last executing test programs: 2.486891016s ago: executing program 2 (id=10968): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv6/conf/all/forwarding\x00', 0x42a81, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/bdi/43:288/max_ratio_fine\x00', 0x10b142, 0x0) setresuid$auto(0xffffffffffffffff, 0x8, 0x8000) sendfile$auto(r0, r1, 0x0, 0x1000200) 2.059174467s ago: executing program 2 (id=10972): close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x5, 0x0) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto(0x3, 0x8001af85, 0x90000800000402) 1.662068554s ago: executing program 2 (id=10980): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb4, 0x401, 0x8000) r0 = openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/ieee80211/phy3/netdev:wlan0/stations/08:02:11:00:00:01/vht_capa\x00', 0x800, 0x0) dup$auto(r0) read$auto_debugfs_full_proxy_file_operations_internal(r0, 0x0, 0x0) 1.567519141s ago: executing program 1 (id=10981): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r0, &(0x7f0000003900)='\t', 0x1) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/button/parameters/lid_init_state\x00', 0x169882, 0x0) sendfile$auto(r1, r1, 0x0, 0x8) 1.504388646s ago: executing program 3 (id=10983): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2, 0x3, 0xa) futex$auto(0x0, 0x6, 0x47, 0x0, 0x0, 0x0) setsockopt$auto(r0, 0x0, 0x6, 0x0, 0x10021) 1.312614791s ago: executing program 3 (id=10984): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) r0 = openat$auto_vsock_device_ops_af_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) ioctl$auto_IOCTL_VM_SOCKETS_GET_LOCAL_CID(r0, 0x7b9, 0x0) 1.296262281s ago: executing program 0 (id=10985): write$auto(0xffffffffffffffff, &(0x7f0000000100)='7\x00\\\xa0\x04\xdb\xc3\x8cnI\x9c\t\xbck\x17\xfe_9\xdf\v\x9d\xf7\xa9+n\xf19\x8ba\xe38\xf7u~\r\x91p\x90x\xd9y\xef\x06\xafs\x90\xf0\xf9\xc3\'r\xac\x8d\\\xccM\xe3\x05\x87\x8c\x1beu\xa6\xab\xb2}\xb6\xb8\xa1\xb4\x98\x0f\x9b(8\xb9\xcb\x88\x0e\x99\x81f&\xe4\xe1\xf1\xe0iS\x93\xea\xa1\xb8\xa6T\xf4G\xb0m\xe5!\xa3\xda\x83\xc1\b\xb3\xce\x1bq\x03\xf7\t\x8f', 0x81) pipe2$auto(0x0, 0x80) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$auto_KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000140)={0x5}) 1.259624264s ago: executing program 2 (id=10986): socket(0xa, 0x2, 0x0) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f0000000140), 0x55) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa}, 0x55) 1.068662796s ago: executing program 3 (id=10987): setresuid$auto(0x0, 0x8, 0x8000) r0 = socket(0x10, 0x3, 0x15) sendmsg$auto_NFSD_CMD_THREADS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001400c7"], 0x2c}}, 0x41) write$auto(r0, &(0x7f0000000000)='-\x00', 0x2fb) 1.059897112s ago: executing program 0 (id=10988): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0xb213, 0x2c, 0x800}) sendmmsg$auto(r0, &(0x7f0000000100)={{&(0x7f0000000000), 0x5aa, &(0x7f0000000080)={0x0, 0x5e0}, 0x1, 0x0, 0x8, 0x3}, 0x6}, 0x2, 0x100) 1.051037977s ago: executing program 1 (id=10989): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) semctl$auto(0x1ff, 0x2, 0x13, 0x1) futex_waitv$auto(&(0x7f0000000180)={0x3fb, 0x6, 0x2, 0xfff}, 0x3, 0xbffffffc, 0x0, 0x81) bpf$auto(0x5, &(0x7f0000000100)=@task_fd_query={0x2, 0x2, 0x4, 0x0, 0x85, 0x7, 0x9, 0x6, 0x8001}, 0x101) 833.696123ms ago: executing program 1 (id=10990): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) waitid$auto_P_PID(0x1, 0x0, 0x0, 0x1ecc, &(0x7f0000000440)={{0xffffffff, 0x2}, {0x7, 0x19}, 0x9, 0x80000000, 0x4, 0x1000000000000005, 0x2000000000000000, 0x6, 0x6, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x4}) r0 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/pagemap\x00', 0x0, 0x0) readv$auto(r0, &(0x7f0000000400)={0x0, 0x40}, 0x6) 829.724426ms ago: executing program 0 (id=10991): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = mq_open$auto(&(0x7f00000000c0)='\x12\xe6D\b\x9e\x00\x80\x8d\f\xb9w-\xbd!\x9eb\xed\xfb\x0f\xe5\x9dZ\xc2\xd1\x01wBV\x91\x8f_\xc0.\x84\xfe\x84\xd1se\x01\x06\x00\xb3\x13_Y&\xa9\x88\xe4\xa2\xb0V\x85\x92<\xb6\xdcT \\\xf2\v\xb1\xe2\xd8\xfa\xd8V\xe5\x00\xfa\xe9!\xc5<\xce\x18=\x06\xdagq\xb5\r\t\xb2\xde\x99\xd50\xbb\x192\x1c4\x86\xc0\xc1-\xd5\x10\xc3\xfc*[8\x89h\xc5\xba\xff\xc8u50x0}) sendmsg$auto_BATADV_CMD_SET_MESH(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)={0x24, r0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xb78}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x140000e4) 188.280359ms ago: executing program 0 (id=10998): socket(0x2, 0x1, 0x106) setresuid$auto(0x8, 0x8, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$auto(0x10, r0, 0x1, 0x0) 187.264471ms ago: executing program 1 (id=10999): sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x20004050}, 0x4000084) lstat$auto(0x0, &(0x7f0000000180)={0xf, 0x200000000018, 0x9, 0x63, 0x0, 0x0, 0x0, 0xffc, 0x5, 0x80000000000000a, 0x0, 0x9, 0x9, 0xffffffff80000000, 0xd, 0x6, 0x200000100103}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) 1.511335ms ago: executing program 0 (id=11000): mmap$auto(0x0, 0x2020008, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400002, 0xdf, 0x9b72, 0x2, 0x8000) r0 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f00000017c0)='/sys/kernel/debug/lru_gen\x00', 0x1, 0x0) writev$auto(r0, &(0x7f0000000100)={0x0, 0x407114}, 0x8) 1.038316ms ago: executing program 1 (id=11001): mmap$auto(0x0, 0x2020009, 0x126, 0xf8, 0xffffffffffffffff, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) prlimit64$auto(0x1, 0x3, 0x0, 0x0) statmount$auto(&(0x7f0000000040)={0x1f, @raw, 0x8000001c, 0x3, 0x8}, 0x0, 0x7ffffffff000, 0x0) 0s ago: executing program 3 (id=11002): r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r0, &(0x7f0000000080)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x40) prctl$auto(0x4d, 0x10001, 0x0, 0xffeffffffffffffc, 0x0) socket(0x1e, 0x4, 0x0) kernel console output (not intermixed with test programs): YSCALL_64_after_hwframe+0x77/0x7f [ 623.014369][T24237] RIP: 0033:0x7f8f51f9c799 [ 623.014388][T24237] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 623.014422][T24237] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 623.014443][T24237] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 623.014458][T24237] RDX: 0000200000000180 RSI: 0000000000000000 RDI: 0000000000000003 [ 623.014490][T24237] RBP: 00007f8f52032bd9 R08: 00002000000000c0 R09: 0000000000000000 [ 623.014505][T24237] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000000 [ 623.014519][T24237] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 623.014549][T24237] [ 623.219888][T24244] __vm_enough_memory: pid: 24244, comm: syz.2.8728, bytes: 4398046511104 not enough memory for the allocation [ 624.122131][T24250] NFSD: Failed to start, no listeners configured. [ 625.012588][T24328] openvswitch: netlink: Key 15 has unexpected len 16 expected 4 [ 626.009953][T24365] FAULT_INJECTION: forcing a failure. [ 626.009953][T24365] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 626.024847][T24366] openvswitch: netlink: VXLAN extension message has 4 unknown bytes. [ 626.091694][T24365] CPU: 0 UID: 0 PID: 24365 Comm: syz.3.8758 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 626.091737][T24365] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 626.091748][T24365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 626.091762][T24365] Call Trace: [ 626.091770][T24365] [ 626.091779][T24365] dump_stack_lvl+0x100/0x190 [ 626.091821][T24365] should_fail_ex.cold+0x5/0xa [ 626.091848][T24365] core_sys_select+0x938/0xbb0 [ 626.091894][T24365] ? __pfx_core_sys_select+0x10/0x10 [ 626.091962][T24365] ? ktime_get_ts64+0x2d2/0x3f0 [ 626.091988][T24365] ? read_tsc+0x9/0x20 [ 626.092013][T24365] ? ktime_get_ts64+0x256/0x3f0 [ 626.092042][T24365] kern_select+0x20c/0x270 [ 626.092082][T24365] ? __pfx_kern_select+0x10/0x10 [ 626.092131][T24365] __x64_sys_select+0xbd/0x160 [ 626.092168][T24365] ? do_syscall_64+0x95/0xf80 [ 626.092195][T24365] ? lockdep_hardirqs_on+0x78/0x100 [ 626.092223][T24365] do_syscall_64+0x106/0xf80 [ 626.092250][T24365] ? clear_bhb_loop+0x40/0x90 [ 626.092280][T24365] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 626.092304][T24365] RIP: 0033:0x7fa69819c799 [ 626.092323][T24365] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 626.092346][T24365] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 626.092368][T24365] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 626.092384][T24365] RDX: 00002000000000c0 RSI: 0000200000000040 RDI: 0000000000000001 [ 626.092398][T24365] RBP: 00007fa698232bd9 R08: 00002000000001c0 R09: 0000000000000000 [ 626.092413][T24365] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000000 [ 626.092427][T24365] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 626.092457][T24365] [ 628.550195][T24429] netlink: Unknown conntrack attr (type=257, max=9) [ 628.993341][T24444] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8798'. [ 629.044581][T24447] openvswitch: netlink: VXLAN extension 0 has unexpected len 4 expected 0 [ 631.090198][T24507] netlink: zone id is out of range [ 631.138881][T24507] netlink: zone id is out of range [ 631.182545][T24507] netlink: zone id is out of range [ 631.229838][T24507] netlink: zone id is out of range [ 631.242589][T24513] openvswitch: netlink: IPv4 tunnel dst address is zero [ 631.287842][T24507] netlink: zone id is out of range [ 631.341146][T24507] netlink: zone id is out of range [ 631.393813][T24507] netlink: zone id is out of range [ 631.448224][T24507] netlink: zone id is out of range [ 631.496081][T24507] netlink: zone id is out of range [ 631.590798][T24523] netlink: 'syz.1.8834': attribute type 1 has an invalid length. [ 631.779456][T24526] FAULT_INJECTION: forcing a failure. [ 631.779456][T24526] name failslab, interval 1, probability 0, space 0, times 0 [ 631.839267][T24526] CPU: 0 UID: 0 PID: 24526 Comm: syz.0.8836 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 631.839311][T24526] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 631.839322][T24526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 631.839335][T24526] Call Trace: [ 631.839343][T24526] [ 631.839352][T24526] dump_stack_lvl+0x100/0x190 [ 631.839393][T24526] should_fail_ex.cold+0x5/0xa [ 631.839422][T24526] should_failslab+0xc2/0x120 [ 631.839446][T24526] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 631.839483][T24526] ? __d_alloc+0x34/0xa80 [ 631.839508][T24526] ? make_vfsgid+0xf1/0x140 [ 631.839544][T24526] __d_alloc+0x34/0xa80 [ 631.839568][T24526] ? bpf_lsm_inode_permission+0x9/0x10 [ 631.839607][T24526] d_alloc+0x4a/0x1e0 [ 631.839634][T24526] vfs_tmpfile+0x148/0x9a0 [ 631.839664][T24526] path_openat+0x164e/0x31a0 [ 631.839686][T24526] ? kasan_save_stack+0x3f/0x50 [ 631.839722][T24526] ? kasan_save_stack+0x30/0x50 [ 631.839758][T24526] ? __kasan_slab_alloc+0x89/0x90 [ 631.839778][T24526] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 631.839813][T24526] ? do_getname+0x35/0x390 [ 631.839842][T24526] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 631.839870][T24526] ? __pfx_path_openat+0x10/0x10 [ 631.839904][T24526] do_file_open+0x20e/0x430 [ 631.839930][T24526] ? __pfx_do_file_open+0x10/0x10 [ 631.839974][T24526] ? _raw_spin_unlock+0x28/0x50 [ 631.839998][T24526] ? alloc_fd+0x476/0x790 [ 631.840028][T24526] do_sys_openat2+0x10d/0x1e0 [ 631.840068][T24526] ? __pfx_do_sys_openat2+0x10/0x10 [ 631.840110][T24526] __x64_sys_open+0xfe/0x1d0 [ 631.840142][T24526] ? __pfx___x64_sys_open+0x10/0x10 [ 631.840184][T24526] do_syscall_64+0x106/0xf80 [ 631.840211][T24526] ? clear_bhb_loop+0x40/0x90 [ 631.840240][T24526] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 631.840265][T24526] RIP: 0033:0x7f729ff9c799 [ 631.840284][T24526] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 631.840306][T24526] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 631.840329][T24526] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 631.840344][T24526] RDX: 0000000000000408 RSI: 0000000000595002 RDI: 0000200000000100 [ 631.840359][T24526] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 631.840373][T24526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 631.840387][T24526] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 631.840417][T24526] [ 633.337437][T24572] NFSD: Failed to start, no listeners configured. [ 633.731599][T24591] input input41: cannot allocate more than FF_MAX_EFFECTS effects [ 635.812681][T24659] netlink: 'syz.2.8883': attribute type 1 has an invalid length. [ 636.305724][T24679] net_ratelimit: 50 callbacks suppressed [ 636.362357][T24679] openvswitch: netlink: Geneve option length err (len 256, max 255). [ 637.302698][T24710] netlink: 'syz.1.8907': attribute type 3 has an invalid length. [ 637.799185][T24720] FAULT_INJECTION: forcing a failure. [ 637.799185][T24720] name failslab, interval 1, probability 0, space 0, times 0 [ 637.867849][T24720] CPU: 0 UID: 0 PID: 24720 Comm: syz.3.8911 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 637.867892][T24720] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 637.867903][T24720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 637.867917][T24720] Call Trace: [ 637.867925][T24720] [ 637.867934][T24720] dump_stack_lvl+0x100/0x190 [ 637.867974][T24720] should_fail_ex.cold+0x5/0xa [ 637.868002][T24720] should_failslab+0xc2/0x120 [ 637.868027][T24720] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 637.868064][T24720] ? kcm_create+0x11e/0x6a0 [ 637.868092][T24720] kcm_create+0x11e/0x6a0 [ 637.868117][T24720] __sock_create+0x339/0x860 [ 637.868159][T24720] __sys_socket+0x14d/0x260 [ 637.868197][T24720] ? __pfx___sys_socket+0x10/0x10 [ 637.868244][T24720] __x64_sys_socket+0x72/0xb0 [ 637.868281][T24720] ? lockdep_hardirqs_on+0x78/0x100 [ 637.868310][T24720] do_syscall_64+0x106/0xf80 [ 637.868337][T24720] ? clear_bhb_loop+0x40/0x90 [ 637.868367][T24720] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 637.868392][T24720] RIP: 0033:0x7fa69819c799 [ 637.868411][T24720] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 637.868433][T24720] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 637.868456][T24720] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 637.868471][T24720] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000029 [ 