last executing test programs: 5.475362828s ago: executing program 1 (id=1882): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x14, r1, 0x351d4d5b9375e359}, 0x14}}, 0x0) (fail_nth: 4) 5.211854244s ago: executing program 4 (id=1885): openat$kvm(0xffffffffffffff9c, 0x0, 0x83, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411892f5466eb01820a43d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x18, r3, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 5.206484898s ago: executing program 1 (id=1886): r0 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x2800047e) r1 = socket$kcm(0x10, 0x7, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYRESOCT=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2, 0x0, 0x3}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xd40, 0xd2) close(r7) write$RDMA_USER_CM_CMD_CREATE_ID(r7, 0x0, 0xc1) read$FUSE(r7, &(0x7f0000001100)={0x2020, 0x0, 0x0, 0x0}, 0x2020) sendmmsg$unix(r7, &(0x7f0000000600)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000340)="4f9a277a55b77ccc0883680d9a493d5db5", 0x11}, {&(0x7f0000000380)="256ba66b155423bfbe1e5151d594aecd714671c76728c6cd1399a7987660de4ca22d7b887beefd0b3f0b05c5734b9052f299ddef3a1e9979727511950c5aeee057f54b969c06b202fda068d515d591f92face4e6d9755496b888c50e0ebc8fec3ab38f119151ea5d542f61ed075f954228c93919441709c8058d8e1ece2656c6bbefeba3395902b84a3d4371ca563ce709602446cd5950b0ad32108685f8a262838fdb9068fb1d231f44b5c106ca42b955b69dc84deb5b45ed552377576136edd8c4ee607bacf9feb39e249c1f58832939206ab9be5657b08ebaeb97ac6ea2", 0xdf}], 0x2, &(0x7f00000009c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r4, @ANYRES32=r8, @ANYRES32=0xee00, @ANYBLOB="000100382d3cd6285000"/20, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r5, @ANYRES32=r5, @ANYRES32=r5, @ANYRESHEX=0x0, @ANYRES32=r6, @ANYRES32=r6, @ANYBLOB="2c000000000000000100000001000000c753bd04e09c7275fe9f9910eee76422cae0cfa3ceee5cff7d9f0558e7173363e38ca4e2c8ef70c2146089dc2d3b2b0a53aa139eaf709087d0ca7118a169a5bc6d106f17337dce8f537b7a13c121952d980080e66ba924058314cf69496d440adf75daa06de4929cf98321618ba57a65115fbb6812c96a7676df82fb01488d485166301dcac745dbdfe8600b94a9f9171028ba6d2cb44b993014424b74ed01400e69528e3d7a3a1d6bb12f57372399505f299db3ae66bc1da465a030a31d76dfb5a723aadaab09aecfab5e9bea1a4c4b7d0478bd2003a31aaecf7d11d41e93a984b5137178ea8ef8b1e01f07b12bbe09f13d6e3125f9b8aebd979bf6de4b44ed8e5ff575ecc070d346dd5fb7ea8f8f584a93fe6a98cbc45b89fb9121bd24832a0ce63fb9b33b64a8657d2de58cb3943a", @ANYRES32=r1, @ANYRESDEC, @ANYRES32=r7, @ANYRES32=r2, @ANYRES32=r5, @ANYRES32=r1, @ANYRESOCT=r1, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=r7, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESOCT=r6, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32=r1], 0xc8, 0x20048050}}], 0x1, 0x80c1) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$kcm(0x2, 0xa, 0x2) socket$kcm(0x2, 0xa, 0x2) r9 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r9, &(0x7f0000000000)=[{&(0x7f0000000180)=""/181, 0xb5}], 0x1, 0x3c, 0x4) mount(0x0, 0x0, &(0x7f0000000040)='autofs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000010c0)={0x30, 0x5, 0x0, {0x0, 0x2, 0x5, 0x6}}, 0x30) syz_open_dev$sndmidi(&(0x7f0000000100), 0x2, 0x141121) r10 = socket$netlink(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r10, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000700)={&(0x7f0000000640)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000fbdbdf25250000000e0001006e657464657673696d0006000f0002006e657464657673696d3000007a148bbc6f6949be16ae8c840338ddf4711675cec3a7dbc5dfff6319b1ae88a5360a78bf0eff20690bd3d223e07cdd53917dccb3a6714e0ec43caf2e"], 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 5.116662398s ago: executing program 4 (id=1887): syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000080)) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000002c0)={@local, @remote}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@private=0xa010101, @loopback, @empty}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x4, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000004340)=""/102376, 0x18fe8) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r4 = syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) r5 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) kcmp(0x0, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000140)={0x1, @pix_mp={0x0, 0x0, 0x34524742, 0x0, 0x7, [{}, {0xfffffff7}, {0x9}, {}, {0x20}, {0x0, 0x4}, {0x2000000}, {0xc28f}], 0x2}}) fcntl$getflags(r3, 0xb) bind$phonet(r3, &(0x7f0000000040)={0x23, 0x19, 0x6, 0x7}, 0x10) getrlimit(0xd, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x0, 0x0, 0xffffffff}, 0x1c) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000200)={"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"}) 4.476053635s ago: executing program 4 (id=1888): syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000013906c08e90f01db9be9010203010902120001000000000904"], 0x0) r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) write$vhost_msg(r0, 0x0, 0x700) 4.280217878s ago: executing program 1 (id=1889): openat$kvm(0xffffffffffffff9c, 0x0, 0x83, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411892f5466eb01820a43d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x18) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x18, r3, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 4.156081911s ago: executing program 1 (id=1892): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0x71, 0x0, &(0x7f0000000340)="c1dfb080cd21d308098ee688bf8486220d8bf1e13982be9d26c432b7ece40703f8929f8ec5dc8ece6294346ec2269c1fbae65f9b3d592f2c70073fdac7e76fbc49b3f972844881b3867993c8253e88735f0fb2a4498c4ba9d3054e649948f42ede9a2203bb6013507a891f50453e717600", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 3.92614076s ago: executing program 1 (id=1894): syz_usb_connect$hid(0x5, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x9, 0x6, 0x0, 0x7}, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r4 = syz_open_dev$vim2m(&(0x7f0000000000), 0x3, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xe, 0x4, 0x8, 0x2, 0x44540, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x50) r5 = socket$netlink(0x10, 0x3, 0x10) timer_create(0x2, 0x0, &(0x7f0000000280)) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='timers\x00') preadv(r6, &(0x7f0000000580)=[{&(0x7f0000000200)=""/122, 0x7a}], 0x1, 0x45, 0xfffffffb) sendmsg$nl_generic(r5, &(0x7f0000001780)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001740)={0x0}, 0x1, 0x0, 0x0, 0x4051}, 0x20000800) ioctl$vim2m_VIDIOC_REQBUFS(r4, 0xc0145608, &(0x7f00000000c0)={0x1, 0x2, 0x1}) memfd_secret(0x80000) ioctl$vim2m_VIDIOC_QBUF(r4, 0xc058560f, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r4, 0x40045612, &(0x7f0000000080)=0x2) close_range(r3, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_CLEAR_HALT(r2, 0xc0105502, &(0x7f0000000300)={0x1, 0x1}) 3.792185707s ago: executing program 4 (id=1895): r0 = syz_open_dev$video4linux(&(0x7f0000000040), 0x5, 0x8000) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r0, 0xc040564a, &(0x7f0000000340)={0x0, 0x0, 0x2002, 0x0, 0x0, 0x80}) (fail_nth: 4) 3.635315851s ago: executing program 4 (id=1896): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f0000000100)=@ax25={{0x3, @null}, [@null, @null, @default, @null, @null, @rose, @null, @null]}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000540)=""/71, 0x47}, {&(0x7f00000005c0)=""/107, 0x6b}, {&(0x7f0000000640)=""/174, 0xae}, {&(0x7f0000000700)=""/219, 0xdb}, {&(0x7f0000000800)=""/4096, 0x1000}], 0x5}, 0x2}], 0x1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2f", 0x68) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e24, @local}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x40, 0x0, 0x0, 0x0, 0x1}, 0x94) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={r6, r7, 0x25, 0x0, @val=@iter={0x0}}, 0x20) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="06000000000000000000000000000000f6000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000500"/28], 0x50) r9 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x800) ioctl$SG_GET_VERSION_NUM(r9, 0x2284, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000500)=@gcm_128={{0x303}, "a95972fc5ec50719", "8e083700daf38a6d69e9b5e9c2f133d7", "6a3a05b9", "12772541f8eb02bb"}, 0x28) shutdown(r8, 0x1) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.state\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000000), 0xffffff6a) sendfile(r8, r10, 0x0, 0xffffffff004) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2, 0xe0, 0x20}, {0x10000, 0x4003, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffff7}, {0x40, 0x8, 0x8000fff, 0x8}, 0x7fffffff, 0x0, 0x1, 0x0, 0x1}, {{@in6=@mcast1, 0x2, 0x6c}, 0xa, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x5, 0x3, 0xb7, 0x0, 0x0, 0x1}}, 0xe8) syz_usb_connect(0x2, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="120100004106cd40cd060f011bd50000000109022400010000800009040bfd02337761000200048140060905870308"], 