xc0 [ 824.869079][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 824.874554][ C0] ? lock_acquire+0x1cf/0x380 [ 824.879237][ C0] kasan_save_stack+0x30/0x50 [ 824.883913][ C0] ? kasan_save_stack+0x30/0x50 [ 824.888772][ C0] ? kasan_save_track+0x14/0x30 [ 824.893610][ C0] ? __kasan_slab_alloc+0x89/0x90 [ 824.898621][ C0] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 824.904349][ C0] kasan_save_track+0x14/0x30 [ 824.909053][ C0] __kasan_slab_alloc+0x89/0x90 [ 824.913906][ C0] kmem_cache_alloc_noprof+0x241/0x6e0 [ 824.919369][ C0] ? skb_ext_add+0xfa/0x810 [ 824.923867][ C0] ? do_softirq+0xb0/0xe0 [ 824.928186][ C0] skb_ext_add+0xfa/0x810 [ 824.932520][ C0] ? lock_acquire+0x1cf/0x380 [ 824.937233][ C0] ? find_held_lock+0x2b/0x80 [ 824.941900][ C0] ? net_generic+0xea/0x2a0 [ 824.946392][ C0] br_nf_forward_ip.part.0+0x28/0x820 [ 824.951751][ C0] br_nf_forward+0xfe5/0x19f0 [ 824.956414][ C0] nf_hook_slow+0xbf/0x220 [ 824.960814][ C0] __br_forward+0x2f6/0x970 [ 824.965303][ C0] ? __pfx___br_forward+0x10/0x10 [ 824.970324][ C0] ? __asan_memcpy+0x3c/0x60 [ 824.974925][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 824.980386][ C0] ? __skb_clone+0x570/0x760 [ 824.984978][ C0] maybe_deliver+0xf0/0x180 [ 824.989569][ C0] br_flood+0x193/0x650 [ 824.993830][ C0] br_handle_frame_finish+0xf57/0x1f00 [ 824.999291][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 825.005258][ C0] ? __local_bh_enable_ip+0x9e/0x120 [ 825.010549][ C0] ? ip6t_do_table+0xc1d/0x1c90 [ 825.015386][ C0] ? __pfx_ip6t_do_table+0x10/0x10 [ 825.020658][ C0] ? nf_hook_slow+0x167/0x220 [ 825.025333][ C0] br_nf_hook_thresh+0x30d/0x420 [ 825.030259][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 825.036137][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 825.041579][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 825.047458][ C0] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 825.052651][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 825.058549][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 825.064542][ C0] br_nf_pre_routing_finish_ipv6+0x769/0xfb0 [ 825.070534][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 825.076415][ C0] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 825.081776][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 825.087655][ C0] ? lock_acquire+0x1cf/0x380 [ 825.092324][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 825.098805][ C0] ? net_generic+0xea/0x2a0 [ 825.103292][ C0] br_nf_pre_routing+0x93b/0x1510 [ 825.108301][ C0] br_handle_frame+0xcdd/0x1520 [ 825.113136][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 825.118398][ C0] ? kfree_skbmem+0x19a/0x210 [ 825.123060][ C0] ? kmem_cache_free+0x124/0x6a0 [ 825.127982][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 825.133856][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 825.139122][ C0] __netif_receive_skb_core.constprop.0+0x6c5/0x3550 [ 825.145789][ C0] ? mark_held_locks+0x40/0x70 [ 825.150548][ C0] ? kmem_cache_free+0x124/0x6a0 [ 825.155474][ C0] ? skb_release_data+0x7a0/0x9d0 [ 825.160484][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 825.167589][ C0] ? kfree_skbmem+0x19f/0x210 [ 825.172251][ C0] ? sk_skb_reason_drop+0x114/0x1b0 [ 825.177432][ C0] ? ip6_mc_input+0x51a/0xf50 [ 825.182105][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 825.187206][ C0] ? __lock_acquire+0x4a5/0x2630 [ 825.192133][ C0] ? process_backlog+0x32a/0x1580 [ 825.197144][ C0] __netif_receive_skb_one_core+0xb0/0x1e0 [ 825.202945][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 825.209365][ C0] ? lock_acquire+0x1cf/0x380 [ 825.214029][ C0] ? process_backlog+0x32a/0x1580 [ 825.219095][ C0] ? process_backlog+0x32a/0x1580 [ 825.224108][ C0] __netif_receive_skb+0x1f/0x120 [ 825.229123][ C0] process_backlog+0x37a/0x1580 [ 825.233964][ C0] __napi_poll.constprop.0+0xaf/0x450 [ 825.239343][ C0] net_rx_action+0xa40/0xf20 [ 825.243932][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 825.249118][ C0] ? mark_held_locks+0x40/0x70 [ 825.253865][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 825.259047][ C0] ? tmigr_handle_remote+0x132/0x380 [ 825.264328][ C0] ? mark_held_locks+0x40/0x70 [ 825.269100][ C0] handle_softirqs+0x1eb/0x9e0 [ 825.273850][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 825.279116][ C0] ? batadv_tt_purge+0x25d/0xbd0 [ 825.284040][ C0] do_softirq+0xac/0xe0 [ 825.288209][ C0] [ 825.291161][ C0] [ 825.294083][ C0] __local_bh_enable_ip+0xf8/0x120 [ 825.299190][ C0] batadv_tt_purge+0x25d/0xbd0 [ 825.303947][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 825.309223][ C0] ? rcu_is_watching+0x12/0xc0 [ 825.313978][ C0] process_one_work+0x9d7/0x1920 [ 825.318909][ C0] ? __pfx_process_one_work+0x10/0x10 [ 825.324271][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 825.329542][ C0] rescuer_thread+0x902/0x1490 [ 825.334298][ C0] ? rescuer_thread+0x23d/0x1490 [ 825.339222][ C0] ? rescuer_thread+0x118/0x1490 [ 825.344144][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 825.349330][ C0] ? __kthread_parkme+0x18c/0x230 [ 825.354343][ C0] ? kthread+0x13a/0x450 [ 825.358620][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 825.363826][ C0] kthread+0x370/0x450 [ 825.367896][ C0] ? __pfx_kthread+0x10/0x10 [ 825.372475][ C0] ret_from_fork+0x754/0xd80 [ 825.377058][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 825.382160][ C0] ? __switch_to+0x7b4/0x1120 [ 825.386823][ C0] ? __pfx_kthread+0x10/0x10 [ 825.391494][ C0] ret_from_fork_asm+0x1a/0x30 [ 825.396268][ C0] [ 827.897344][ C0] net_ratelimit: 5225 callbacks suppressed [ 827.897361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.915833][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.928553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.941215][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.953982][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.966752][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.979482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.992237][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.004900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 828.017535][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.907178][ C0] net_ratelimit: 7747 callbacks suppressed [ 832.907196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.925638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.938282][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.950919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.963542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.976186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.988839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.001569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.014169][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 833.026788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)