637.868493][T24720] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 637.868508][T24720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 637.868522][T24720] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 637.868552][T24720] [ 638.249260][T24726] netlink: Invalid conntrack timeout [ 638.495046][T24734] openvswitch: netlink: IP tunnel dst address not specified [ 638.647052][T24742] : entered promiscuous mode [ 638.771776][T24746] FAULT_INJECTION: forcing a failure. [ 638.771776][T24746] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 638.863881][T24746] CPU: 0 UID: 0 PID: 24746 Comm: syz.0.8922 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 638.863925][T24746] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 638.863936][T24746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 638.863950][T24746] Call Trace: [ 638.863958][T24746] [ 638.863967][T24746] dump_stack_lvl+0x100/0x190 [ 638.864008][T24746] should_fail_ex.cold+0x5/0xa [ 638.864031][T24746] ? prepare_alloc_pages+0x16d/0x5f0 [ 638.864060][T24746] should_fail_alloc_page+0xeb/0x140 [ 638.864087][T24746] prepare_alloc_pages+0x1f0/0x5f0 [ 638.864118][T24746] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 638.864154][T24746] ? find_held_lock+0x1/0x80 [ 638.864176][T24746] ? is_bpf_text_address+0x8a/0x1a0 [ 638.864212][T24746] ? is_bpf_text_address+0x8a/0x1a0 [ 638.864248][T24746] ? bpf_ksym_find+0x124/0x1c0 [ 638.864276][T24746] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 638.864301][T24746] ? is_bpf_text_address+0x94/0x1a0 [ 638.864338][T24746] ? kernel_text_address+0x8d/0x100 [ 638.864373][T24746] ? __kernel_text_address+0xd/0x30 [ 638.864408][T24746] ? unwind_get_return_address+0x59/0xa0 [ 638.864434][T24746] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 638.864490][T24746] ? __pfx_stack_trace_save+0x10/0x10 [ 638.864514][T24746] ? stack_depot_save_flags+0x27/0x9d0 [ 638.864539][T24746] ? find_held_lock+0x2b/0x80 [ 638.864562][T24746] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 638.864604][T24746] ? policy_nodemask+0xed/0x4f0 [ 638.864630][T24746] alloc_pages_mpol+0x1fb/0x550 [ 638.864656][T24746] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 638.864688][T24746] alloc_pages_noprof+0x131/0x390 [ 638.864714][T24746] kimage_alloc_pages+0x72/0x380 [ 638.864758][T24746] kimage_alloc_control_pages+0x157/0xa20 [ 638.864789][T24746] ? __pfx_kimage_alloc_control_pages+0x10/0x10 [ 638.864823][T24746] do_kexec_load+0x275/0x810 [ 638.864850][T24746] ? __pfx_do_kexec_load+0x10/0x10 [ 638.864878][T24746] ? _copy_from_user+0x59/0xd0 [ 638.864920][T24746] __x64_sys_kexec_load+0x1bf/0x230 [ 638.864948][T24746] do_syscall_64+0x106/0xf80 [ 638.864976][T24746] ? clear_bhb_loop+0x40/0x90 [ 638.865006][T24746] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 638.865030][T24746] RIP: 0033:0x7f729ff9c799 [ 638.865049][T24746] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 638.865071][T24746] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 638.865094][T24746] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 638.865110][T24746] RDX: 0000200000000040 RSI: 0000000000000002 RDI: 0000000000000005 [ 638.865124][T24746] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 638.865138][T24746] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 638.865152][T24746] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 638.865182][T24746] [ 638.865207][T24746] kexec: Could not allocate control_code_buffer syzkaller syzkaller login: [ 640.050895][T24778] netlink: zone id is out of range [ 640.285412][T24785] netlink: 'syz.3.8939': attribute type 1 has an invalid length. [ 640.347557][T24788] binder: 24787:24788 ioctl 400c620e 2000000001c0 returned -22 [ 642.861342][T24895] crash hp: kexec_trylock() failed, kdump image may be inaccurate [ 643.306761][T24908] netlink: 'syz.2.8981': attribute type 1 has an invalid length. [ 644.001564][T24928] netlink: zone id is out of range [ 644.025740][T24928] netlink: zone id is out of range [ 644.030900][T24928] netlink: zone id is out of range [ 644.085584][T24928] netlink: zone id is out of range [ 644.101134][T24928] netlink: zone id is out of range [ 644.118512][T24928] netlink: zone id is out of range [ 644.147949][T24928] netlink: zone id is out of range [ 644.180807][T24928] netlink: zone id is out of range [ 644.193351][T24928] netlink: zone id is out of range [ 644.233739][T24928] netlink: zone id is out of range [ 644.331972][T24888] kexec: Could not allocate control_code_buffer [ 644.700463][T24941] NFSD: Failed to start, no listeners configured. [ 647.936397][T25082] random: crng reseeded on system resumption [ 647.953780][T25081] netlink: 'syz.0.9050': attribute type 11 has an invalid length. [ 647.983709][T25081] netlink: 'syz.0.9050': attribute type 11 has an invalid length. [ 648.004143][T25082] Restarting kernel threads ... [ 648.014793][T25081] netlink: 'syz.0.9050': attribute type 11 has an invalid length. [ 648.023653][T25082] Done restarting kernel threads. [ 651.286206][T25210] netlink: 'syz.1.9102': attribute type 1 has an invalid length. [ 651.334500][T25210] netlink: 33 bytes leftover after parsing attributes in process `syz.1.9102'. [ 653.904145][ T30] audit: type=1326 audit(4295070010.996:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=25310 comm="syz.1.9138" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8f51f9c799 code=0x0 [ 654.655166][T25333] net_ratelimit: 18 callbacks suppressed [ 654.655187][T25333] netlink: set zone limit has 8 unknown bytes [ 655.948548][T25379] debugfs: '!PjE ùrõ£Ò„yù*›"¤l-ý¤ôy–ú„L̓÷ÓÄ]' already exists in 'ieee80211' [ 656.933341][T25410] netlink: 342 bytes leftover after parsing attributes in process `syz.1.9181'. [ 657.940849][T25447] openvswitch: netlink: IP tunnel TTL not specified. [ 659.258033][T25492] netlink: 'syz.1.9217': attribute type 3 has an invalid length. [ 659.554005][T25503] netlink: 16 bytes leftover after parsing attributes in process `syz.0.9223'. [ 660.352405][T25536] netlink: 2 bytes leftover after parsing attributes in process `syz.0.9234'. [ 661.467504][T25571] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9251'. [ 662.183759][T25597] random: crng reseeded on system resumption [ 663.510651][T25632] openvswitch: netlink: IP tunnel dst address not specified [ 663.837584][T25638] openvswitch: netlink: Flow key attr not present in new flow. [ 664.724242][T16375] Bluetooth: hci0: SCO packet too small [ 666.450292][T25731] openvswitch: netlink: Geneve opt len 1 is not a multiple of 4. [ 668.376700][T25800] openvswitch: netlink: Geneve opt len 1 is not a multiple of 4. [ 668.603733][T25809] netlink: NAT attribute type 6 has unexpected length (4 != 2) [ 670.545108][T25871] FAULT_INJECTION: forcing a failure. [ 670.545108][T25871] name failslab, interval 1, probability 0, space 0, times 0 [ 670.589555][T25871] CPU: 0 UID: 0 PID: 25871 Comm: syz.1.9392 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 670.589599][T25871] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 670.589610][T25871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 670.589624][T25871] Call Trace: [ 670.589631][T25871] [ 670.589640][T25871] dump_stack_lvl+0x100/0x190 [ 670.589682][T25871] should_fail_ex.cold+0x5/0xa [ 670.589710][T25871] should_failslab+0xc2/0x120 [ 670.589735][T25871] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 670.589770][T25871] ? security_file_alloc+0x34/0x2c0 [ 670.589794][T25871] ? trace_kmem_cache_alloc+0xf3/0x120 [ 670.589824][T25871] security_file_alloc+0x34/0x2c0 [ 670.589848][T25871] init_file+0x95/0x480 [ 670.589876][T25871] alloc_empty_file+0x73/0x1c0 [ 670.589907][T25871] dentry_open+0x46/0xd0 [ 670.589937][T25871] pidfs_alloc_file+0x18f/0x290 [ 670.589975][T25871] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 670.590021][T25871] pidfd_prepare+0x123/0x200 [ 670.590051][T25871] __x64_sys_pidfd_open+0x105/0x1a0 [ 670.590085][T25871] ? __pfx___x64_sys_pidfd_open+0x10/0x10 [ 670.590127][T25871] do_syscall_64+0x106/0xf80 [ 670.590154][T25871] ? clear_bhb_loop+0x40/0x90 [ 670.590183][T25871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 670.590208][T25871] RIP: 0033:0x7f8f51f9c799 [ 670.590227][T25871] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 670.590250][T25871] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 670.590272][T25871] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 670.590288][T25871] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 670.590302][T25871] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 670.590316][T25871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 670.590329][T25871] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 670.590359][T25871] [ 670.985645][T25875] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 672.680612][T25947] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 672.687183][T25947] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 673.123901][T25960] netlink: 'syz.0.9422': attribute type 11 has an invalid length. [ 673.172693][T25960] netlink: 'syz.0.9422': attribute type 11 has an invalid length. [ 673.204033][T25960] netlink: 'syz.0.9422': attribute type 11 has an invalid length. [ 673.211890][T25960] netlink: 'syz.0.9422': attribute type 11 has an invalid length. [ 673.290454][T25958] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 673.779785][T25981] usbip-vudc usbip-vudc.0: gadget not bound [ 674.185054][T25992] netlink: ct family unspecified [ 674.410155][T26000] netlink: 'syz.3.9442': attribute type 11 has an invalid length. [ 674.442669][T26000] netlink: 'syz.3.9442': attribute type 11 has an invalid length. [ 674.442714][T26000] netlink: 'syz.3.9442': attribute type 11 has an invalid length. [ 677.285444][T26111] openvswitch: netlink: Message has 20 unknown bytes. [ 678.894548][T26164] netlink: 'syz.1.9508': attribute type 1 has an invalid length. [ 678.929349][T26164] netlink: 'syz.1.9508': attribute type 1 has an invalid length. [ 678.981550][T26164] netlink: 124 bytes leftover after parsing attributes in process `syz.1.9508'. [ 679.019188][T26164] netlink: 100 bytes leftover after parsing attributes in process `syz.1.9508'. [ 681.767113][T26251] .^: entered promiscuous mode [ 682.589133][T26279] delete_channel: no stack [ 683.196758][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 683.203375][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 685.911951][T16375] Bluetooth: hci2: unexpected event 0x3e length: 508 > 260 [ 685.911983][T16375] Bluetooth: hci2: unexpected subevent 0x02 length: 507 > 260 [ 685.932216][T16375] Bluetooth: hci2: Dropping invalid advertising data [ 685.939254][T16375] Bluetooth: hci2: unknown advertising packet type: 0xe9 [ 685.939282][T16375] Bluetooth: hci2: Dropping invalid advertising data [ 685.954675][T16375] Bluetooth: hci2: Malformed LE Event: 0x02 [ 688.962250][T26508] netlink: 'syz.1.9644': attribute type 11 has an invalid length. [ 691.002628][T26565] netlink: Conntrack attr has 16 unknown bytes [ 692.205538][T26604] netlink: 'syz.1.9691': attribute type 1 has an invalid length. [ 693.162975][T26636] netlink: zone id is out of range [ 694.001330][T26663] nbd: must specify a size in bytes for the device [ 694.347297][T16375] Bluetooth: hci1: unexpected event 0x3e length: 508 > 260 [ 694.347329][T16375] Bluetooth: hci1: unexpected subevent 0x02 length: 507 > 260 [ 694.364192][T16375] Bluetooth: hci1: Dropping invalid advertising data [ 694.371250][T16375] Bluetooth: hci1: unknown advertising packet type: 0xe9 [ 694.371282][T16375] Bluetooth: hci1: Dropping invalid advertising data [ 694.388307][T16375] Bluetooth: hci1: Malformed LE Event: 0x02 [ 694.528415][T26681] openvswitch: netlink: Duplicate or invalid key (type 0). [ 695.061663][T26710] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9731'. [ 696.460282][T26764] netlink: 'syz.3.9757': attribute type 1 has an invalid length. [ 696.902329][T26778] netlink: 44 bytes leftover after parsing attributes in process `syz.2.9763'. [ 698.157760][T16375] Bluetooth: hci0: unexpected event 0x3e length: 508 > 260 [ 698.157791][T16375] Bluetooth: hci0: unexpected subevent 0x02 length: 507 > 260 [ 698.172909][T16375] Bluetooth: hci0: Dropping invalid advertising data [ 698.179916][T16375] Bluetooth: hci0: unknown advertising packet type: 0xe9 [ 698.179943][T16375] Bluetooth: hci0: Dropping invalid advertising data [ 698.198070][T16375] Bluetooth: hci0: Malformed LE Event: 0x02 [ 700.065822][T26901] openvswitch: netlink: Port -2134900732 exceeds max allowable 65535 [ 700.368624][T26910] netlink: 'syz.0.9810': attribute type 1 has an invalid length. [ 700.535527][T26915] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9812'. [ 701.326276][T26943] openvswitch: netlink: IP tunnel dst address not specified [ 702.676862][T26989] sctp: [Deprecated]: syz.3.9846 (pid 26989) Use of struct sctp_assoc_value in delayed_ack socket option. [ 702.676862][T26989] Use struct sctp_sack_info instead [ 703.083473][T27003] nfsd: Unknown parameter 'ˆ*Ú' [ 703.223998][T27009] openvswitch: netlink: ERSPAN option length err (len 256, max 255). [ 703.328781][T27012] FAULT_INJECTION: forcing a failure. [ 703.328781][T27012] name failslab, interval 1, probability 0, space 0, times 0 [ 703.388604][T27012] CPU: 0 UID: 0 PID: 27012 Comm: syz.0.9857 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 703.388648][T27012] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 703.388659][T27012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 703.388673][T27012] Call Trace: [ 703.388681][T27012] [ 703.388691][T27012] dump_stack_lvl+0x100/0x190 [ 703.388732][T27012] should_fail_ex.cold+0x5/0xa [ 703.388761][T27012] should_failslab+0xc2/0x120 [ 703.388786][T27012] __kvmalloc_node_noprof+0xfa/0xa00 [ 703.388824][T27012] ? io_alloc_cache_init+0x38/0x170 [ 703.388859][T27012] ? lockdep_init_map_type+0x5c/0x250 [ 703.388896][T27012] io_alloc_cache_init+0x38/0x170 [ 703.388934][T27012] io_uring_setup.cold+0x3cd/0x1d09 [ 703.388974][T27012] ? __pfx_io_uring_setup+0x10/0x10 [ 703.389012][T27012] ? do_futex+0x192/0x350 [ 703.389044][T27012] ? __pfx_do_futex+0x10/0x10 [ 703.389089][T27012] ? xfd_validate_state+0x129/0x190 [ 703.389138][T27012] __x64_sys_io_uring_setup+0xc2/0x170 [ 703.389168][T27012] do_syscall_64+0x106/0xf80 [ 