0x0) r11 = syz_usb_connect(0x2, 0x2d, 0x0, 0x0) syz_usb_control_io$hid(r11, 0x0, 0x0) 3.424000838s ago: executing program 0 (id=1898): syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000080)) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000002c0)={@local, @remote}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000440)={@private=0xa010101, @loopback, @empty}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x4, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000004340)=""/102376, 0x18fe8) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) r4 = syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) r5 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0xe, &(0x7f00000020c0)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000f0ffffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404005400ff0f1704000001130a00b7050000010000006a0af2fe0000000085000000a3000000b70000000000000095000000000000003f0c54cd844a954b26c933f7ffffffffe4fbffffff55bb2007ee51050512b5b42128aa090a79507df79f298129da487130d5f24bf901115e17392ac627c87881c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752688300000000dbc2777df150b7cdd77b85b941092314fd085f1b1b2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1efc5f9094fa737c28b994a8512c830fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d7f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db4bf23242a1f2c28179f09943b1b0452d1b72183aacf4a84f9130b701b81675dd4e9e3070756f97ad791fa99dac06c37479321a0574fb30ff0000001989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fd80f553876acb45821d0c48fb657c29b309c73f0977e7cde65a89d9458aac2795b2b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d2665016ac59dd20fde0745db06753a7ac7fe13cab6692422a47e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2084bb5d4045c9585638c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c651e24d9f679e4fbe948dfb4cc4a3894696082417304fff0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6eea7b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb77872a2cd8a104e16bb1a2bacf13464ca03aff14a9aa4bdb539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572ac45b9d3fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af00200f900cd1d0000002000000001c800000000000000000048cea769470424d28804c024ab81921f01280b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf3411718d6ee78ebf9ef40662d7836d252c566f5ee934c679dbfae9fb4a79f8a836804ed3a1079b0282a12043408816eae08cd60b687dcff91af19010000000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c74f20675eb7819441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec780f535e62f4eeee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab5009c68c73de2f04f15d005391577f480000ea65559eb00e76e9d0ada209bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2f085185cc92fe7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5d81e710d50517a59a3ad09e8802e8f4f535447cc0f"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x94) kcmp(0x0, r5, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000140)={0x1, @pix_mp={0x0, 0x0, 0x34524742, 0x0, 0x7, [{}, {0xfffffff7}, {0x9}, {}, {0x20}, {0x0, 0x4}, {0x2000000}, {0xc28f}], 0x2}}) fcntl$getflags(r3, 0xb) bind$phonet(r3, &(0x7f0000000040)={0x23, 0x19, 0x6, 0x7}, 0x10) getrlimit(0xd, &(0x7f0000000100)) socket$kcm(0x29, 0x5, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x0, 0x0, 0xffffffff}, 0x1c) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000200)={"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"}) 3.185803751s ago: executing program 0 (id=1899): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x4c}}, 0x20004000) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000000)={0x7, 0x3, 0x23, 0x8}, 0x10) read$msr(r0, &(0x7f0000004c00)=""/102392, 0x18ff8) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x4}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x3}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="00020201"], 0x18) socket$netlink(0x10, 0x3, 0x4) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r5, 0xa, 0x13) fcntl$setlease(r5, 0x400, 0x0) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000280)) ioctl$KVM_GET_CPUID2(r5, 0xc008ae91, &(0x7f00000003c0)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x60001600, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() socket$netlink(0x10, 0x3, 0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 2.960285304s ago: executing program 3 (id=1901): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 2.926666491s ago: executing program 3 (id=1902): openat$kvm(0xffffffffffffff9c, 0x0, 0x83, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411892f5466eb01820a43d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x18, r3, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 2.843746228s ago: executing program 3 (id=1903): unshare(0x6a040000) r0 = syz_open_dev$vim2m(0x0, 0x47b, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0xf0f028, 0x5}) pread64(0xffffffffffffffff, &(0x7f0000001480)=""/4122, 0x101a, 0x4b) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x0, 0x0, 0x0, 0x2, 0xc2, &(0x7f0000000480)=""/194, 0x41100, 0x3b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x94) syz_open_procfs(0x0, 0x0) ioctl$IOMMU_IOAS_MAP$PAGES(0xffffffffffffffff, 0x3b85, &(0x7f0000000000)={0x28, 0x4, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7fffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffe7b, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000001a40)=""/102392, 0x18ff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a734f7a20303000010000303030303030303030303430393300"], 0x2a, 0x0) msync(&(0x7f0000003000/0x1000)=nil, 0xffffffffdfffcfff, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00') write$vhost_msg(r2, &(0x7f0000000840)={0x796e6564, {0x0, 0x0, 0x0}}, 0x7) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={0x0, 0x34}, 0x1, 0x0, 0x0, 0x4040}, 0x4000814) 2.203935037s ago: executing program 0 (id=1905): getpid() r0 = fsopen(&(0x7f00000001c0)='udf\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000ac0)='gid', &(0x7f0000000b00)='\xbf%#\x00', 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newqdisc={0x3c, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0xc, 0x8002, [@TCA_FQ_PIE_ALPHA={0x8, 0x5, 0x1d}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea048500000050"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280), 0x4241, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r4, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r5 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r5, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000180)=0x7, 0x4) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/meminfo\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x40000, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000000c0)=0xf) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$TCFLSH(r7, 0x400455c8, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ata_eh_link_autopsy_qc\x00', r3, 0x0, 0xffffffffffff2a80}, 0x18) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000000)=0xdb) 2.011387814s ago: executing program 2 (id=1906): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000bc00000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000008850000000700000095"], &(0x7f0000000680)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) openat$kvm(0xffffffffffffff9c, 0x0, 0x80, 0x0) ioctl$KVM_GET_MSRS_cpu(0xffffffffffffffff, 0xc008ae88, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f00000007c0)="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", 0x1000, 0x0) ioctl$IMADDTIMER(r5, 0x80044940, &(0x7f00000002c0)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x41, 0x0) write$P9_RVERSION(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff017f000e0800395032303030"], 0x15) r8 = dup(r7) write$FUSE_BMAP(r8, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x3b9}}, 0x18) write$FUSE_DIRENTPLUS(r8, &(0x7f00000003c0)=ANY=[@ANYBLOB="b0"], 0xb0) write$FUSE_GETXATTR(r8, &(0x7f00000000c0)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r8, &(0x7f00000005c0)=ANY=[@ANYBLOB="b9"], 0xb8) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000080), 0x1010412, &(0x7f0000000780)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r8]) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x22) 1.936174909s ago: executing program 2 (id=1907): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x20004000) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000000)={0x7, 0x3, 0x23, 0x8}, 0x10) read$msr(r0, &(0x7f0000004c00)=""/102392, 0x18ff8) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x4}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x3}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="00020201"], 0x18) socket$netlink(0x10, 0x3, 0x4) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r5, 0xa, 0x13) fcntl$setlease(r5, 0x400, 0x0) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000280)) ioctl$KVM_GET_CPUID2(r5, 