703.389195][T27012] ? clear_bhb_loop+0x40/0x90 [ 703.389225][T27012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 703.389255][T27012] RIP: 0033:0x7f729ff9c799 [ 703.389274][T27012] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 703.389298][T27012] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 703.389321][T27012] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 703.389336][T27012] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000001d48 [ 703.389352][T27012] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 703.389375][T27012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 703.389390][T27012] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 703.389421][T27012] [ 704.127678][T27034] netlink: get zone limit has 8 unknown bytes [ 704.827951][T27058] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 704.999660][T27064] tipc: Started in network mode [ 705.004596][T27064] tipc: Node identity ee00, cluster identity 4711 [ 705.052031][T27064] tipc: Node number set to 60928 [ 705.107176][T27063] netlink: Failed to add  helper -22 [ 707.260649][T27147] No such timeout policy "" [ 707.279538][T27147] netlink: Failed to associated timeout policy '' [ 713.154635][T27306] kexec: Could not allocate control_code_buffer [ 713.864914][T27361] netlink: 16 bytes leftover after parsing attributes in process `syz.3.10018'. [ 714.607557][T27387] FAULT_INJECTION: forcing a failure. [ 714.607557][T27387] name failslab, interval 1, probability 0, space 0, times 0 [ 714.666647][T27387] CPU: 0 UID: 0 PID: 27387 Comm: syz.3.10029 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 714.666694][T27387] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 714.666706][T27387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 714.666724][T27387] Call Trace: [ 714.666734][T27387] [ 714.666745][T27387] dump_stack_lvl+0x100/0x190 [ 714.666790][T27387] should_fail_ex.cold+0x5/0xa [ 714.666818][T27387] ? lsm_blob_alloc+0x68/0x90 [ 714.666846][T27387] should_failslab+0xc2/0x120 [ 714.666875][T27387] __kmalloc_noprof+0xe0/0x850 [ 714.666911][T27387] ? trace_kmem_cache_alloc+0xf3/0x120 [ 714.666941][T27387] lsm_blob_alloc+0x68/0x90 [ 714.666970][T27387] security_prepare_creds+0x2d/0x290 [ 714.667000][T27387] prepare_creds+0x5d6/0x950 [ 714.667039][T27387] lookup_user_key+0x8e9/0x1300 [ 714.667080][T27387] ? __pfx_lookup_user_key+0x10/0x10 [ 714.667118][T27387] ? find_held_lock+0x2b/0x80 [ 714.667140][T27387] ? setid_policy_lookup+0x10c/0x350 [ 714.667172][T27387] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 714.667216][T27387] ? bpf_lsm_capable+0x9/0x10 [ 714.667240][T27387] ? security_capable+0x80/0x260 [ 714.667275][T27387] keyctl_get_persistent+0x197/0x8b0 [ 714.667307][T27387] ? __pfx_keyctl_get_persistent+0x10/0x10 [ 714.667345][T27387] ? __x64_sys_futex+0x34f/0x4d0 [ 714.667376][T27387] ? __x64_sys_futex+0x358/0x4d0 [ 714.667410][T27387] ? xfd_validate_state+0x129/0x190 [ 714.667451][T27387] __do_sys_keyctl+0x3b2/0x5a0 [ 714.667488][T27387] do_syscall_64+0x106/0xf80 [ 714.667516][T27387] ? clear_bhb_loop+0x40/0x90 [ 714.667546][T27387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.667572][T27387] RIP: 0033:0x7fa69819c799 [ 714.667591][T27387] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 714.667619][T27387] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 714.667642][T27387] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 714.667659][T27387] RDX: 7fffffffffffffff RSI: 000000000000ee00 RDI: 0000000000000016 [ 714.667674][T27387] RBP: 00007fa698232bd9 R08: 000000000000000c R09: 0000000000000000 [ 714.667688][T27387] R10: 00000000000099a7 R11: 0000000000000246 R12: 0000000000000000 [ 714.667703][T27387] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 714.667733][T27387] [ 716.868359][T27458] netlink: 338 bytes leftover after parsing attributes in process `syz.2.10063'. [ 717.119721][T27467] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10066'. [ 717.691603][T27486] FAULT_INJECTION: forcing a failure. [ 717.691603][T27486] name failslab, interval 1, probability 0, space 0, times 0 [ 717.734569][T27486] CPU: 0 UID: 0 PID: 27486 Comm: syz.3.10075 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 717.734614][T27486] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 717.734626][T27486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 717.734640][T27486] Call Trace: [ 717.734648][T27486] [ 717.734657][T27486] dump_stack_lvl+0x100/0x190 [ 717.734699][T27486] should_fail_ex.cold+0x5/0xa [ 717.734727][T27486] should_failslab+0xc2/0x120 [ 717.734752][T27486] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 717.734788][T27486] ? __anon_vma_prepare+0xae/0x5e0 [ 717.734827][T27486] __anon_vma_prepare+0xae/0x5e0 [ 717.734858][T27486] ? __pfx___pte_alloc+0x10/0x10 [ 717.734885][T27486] __vmf_anon_prepare+0x11f/0x250 [ 717.734914][T27486] do_anonymous_page+0x552/0x1fb0 [ 717.734947][T27486] ? do_huge_pmd_anonymous_page+0x7ee/0x1a60 [ 717.734991][T27486] __handle_mm_fault+0x1d42/0x2b60 [ 717.735032][T27486] ? mt_find+0x45e/0x8e0 [ 717.735070][T27486] ? __pfx___handle_mm_fault+0x10/0x10 [ 717.735102][T27486] ? __pfx_mt_find+0x10/0x10 [ 717.735156][T27486] handle_mm_fault+0x36d/0xa20 [ 717.735194][T27486] __get_user_pages+0xf9c/0x34d0 [ 717.735232][T27486] ? __pfx___get_user_pages+0x10/0x10 [ 717.735267][T27486] populate_vma_page_range+0x267/0x3f0 [ 717.735298][T27486] ? __pfx_populate_vma_page_range+0x10/0x10 [ 717.735328][T27486] ? __pfx_find_vma_intersection+0x10/0x10 [ 717.735354][T27486] ? do_mmap+0x93f/0x12f0 [ 717.735383][T27486] __mm_populate+0x107/0x3a0 [ 717.735412][T27486] ? __pfx___mm_populate+0x10/0x10 [ 717.735442][T27486] ? up_write+0x290/0x4f0 [ 717.735480][T27486] vm_mmap_pgoff+0x37f/0x470 [ 717.735509][T27486] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 717.735538][T27486] ? do_futex+0x192/0x350 [ 717.735569][T27486] ? __pfx_do_futex+0x10/0x10 [ 717.735604][T27486] ksys_mmap_pgoff+0xe1/0x650 [ 717.735629][T27486] ? __x64_sys_futex+0x34f/0x4d0 [ 717.735658][T27486] ? __x64_sys_futex+0x358/0x4d0 [ 717.735690][T27486] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 717.735715][T27486] ? xfd_validate_state+0x129/0x190 [ 717.735755][T27486] __x64_sys_mmap+0x125/0x190 [ 717.735794][T27486] do_syscall_64+0x106/0xf80 [ 717.735821][T27486] ? clear_bhb_loop+0x40/0x90 [ 717.735851][T27486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 717.735876][T27486] RIP: 0033:0x7fa69819c799 [ 717.735912][T27486] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 717.735936][T27486] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 717.735960][T27486] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 717.735976][T27486] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000401000 [ 717.735991][T27486] RBP: 00007fa698232bd9 R08: ffffffffffffffff R09: 0000000000008000 [ 717.736006][T27486] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 717.736021][T27486] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 717.736056][T27486] [ 718.607300][T27506] FAULT_INJECTION: forcing a failure. [ 718.607300][T27506] name failslab, interval 1, probability 0, space 0, times 0 [ 718.642780][T27506] CPU: 0 UID: 0 PID: 27506 Comm: syz.3.10084 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 718.642825][T27506] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 718.642837][T27506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 718.642851][T27506] Call Trace: [ 718.642859][T27506] [ 718.642868][T27506] dump_stack_lvl+0x100/0x190 [ 718.642910][T27506] should_fail_ex.cold+0x5/0xa [ 718.642938][T27506] should_failslab+0xc2/0x120 [ 718.642962][T27506] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 718.642998][T27506] ? sk_prot_alloc+0x60/0x2a0 [ 718.643044][T27506] sk_prot_alloc+0x60/0x2a0 [ 718.643080][T27506] sk_alloc+0x36/0xe80 [ 718.643106][T27506] qrtr_create+0x84/0x1d0 [ 718.643136][T27506] __sock_create+0x339/0x860 [ 718.643177][T27506] __sys_socket+0x14d/0x260 [ 718.643216][T27506] ? __pfx___sys_socket+0x10/0x10 [ 718.643263][T27506] __x64_sys_socket+0x72/0xb0 [ 718.643299][T27506] ? lockdep_hardirqs_on+0x78/0x100 [ 718.643327][T27506] do_syscall_64+0x106/0xf80 [ 718.643354][T27506] ? clear_bhb_loop+0x40/0x90 [ 718.643384][T27506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 718.643408][T27506] RIP: 0033:0x7fa69819c799 [ 718.643426][T27506] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 718.643449][T27506] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 718.643472][T27506] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 718.643488][T27506] RDX: 0000000000000001 RSI: 0000000000000002 RDI: 000000000000002a [ 718.643503][T27506] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 718.643517][T27506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 718.643532][T27506] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 718.643562][T27506] [ 718.848537][T27508] FAULT_INJECTION: forcing a failure. [ 718.848537][T27508] name failslab, interval 1, probability 0, space 0, times 0 [ 718.861251][T27508] CPU: 0 UID: 0 PID: 27508 Comm: syz.0.10085 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 718.861294][T27508] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 718.861305][T27508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 718.861319][T27508] Call Trace: [ 718.861327][T27508] [ 718.861337][T27508] dump_stack_lvl+0x100/0x190 [ 718.861377][T27508] should_fail_ex.cold+0x5/0xa [ 718.861406][T27508] should_failslab+0xc2/0x120 [ 718.861430][T27508] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 718.861467][T27508] ? key_alloc+0x3c5/0x1310 [ 718.861489][T27508] ? rcu_is_watching+0x12/0xc0 [ 718.861531][T27508] key_alloc+0x3c5/0x1310 [ 718.861564][T27508] ? __pfx_key_alloc+0x10/0x10 [ 718.861595][T27508] keyring_alloc+0x44/0xc0 [ 718.861625][T27508] install_session_keyring_to_cred+0x190/0x230 [ 718.861668][T27508] join_session_keyring+0x1bc/0x350 [ 718.861707][T27508] lookup_user_key+0x32f/0x1300 [ 718.861748][T27508] ? __pfx_lookup_user_key+0x10/0x10 [ 718.861787][T27508] ? __pfx_futex_wait+0x10/0x10 [ 718.861828][T27508] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 718.861870][T27508] ? __pfx_msgctl_down+0x10/0x10 [ 718.861906][T27508] keyctl_get_persistent+0x197/0x8b0 [ 718.861936][T27508] ? __pfx_keyctl_get_persistent+0x10/0x10 [ 718.861968][T27508] ? __x64_sys_futex+0x34f/0x4d0 [ 718.861997][T27508] ? __x64_sys_futex+0x358/0x4d0 [ 718.862040][T27508] ? xfd_validate_state+0x129/0x190 [ 718.862083][T27508] __do_sys_keyctl+0x3b2/0x5a0 [ 718.862120][T27508] do_syscall_64+0x106/0xf80 [ 718.862148][T27508] ? clear_bhb_loop+0x40/0x90 [ 718.862178][T27508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 718.862203][T27508] RIP: 0033:0x7f729ff9c799 [ 718.862224][T27508] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 718.862247][T27508] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 718.862270][T27508] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 718.862286][T27508] RDX: 7ffffffffffffffd RSI: 0000000000000000 RDI: 0000000000000016 [ 718.862301][T27508] RBP: 00007f72a0032bd9 R08: 0004000000000000 R09: 0000000000000000 [ 718.862317][T27508] R10: 00000000000099a5 R11: 0000000000000246 R12: 0000000000000000 [ 718.862332][T27508] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 718.862362][T27508] [ 720.283327][T27547] FAULT_INJECTION: forcing a failure. [ 720.283327][T27547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 720.348673][T27547] CPU: 0 UID: 0 PID: 27547 Comm: syz.1.10103 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 720.348722][T27547] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 720.348734][T27547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 720.348748][T27547] Call Trace: [ 720.348756][T27547] [ 720.348765][T27547] dump_stack_lvl+0x100/0x190 [ 720.348815][T27547] should_fail_ex.cold+0x5/0xa [ 720.348843][T27547] _copy_to_user+0x32/0xd0 [ 720.348885][T27547] copy_siginfo_to_user+0x27/0xc0 [ 720.348915][T27547] x64_setup_rt_frame+0xa03/0xce0 [ 720.348955][T27547] ? __pfx_x64_setup_rt_frame+0x10/0x10 [ 720.348988][T27547] ? do_send_specific+0x15c/0x360 [ 720.349018][T27547] arch_do_signal_or_restart+0x587/0x770 [ 720.349050][T27547] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 720.349097][T27547] exit_to_user_mode_loop+0x86/0x4a0 [ 720.349132][T27547] do_syscall_64+0x668/0xf80 [ 720.349161][T27547] ? clear_bhb_loop+0x40/0x90 [ 720.349191][T27547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.349215][T27547] RIP: 0033:0x7f8f51f9c799 [ 720.349234][T27547] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 720.349262][T27547] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000c8 [ 720.349285][T27547] RAX: 0000000000000000 RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 720.349301][T27547] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000001425 [ 720.349316][T27547] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 720.349331][T27547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 720.349345][T27547] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 720.349376][T27547] [ 720.550057][T27555] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10105'. [ 721.082539][T27586] netlink: 350 bytes leftover after parsing attributes in process `syz.2.10111'. [ 721.522592][T27619] FAULT_INJECTION: forcing a failure. [ 721.522592][T27619] name failslab, interval 1, probability 0, space 0, times 0 [ 721.573474][T27619] CPU: 0 UID: 0 PID: 27619 Comm: syz.1.10116 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 721.573518][T27619] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 721.573530][T27619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 721.573544][T27619] Call Trace: [ 721.573551][T27619] [ 721.573561][T27619] dump_stack_lvl+0x100/0x190 [ 721.573602][T27619] should_fail_ex.cold+0x5/0xa [ 721.573630][T27619] should_failslab+0xc2/0x120 [ 721.573655][T27619] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 721.573691][T27619] ? prepare_creds+0x2c/0x950 [ 721.573726][T27619] ? __sys_socket+0xac/0x260 [ 721.573770][T27619] prepare_creds+0x2c/0x950 [ 721.573808][T27619] __sys_setuid+0x9c/0x440 [ 721.573832][T27619] do_syscall_64+0x106/0xf80 [ 721.573860][T27619] ? clear_bhb_loop+0x40/0x90 [ 721.573889][T27619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 721.573915][T27619] RIP: 0033:0x7f8f51f9c799 [ 721.573933][T27619] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 721.573965][T27619] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000069 [ 721.573987][T27619] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 721.574004][T27619] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000000e [ 721.574018][T27619] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 721.574032][T27619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 721.574047][T27619] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 721.574078][T27619] [ 722.236568][T27641] netlink: 350 bytes leftover after parsing attributes in process `syz.3.10125'. [ 722.348221][T27624] netlink: 'syz.2.10118': attribute type 1 has an invalid length. [ 724.732980][T27722] openvswitch: HfR: Dropping previously announced user features [ 725.242490][T27731] zswap: compressor not available [ 725.933290][T27768] FAULT_INJECTION: forcing a failure. [ 725.933290][T27768] name failslab, interval 1, probability 0, space 0, times 0 [ 726.007718][T27768] CPU: 0 UID: 0 PID: 27768 Comm: syz.1.10182 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 726.007764][T27768] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 726.007774][T27768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 726.007788][T27768] Call Trace: [ 726.007797][T27768] [ 726.007806][T27768] dump_stack_lvl+0x100/0x190 [ 726.007847][T27768] should_fail_ex.cold+0x5/0xa [ 726.007874][T27768] ? sk_prot_alloc+0x10b/0x2a0 [ 726.007907][T27768] should_failslab+0xc2/0x120 [ 726.007933][T27768] __kmalloc_noprof+0xe0/0x850 [ 726.007975][T27768] sk_prot_alloc+0x10b/0x2a0 [ 726.008011][T27768] sk_alloc+0x36/0xe80 [ 726.008038][T27768] packet_create+0x127/0x8e0 [ 726.008077][T27768] __sock_create+0x339/0x860 [ 726.008119][T27768] __sys_socket+0x14d/0x260 [ 726.008157][T27768] ? __pfx___sys_socket+0x10/0x10 [ 726.008205][T27768] __x64_sys_socket+0x72/0xb0 [ 726.008241][T27768] ? lockdep_hardirqs_on+0x78/0x100 [ 726.008271][T27768] do_syscall_64+0x106/0xf80 [ 726.008306][T27768] ? clear_bhb_loop+0x40/0x90 [ 726.008336][T27768] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 726.008361][T27768] RIP: 0033:0x7f8f51f9c799 [ 726.008380][T27768] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 726.008404][T27768] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 726.008426][T27768] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 726.008443][T27768] RDX: 0000000000000004 RSI: 0000000000000003 RDI: 0000000000000011 [ 726.008457][T27768] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 726.008471][T27768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 726.008485][T27768] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 726.008516][T27768] [ 727.118781][T27789] openvswitch: netlink: IP tunnel TTL not specified. [ 728.438342][T27829] device-mapper: ioctl: Invalid new mapped device name or uuid string supplied. [ 728.753118][T27839] bridge0: port 3(veth0_to_bridge) entered blocking state [ 728.792737][T27839] bridge0: port 3(veth0_to_bridge) entered disabled state [ 728.833332][T27839] veth0_to_bridge: entered allmulticast mode [ 728.875256][T27839] veth0_to_bridge: entered promiscuous mode [ 728.900031][T27839] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 728.913219][T27841] netlink: Unknown conntrack attr (0) [ 728.966704][T27839] bridge0: port 3(veth0_to_bridge) entered blocking state [ 728.974310][T27839] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 729.294458][T27849] FAULT_INJECTION: forcing a failure. [ 729.294458][T27849] name failslab, interval 1, probability 0, space 0, times 0 [ 729.365725][T27849] CPU: 0 UID: 0 PID: 27849 Comm: syz.1.10221 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 729.365770][T27849] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 729.365781][T27849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 729.365795][T27849] Call Trace: [ 729.365803][T27849] [ 729.365811][T27849] dump_stack_lvl+0x100/0x190 [ 729.365853][T27849] should_fail_ex.cold+0x5/0xa [ 729.365881][T27849] should_failslab+0xc2/0x120 [ 729.365906][T27849] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 729.365942][T27849] ? security_file_alloc+0x34/0x2c0 [ 729.365973][T27849] ? trace_kmem_cache_alloc+0xf3/0x120 [ 729.366003][T27849] security_file_alloc+0x34/0x2c0 [ 729.366028][T27849] init_file+0x95/0x480 [ 729.366056][T27849] alloc_empty_file_noaccount+0x3d/0xd0 [ 729.366089][T27849] alloc_file_pseudo_noaccount+0x13a/0x230 [ 729.366123][T27849] ? __pfx_alloc_file_pseudo_noaccount+0x10/0x10 [ 729.366159][T27849] ? iput+0x3a/0x40 [ 729.366189][T27849] bdev_file_open_by_dev+0x13a/0x210 [ 729.366220][T27849] blkdev_bszset+0x170/0x240 [ 729.366248][T27849] ? __pfx_blkdev_bszset+0x10/0x10 [ 729.366276][T27849] ? find_held_lock+0x2b/0x80 [ 729.366298][T27849] ? __fget_files+0x215/0x3d0 [ 729.366317][T27849] ? hook_file_ioctl_common+0x146/0x410 [ 729.366360][T27849] blkdev_ioctl+0x513/0x6f0 [ 729.366389][T27849] ? __pfx_blkdev_ioctl+0x10/0x10 [ 729.366421][T27849] ? __pfx_blkdev_ioctl+0x10/0x10 [ 729.366450][T27849] __x64_sys_ioctl+0x18e/0x210 [ 729.366487][T27849] do_syscall_64+0x106/0xf80 [ 729.366515][T27849] ? clear_bhb_loop+0x40/0x90 [ 729.366544][T27849] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.366569][T27849] RIP: 0033:0x7f8f51f9c799 [ 729.366590][T27849] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 729.366614][T27849] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 729.366636][T27849] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 729.366652][T27849] RDX: 00002000000000c0 RSI: 0000000040081271 RDI: 0000000000000003 [ 729.366667][T27849] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 729.366682][T27849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 729.366696][T27849] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 729.366727][T27849] [ 729.847795][T27864] FAULT_INJECTION: forcing a failure. [ 729.847795][T27864] name failslab, interval 1, probability 0, space 0, times 0 [ 729.860659][T27864] CPU: 0 UID: 0 PID: 27864 Comm: syz.1.10225 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 729.860713][T27864] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 729.860724][T27864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 729.860738][T27864] Call Trace: [ 729.860745][T27864] [ 729.860754][T27864] dump_stack_lvl+0x100/0x190 [ 729.860793][T27864] should_fail_ex.cold+0x5/0xa [ 729.860821][T27864] should_failslab+0xc2/0x120 [ 729.860844][T27864] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 729.860879][T27864] ? do_fcntl_add_lease+0x9d/0x550 [ 729.860907][T27864] do_fcntl_add_lease+0x9d/0x550 [ 729.860929][T27864] ? __pfx_do_fcntl_add_lease+0x10/0x10 [ 729.860967][T27864] ? __pfx_futex_wait+0x10/0x10 [ 729.861012][T27864] fcntl_setlease+0xfc/0x180 [ 729.861036][T27864] ? __pfx_fcntl_setlease+0x10/0x10 [ 729.861068][T27864] do_fcntl+0x1149/0x1670 [ 729.861097][T27864] ? __pfx_do_fcntl+0x10/0x10 [ 729.861125][T27864] ? __fget_files+0x215/0x3d0 [ 729.861155][T27864] ? tomoyo_file_fcntl+0x6c/0xc0 [ 729.861189][T27864] __x64_sys_fcntl+0x163/0x200 [ 729.861236][T27864] do_syscall_64+0x106/0xf80 [ 729.861264][T27864] ? clear_bhb_loop+0x40/0x90 [ 729.861292][T27864] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.861317][T27864] RIP: 0033:0x7f8f51f9c799 [ 729.861335][T27864] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 729.861358][T27864] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 729.861380][T27864] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 729.861396][T27864] RDX: 9ec0000000000000 RSI: 0000000000000400 RDI: 0000000000000003 [ 729.861410][T27864] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 729.861424][T27864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 729.861438][T27864] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 729.861468][T27864] [ 731.841251][ T30] audit: type=1326 audit(4294967301.201:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined pid=27941 comm="syz.1.10251" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8f51f9c799 code=0x0 [ 732.780418][T27971] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10265'. [ 734.138660][T28029] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10281'. [ 734.400328][T16375] Bluetooth: hci1: unexpected event 0x03 length: 43 > 11 [ 734.401227][T28038] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10286'. [ 734.482886][T28038] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10286'. [ 735.181007][T28066] tunl0: entered allmulticast mode [ 737.015861][T28130] FAULT_INJECTION: forcing a failure. [ 737.015861][T28130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 737.074396][T28130] CPU: 0 UID: 0 PID: 28130 Comm: syz.3.10327 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 737.074441][T28130] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 737.074452][T28130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 737.074467][T28130] Call Trace: [ 737.074475][T28130] [ 737.074484][T28130] dump_stack_lvl+0x100/0x190 [ 737.074525][T28130] should_fail_ex.cold+0x5/0xa [ 737.074554][T28130] _copy_from_user+0x2e/0xd0 [ 737.074594][T28130] get_itimerspec64+0x16c/0x2f0 [ 737.074624][T28130] ? __pfx_get_itimerspec64+0x10/0x10 [ 737.074653][T28130] ? __pfx_do_futex+0x10/0x10 [ 737.074689][T28130] __x64_sys_timerfd_settime+0x15f/0x280 [ 737.074725][T28130] ? __pfx___x64_sys_timerfd_settime+0x10/0x10 [ 737.074762][T28130] ? xfd_validate_state+0x129/0x190 [ 737.074808][T28130] do_syscall_64+0x106/0xf80 [ 737.074836][T28130] ? clear_bhb_loop+0x40/0x90 [ 737.074865][T28130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 737.074890][T28130] RIP: 0033:0x7fa69819c799 [ 737.074910][T28130] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 737.074934][T28130] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 000000000000011e [ 737.074957][T28130] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 737.074973][T28130] RDX: 0000200000000040 RSI: 0000000000000003 RDI: ffffffffffffffff [ 737.074989][T28130] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 737.075003][T28130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 737.075018][T28130] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 737.075048][T28130] [ 737.290753][T28137] netlink: 2468 bytes leftover after parsing attributes in process `syz.2.10330'. [ 737.529781][T28145] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10331'. [ 740.593693][T28271] sctp: [Deprecated]: syz.0.10371 (pid 28271) Use of struct sctp_assoc_value in delayed_ack socket option. [ 740.593693][T28271] Use struct sctp_sack_info instead [ 744.319694][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 744.326142][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.791716][T28455] FAULT_INJECTION: forcing a failure. [ 747.791716][T28455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.880703][T28455] CPU: 0 UID: 0 PID: 28455 Comm: syz.0.10443 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 747.880747][T28455] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 747.880759][T28455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 747.880773][T28455] Call Trace: [ 747.880780][T28455] [ 747.880789][T28455] dump_stack_lvl+0x100/0x190 [ 747.880830][T28455] should_fail_ex.cold+0x5/0xa [ 747.880854][T28455] ? prepare_alloc_pages+0x16d/0x5f0 [ 747.880883][T28455] should_fail_alloc_page+0xeb/0x140 [ 747.880909][T28455] prepare_alloc_pages+0x1f0/0x5f0 [ 747.880942][T28455] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 747.880986][T28455] ? __lock_acquire+0x4a5/0x2630 [ 747.881019][T28455] ? futex_unqueue+0x13d/0x2c0 [ 747.881054][T28455] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 747.881097][T28455] ? find_held_lock+0x2b/0x80 [ 747.881118][T28455] ? __debug_object_init+0x2de/0x3d0 [ 747.881156][T28455] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 747.881182][T28455] ? lockdep_hardirqs_on+0x78/0x100 [ 747.881211][T28455] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 747.881237][T28455] ? __debug_object_init+0x2de/0x3d0 [ 747.881269][T28455] ? __might_fault+0xc5/0x140 [ 747.881304][T28455] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 747.881346][T28455] ? policy_nodemask+0xed/0x4f0 [ 747.881373][T28455] alloc_pages_mpol+0x1fb/0x550 [ 747.881399][T28455] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 747.881426][T28455] ? ktime_add_safe+0x60/0x70 [ 747.881459][T28455] ? __do_sys_futex_waitv+0x12e/0x2c0 [ 747.881496][T28455] ___kmalloc_large_node+0x104/0x150 [ 747.881523][T28455] ? futex2_setup_timeout+0x1c2/0x2d0 [ 747.881557][T28455] __kmalloc_large_node_noprof+0x1c/0x70 [ 747.881585][T28455] ? do_futex+0x192/0x350 [ 747.881615][T28455] __kmalloc_noprof+0x5be/0x850 [ 747.881657][T28455] __do_sys_futex_waitv+0x12e/0x2c0 [ 747.881691][T28455] ? __pfx___do_sys_futex_waitv+0x10/0x10 [ 747.881733][T28455] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 747.881776][T28455] do_syscall_64+0x106/0xf80 [ 747.881804][T28455] ? clear_bhb_loop+0x40/0x90 [ 747.881834][T28455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 747.881860][T28455] RIP: 0033:0x7f729ff9c799 [ 747.881879][T28455] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 747.881903][T28455] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000001c1 [ 747.881926][T28455] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 747.881942][T28455] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 00002000000004c0 [ 747.881956][T28455] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 747.881971][T28455] R10: 0000200000000500 R11: 0000000000000246 R12: 0000000000000000 [ 747.881986][T28455] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 747.882016][T28455] [ 751.795665][T28551] netlink: 346 bytes leftover after parsing attributes in process `syz.0.10478'. [ 751.987312][T28556] Invalid ELF header magic: != ELF [ 753.665270][T28619] ovs_: entered promiscuous mode [ 755.003562][T28656] sysfs: cannot create duplicate filename '/class/ieee80211/!PjE ùrõ£Ò„yù*›"¤l-ý¤ôy–ú„L̓÷ÓÄ]' [ 755.032536][T28656] CPU: 0 UID: 0 PID: 28656 Comm: syz.2.10515 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 