0xc008ae91, &(0x7f00000003c0)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x60001600, 0x0, 0x0, 0x0, 0x0, 0x0) getpid() socket$netlink(0x10, 0x3, 0x8) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 1.755878397s ago: executing program 0 (id=1908): getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea048500000050"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/meminfo\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TCFLSH(r3, 0x400455c8, 0x1) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000000)=0xdb) (fail_nth: 4) 1.482905583s ago: executing program 0 (id=1909): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x20004000) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_DATA={0x4}, @IFLA_MACVLAN_MACADDR_MODE={0x8, 0x3, 0x3}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x10}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="00020201"], 0x18) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r4, 0x400, 0x0) timer_create(0x7, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000280)) ioctl$KVM_GET_CPUID2(r4, 0xc008ae91, &(0x7f00000003c0)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_clone(0x60001600, 0x0, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8) close_range(r3, 0xffffffffffffffff, 0x0) 1.450405739s ago: executing program 2 (id=1910): socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r1 = memfd_create(&(0x7f0000000280)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t;\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\x05\x00\x00\x00\x00\x00\x00\x00\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbe\x90C\x1c)5\x98\xa3\xfa\a\xf9\x98\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajn\xd7\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x15, 0x8, 0x9, 0x9, 0x0, 0xf9, 0x3, 0x3, 0xe, 0x9, 0x10, 0x5, 0x4}, 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000000c0)={&(0x7f0000000a00)=@generic={0xa, "8ab77fa26849ff26650042e2dacd300000000000000162e2adacd2737d00ad6f9fa9f3d7145e15dd9d6d2e19c211220940ad5def53b911ba5b9da13641f9826d7012a749f54b901ee80ea6132ca6e88c776553e1833052ca376304313c4b37780136a4b838570400"}, 0x80, 0x0}, 0x0) 1.36430755s ago: executing program 2 (id=1911): r0 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, 0x0, 0x0) r1 = syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r0, @ANYBLOB="c5", @ANYBLOB="67c2e5d08530710f1222cceedc71937728bd6d12462033df53bfc840f7fea04dff03a92191a7bb6ceceff861ad49c71268e6e660bca4bd7b3bc015416605992448f85dfcd12d7d0ea606422e01d48f6741ccab805b42612e9f701089341149be9d65c9669b086da4fa244c7283f595838479ef6d76b2e43668773e1aebfa65081d5ba48b944b209f25a13bfda5ff222ba8377dfa84a4dd394754f49f6364f3f969b4659b06a9a0a09d1c184a6b8ea45e32b7d841d88df15353daf2742a829d16ba"], 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, &(0x7f0000000b80)={0x44, &(0x7f0000000900)=ANY=[@ANYBLOB="0015b3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) readv(r2, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000300)=""/214, 0xd6}], 0x2) syz_usb_ep_write(r1, 0x81, 0x8, &(0x7f0000000080)="00012c615bc20000") 1.293033011s ago: executing program 3 (id=1912): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x800000}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={{0x14}, [@NFT_MSG_NEWRULE={0x110, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_USERDATA={0xe2, 0x7, 0x1, 0x0, "fed699977e48fabd001b4f4988a0caae3c27a61dd92affdd9273facbb7a13477b1df3592166577918882859b7111576892828cb1d175e5498b7d89f2e84284c13e0129e6b18b19d869578e47341170e450a309b33caf7b993b47a295065bed96c5d370199c58f7ee1b7a41f5390d4069c13dfb702aabc9493857c0cb52140d87270ba3d056b921e7544f3211a3fcb04ca6ad657abdada584d89c2f362a85c0cafb8b3b8ac21d2bb4c0aad9a9d154c50143ea349c3434219e90c5210fe620f581e60a20f8ba76527ce7e2b0ddd472ad1d48d1cf201e74f83cafcc89c935eb"}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x138}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000540)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) setfsgid(0xee00) r4 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) r6 = syz_open_procfs(r4, &(0x7f0000000100)='stack\x00') pread64(r6, &(0x7f0000000140)=""/15, 0xf, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, 0x0, 0x0}, 0x20) r7 = socket$netlink(0x10, 0x3, 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x404c4701, &(0x7f0000000040)={0x2, 0x4, 0xf75e, 0x400001, 0x13, "3eccd82000000002000005dc000000ffffffff"}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000480)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000238bd7000f8dbdf2502000d00000000000000000008003f"], 0x24}, 0x1, 0x0, 0x0, 0x4008091}, 0x41) sendmsg$NL80211_CMD_SET_COALESCE(r8, &(0x7f0000000200)={0x0, 0xffffffffffffff8c, &(0x7f0000000b00)={&(0x7f0000000040)={0x28, r9, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r10}, @void}}}, 0x28}}, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000380)={0x14, 0x14, 0x609, 0x0, 0x0, {0x1e}}, 0x14}}, 0x8040) 851.427401ms ago: executing program 3 (id=1913): openat$kvm(0xffffffffffffff9c, 0x0, 0x83, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a00e9bfde908990817b364e51afe9c81a97f0570759f1cae63487ff68fffffffffffe8e3932e2b7185a25a4cf8a9456aa8a701c318c67edb6e9330b53c0eeba8644311ba75411892f5466eb01820a43d8e5b1dc91c5499bea0977"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000500)={0x18, r3, 0x801, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x24008000}, 0x2400c000) 801.688439ms ago: executing program 2 (id=1914): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES64=r0, @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0x10}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048", 0x4d}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11", 0xfffffc1e}], 0x3, &(0x7f0000000380)}], 0x1, 0x40800) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) 800.559457ms ago: executing program 0 (id=1915): io_uring_enter(0xffffffffffffffff, 0x47be, 0x1, 0x0, 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYRES8], 0x0) syz_open_dev$sndctrl(&(0x7f0000000000), 0xdc3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)=@null) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="d8000000140081044e81f782db44b9040a1d080211000000040000a118000200ff02000100000e1208000f0100810401a80016ea1f000840032e5f54c92011148ed08734843cb12b00000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5e835913b06218a07445d6d930dfe1d9d322fe7c9fd68775730d16a4683f52eb4edbb57a5025ccca9e00360d8bcc00400040fad95667e0060000000000000080bb9ad809d5e1cace81b341139fe3cd4032e8edb12d1d2eb0c0ed0bff", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x400b40, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20008b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f00000002c0), 0xf1c101, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='mounts\x00') fchdir(r3) syz_open_procfs(0x0, &(0x7f00000001c0)='net/packet\x00') r4 = fanotify_init(0x1, 0x40000) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x50) readv(r4, &(0x7f0000000240)=[{&(0x7f0000000500)=""/175, 0xaf}, {&(0x7f0000000440)=""/138, 0x8a}], 0x2) 652.236129ms ago: executing program 3 (id=1916): sendmmsg$sock(0xffffffffffffffff, &(0x7f0000006740)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x0, 0x5c2e, @mcast1, 0x8001}, 0x80, 0x0}}], 0x1, 0x24064044) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x9, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x9) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0), 0x8200, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = syz_clone3(&(0x7f0000000740)={0x102202000, &(0x7f0000000200), &(0x7f0000000300), 0x0, {0x1d}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000007c0)=r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000040)={0x7, 0x6579, 0x8}) r3 = socket$pppl2tp(0x18, 0x1, 0x1) socket$l2tp6(0xa, 0x2, 0x73) connect$pppl2tp(r3, 0x0, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, 0xffffffffffffffff, 0x100000000) mount(&(0x7f0000000140)=@nullb, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000180)='gfs2\x00', 0x2208004, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = openat$audio1(0xffffffffffffff9c, &(0x7f0000000080), 0x129202, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x1000) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, 0x0, 0x0) fsopen(&(0x7f0000000040)='sysfs\x00', 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4220}, {r1, 0x9622}, {r5, 0x2256}], 0x3, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x100000f, 0x11, r6, 0x0) ioctl$SNDCTL_DSP_SETFMT(r6, 0xc0045005, &(0x7f0000000000)=0x4000) socket$inet6(0xa, 0x5, 0x6) 510.914684ms ago: executing program 4 (id=1917): socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="10797fcd6cd957d2b903c6bf46b4abf3", 0x10) r3 = accept$alg(r2, 0x0, 0x0) readv(r3, &(0x7f0000000040), 0x0) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f00000003c0)="cda40fa93f844b47ae9a215b493f3c10837f98391b9adbf9e438190e03703263ad21c81138f1008e873d744741f971f707f3b1c6daa15c6f2c9716cc62ddfdc6e7a39c2180760df8328d575c8677c9db52eb7f7acdc3d7ef416eaec23b310a5bac802446e7f347601a73a4d161ce773acca5ee9ac6d827cdf5dee22bc66d01b4a5d645", 