755.032579][T28656] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 755.032592][T28656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 755.032606][T28656] Call Trace: [ 755.032620][T28656] [ 755.032629][T28656] dump_stack_lvl+0x100/0x190 [ 755.032671][T28656] sysfs_warn_dup.cold+0x1c/0x28 [ 755.032706][T28656] sysfs_do_create_link_sd+0x113/0x140 [ 755.032742][T28656] sysfs_create_link+0x61/0xc0 [ 755.032781][T28656] device_add+0x675/0x1950 [ 755.032824][T28656] ? __pfx_device_add+0x10/0x10 [ 755.032862][T28656] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 755.032905][T28656] ? ieee80211_set_bitrate_flags+0x41b/0x6b0 [ 755.032939][T28656] wiphy_register+0x1e5b/0x2d30 [ 755.032971][T28656] ? __rtnl_unlock+0xb9/0xf0 [ 755.033004][T28656] ? netdev_run_todo+0x840/0x12c0 [ 755.033041][T28656] ? __pfx_wiphy_register+0x10/0x10 [ 755.033074][T28656] ? __asan_memset+0x23/0x50 [ 755.033108][T28656] ? minstrel_ht_alloc+0x5e6/0x7f0 [ 755.033159][T28656] ieee80211_register_hw+0x2cfd/0x4140 [ 755.033207][T28656] ? __pfx_ieee80211_register_hw+0x10/0x10 [ 755.033241][T28656] ? __pfx___debug_object_init+0x10/0x10 [ 755.033282][T28656] ? find_held_lock+0x2b/0x80 [ 755.033306][T28656] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 755.033348][T28656] ? __hrtimer_setup+0x178/0x280 [ 755.033383][T28656] mac80211_hwsim_new_radio+0x2847/0x57d0 [ 755.033436][T28656] ? __pfx_mac80211_hwsim_new_radio+0x10/0x10 [ 755.033480][T28656] hwsim_new_radio_nl+0xc1f/0x1340 [ 755.033516][T28656] ? __pfx_hwsim_new_radio_nl+0x10/0x10 [ 755.033559][T28656] ? genl_family_rcv_msg_attrs_parse.isra.0+0x1a0/0x280 [ 755.033596][T28656] ? genl_family_rcv_msg_attrs_parse.isra.0+0x1aa/0x280 [ 755.033645][T28656] genl_family_rcv_msg_doit+0x214/0x300 [ 755.033685][T28656] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 755.033721][T28656] ? genl_get_cmd+0x3ef/0x720 [ 755.033761][T28656] ? bpf_lsm_capable+0x9/0x10 [ 755.033785][T28656] ? security_capable+0x80/0x260 [ 755.033819][T28656] ? ns_capable+0xd2/0xf0 [ 755.033844][T28656] genl_rcv_msg+0x560/0x800 [ 755.033883][T28656] ? __pfx_genl_rcv_msg+0x10/0x10 [ 755.033919][T28656] ? __pfx_hwsim_new_radio_nl+0x10/0x10 [ 755.033964][T28656] netlink_rcv_skb+0x159/0x420 [ 755.033995][T28656] ? __pfx_genl_rcv_msg+0x10/0x10 [ 755.034038][T28656] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 755.034082][T28656] ? netlink_deliver_tap+0x1ae/0xcc0 [ 755.034116][T28656] genl_rcv+0x28/0x40 [ 755.034148][T28656] netlink_unicast+0x5aa/0x870 [ 755.034184][T28656] ? __pfx_netlink_unicast+0x10/0x10 [ 755.034215][T28656] ? __pfx___might_resched+0x10/0x10 [ 755.034250][T28656] ? __lock_acquire+0x4a5/0x2630 [ 755.034288][T28656] netlink_sendmsg+0x8b0/0xda0 [ 755.034325][T28656] ? __pfx_netlink_sendmsg+0x10/0x10 [ 755.034355][T28656] ? __import_iovec+0x1d2/0x640 [ 755.034381][T28656] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 755.034419][T28656] ____sys_sendmsg+0xa54/0xc30 [ 755.034459][T28656] ? __pfx_____sys_sendmsg+0x10/0x10 [ 755.034501][T28656] ? __pfx_futex_wake_mark+0x10/0x10 [ 755.034543][T28656] ___sys_sendmsg+0x190/0x1e0 [ 755.034583][T28656] ? __pfx____sys_sendmsg+0x10/0x10 [ 755.034665][T28656] __sys_sendmsg+0x170/0x220 [ 755.034695][T28656] ? __pfx___sys_sendmsg+0x10/0x10 [ 755.034724][T28656] ? __x64_sys_futex+0x34f/0x4d0 [ 755.034773][T28656] do_syscall_64+0x106/0xf80 [ 755.034801][T28656] ? clear_bhb_loop+0x40/0x90 [ 755.034832][T28656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 755.034857][T28656] RIP: 0033:0x7efe22f9c799 [ 755.034876][T28656] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 755.034900][T28656] RSP: 002b:00007efe23f06028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 755.034923][T28656] RAX: ffffffffffffffda RBX: 00007efe23215fa0 RCX: 00007efe22f9c799 [ 755.034939][T28656] RDX: 0000000000040800 RSI: 00002000000000c0 RDI: 0000000000000003 [ 755.034954][T28656] RBP: 00007efe23032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 755.034969][T28656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 755.034984][T28656] R13: 00007efe23216038 R14: 00007efe23215fa0 R15: 00007fff214c2848 [ 755.035016][T28656] [ 755.726554][T28669] FAULT_INJECTION: forcing a failure. [ 755.726554][T28669] name failslab, interval 1, probability 0, space 0, times 0 [ 755.739362][T28669] CPU: 0 UID: 0 PID: 28669 Comm: syz.0.10518 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 755.739406][T28669] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 755.739417][T28669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 755.739431][T28669] Call Trace: [ 755.739439][T28669] [ 755.739449][T28669] dump_stack_lvl+0x100/0x190 [ 755.739520][T28669] should_fail_ex.cold+0x5/0xa [ 755.739549][T28669] should_failslab+0xc2/0x120 [ 755.739574][T28669] __kvmalloc_node_noprof+0xfa/0xa00 [ 755.739612][T28669] ? vmemdup_user+0x2a/0xe0 [ 755.739658][T28669] vmemdup_user+0x2a/0xe0 [ 755.739698][T28669] path_setxattrat+0x29e/0x3b0 [ 755.739724][T28669] ? __pfx_path_setxattrat+0x10/0x10 [ 755.739753][T28669] ? __pfx_poll_select_finish+0x10/0x10 [ 755.739816][T28669] ? xfd_validate_state+0x129/0x190 [ 755.739857][T28669] __x64_sys_fsetxattr+0xc5/0x140 [ 755.739882][T28669] ? do_syscall_64+0x95/0xf80 [ 755.739910][T28669] ? lockdep_hardirqs_on+0x78/0x100 [ 755.739937][T28669] do_syscall_64+0x106/0xf80 [ 755.739964][T28669] ? clear_bhb_loop+0x40/0x90 [ 755.739994][T28669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 755.740019][T28669] RIP: 0033:0x7f729ff9c799 [ 755.740040][T28669] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 755.740064][T28669] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 755.740087][T28669] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 755.740103][T28669] RDX: 0000000000000000 RSI: 0000200000002ac0 RDI: ffffffffffffffff [ 755.740119][T28669] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 755.740134][T28669] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 755.740148][T28669] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 755.740179][T28669] [ 756.074633][T28674] FAULT_INJECTION: forcing a failure. [ 756.074633][T28674] name failslab, interval 1, probability 0, space 0, times 0 [ 756.087443][T28674] CPU: 0 UID: 0 PID: 28674 Comm: syz.1.10521 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 756.087524][T28674] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 756.087535][T28674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 756.087550][T28674] Call Trace: [ 756.087558][T28674] [ 756.087568][T28674] dump_stack_lvl+0x100/0x190 [ 756.087610][T28674] should_fail_ex.cold+0x5/0xa [ 756.087638][T28674] should_failslab+0xc2/0x120 [ 756.087663][T28674] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 756.087700][T28674] ? security_file_alloc+0x34/0x2c0 [ 756.087724][T28674] ? trace_kmem_cache_alloc+0xf3/0x120 [ 756.087754][T28674] security_file_alloc+0x34/0x2c0 [ 756.087778][T28674] init_file+0x95/0x480 [ 756.087806][T28674] alloc_empty_file+0x73/0x1c0 [ 756.087836][T28674] alloc_file_pseudo+0x13a/0x230 [ 756.087867][T28674] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 756.087899][T28674] ? _raw_spin_unlock+0x28/0x50 [ 756.087923][T28674] ? alloc_fd+0x476/0x790 [ 756.087947][T28674] __anon_inode_getfile+0xe8/0x280 [ 756.087978][T28674] __anon_inode_getfd+0x5c/0xe0 [ 756.088010][T28674] do_inotify_init+0x483/0x5e0 [ 756.088044][T28674] __x64_sys_inotify_init1+0x30/0x40 [ 756.088077][T28674] do_syscall_64+0x106/0xf80 [ 756.088104][T28674] ? clear_bhb_loop+0x40/0x90 [ 756.088134][T28674] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 756.088159][T28674] RIP: 0033:0x7f8f51f9c799 [ 756.088191][T28674] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 756.088214][T28674] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000126 [ 756.088235][T28674] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 756.088251][T28674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0003000000000000 [ 756.088265][T28674] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 756.088279][T28674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 756.088293][T28674] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 756.088322][T28674] [ 756.943565][T28693] FAULT_INJECTION: forcing a failure. [ 756.943565][T28693] name failslab, interval 1, probability 0, space 0, times 0 [ 756.943630][T28693] CPU: 0 UID: 0 PID: 28693 Comm: syz.1.10531 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 756.943670][T28693] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 756.943680][T28693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 756.943694][T28693] Call Trace: [ 756.943701][T28693] [ 756.943710][T28693] dump_stack_lvl+0x100/0x190 [ 756.943768][T28693] should_fail_ex.cold+0x5/0xa [ 756.943811][T28693] should_failslab+0xc2/0x120 [ 756.943835][T28693] __kmalloc_cache_noprof+0x7a/0x6f0 [ 756.943865][T28693] ? assoc_array_delete+0x101/0xd10 [ 756.943894][T28693] ? __lock_acquire+0x4a5/0x2630 [ 756.943929][T28693] assoc_array_delete+0x101/0xd10 [ 756.943965][T28693] ? __pfx_assoc_array_delete+0x10/0x10 [ 756.944006][T28693] ? __pfx_down_write+0x10/0x10 [ 756.944037][T28693] ? __sys_bind+0x1c7/0x260 [ 756.944079][T28693] key_unlink+0xbc/0x310 [ 756.944105][T28693] ? __pfx_key_unlink+0x10/0x10 [ 756.944133][T28693] ? xfd_validate_state+0x129/0x190 [ 756.944171][T28693] keyctl_keyring_unlink+0xdc/0x1b0 [ 756.944203][T28693] __do_sys_keyctl+0x3dd/0x5a0 [ 756.944239][T28693] do_syscall_64+0x106/0xf80 [ 756.944265][T28693] ? clear_bhb_loop+0x40/0x90 [ 756.944294][T28693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 756.944318][T28693] RIP: 0033:0x7f8f51f9c799 [ 756.944336][T28693] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 756.944359][T28693] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 756.944381][T28693] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 756.944397][T28693] RDX: 7ffffffffffffffb RSI: fffffffffffffffd RDI: 0000000000000009 [ 756.944411][T28693] RBP: 00007f8f52032bd9 R08: 8000000000000000 R09: 0000000000000000 [ 756.944426][T28693] R10: 080000000000000b R11: 0000000000000246 R12: 0000000000000000 [ 756.944447][T28693] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 756.944478][T28693] [ 758.372937][T28738] bridge0: port 3(batadv0) entered blocking state [ 758.387400][T28738] bridge0: port 3(batadv0) entered disabled state [ 758.405820][T28738] batadv0: entered allmulticast mode [ 758.423669][T28738] batadv0: entered promiscuous mode [ 758.436241][T28738] bridge0: port 3(batadv0) entered blocking state [ 758.442937][T28738] bridge0: port 3(batadv0) entered forwarding state [ 758.589592][T28743] netlink: 16 bytes leftover after parsing attributes in process `syz.3.10553'. [ 758.849793][T16231] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 758.859444][T16231] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 759.001928][T28753] FAULT_INJECTION: forcing a failure. [ 759.001928][T28753] name failslab, interval 1, probability 0, space 0, times 0 [ 759.076263][T28753] CPU: 0 UID: 0 PID: 28753 Comm: syz.0.10558 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 759.076307][T28753] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 759.076318][T28753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 759.076332][T28753] Call Trace: [ 759.076339][T28753] [ 759.076348][T28753] dump_stack_lvl+0x100/0x190 [ 759.076388][T28753] should_fail_ex.cold+0x5/0xa [ 759.076416][T28753] should_failslab+0xc2/0x120 [ 759.076441][T28753] __kmalloc_cache_noprof+0x7a/0x6f0 [ 759.076471][T28753] ? allocate_file_region_entries+0x1a0/0x620 [ 759.076513][T28753] allocate_file_region_entries+0x1a0/0x620 [ 759.076556][T28753] ? __pfx_allocate_file_region_entries+0x10/0x10 [ 759.076601][T28753] region_chg+0x85/0x140 [ 759.076636][T28753] __vma_reservation_common+0x376/0x720 [ 759.076694][T28753] ? __pfx___vma_reservation_common+0x10/0x10 [ 759.076733][T28753] ? __pfx___might_resched+0x10/0x10 [ 759.076775][T28753] hugetlb_no_page+0xb2b/0x1970 [ 759.076814][T28753] hugetlb_fault+0x5df/0x1450 [ 759.076847][T28753] ? __pfx_hugetlb_fault+0x10/0x10 [ 759.076888][T28753] ? find_vma+0xbf/0x140 [ 759.076910][T28753] ? __pfx_find_vma+0x10/0x10 [ 759.076935][T28753] handle_mm_fault+0x5f1/0xa20 [ 759.076974][T28753] do_user_addr_fault+0x74c/0x12f0 [ 759.077022][T28753] exc_page_fault+0x6f/0xd0 [ 759.077050][T28753] asm_exc_page_fault+0x26/0x30 [ 759.077074][T28753] RIP: 0010:__put_user_4+0xd/0x20 [ 759.077101][T28753] Code: 66 89 01 31 c9 0f 01 ca e9 c0 d0 03 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca e9 97 d0 03 00 0f 1f 80 00 00 00 00 90 90 90 [ 759.077125][T28753] RSP: 0018:ffffc90006257e58 EFLAGS: 00050202 [ 759.077144][T28753] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000007 [ 759.077159][T28753] RDX: 0000000000000000 RSI: ffffffff8255f4b1 RDI: ffff88807859e15c [ 759.077174][T28753] RBP: 0000000000000002 R08: 0000000000000001 R09: 00000000000001c9 [ 759.077188][T28753] R10: 0000000000000200 R11: 0000000000000000 R12: 1ffff92000c4afce [ 759.077210][T28753] R13: 0000000000000007 R14: 0000000000000000 R15: dffffc0000000000 [ 759.077235][T28753] ? __might_fault+0x111/0x140 [ 759.077274][T28753] __do_sys_prctl+0xd67/0x2330 [ 759.077317][T28753] ? __pfx___do_sys_prctl+0x10/0x10 [ 759.077361][T28753] do_syscall_64+0x106/0xf80 [ 759.077388][T28753] ? clear_bhb_loop+0x40/0x90 [ 759.077418][T28753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 759.077442][T28753] RIP: 0033:0x7f729ff9c799 [ 759.077461][T28753] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 759.077484][T28753] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 759.077505][T28753] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 759.077521][T28753] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000002 [ 759.077535][T28753] RBP: 00007f72a0032bd9 R08: 0000000000000001 R09: 0000000000000000 [ 759.077550][T28753] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000000 [ 759.077564][T28753] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 759.077607][T28753] [ 760.677407][T28794] netlink: 'syz.2.10576': attribute type 2 has an invalid length. [ 761.037437][T28809] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10583'. [ 761.157327][T28813] netlink: 12 bytes leftover after parsing attributes in process `syz.2.10585'. [ 761.946554][T28841] FAULT_INJECTION: forcing a failure. [ 761.946554][T28841] name failslab, interval 1, probability 0, space 0, times 0 [ 761.993618][T28841] CPU: 0 UID: 0 PID: 28841 Comm: syz.0.10598 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 761.993660][T28841] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 761.993671][T28841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 761.993685][T28841] Call Trace: [ 761.993693][T28841] [ 761.993702][T28841] dump_stack_lvl+0x100/0x190 [ 761.993742][T28841] should_fail_ex.cold+0x5/0xa [ 761.993769][T28841] should_failslab+0xc2/0x120 [ 761.993793][T28841] __kmalloc_node_track_caller_noprof+0xe3/0x850 [ 761.993832][T28841] ? snd_timer_instance_new+0x65/0x2e0 [ 761.993875][T28841] kstrdup+0x51/0xe0 [ 761.993913][T28841] snd_timer_instance_new+0x65/0x2e0 [ 761.993958][T28841] __snd_timer_user_ioctl.isra.0+0xbe6/0x27c0 [ 761.993987][T28841] ? __pfx___snd_timer_user_ioctl.isra.0+0x10/0x10 [ 761.994018][T28841] ? rcu_is_watching+0x12/0xc0 [ 761.994061][T28841] ? snd_timer_user_ioctl+0x4a/0xd0 [ 761.994084][T28841] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 761.994120][T28841] ? __pfx___mutex_lock+0x10/0x10 [ 761.994153][T28841] ? find_held_lock+0x2b/0x80 [ 761.994189][T28841] snd_timer_user_ioctl+0x76/0xd0 [ 761.994211][T28841] ? __pfx_snd_timer_user_ioctl+0x10/0x10 [ 761.994237][T28841] __x64_sys_ioctl+0x18e/0x210 [ 761.994272][T28841] do_syscall_64+0x106/0xf80 [ 761.994298][T28841] ? clear_bhb_loop+0x40/0x90 [ 761.994327][T28841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 761.994351][T28841] RIP: 0033:0x7f729ff9c799 [ 761.994371][T28841] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 761.994393][T28841] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 761.994415][T28841] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 761.994431][T28841] RDX: 0000200000000080 RSI: 0000000040345410 RDI: 0000000000000003 [ 761.994445][T28841] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 761.994460][T28841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 761.994473][T28841] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 761.994503][T28841] [ 763.214017][T28869] bridge0: port 4(ipvlan0) entered blocking state [ 763.265743][T28869] bridge0: port 4(ipvlan0) entered disabled state [ 763.304127][T28869] ipvlan0: entered allmulticast mode [ 763.327830][T28869] veth0_vlan: entered allmulticast mode [ 763.368065][T28869] ipvlan0: left allmulticast mode [ 763.404987][T28869] veth0_vlan: left allmulticast mode [ 764.218210][T28851] kexec: Could not allocate control_code_buffer [ 764.636774][T28907] netlink: 206 bytes leftover after parsing attributes in process `syz.1.10627'. [ 765.600925][T28941] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10645'. [ 765.622572][T28943] FAULT_INJECTION: forcing a failure. [ 765.622572][T28943] name failslab, interval 1, probability 0, space 0, times 0 [ 765.690039][T28943] CPU: 0 UID: 0 PID: 28943 Comm: syz.0.10643 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 765.690085][T28943] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 765.690097][T28943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 765.690111][T28943] Call Trace: [ 765.690119][T28943] [ 765.690128][T28943] dump_stack_lvl+0x100/0x190 [ 765.690169][T28943] should_fail_ex.cold+0x5/0xa [ 765.690196][T28943] should_failslab+0xc2/0x120 [ 765.690221][T28943] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 765.690257][T28943] ? alloc_empty_file+0x55/0x1c0 [ 765.690292][T28943] alloc_empty_file+0x55/0x1c0 [ 765.690322][T28943] alloc_file_pseudo+0x13a/0x230 [ 765.690354][T28943] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 765.690386][T28943] ? _raw_spin_unlock+0x28/0x50 [ 765.690409][T28943] ? alloc_fd+0x476/0x790 [ 765.690434][T28943] __anon_inode_getfile+0xe8/0x280 [ 765.690465][T28943] do_epoll_create+0x329/0x4b0 [ 765.690489][T28943] __x64_sys_epoll_create+0x45/0x70 [ 765.690514][T28943] do_syscall_64+0x106/0xf80 [ 765.690551][T28943] ? clear_bhb_loop+0x40/0x90 [ 765.690581][T28943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 765.690606][T28943] RIP: 0033:0x7f729ff9c799 [ 765.690625][T28943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 765.690650][T28943] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d5 [ 765.690672][T28943] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 765.690688][T28943] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000000003e [ 765.690703][T28943] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 765.690718][T28943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 765.690732][T28943] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 765.690763][T28943] [ 765.935510][T28945] bridge0: port 4(bond0) entered blocking state [ 765.941947][T28945] bridge0: port 4(bond0) entered disabled state [ 765.948356][T28945] bond0: entered allmulticast mode [ 765.953545][T28945] bond_slave_0: entered allmulticast mode [ 765.959369][T28945] bond_slave_1: entered allmulticast mode [ 765.967064][T28945] bond0: entered promiscuous mode [ 765.972172][T28945] bond_slave_0: entered promiscuous mode [ 765.978276][T28945] bond_slave_1: entered promiscuous mode [ 765.984598][T28945] bridge0: port 4(bond0) entered blocking state [ 765.990947][T28945] bridge0: port 4(bond0) entered forwarding state [ 767.377149][T28991] Invalid ELF header magic: != ELF [ 770.488794][T29091] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10713'. [ 771.541976][ T30] audit: type=1800 audit(4294967341.098:36): pid=29125 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.10729" name="dbroot" dev="configfs" ino=81414 res=0 errno=0 [ 774.858682][T29212] FAULT_INJECTION: forcing a failure. [ 774.858682][T29212] name failslab, interval 1, probability 0, space 0, times 0 [ 774.968589][T29212] CPU: 0 UID: 0 PID: 29212 Comm: syz.3.10768 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 774.968634][T29212] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 774.968645][T29212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 774.968660][T29212] Call Trace: [ 774.968667][T29212] [ 774.968676][T29212] dump_stack_lvl+0x100/0x190 [ 774.968725][T29212] should_fail_ex.cold+0x5/0xa [ 774.968754][T29212] should_failslab+0xc2/0x120 [ 774.968779][T29212] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 774.968815][T29212] ? ptlock_alloc+0x1f/0x70 [ 774.968852][T29212] ptlock_alloc+0x1f/0x70 [ 774.968882][T29212] pte_alloc_one+0x84/0x3e0 [ 774.968910][T29212] do_fault+0x8cc/0x1950 [ 774.968936][T29212] ? __pmd_alloc+0x6aa/0x9c0 [ 774.968971][T29212] __handle_mm_fault+0x180f/0x2b60 [ 774.969007][T29212] ? mt_find+0x45e/0x8e0 [ 774.969040][T29212] ? __pfx___handle_mm_fault+0x10/0x10 [ 774.969071][T29212] ? __pfx_mt_find+0x10/0x10 [ 774.969117][T29212] ? find_vma+0xbf/0x140 [ 774.969138][T29212] ? __pfx_find_vma+0x10/0x10 [ 774.969163][T29212] handle_mm_fault+0x36d/0xa20 [ 774.969201][T29212] do_user_addr_fault+0x74c/0x12f0 [ 774.969249][T29212] exc_page_fault+0x6f/0xd0 [ 774.969277][T29212] asm_exc_page_fault+0x26/0x30 [ 774.969301][T29212] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 774.969338][T29212] Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 fd 93 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 [ 774.969362][T29212] RSP: 0018:ffffc900061c7d90 EFLAGS: 00050216 [ 774.969382][T29212] RAX: 0000000000000001 RBX: 0000000000001298 RCX: 0000000000000020 [ 774.969396][T29212] RDX: 0000000000000001 RSI: 0000000000001298 RDI: ffffc900061c7e30 [ 774.969411][T29212] RBP: 0000000000000020 R08: 0000000000000001 R09: fffff52000c38fc9 [ 774.969426][T29212] R10: ffffc900061c7e4f R11: 0000000000000000 R12: 0000000000000000 [ 774.969440][T29212] R13: ffffc900061c7e30 R14: ffffc900061c7e30 R15: dffffc0000000000 [ 774.969471][T29212] _copy_from_user+0x98/0xd0 [ 774.969520][T29212] do_fcntl+0xf0c/0x1670 [ 774.969552][T29212] ? __pfx_do_fcntl+0x10/0x10 [ 774.969580][T29212] ? __fget_files+0x215/0x3d0 [ 774.969616][T29212] ? tomoyo_file_fcntl+0x6c/0xc0 [ 774.969652][T29212] __x64_sys_fcntl+0x163/0x200 [ 774.969687][T29212] do_syscall_64+0x106/0xf80 [ 774.969721][T29212] ? clear_bhb_loop+0x40/0x90 [ 774.969751][T29212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 774.969777][T29212] RIP: 0033:0x7fa69819c799 [ 774.969795][T29212] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 774.969819][T29212] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 774.969841][T29212] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 774.969857][T29212] RDX: 0000000000001298 RSI: 0000000000000026 RDI: 0000000000000003 [ 774.969871][T29212] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 774.969885][T29212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 774.969900][T29212] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 774.969931][T29212] [ 777.066279][T29254] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10787'. [ 777.266250][T29260] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10790'. [ 783.024057][T29396] FAULT_INJECTION: forcing a failure. [ 783.024057][T29396] name failslab, interval 1, probability 0, space 0, times 0 [ 783.082599][T29396] CPU: 0 UID: 0 PID: 29396 Comm: syz.3.10851 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 783.082646][T29396] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 783.082657][T29396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 783.082672][T29396] Call Trace: [ 783.082680][T29396] [ 783.082689][T29396] dump_stack_lvl+0x100/0x190 [ 783.082731][T29396] should_fail_ex.cold+0x5/0xa [ 783.082759][T29396] should_failslab+0xc2/0x120 [ 783.082784][T29396] __kmalloc_cache_noprof+0x7a/0x6f0 [ 783.082816][T29396] ? do_signalfd4+0x14e/0x480 [ 783.082850][T29396] do_signalfd4+0x14e/0x480 [ 783.082882][T29396] __x64_sys_signalfd+0x120/0x1a0 [ 783.082911][T29396] ? __pfx___x64_sys_signalfd+0x10/0x10 [ 783.082950][T29396] do_syscall_64+0x106/0xf80 [ 783.082985][T29396] ? clear_bhb_loop+0x40/0x90 [ 783.083015][T29396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 783.083040][T29396] RIP: 0033:0x7fa69819c799 [ 783.083059][T29396] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 783.083083][T29396] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 000000000000011a [ 783.083106][T29396] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 783.083122][T29396] RDX: 0000000000000008 RSI: 00002000000000c0 RDI: ffffffffffffffff [ 783.083137][T29396] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 783.083152][T29396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 783.083166][T29396] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 783.083197][T29396] [ 783.539395][T29403] FAULT_INJECTION: forcing a failure. [ 783.539395][T29403] name failslab, interval 1, probability 0, space 0, times 0 [ 783.576171][T29403] CPU: 0 UID: 0 PID: 29403 Comm: syz.3.10854 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 783.576214][T29403] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 783.576226][T29403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 783.576240][T29403] Call Trace: [ 783.576248][T29403] [ 783.576257][T29403] dump_stack_lvl+0x100/0x190 [ 783.576298][T29403] should_fail_ex.cold+0x5/0xa [ 783.576326][T29403] should_failslab+0xc2/0x120 [ 783.576350][T29403] __kmalloc_cache_noprof+0x7a/0x6f0 [ 783.576382][T29403] ? do_kimage_alloc_init+0x40/0x320 [ 783.576411][T29403] do_kimage_alloc_init+0x40/0x320 [ 783.576434][T29403] do_kexec_load+0x11b/0x810 [ 783.576463][T29403] ? __pfx_do_kexec_load+0x10/0x10 [ 783.576492][T29403] ? _copy_from_user+0x59/0xd0 [ 783.576534][T29403] __x64_sys_kexec_load+0x1bf/0x230 [ 783.576563][T29403] do_syscall_64+0x106/0xf80 [ 783.576590][T29403] ? clear_bhb_loop+0x40/0x90 [ 783.576620][T29403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 783.576644][T29403] RIP: 0033:0x7fa69819c799 [ 783.576664][T29403] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 783.576688][T29403] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 783.576711][T29403] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 783.576727][T29403] RDX: 0000200000000040 RSI: 0000000000000002 RDI: 0000000000000005 [ 783.576742][T29403] RBP: 00007fa698232bd9 R08: 0000000000000000 R09: 0000000000000000 [ 783.576757][T29403] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 783.576771][T29403] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 783.576802][T29403] [ 783.949758][T29410] sctp: [Deprecated]: syz.3.10857 (pid 29410) Use of int in maxseg socket option. [ 783.949758][T29410] Use struct sctp_assoc_value instead [ 787.865237][T29501] FAULT_INJECTION: forcing a failure. [ 787.865237][T29501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 787.929189][T29501] CPU: 0 UID: 0 PID: 29501 Comm: syz.1.10899 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 787.929235][T29501] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 787.929246][T29501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 787.929261][T29501] Call Trace: [ 787.929268][T29501] [ 787.929278][T29501] dump_stack_lvl+0x100/0x190 [ 787.929319][T29501] should_fail_ex.cold+0x5/0xa [ 787.929359][T29501] ? prepare_alloc_pages+0x16d/0x5f0 [ 787.929389][T29501] should_fail_alloc_page+0xeb/0x140 [ 787.929417][T29501] prepare_alloc_pages+0x1f0/0x5f0 [ 787.929449][T29501] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 787.929494][T29501] ? __lock_acquire+0x4a5/0x2630 [ 787.929542][T29501] ? futex_unqueue+0x13d/0x2c0 [ 787.929575][T29501] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 787.929618][T29501] ? find_held_lock+0x2b/0x80 [ 787.929639][T29501] ? __debug_object_init+0x2de/0x3d0 [ 787.929677][T29501] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 787.929703][T29501] ? lockdep_hardirqs_on+0x78/0x100 [ 787.929731][T29501] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 787.929763][T29501] ? __debug_object_init+0x2de/0x3d0 [ 787.929795][T29501] ? __might_fault+0xc5/0x140 [ 787.929830][T29501] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 787.929873][T29501] ? policy_nodemask+0xed/0x4f0 [ 787.929900][T29501] alloc_pages_mpol+0x1fb/0x550 [ 787.929926][T29501] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 787.929952][T29501] ? ktime_add_safe+0x60/0x70 [ 787.929986][T29501] ? __do_sys_futex_waitv+0x12e/0x2c0 [ 787.930018][T29501] ___kmalloc_large_node+0x104/0x150 [ 787.930044][T29501] ? futex2_setup_timeout+0x1c2/0x2d0 [ 787.930077][T29501] __kmalloc_large_node_noprof+0x1c/0x70 [ 787.930105][T29501] ? do_futex+0x192/0x350 [ 787.930135][T29501] __kmalloc_noprof+0x5be/0x850 [ 787.930178][T29501] __do_sys_futex_waitv+0x12e/0x2c0 [ 787.930212][T29501] ? __pfx___do_sys_futex_waitv+0x10/0x10 [ 787.930249][T29501] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 787.930291][T29501] do_syscall_64+0x106/0xf80 [ 787.930319][T29501] ? clear_bhb_loop+0x40/0x90 [ 787.930348][T29501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 787.930373][T29501] RIP: 0033:0x7f8f51f9c799 [ 787.930392][T29501] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 787.930416][T29501] RSP: 002b:00007f8f52dc1028 EFLAGS: 00000246 ORIG_RAX: 00000000000001c1 [ 787.930439][T29501] RAX: ffffffffffffffda RBX: 00007f8f52215fa0 RCX: 00007f8f51f9c799 [ 787.930455][T29501] RDX: 0000000000000000 RSI: 0000000000000040 RDI: 00002000000004c0 [ 787.930470][T29501] RBP: 00007f8f52032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 787.930485][T29501] R10: 0000200000000500 R11: 0000000000000246 R12: 0000000000000000 [ 787.930499][T29501] R13: 00007f8f52216038 R14: 00007f8f52215fa0 R15: 00007fff9e4b32f8 [ 787.930530][T29501] [ 788.753740][T29507] FAULT_INJECTION: forcing a failure. [ 788.753740][T29507] name failslab, interval 1, probability 0, space 0, times 0 [ 788.843617][T29507] CPU: 0 UID: 0 PID: 29507 Comm: syz.0.10902 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 788.843663][T29507] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 788.843674][T29507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 788.843689][T29507] Call Trace: [ 788.843697][T29507] [ 788.843705][T29507] dump_stack_lvl+0x100/0x190 [ 788.843747][T29507] should_fail_ex.cold+0x5/0xa [ 788.843775][T29507] should_failslab+0xc2/0x120 [ 788.843800][T29507] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 788.843836][T29507] ? copy_net_ns+0xe8/0x7c0 [ 788.843874][T29507] copy_net_ns+0xe8/0x7c0 [ 788.843905][T29507] ? copy_cgroup_ns+0x71/0x970 [ 788.843935][T29507] create_new_namespaces+0x3ea/0xac0 [ 788.843967][T29507] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 788.843995][T29507] ksys_unshare+0x473/0xad0 [ 788.844028][T29507] ? __pfx_ksys_unshare+0x10/0x10 [ 788.844068][T29507] __x64_sys_unshare+0x31/0x40 [ 788.844099][T29507] do_syscall_64+0x106/0xf80 [ 788.844127][T29507] ? clear_bhb_loop+0x40/0x90 [ 788.844156][T29507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 788.844181][T29507] RIP: 0033:0x7f729ff9c799 [ 788.844200][T29507] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 788.844224][T29507] RSP: 002b:00007f72a0f44028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 788.844247][T29507] RAX: ffffffffffffffda RBX: 00007f72a0215fa0 RCX: 00007f729ff9c799 [ 788.844263][T29507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 788.844277][T29507] RBP: 00007f72a0032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 788.844292][T29507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 788.844306][T29507] R13: 00007f72a0216038 R14: 00007f72a0215fa0 R15: 00007ffcbc57c248 [ 788.844337][T29507] [ 789.886874][T29527] netlink: 16 bytes leftover after parsing attributes in process `syz.0.10914'. [ 792.847873][T29609] netlink: 346 bytes leftover after parsing attributes in process `syz.1.10944'. [ 794.258276][T16375] Bluetooth: hci1: unexpected event 0x3e length: 726 > 260 [ 794.258312][T16375] Bluetooth: hci1: unexpected subevent 0x0d length: 725 > 260 [ 794.273409][T16375] Bluetooth: hci1: Unknown advertising packet type: 0x7f [ 794.273433][T16375] Bluetooth: hci1: adv larger than maximum supported [ 794.280765][T16375] Bluetooth: hci1: adv larger than maximum supported [ 794.288797][T16375] Bluetooth: hci1: Malformed LE Event: 0x0d [ 795.128984][T29687] sctp: [Deprecated]: syz.3.10970 (pid 29687) Use of int in max_burst socket option. [ 795.128984][T29687] Use struct sctp_assoc_value instead [ 795.819570][T29711] netlink: 'syz.0.10982': attribute type 33 has an invalid length. [ 796.097021][T29708] zswap: compressor not available [ 796.293456][T29722] netlink: 29 bytes leftover after parsing attributes in process `syz.3.10987'. [ 796.758956][T29737] FAULT_INJECTION: forcing a failure. [ 796.758956][T29737] name failslab, interval 1, probability 0, space 0, times 0 [ 796.817186][T29737] CPU: 0 UID: 0 PID: 29737 Comm: syz.3.10995 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 796.817231][T29737] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 796.817242][T29737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 796.817257][T29737] Call Trace: [ 796.817264][T29737] [ 796.817274][T29737] dump_stack_lvl+0x100/0x190 [ 796.817318][T29737] should_fail_ex.cold+0x5/0xa [ 796.817346][T29737] should_failslab+0xc2/0x120 [ 796.817371][T29737] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 796.817407][T29737] ? key_alloc+0x3c5/0x1310 [ 796.817429][T29737] ? rcu_is_watching+0x12/0xc0 [ 796.817472][T29737] key_alloc+0x3c5/0x1310 [ 796.817505][T29737] ? __pfx_key_alloc+0x10/0x10 [ 796.817536][T29737] keyring_alloc+0x44/0xc0 [ 796.817566][T29737] lookup_user_key+0x9b8/0x1300 [ 796.817608][T29737] ? __pfx_lookup_user_key+0x10/0x10 [ 796.817646][T29737] ? do_futex+0x192/0x350 [ 796.817685][T29737] ? __pfx_do_futex+0x10/0x10 [ 796.817724][T29737] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 796.817767][T29737] ? __x64_sys_futex+0x34f/0x4d0 [ 796.817798][T29737] ? __x64_sys_futex+0x358/0x4d0 [ 796.817840][T29737] keyctl_watch_key+0x52/0x500 [ 796.817880][T29737] __do_sys_keyctl+0x29f/0x5a0 [ 796.817917][T29737] do_syscall_64+0x106/0xf80 [ 796.817950][T29737] ? clear_bhb_loop+0x40/0x90 [ 796.817980][T29737] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.818005][T29737] RIP: 0033:0x7fa69819c799 [ 796.818025][T29737] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 796.818048][T29737] RSP: 002b:00007fa6990b1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 796.818071][T29737] RAX: ffffffffffffffda RBX: 00007fa698415fa0 RCX: 00007fa69819c799 [ 796.818087][T29737] RDX: 0000000000000005 RSI: ffffffffffffffff RDI: 0200000000000020 [ 796.818102][T29737] RBP: 00007fa698232bd9 R08: 0000000000000008 R09: 0000000000000000 [ 796.818117][T29737] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000000 [ 796.818131][T29737] R13: 00007fa698416038 R14: 00007fa698415fa0 R15: 00007fff2d86b748 [ 796.818162][T29737] [ 797.251432][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.264494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.277800][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.290442][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.303043][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.315556][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.328083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.340641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.353250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 797.365882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.232984][ C0] net_ratelimit: 10296 callbacks suppressed [ 802.233005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.251784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.264434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.276943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.289466][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.302220][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.314763][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.327264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.339848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 802.352409][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.217044][ C0] net_ratelimit: 10435 callbacks suppressed [ 807.217066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.235552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.248146][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.260648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.273189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.285666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.298192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.310682][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.323250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 807.335791][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 810.445361][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 810.567099][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 812.201173][ C0] net_ratelimit: 10046 callbacks suppressed [ 812.201194][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.220264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.232838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.245362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.257790][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.270298][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.282823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.295351][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.307795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 812.320441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.185261][ C0] net_ratelimit: 9867 callbacks suppressed [ 817.185283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.203865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.216519][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.229083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.241776][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.254323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.266839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.279330][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.291852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 817.304512][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.169229][ C0] net_ratelimit: 10232 callbacks suppressed [ 822.169250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.187820][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.200418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.212949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.225430][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.238036][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.250734][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.263297][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.275739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 822.288133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.153413][ C0] net_ratelimit: 10497 callbacks suppressed [ 827.153433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.171867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.184332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.196916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.209609][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.222271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.234786][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.247393][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.259967][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 827.272573][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.137500][ C0] net_ratelimit: 10501 callbacks suppressed [ 832.137521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.156004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.168497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.181028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.194069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.206669][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.219174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.231632][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.244139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 832.256978][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.121847][ C0] net_ratelimit: 10498 callbacks suppressed [ 837.121868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.140591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.153072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.165482][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.177983][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.190536][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.203024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.215565][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.228064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 837.240712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.105914][ C0] net_ratelimit: 10523 callbacks suppressed [ 842.105935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.124385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.136917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.149460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.162124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.174729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.187216][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.199797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.212352][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 842.224929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.089920][ C0] net_ratelimit: 10598 callbacks suppressed [ 847.089941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.108483][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.121067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.133836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.146461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.159166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.171992][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.184829][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.197392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 847.210022][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.074015][ C0] net_ratelimit: 10585 callbacks suppressed [ 