0x83}, {&(0x7f00000001c0)="4e84e4676ca902ac9c70861e766bc5b85dfc3b00850b25a33d8a18f15c0406e31755d9759871d981e2eaebf7b6d7a28a9af929a662e3680b39b5aef78716c1191540235a0007f76ee00498", 0x4b}], 0x2, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4000000}], 0x1, 0x4800) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) 346.954194ms ago: executing program 2 (id=1918): futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) timer_create(0x1, 0x0, &(0x7f0000000300)) r0 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_J1939_ERRQUEUE(r0, 0x6b, 0x4, &(0x7f00000015c0), 0x4) timer_create(0x3, 0x0, &(0x7f0000000300)) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x8, 0x2080) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000040)) 0s ago: executing program 1 (id=1919): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') openat$comedi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/comedi0\x00', 0x181001, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0xfff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000080)={0x2, 0xfff}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r2}, 0x10) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r5 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockopt$PNPIPE_ENCAP(r5, 0x113, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x7b9, 0x0) execve(&(0x7f00000190c0)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1c3425, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) poll(&(0x7f0000000340)=[{r1, 0x13c1}, {r1, 0x1000}], 0x2, 0x400) socket$nl_netfilter(0x10, 0x3, 0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x6, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000006000000080000000d"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x188, 0xffffffff, 0xffffffff, 0x188, 0xffffffff, 0x7fffffe, 0x0, {[{{@uncond, 0x6, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ip={@local, @local, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) socket$inet(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b04, 0x0) kernel console output (not intermixed with test programs): _socket permissive=0 [ 330.850342][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 330.855297][ T30] audit: type=1400 audit(1758687303.772:7227): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.882013][ T5516] audit: audit_lost=74 audit_rate_limit=0 audit_backlog_limit=64 [ 330.893190][ T9244] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 330.908968][ T30] audit: type=1400 audit(1758687303.772:7228): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.921176][ T5516] audit: backlog limit exceeded [ 330.963152][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 330.983212][ T5516] audit: audit_lost=75 audit_rate_limit=0 audit_backlog_limit=64 [ 330.991258][ T30] audit: type=1400 audit(1758687303.772:7229): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.020866][ T5516] audit: backlog limit exceeded [ 331.596471][ T9247] netlink: 48 bytes leftover after parsing attributes in process `syz.0.823'. [ 332.237400][ T9255] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 333.550085][ T9281] netlink: 4 bytes leftover after parsing attributes in process `syz.1.835'. [ 334.149079][ T9293] could not allocate digest TFM handle cmac-aes-neon [ 334.249782][ T9302] FAULT_INJECTION: forcing a failure. [ 334.249782][ T9302] name failslab, interval 1, probability 0, space 0, times 0 [ 334.312035][ T9302] CPU: 0 UID: 0 PID: 9302 Comm: syz.4.841 Not tainted syzkaller #0 PREEMPT(full) [ 334.312060][ T9302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 334.312071][ T9302] Call Trace: [ 334.312077][ T9302] [ 334.312084][ T9302] dump_stack_lvl+0x16c/0x1f0 [ 334.312110][ T9302] should_fail_ex+0x512/0x640 [ 334.312138][ T9302] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 334.312160][ T9302] should_failslab+0xc2/0x120 [ 334.312181][ T9302] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 334.312200][ T9302] ? security_file_alloc+0x34/0x2b0 [ 334.312231][ T9302] security_file_alloc+0x34/0x2b0 [ 334.312257][ T9302] init_file+0x93/0x4c0 [ 334.312281][ T9302] alloc_empty_file+0x73/0x1e0 [ 334.312306][ T9302] path_openat+0xda/0x2cb0 [ 334.312324][ T9302] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.312350][ T9302] ? __pfx_path_openat+0x10/0x10 [ 334.312375][ T9302] do_filp_open+0x20b/0x470 [ 334.312394][ T9302] ? __pfx_do_filp_open+0x10/0x10 [ 334.312430][ T9302] ? alloc_fd+0x471/0x7d0 [ 334.312458][ T9302] do_sys_openat2+0x11b/0x1d0 [ 334.312482][ T9302] ? __pfx_do_sys_openat2+0x10/0x10 [ 334.312508][ T9302] ? __fget_files+0x20e/0x3c0 [ 334.312535][ T9302] __x64_sys_openat+0x174/0x210 [ 334.312560][ T9302] ? __pfx___x64_sys_openat+0x10/0x10 [ 334.312583][ T9302] ? ksys_write+0x1ac/0x250 [ 334.312610][ T9302] do_syscall_64+0xcd/0x4e0 [ 334.312635][ T9302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.312652][ T9302] RIP: 0033:0x7f89fcb8eec9 [ 334.312668][ T9302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 334.312685][ T9302] RSP: 002b:00007f89fadcd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 334.312704][ T9302] RAX: ffffffffffffffda RBX: 00007f89fcde6090 RCX: 00007f89fcb8eec9 [ 334.312715][ T9302] RDX: 0000000000121602 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 334.312726][ T9302] RBP: 00007f89fadcd090 R08: 0000000000000000 R09: 0000000000000000 [ 334.312737][ T9302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.312747][ T9302] R13: 00007f89fcde6128 R14: 00007f89fcde6090 R15: 00007fff2ac818d8 [ 334.312770][ T9302] [ 334.791318][ T9310] bridge_slave_0: left allmulticast mode [ 334.818933][ T9310] bridge_slave_0: left promiscuous mode [ 334.830371][ T9310] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.842614][ T9312] netlink: 'syz.4.845': attribute type 10 has an invalid length. [ 334.949956][ T9310] bridge_slave_1: left allmulticast mode [ 334.956168][ T9310] bridge_slave_1: left promiscuous mode [ 334.981102][ T9310] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.277314][ T9310] bond0: (slave bond_slave_0): Releasing backup interface [ 335.332689][ T9310] bond0: (slave bond_slave_1): Releasing backup interface [ 335.380390][ T9310] team0: Port device team_slave_0 removed [ 335.441517][ T9310] team0: Port device team_slave_1 removed [ 335.463169][ T9327] netlink: 'syz.0.848': attribute type 4 has an invalid length. [ 335.484854][ T9310] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 335.494891][ T9310] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 335.509812][ T9328] netlink: 4 bytes leftover after parsing attributes in process `syz.1.850'. [ 335.543394][ T9310] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 335.550869][ T9310] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 335.582731][ T9331] netlink: 'syz.0.848': attribute type 4 has an invalid length. [ 335.682873][ T9312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.708471][ T9312] team0: Port device bond0 added [ 335.802787][ T9328] vxlan0: entered promiscuous mode [ 335.813694][ T30] kauditd_printk_skb: 6396 callbacks suppressed [ 335.813708][ T30] audit: type=1400 audit(1758687308.742:12918): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.906938][ T6508] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 335.927577][ T30] audit: type=1400 audit(1758687308.742:12919): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.933678][ T6508] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 335.960948][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.962427][ T30] audit: type=1400 audit(1758687308.742:12920): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.995143][ T30] audit: type=1400 audit(1758687308.742:12921): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 336.022111][ T9336] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.031011][ T9336] audit: audit_lost=312 audit_rate_limit=0 audit_backlog_limit=64 [ 336.040845][ T9336] audit: backlog limit exceeded [ 336.048314][ T9333] audit: audit_backlog=65 > audit_backlog_limit=64 [ 336.049363][ T30] audit: type=1400 audit(1758687308.822:12922): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 336.086062][ T6508] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 336.097395][ T6508] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 337.618916][ T9364] netlink: 4 bytes leftover after parsing attributes in process `syz.0.864'. [ 338.116390][ T9377] macvlan5: entered promiscuous mode [ 338.269044][ T9385] netlink: 'syz.4.869': attribute type 1 has an invalid length. [ 338.338707][ T9385] 8021q: adding VLAN 0 to HW filter on device bond1 [ 338.804877][ T9400] veth15: entered promiscuous mode [ 338.812246][ T9400] veth15: entered allmulticast mode [ 339.116062][ T9408] FAULT_INJECTION: forcing a failure. [ 339.116062][ T9408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.183632][ T9408] CPU: 1 UID: 0 PID: 9408 Comm: syz.3.879 Not tainted syzkaller #0 PREEMPT(full) [ 339.183656][ T9408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 339.183666][ T9408] Call Trace: [ 339.183672][ T9408] [ 339.183679][ T9408] dump_stack_lvl+0x16c/0x1f0 [ 339.183707][ T9408] should_fail_ex+0x512/0x640 [ 339.183734][ T9408] _copy_to_user+0x32/0xd0 [ 339.183761][ T9408] simple_read_from_buffer+0xcb/0x170 [ 339.183781][ T9408] proc_fail_nth_read+0x197/0x240 [ 339.183803][ T9408] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 339.183824][ T9408] ? rw_verify_area+0xcf/0x6c0 [ 339.183851][ T9408] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 339.183870][ T9408] vfs_read+0x1e1/0xcf0 [ 339.183891][ T9408] ? __pfx___mutex_lock+0x10/0x10 [ 339.183913][ T9408] ? __pfx_vfs_read+0x10/0x10 [ 339.183936][ T9408] ? __fget_files+0x20e/0x3c0 [ 339.183960][ T9408] ksys_read+0x12a/0x250 [ 339.183975][ T9408] ? __pfx_ksys_read+0x10/0x10 [ 339.183991][ T9408] ? fdget+0x187/0x210 [ 339.184010][ T9408] do_syscall_64+0xcd/0x4e0 [ 339.184032][ T9408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.184047][ T9408] RIP: 0033:0x7fe94c18d8dc [ 339.184059][ T9408] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 339.184074][ T9408] RSP: 002b:00007fe94cfb4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 339.184089][ T9408] RAX: ffffffffffffffda RBX: 00007fe94c3e5fa0 RCX: 00007fe94c18d8dc [ 339.184099][ T9408] RDX: 000000000000000f RSI: 00007fe94cfb40a0 RDI: 0000000000000003 [ 339.184109][ T9408] RBP: 00007fe94cfb4090 R08: 0000000000000000 R09: 0000000000000000 [ 339.184119][ T9408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.184129][ T9408] R13: 00007fe94c3e6038 R14: 00007fe94c3e5fa0 R15: 00007ffd1e7e6318 [ 339.184152][ T9408] [ 339.504076][ T9422] macvlan5: entered promiscuous mode [ 339.567773][ T9425] macvlan5: entered promiscuous mode [ 339.922537][ T9439] veth7: entered promiscuous mode [ 339.928779][ T9439] veth7: entered allmulticast mode [ 340.168378][ T9441] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 340.824832][ T30] kauditd_printk_skb: 9082 callbacks suppressed [ 340.824847][ T30] audit: type=1400 audit(1758687313.762:19667): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.911340][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.932363][ T5858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.939295][ T5516] audit: audit_lost=1093 audit_rate_limit=0 audit_backlog_limit=64 [ 340.950327][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.969610][ T8130] audit: audit_lost=1094 audit_rate_limit=0 audit_backlog_limit=64 [ 340.971394][ T5516] audit: backlog limit exceeded [ 340.982862][ T5858] audit: audit_lost=1095 audit_rate_limit=0 audit_backlog_limit=64 [ 340.982880][ T5858] audit: backlog limit exceeded [ 341.023901][ T8130] audit: backlog limit exceeded [ 341.623810][ T9463] FAULT_INJECTION: forcing a failure. [ 341.623810][ T9463] name failslab, interval 1, probability 0, space 0, times 0 [ 341.689956][ T9463] CPU: 0 UID: 0 PID: 9463 Comm: syz.4.895 Not tainted syzkaller #0 PREEMPT(full) [ 341.689980][ T9463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 341.689989][ T9463] Call Trace: [ 341.689995][ T9463] [ 341.690001][ T9463] dump_stack_lvl+0x16c/0x1f0 [ 341.690028][ T9463] should_fail_ex+0x512/0x640 [ 341.690055][ T9463] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 341.690076][ T9463] should_failslab+0xc2/0x120 [ 341.690097][ T9463] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 341.690115][ T9463] ? security_file_alloc+0x34/0x2b0 [ 341.690145][ T9463] security_file_alloc+0x34/0x2b0 [ 341.690171][ T9463] init_file+0x93/0x4c0 [ 341.690194][ T9463] alloc_empty_file+0x73/0x1e0 [ 341.690219][ T9463] path_openat+0xda/0x2cb0 [ 341.690235][ T9463] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.690258][ T9463] ? __pfx_path_openat+0x10/0x10 [ 341.690275][ T9463] do_filp_open+0x20b/0x470 [ 341.690287][ T9463] ? __pfx_do_filp_open+0x10/0x10 [ 341.690309][ T9463] ? alloc_fd+0x471/0x7d0 [ 341.690324][ T9463] do_sys_openat2+0x11b/0x1d0 [ 341.690339][ T9463] ? __pfx_do_sys_openat2+0x10/0x10 [ 341.690354][ T9463] ? find_held_lock+0x2b/0x80 [ 341.690368][ T9463] ? handle_mm_fault+0x2ab/0xd10 [ 341.690388][ T9463] __x64_sys_openat+0x174/0x210 [ 341.690404][ T9463] ? __pfx___x64_sys_openat+0x10/0x10 [ 341.690420][ T9463] ? do_user_addr_fault+0x843/0x1370 [ 341.690436][ T9463] do_syscall_64+0xcd/0x4e0 [ 341.690452][ T9463] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.690462][ T9463] RIP: 0033:0x7f89fcb8d710 [ 341.690471][ T9463] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 341.690482][ T9463] RSP: 002b:00007f89fadedb70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 341.690493][ T9463] RAX: ffffffffffffffda RBX: 0000000000040002 RCX: 00007f89fcb8d710 [ 341.690500][ T9463] RDX: 0000000000040002 RSI: 00007f89fadedc10 RDI: 00000000ffffff9c [ 341.690506][ T9463] RBP: 00007f89fadedc10 R08: 0000000000000000 R09: 0000000000000000 [ 341.690512][ T9463] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 341.690519][ T9463] R13: 00007f89fcde6038 R14: 00007f89fcde5fa0 R15: 00007fff2ac818d8 [ 341.690532][ T9463] [ 342.036727][ T9471] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 342.043252][ T9471] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 342.052475][ T9471] vhci_hcd vhci_hcd.0: Device attached [ 342.092849][ T9474] vhci_hcd vhci_hcd.0: pdev(1) rhport(1) sockfd(6) [ 342.099378][ T9474] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 342.103997][ T9471] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 342.203976][ T9474] vhci_hcd vhci_hcd.0: Device attached [ 342.295805][ T978] usb 35-1: new low-speed USB device number 2 using vhci_hcd [ 343.093852][ T9492] macvlan6: entered promiscuous mode [ 343.114286][ T9495] netlink: 'syz.1.906': attribute type 4 has an invalid length. [ 343.140018][ T9495] netlink: 'syz.1.906': attribute type 4 has an invalid length. [ 344.721906][ T9519] veth9: entered promiscuous mode [ 344.727007][ T9519] veth9: entered allmulticast mode [ 345.857341][ T30] kauditd_printk_skb: 4006 callbacks suppressed [ 345.857382][ T30] audit: type=1400 audit(1758687318.742:23475): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 345.906497][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.917549][ T5516] audit: audit_lost=1162 audit_rate_limit=0 audit_backlog_limit=64 [ 345.926214][ T5516] audit: backlog limit exceeded [ 345.931329][ T9553] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.943765][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.957985][ T5516] audit: audit_lost=1163 audit_rate_limit=0 audit_backlog_limit=64 [ 345.975832][ T5516] audit: backlog limit exceeded [ 345.976786][ T9553] audit: audit_lost=1164 audit_rate_limit=0 audit_backlog_limit=64 [ 345.997529][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 346.520685][ T9559] bridge1: entered promiscuous mode [ 346.818572][ T9574] netlink: 20 bytes leftover after parsing attributes in process `syz.0.930'. [ 350.611021][ T9624] hugetlbfs: syz.1.946 (9624): Using mlock ulimits for SHM_HUGETLB is obsolete [ 350.880093][ T30] kauditd_printk_skb: 7256 callbacks suppressed [ 350.880108][ T30] audit: type=1400 audit(1758687323.812:28027): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.905097][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 350.963729][ T30] audit: type=1400 audit(1758687323.812:28028): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.984939][ T30] audit: type=1400 audit(1758687323.812:28029): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.006953][ T30] audit: type=1400 audit(1758687323.832:28030): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.011384][ T9633] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.028978][ T9634] audit: audit_backlog=65 > audit_backlog_limit=64 [ 351.042680][ T9634] audit: audit_lost=2067 audit_rate_limit=0 audit_backlog_limit=64 [ 351.053611][ T9634] audit: backlog limit exceeded [ 351.079709][ T5516] audit: audit_lost=2068 audit_rate_limit=0 audit_backlog_limit=64 [ 355.884402][ T30] kauditd_printk_skb: 5947 callbacks suppressed [ 355.884413][ T30] audit: type=1400 audit(1758687328.822:33933): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.913657][ T30] audit: type=1400 audit(1758687328.842:33934): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.935919][ T30] audit: type=1400 audit(1758687328.842:33935): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.957271][ T30] audit: type=1400 audit(1758687328.842:33936): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.978639][ T30] audit: type=1400 audit(1758687328.862:33937): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.021276][ T30] audit: type=1400 audit(1758687328.862:33938): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.043964][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.054042][ T9706] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.060526][ T9706] audit: audit_lost=2084 audit_rate_limit=0 audit_backlog_limit=64 [ 356.074009][ T9706] audit: backlog limit exceeded [ 360.086418][ T9792] netlink: 'syz.2.1002': attribute type 11 has an invalid length. [ 361.032453][ T30] kauditd_printk_skb: 6184 callbacks suppressed [ 361.032467][ T30] audit: type=1400 audit(1758687333.962:39476): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.249570][ T30] audit: type=1400 audit(1758687333.992:39477): avc: denied { read write } for pid=8130 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 361.286667][ T9810] block device autoloading is deprecated and will be removed. [ 361.294289][ T30] audit: type=1400 audit(1758687334.002:39478): avc: denied { mounton } for pid=9803 comm="syz.2.1006" path="/202/file0" dev="tmpfs" ino=1095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=0 [ 361.317785][ T30] audit: type=1400 audit(1758687334.042:39479): avc: denied { create } for pid=9809 comm="syz.4.1007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 361.353799][ T30] audit: type=1400 audit(1758687334.042:39480): avc: denied { read } for pid=9809 comm="syz.4.1007" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 361.377107][ T30] audit: type=1400 audit(1758687334.042:39481): avc: denied { read } for pid=9800 comm="syz.3.1005" dev="nsfs" ino=4026532797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 361.411439][ T30] audit: type=1400 audit(1758687334.042:39482): avc: denied { create } for pid=9800 comm="syz.3.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 361.473071][ T30] audit: type=1400 audit(1758687334.152:39483): avc: denied { search } for pid=9807 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 361.540058][ T30] audit: type=1400 audit(1758687334.162:39485): avc: denied { prog_load } for pid=9809 comm="syz.4.1007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.589882][ T30] audit: type=1400 audit(1758687334.162:39484): avc: denied { search } for pid=9811 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 361.771200][ T5856] Bluetooth: hci3: unexpected event for opcode 0x2024 [ 362.275306][ T9838] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1014'. [ 362.675024][ T9857] trusted_key: encrypted_key: insufficient parameters specified [ 362.843198][ T9863] FAULT_INJECTION: forcing a failure. [ 362.843198][ T9863] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.886147][ T9863] CPU: 0 UID: 0 PID: 9863 Comm: syz.1.1022 Not tainted syzkaller #0 PREEMPT(full) [ 362.886173][ T9863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 362.886183][ T9863] Call Trace: [ 362.886189][ T9863] [ 362.886197][ T9863] dump_stack_lvl+0x16c/0x1f0 [ 362.886227][ T9863] should_fail_ex+0x512/0x640 [ 362.886252][ T9863] _copy_from_iter+0x29f/0x1720 [ 362.886280][ T9863] ? __alloc_skb+0x200/0x380 [ 362.886301][ T9863] ? __pfx__copy_from_iter+0x10/0x10 [ 362.886326][ T9863] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 362.886358][ T9863] netlink_sendmsg+0x829/0xdd0 [ 362.886386][ T9863] ? __pfx_netlink_sendmsg+0x10/0x10 [ 362.886418][ T9863] ____sys_sendmsg+0xa95/0xc70 [ 362.886445][ T9863] ? copy_msghdr_from_user+0x10a/0x160 [ 362.886467][ T9863] ? __pfx_____sys_sendmsg+0x10/0x10 [ 362.886504][ T9863] ___sys_sendmsg+0x134/0x1d0 [ 362.886526][ T9863] ? __pfx____sys_sendmsg+0x10/0x10 [ 362.886577][ T9863] __sys_sendmsg+0x16d/0x220 [ 362.886599][ T9863] ? __pfx___sys_sendmsg+0x10/0x10 [ 362.886636][ T9863] do_syscall_64+0xcd/0x4e0 [ 362.886661][ T9863] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.886679][ T9863] RIP: 0033:0x7f1a3538eec9 [ 362.886694][ T9863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.886710][ T9863] RSP: 002b:00007f1a361a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 362.886727][ T9863] RAX: ffffffffffffffda RBX: 00007f1a355e5fa0 RCX: 00007f1a3538eec9 [ 362.886738][ T9863] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 362.886749][ T9863] RBP: 00007f1a361a7090 R08: 0000000000000000 R09: 0000000000000000 [ 362.886759][ T9863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.886770][ T9863] R13: 00007f1a355e6038 R14: 00007f1a355e5fa0 R15: 00007ffe49ebf178 [ 362.886796][ T9863] [ 364.991264][ T9907] macvlan6: entered promiscuous mode [ 366.462164][ T9930] syz.2.1038 (9930): drop_caches: 2 [ 366.560740][ T30] kauditd_printk_skb: 558 callbacks suppressed [ 366.560754][ T30] audit: type=1400 audit(1758687339.492:40044): avc: denied { search } for pid=9935 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 366.596524][ T9930] syz.2.1038 (9930): drop_caches: 2 [ 366.670351][ T30] audit: type=1400 audit(1758687339.592:40045): avc: denied { create } for pid=9941 comm="syz.3.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 367.045794][ T30] audit: type=1400 audit(1758687339.592:40046): avc: denied { create } for pid=9941 comm="syz.3.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 367.119728][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 367.136408][ T9949] audit: audit_backlog=65 > audit_backlog_limit=64 [ 367.148867][ T9947] audit: audit_backlog=65 > audit_backlog_limit=64 [ 367.149161][ T5516] audit: audit_lost=2301 audit_rate_limit=0 audit_backlog_limit=64 [ 367.158955][ T30] audit: type=1400 audit(1758687339.592:40047): avc: denied { create } for pid=9941 comm="syz.3.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 367.173625][ T9949] audit: audit_lost=2302 audit_rate_limit=0 audit_backlog_limit=64 [ 367.183959][ T9947] audit: audit_lost=2303 audit_rate_limit=0 audit_backlog_limit=64 [ 367.275751][ T9951] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(6) [ 367.282274][ T9951] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 367.340917][ T9951] vhci_hcd vhci_hcd.0: Device attached [ 367.417207][ T9955] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(9) [ 367.423728][ T9955] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 367.433789][ T9955] vhci_hcd vhci_hcd.0: Device attached [ 367.516342][ T9951] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 367.535435][ T9951] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 367.573684][ T5903] usb 37-1: new low-speed USB device number 3 using vhci_hcd [ 367.608888][ T9956] vhci_hcd: connection closed [ 367.609812][ T9952] vhci_hcd: connection reset by peer [ 367.620537][ T12] vhci_hcd: stop threads [ 367.628528][ T12] vhci_hcd: release socket [ 367.653720][ T12] vhci_hcd: disconnect device [ 367.661924][ T12] vhci_hcd: stop threads [ 367.668528][ T12] vhci_hcd: release socket [ 367.694414][ T12] vhci_hcd: disconnect device [ 368.411349][ T9974] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 369.963677][ T51] Bluetooth: hci3: command 0x0405 tx timeout [ 371.045785][T10045] netlink: 'syz.1.1076': attribute type 4 has an invalid length. [ 371.069019][T10045] netlink: 'syz.1.1076': attribute type 4 has an invalid length. [ 371.329589][T10043] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1077'. [ 371.568883][ T30] kauditd_printk_skb: 7751 callbacks suppressed [ 371.568899][ T30] audit: type=1400 audit(1758687344.492:46887): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.578867][T10056] IPVS: set_ctl: invalid protocol: 50 172.20.20.170:20001 [ 371.621222][ T30] audit: type=1400 audit(1758687344.502:46888): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.647967][ T30] audit: type=1400 audit(1758687344.502:46889): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.673814][ T30] audit: type=1400 audit(1758687344.502:46890): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.695570][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.705300][ T5516] audit: audit_lost=2607 audit_rate_limit=0 audit_backlog_limit=64 [ 371.709138][ T5858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.720542][T10052] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.734820][ T5516] audit: backlog limit exceeded [ 371.739768][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.940536][T10070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10070 comm=syz.2.1083 [ 371.958139][T10070] netlink: 'syz.2.1083': attribute type 1 has an invalid length. [ 372.680095][ T5903] vhci_hcd: vhci_device speed not set [ 376.067813][T10114] FAULT_INJECTION: forcing a failure. [ 376.067813][T10114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 376.215783][T10114] CPU: 0 UID: 0 PID: 10114 Comm: syz.3.1097 Not tainted syzkaller #0 PREEMPT(full) [ 376.215801][T10114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 376.215808][T10114] Call Trace: [ 376.215818][T10114] [ 376.215822][T10114] dump_stack_lvl+0x16c/0x1f0 [ 376.215842][T10114] should_fail_ex+0x512/0x640 [ 376.215856][T10114] ? page_copy_sane+0xcd/0x2d0 [ 376.215872][T10114] copy_folio_from_iter_atomic+0x36f/0x1ac0 [ 376.215895][T10114] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 376.215912][T10114] ? shmem_write_begin+0x176/0x300 [ 376.215925][T10114] ? __pfx_shmem_write_begin+0x10/0x10 [ 376.215937][T10114] ? balance_dirty_pages_ratelimited_flags+0x92/0x1260 [ 376.215953][T10114] ? reacquire_held_locks+0xcd/0x1f0 [ 376.215974][T10114] generic_perform_write+0x221/0x900 [ 376.215996][T10114] ? __pfx_generic_perform_write+0x10/0x10 [ 376.216015][T10114] ? generic_update_time+0xcf/0xf0 [ 376.216030][T10114] ? mnt_put_write_access_file+0x45/0xf0 [ 376.216044][T10114] shmem_file_write_iter+0x10e/0x140 [ 376.216060][T10114] aio_write+0x3b9/0x910 [ 376.216074][T10114] ? __pfx_aio_write+0x10/0x10 [ 376.216086][T10114] ? __lock_acquire+0xb97/0x1ce0 [ 376.216111][T10114] ? __might_fault+0xe3/0x190 [ 376.216121][T10114] ? __might_fault+0x13b/0x190 [ 376.216135][T10114] ? io_submit_one+0x1243/0x1df0 [ 376.216147][T10114] io_submit_one+0x1243/0x1df0 [ 376.216162][T10114] ? __lock_acquire+0xb97/0x1ce0 [ 376.216181][T10114] ? __pfx_io_submit_one+0x10/0x10 [ 376.216199][T10114] ? __might_fault+0xe3/0x190 [ 376.216209][T10114] ? __might_fault+0x13b/0x190 [ 376.216222][T10114] ? __x64_sys_io_submit+0x1a9/0x350 [ 376.216236][T10114] __x64_sys_io_submit+0x1a9/0x350 [ 376.216254][T10114] ? __pfx___x64_sys_io_submit+0x10/0x10 [ 376.216275][T10114] do_syscall_64+0xcd/0x4e0 [ 376.216291][T10114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 376.216302][T10114] RIP: 0033:0x7fe94c18eec9 [ 376.216311][T10114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.216322][T10114] RSP: 002b:00007fe94cfb4038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 376.216332][T10114] RAX: ffffffffffffffda RBX: 00007fe94c3e5fa0 RCX: 00007fe94c18eec9 [ 376.216339][T10114] RDX: 0000200000000780 RSI: 0000000000000020 RDI: 00007fe94cf8b000 [ 376.216346][T10114] RBP: 00007fe94cfb4090 R08: 0000000000000000 R09: 0000000000000000 [ 376.216352][T10114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.216358][T10114] R13: 00007fe94c3e6038 R14: 00007fe94c3e5fa0 R15: 00007ffd1e7e6318 [ 376.216371][T10114] [ 376.773237][ T30] kauditd_printk_skb: 4766 callbacks suppressed [ 376.773248][ T30] audit: type=1400 audit(1758687349.702:51648): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.807322][ T30] audit: type=1400 audit(1758687349.702:51649): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.835759][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.843755][ T5516] audit: audit_lost=2612 audit_rate_limit=0 audit_backlog_limit=64 [ 376.855407][ T5516] audit: backlog limit exceeded [ 376.861205][ T30] audit: type=1400 audit(1758687349.702:51650): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.883754][ T30] audit: type=1400 audit(1758687349.702:51651): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.926385][ T30] audit: type=1400 audit(1758687349.702:51652): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.961904][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.987239][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 377.124555][T10121] FAULT_INJECTION: forcing a failure. [ 377.124555][T10121] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.175349][T10121] CPU: 1 UID: 0 PID: 10121 Comm: syz.2.1100 Not tainted syzkaller #0 PREEMPT(full) [ 377.175373][T10121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 377.175384][T10121] Call Trace: [ 377.175390][T10121] [ 377.175396][T10121] dump_stack_lvl+0x16c/0x1f0 [ 377.175424][T10121] should_fail_ex+0x512/0x640 [ 377.175450][T10121] _copy_from_iter+0x29f/0x1720 [ 377.175478][T10121] ? __alloc_skb+0x200/0x380 [ 377.175499][T10121] ? __pfx__copy_from_iter+0x10/0x10 [ 377.175525][T10121] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 377.175556][T10121] netlink_sendmsg+0x829/0xdd0 [ 377.175582][T10121] ? __pfx_netlink_sendmsg+0x10/0x10 [ 377.175614][T10121] ____sys_sendmsg+0xa95/0xc70 [ 377.175641][T10121] ? copy_msghdr_from_user+0x10a/0x160 [ 377.175662][T10121] ? __pfx_____sys_sendmsg+0x10/0x10 [ 377.175699][T10121] ___sys_sendmsg+0x134/0x1d0 [ 377.175721][T10121] ? __pfx____sys_sendmsg+0x10/0x10 [ 377.175779][T10121] __sys_sendmsg+0x16d/0x220 [ 377.175800][T10121] ? __pfx___sys_sendmsg+0x10/0x10 [ 377.175838][T10121] do_syscall_64+0xcd/0x4e0 [ 377.175865][T10121] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.175883][T10121] RIP: 0033:0x7fe56638eec9 [ 377.175896][T10121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 377.175913][T10121] RSP: 002b:00007fe5671bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.175929][T10121] RAX: ffffffffffffffda RBX: 00007fe5665e5fa0 RCX: 00007fe56638eec9 [ 377.175941][T10121] RDX: 0000000004000080 RSI: 0000200000001200 RDI: 0000000000000005 [ 377.175951][T10121] RBP: 00007fe5671bf090 R08: 0000000000000000 R09: 0000000000000000 [ 377.175961][T10121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.175971][T10121] R13: 00007fe5665e6038 R14: 00007fe5665e5fa0 R15: 00007fff259465d8 [ 377.175994][T10121] [ 377.597248][T10133] veth9: entered promiscuous mode [ 377.602282][T10133] veth9: entered allmulticast mode [ 378.127422][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.136045][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.912524][T10178] trusted_key: encrypted_key: insufficient parameters specified [ 380.626445][T10194] bridge0: entered promiscuous mode [ 380.631962][T10194] macvlan2: entered promiscuous mode [ 381.026091][T10209] macvlan6: entered promiscuous mode [ 381.776098][ T30] kauditd_printk_skb: 9665 callbacks suppressed [ 381.776109][ T30] audit: type=1400 audit(1758687354.702:60474): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.815873][ T30] audit: type=1400 audit(1758687354.702:60475): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.841939][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.863310][ T30] audit: type=1400 audit(1758687354.702:60476): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.864099][ T5516] audit: audit_lost=2895 audit_rate_limit=0 audit_backlog_limit=64 [ 381.912220][ T30] audit: type=1400 audit(1758687354.702:60477): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.917621][ T5516] audit: backlog limit exceeded [ 381.950565][ T30] audit: type=1400 audit(1758687354.702:60478): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.959545][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.987091][T10234] audit: audit_backlog=65 > audit_backlog_limit=64 [ 382.858178][T10254] trusted_key: encrypted_key: insufficient parameters specified [ 383.234310][T10260] trusted_key: encrypted_key: insufficient parameters specified [ 384.129687][T10279] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1153'. [ 385.272271][T10299] FAULT_INJECTION: forcing a failure. [ 385.272271][T10299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 385.325471][T10299] CPU: 1 UID: 0 PID: 10299 Comm: syz.4.1161 Not tainted syzkaller #0 PREEMPT(full) [ 385.325495][T10299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 385.325505][T10299] Call Trace: [ 385.325510][T10299] [ 385.325516][T10299] dump_stack_lvl+0x16c/0x1f0 [ 385.325540][T10299] should_fail_ex+0x512/0x640 [ 385.325565][T10299] _copy_from_user+0x2e/0xd0 [ 385.325589][T10299] copy_mount_options+0x76/0x190 [ 385.325615][T10299] __x64_sys_mount+0x1ac/0x310 [ 385.325638][T10299] ? __pfx___x64_sys_mount+0x10/0x10 [ 385.325661][T10299] ? getname_flags.part.0+0x1c5/0x550 [ 385.325690][T10299] do_syscall_64+0xcd/0x4e0 [ 385.325715][T10299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.325732][T10299] RIP: 0033:0x7f89fcb8eec9 [ 385.325746][T10299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.325763][T10299] RSP: 002b:00007f89fadee038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 385.325780][T10299] RAX: ffffffffffffffda RBX: 00007f89fcde5fa0 RCX: 00007f89fcb8eec9 [ 385.325791][T10299] RDX: 0000200000000000 RSI: 0000200000000240 RDI: 0000000000000000 [ 385.325802][T10299] RBP: 00007f89fadee090 R08: 0000200000000300 R09: 0000000000000000 [ 385.325812][T10299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.325822][T10299] R13: 00007f89fcde6038 R14: 00007f89fcde5fa0 R15: 00007fff2ac818d8 [ 385.325845][T10299] [ 386.025377][T10309] FAULT_INJECTION: forcing a failure. [ 386.025377][T10309] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.053621][T10309] CPU: 1 UID: 0 PID: 10309 Comm: syz.2.1164 Not tainted syzkaller #0 PREEMPT(full) [ 386.053644][T10309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 386.053660][T10309] Call Trace: [ 386.053665][T10309] [ 386.053673][T10309] dump_stack_lvl+0x16c/0x1f0 [ 386.053699][T10309] should_fail_ex+0x512/0x640 [ 386.053725][T10309] strncpy_from_user+0x3b/0x2e0 [ 386.053747][T10309] getname_flags.part.0+0x8f/0x550 [ 386.053777][T10309] getname_flags+0x93/0xf0 [ 386.053796][T10309] do_sys_openat2+0xb8/0x1d0 [ 386.053820][T10309] ? __pfx_do_sys_openat2+0x10/0x10 [ 386.053845][T10309] ? __fget_files+0x20e/0x3c0 [ 386.053870][T10309] __x64_sys_open+0x153/0x1e0 [ 386.053894][T10309] ? __pfx___x64_sys_open+0x10/0x10 [ 386.053923][T10309] ? rcu_is_watching+0x12/0xc0 [ 386.053947][T10309] do_syscall_64+0xcd/0x4e0 [ 