852.074036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.093155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.105952][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.118461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.131047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.143632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.156197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.168824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.181333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 852.193861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.058307][ C0] net_ratelimit: 10493 callbacks suppressed [ 857.058327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.076771][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.089278][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.101756][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.114307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.126857][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.139394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.151943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.164502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 857.177882][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.041984][ C0] net_ratelimit: 10500 callbacks suppressed [ 862.042006][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.060666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.073306][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.086049][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.098686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.111162][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.123583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.136125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.148795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 862.161280][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 866.693041][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 867.026207][ C0] net_ratelimit: 10472 callbacks suppressed [ 867.026227][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.044696][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.057405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.070063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.082491][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.094962][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.107540][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.120010][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.132423][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 867.144965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.010219][ C0] net_ratelimit: 10510 callbacks suppressed [ 872.010240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.028826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.041405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.053854][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.066254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.078835][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.091446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.103967][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.116747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 872.129283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 876.994509][ C0] net_ratelimit: 10466 callbacks suppressed [ 876.994530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.013156][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.025682][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.038133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.050570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.063066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.076013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.088468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.100936][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 877.113544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.978363][ C0] net_ratelimit: 10496 callbacks suppressed [ 881.978385][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 881.996820][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.010272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.022814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.035447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.048054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.060616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.073295][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.085897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 882.098441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.962466][ C0] net_ratelimit: 10539 callbacks suppressed [ 886.962488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.980886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 886.993365][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.005863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.018338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.030882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.044893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.057567][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.070062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 887.082583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.946402][ C0] net_ratelimit: 10657 callbacks suppressed [ 891.946422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.964913][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.977374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 891.990121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.002889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.015448][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.027884][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.040398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.053025][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 892.065530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.930532][ C0] net_ratelimit: 10667 callbacks suppressed [ 896.930553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.948994][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.961494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.974081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.986583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 896.999104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.011580][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.024046][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.036501][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 897.048939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.914644][ C0] net_ratelimit: 10555 callbacks suppressed [ 901.914665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.933123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.945675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.958177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.970893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.983401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 901.995885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.008364][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.020849][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 902.033458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.898928][ C0] net_ratelimit: 10557 callbacks suppressed [ 906.898949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.917384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.929965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.942658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.955123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.967640][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.980208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 906.992772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.005240][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 907.017669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.883083][ C0] net_ratelimit: 10671 callbacks suppressed [ 911.883104][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.901542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.914136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.926708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.939112][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.951561][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.964050][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.976536][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 911.988943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 912.001447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 914.210774][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 914.956702][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 914.963706][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5824/1:b..l [ 914.972171][ C0] rcu: (detected by 0, t=10502 jiffies, g=167525, q=791 ncpus=1) [ 914.980004][ C0] task:syz-executor state:R running task stack:23656 pid:5824 tgid:5824 ppid:5817 task_flags:0x400140 flags:0x00080000 [ 914.994692][ C0] Call Trace: [ 914.997990][ C0] [ 915.000934][ C0] __schedule+0xfee/0x6120 [ 915.005379][ C0] ? stack_depot_save_flags+0x27/0x9d0 [ 915.010895][ C0] ? kasan_save_track+0x14/0x30 [ 915.015780][ C0] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 915.021448][ C0] ? ptlock_alloc+0x1f/0x70 [ 915.026057][ C0] ? pte_alloc_one+0x84/0x3e0 [ 915.030753][ C0] ? __pte_alloc+0x6d/0x3f0 [ 915.035290][ C0] ? __pfx___schedule+0x10/0x10 [ 915.040167][ C0] ? mark_held_locks+0x40/0x70 [ 915.044966][ C0] preempt_schedule_irq+0x50/0x90 [ 915.050014][ C0] irqentry_exit+0x17b/0x670 [ 915.054630][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 915.060639][ C0] RIP: 0010:rcu_is_watching+0x6/0xc0 [ 915.065949][ C0] Code: df e8 9e e2 86 00 eb 81 e8 c7 e2 86 00 e9 49 ff ff ff 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 53 <65> ff 05 93 6c 20 12 e8 3e a1 a0 09 48 c7 c3 a8 5c 0e 94 89 c5 83 [ 915.085565][ C0] RSP: 0018:ffffc90003b873e8 EFLAGS: 00000202 [ 915.091638][ C0] RAX: 0000000000000001 RBX: ffffc90003b87da8 RCX: ffffffff9178e301 [ 915.099614][ C0] RDX: ffffc90003b87db0 RSI: ffffc90003b87d78 RDI: ffffc90003b87480 [ 915.107592][ C0] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000007 [ 915.115586][ C0] R10: 0000000000000200 R11: 000000000000c68c R12: ffffc90003b874c0 [ 915.123646][ C0] R13: ffffc90003b87470 R14: ffffc90003b87da8 R15: ffffc90003b874a4 [ 915.131665][ C0] unwind_next_frame+0x745/0x1ea0 [ 915.136703][ C0] ? kernel_clone+0xfc/0x9a0 [ 915.141306][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 915.147465][ C0] arch_stack_walk+0x94/0xf0 [ 915.152070][ C0] ? __do_sys_clone+0xd9/0x120 [ 915.156857][ C0] stack_trace_save+0x8e/0xc0 [ 915.161555][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 915.166950][ C0] ? copy_page_range+0x602/0x6570 [ 915.172018][ C0] kasan_save_stack+0x30/0x50 [ 915.176727][ C0] ? kasan_save_stack+0x30/0x50 [ 915.181693][ C0] ? kasan_save_track+0x14/0x30 [ 915.186569][ C0] ? __kasan_slab_alloc+0x89/0x90 [ 915.191599][ C0] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 915.197244][ C0] ? vm_area_dup+0x27/0x8e0 [ 915.201767][ C0] ? dup_mmap+0x6f6/0x2180 [ 915.206197][ C0] ? copy_process+0x73d7/0x7a10 [ 915.211075][ C0] ? kernel_clone+0xfc/0x9a0 [ 915.215740][ C0] kasan_save_track+0x14/0x30 [ 915.220436][ C0] __kasan_slab_alloc+0x89/0x90 [ 915.225299][ C0] kmem_cache_alloc_noprof+0x241/0x6e0 [ 915.230779][ C0] ? vm_area_dup+0x27/0x8e0 [ 915.235389][ C0] vm_area_dup+0x27/0x8e0 [ 915.239735][ C0] dup_mmap+0x6f6/0x2180 [ 915.244043][ C0] ? __pfx_dup_mmap+0x10/0x10 [ 915.248750][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 915.254587][ C0] ? __lock_acquire+0x4a5/0x2630 [ 915.259555][ C0] ? find_held_lock+0x2b/0x80 [ 915.264244][ C0] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 915.270217][ C0] copy_process+0x73d7/0x7a10 [ 915.274927][ C0] ? __pfx_copy_process+0x10/0x10 [ 915.279972][ C0] ? do_raw_spin_lock+0x128/0x260 [ 915.285036][ C0] kernel_clone+0xfc/0x9a0 [ 915.289481][ C0] ? __pfx_kernel_clone+0x10/0x10 [ 915.294531][ C0] ? __lock_acquire+0x4a5/0x2630 [ 915.299502][ C0] ? find_held_lock+0x2b/0x80 [ 915.304190][ C0] ? __might_fault+0xc5/0x140 [ 915.308890][ C0] __do_sys_clone+0xd9/0x120 [ 915.313500][ C0] ? __pfx___do_sys_clone+0x10/0x10 [ 915.318736][ C0] do_syscall_64+0x106/0xf80 [ 915.323345][ C0] ? clear_bhb_loop+0x40/0x90 [ 915.328046][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 915.333970][ C0] RIP: 0033:0x7f729ffc5212 [ 915.338389][ C0] RSP: 002b:00007ffcbc57c460 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 915.346824][ C0] RAX: ffffffffffffffda RBX: 00007ffcbc57c460 RCX: 00007f729ffc5212 [ 915.354803][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 915.362797][ C0] RBP: 00007ffcbc57c5ec R08: 0000000000000000 R09: 0000000000000001 [ 915.370777][ C0] R10: 00005555944cc7d0 R11: 0000000000000246 R12: 0000000000000001 [ 915.378753][ C0] R13: 00000000000927c0 R14: 00000000000c3753 R15: 00007ffcbc57c640 [ 915.386746][ C0] [ 916.867235][ C0] net_ratelimit: 9482 callbacks suppressed [ 916.867256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.885791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.898319][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.910824][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.923327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.935868][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.948471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.961011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.973502][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 916.986121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.851285][ C0] net_ratelimit: 9849 callbacks suppressed [ 921.851306][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.869923][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.882528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.895096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.907779][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.920456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.933059][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.945644][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.959205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 921.971680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)