386.053972][T10309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.053989][T10309] RIP: 0033:0x7fe56638eec9 [ 386.054002][T10309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.054018][T10309] RSP: 002b:00007fe5671bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 386.054034][T10309] RAX: ffffffffffffffda RBX: 00007fe5665e5fa0 RCX: 00007fe56638eec9 [ 386.054046][T10309] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00002000000001c0 [ 386.054056][T10309] RBP: 00007fe5671bf090 R08: 0000000000000000 R09: 0000000000000000 [ 386.054066][T10309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.054076][T10309] R13: 00007fe5665e6038 R14: 00007fe5665e5fa0 R15: 00007fff259465d8 [ 386.054100][T10309] [ 386.567140][T10313] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1166'. [ 386.691924][T10317] FAULT_INJECTION: forcing a failure. [ 386.691924][T10317] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.771679][T10317] CPU: 0 UID: 0 PID: 10317 Comm: syz.4.1168 Not tainted syzkaller #0 PREEMPT(full) [ 386.771704][T10317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 386.771714][T10317] Call Trace: [ 386.771720][T10317] [ 386.771727][T10317] dump_stack_lvl+0x16c/0x1f0 [ 386.771755][T10317] should_fail_ex+0x512/0x640 [ 386.771781][T10317] _copy_from_user+0x2e/0xd0 [ 386.771807][T10317] memdup_user+0x6b/0xe0 [ 386.771827][T10317] strndup_user+0x78/0xe0 [ 386.771847][T10317] __x64_sys_mount+0x137/0x310 [ 386.771872][T10317] ? __pfx___x64_sys_mount+0x10/0x10 [ 386.771902][T10317] do_syscall_64+0xcd/0x4e0 [ 386.771927][T10317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.771945][T10317] RIP: 0033:0x7f89fcb8eec9 [ 386.771960][T10317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.771977][T10317] RSP: 002b:00007f89fadee038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 386.771994][T10317] RAX: ffffffffffffffda RBX: 00007f89fcde5fa0 RCX: 00007f89fcb8eec9 [ 386.772006][T10317] RDX: 0000200000000000 RSI: 0000200000000040 RDI: 0000200000000140 [ 386.772017][T10317] RBP: 00007f89fadee090 R08: 0000000000000000 R09: 0000000000000000 [ 386.772027][T10317] R10: 0000000002208004 R11: 0000000000000246 R12: 0000000000000001 [ 386.772038][T10317] R13: 00007f89fcde6038 R14: 00007f89fcde5fa0 R15: 00007fff2ac818d8 [ 386.772062][T10317] [ 386.923940][ T30] kauditd_printk_skb: 6677 callbacks suppressed [ 386.923955][ T30] audit: type=1400 audit(1758687359.852:66375): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 387.003619][ T30] audit: type=1400 audit(1758687359.852:66376): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 387.041217][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 387.047872][ T5516] audit: audit_lost=3157 audit_rate_limit=0 audit_backlog_limit=64 [ 387.059575][ T5516] audit: backlog limit exceeded [ 387.065395][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 387.071952][ T5516] audit: audit_lost=3158 audit_rate_limit=0 audit_backlog_limit=64 [ 387.080681][ T5516] audit: backlog limit exceeded [ 387.086102][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 387.092593][ T5516] audit: audit_lost=3159 audit_rate_limit=0 audit_backlog_limit=64 [ 389.560849][T10356] netlink: 27 bytes leftover after parsing attributes in process `syz.2.1179'. [ 391.787367][T10378] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1187'. [ 391.956684][ T30] kauditd_printk_skb: 6428 callbacks suppressed [ 391.956718][ T30] audit: type=1400 audit(1758687367.861:70554): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 392.030367][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.046017][ T5516] audit: audit_lost=3910 audit_rate_limit=0 audit_backlog_limit=64 [ 392.061935][ T30] audit: type=1400 audit(1758687367.891:70555): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 392.093475][ T5516] audit: backlog limit exceeded [ 392.107102][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.113995][ T5516] audit: audit_lost=3911 audit_rate_limit=0 audit_backlog_limit=64 [ 392.122033][ T5516] audit: backlog limit exceeded [ 392.123886][T10384] audit: audit_backlog=65 > audit_backlog_limit=64 [ 392.131036][ T30] audit: type=1400 audit(1758687367.891:70556): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 392.692687][T10391] netlink: 'syz.0.1190': attribute type 4 has an invalid length. [ 392.702741][T10391] netlink: 'syz.0.1190': attribute type 4 has an invalid length. [ 393.820897][T10403] FAULT_INJECTION: forcing a failure. [ 393.820897][T10403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.866746][T10403] CPU: 0 UID: 0 PID: 10403 Comm: syz.2.1194 Not tainted syzkaller #0 PREEMPT(full) [ 393.866768][T10403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 393.866775][T10403] Call Trace: [ 393.866779][T10403] [ 393.866784][T10403] dump_stack_lvl+0x16c/0x1f0 [ 393.866802][T10403] should_fail_ex+0x512/0x640 [ 393.866819][T10403] _copy_from_iter+0x29f/0x1720 [ 393.866836][T10403] ? __alloc_skb+0x200/0x380 [ 393.866849][T10403] ? __pfx__copy_from_iter+0x10/0x10 [ 393.866864][T10403] ? selinux_socket_getpeersec_dgram+0x1a4/0x370 [ 393.866880][T10403] ? __pfx_selinux_socket_getpeersec_dgram+0x10/0x10 [ 393.866900][T10403] netlink_sendmsg+0x829/0xdd0 [ 393.866918][T10403] ? __pfx_netlink_sendmsg+0x10/0x10 [ 393.866937][T10403] ____sys_sendmsg+0xa95/0xc70 [ 393.866955][T10403] ? copy_msghdr_from_user+0x10a/0x160 [ 393.866969][T10403] ? __pfx_____sys_sendmsg+0x10/0x10 [ 393.866991][T10403] ___sys_sendmsg+0x134/0x1d0 [ 393.867005][T10403] ? __pfx____sys_sendmsg+0x10/0x10 [ 393.867034][T10403] __sys_sendmsg+0x16d/0x220 [ 393.867048][T10403] ? __pfx___sys_sendmsg+0x10/0x10 [ 393.867069][T10403] do_syscall_64+0xcd/0x4e0 [ 393.867085][T10403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.867097][T10403] RIP: 0033:0x7fe56638eec9 [ 393.867106][T10403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.867117][T10403] RSP: 002b:00007fe5671bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.867128][T10403] RAX: ffffffffffffffda RBX: 00007fe5665e5fa0 RCX: 00007fe56638eec9 [ 393.867135][T10403] RDX: 0000000000000800 RSI: 00002000000000c0 RDI: 0000000000000003 [ 393.867142][T10403] RBP: 00007fe5671bf090 R08: 0000000000000000 R09: 0000000000000000 [ 393.867148][T10403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.867154][T10403] R13: 00007fe5665e6038 R14: 00007fe5665e5fa0 R15: 00007fff259465d8 [ 393.867168][T10403] [ 394.300956][T10408] netlink: 'syz.0.1196': attribute type 1 has an invalid length. [ 394.472483][T10408] bond2: entered promiscuous mode [ 394.491510][T10408] 8021q: adding VLAN 0 to HW filter on device bond2 [ 394.500121][T10412] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1195'. [ 394.511713][T10412] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 394.574142][T10411] 8021q: adding VLAN 0 to HW filter on device bond2 [ 394.623822][T10411] bond2: (slave vcan1): The slave device specified does not support setting the MAC address [ 394.636673][T10411] bond2: (slave vcan1): Setting fail_over_mac to active for active-backup mode [ 394.735506][T10411] bond2: (slave vcan1): making interface the new active one [ 394.742832][T10411] vcan1: entered promiscuous mode [ 394.769382][T10411] bond2: (slave vcan1): Enslaving as an active interface with an up link [ 397.073104][ T30] kauditd_printk_skb: 7047 callbacks suppressed [ 397.073119][ T30] audit: type=1400 audit(1758687372.991:76069): avc: denied { read } for pid=10457 comm="syz.3.1215" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 397.196999][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 397.201238][T10473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 397.210225][T10473] audit: audit_lost=4424 audit_rate_limit=0 audit_backlog_limit=64 [ 397.213770][ T5516] audit: audit_lost=4425 audit_rate_limit=0 audit_backlog_limit=64 [ 397.218635][ T30] audit: type=1400 audit(1758687373.001:76070): avc: denied { read append } for pid=10457 comm="syz.3.1215" name="nvme-fabrics" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 397.255230][T10473] audit: backlog limit exceeded [ 397.278220][T10475] audit: audit_backlog=65 > audit_backlog_limit=64 [ 397.295048][T10475] audit: audit_lost=4426 audit_rate_limit=0 audit_backlog_limit=64 [ 397.326930][T10475] audit: backlog limit exceeded [ 397.702693][T10481] veth11: entered promiscuous mode [ 397.710883][T10481] veth11: entered allmulticast mode [ 399.038629][T10507] FAULT_INJECTION: forcing a failure. [ 399.038629][T10507] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 399.073706][T10507] CPU: 0 UID: 0 PID: 10507 Comm: syz.1.1228 Not tainted syzkaller #0 PREEMPT(full) [ 399.073731][T10507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 399.073741][T10507] Call Trace: [ 399.073747][T10507] [ 399.073753][T10507] dump_stack_lvl+0x16c/0x1f0 [ 399.073779][T10507] should_fail_ex+0x512/0x640 [ 399.073804][T10507] _copy_to_user+0x32/0xd0 [ 399.073831][T10507] put_timespec64+0xb5/0x120 [ 399.073856][T10507] ? __pfx_put_timespec64+0x10/0x10 [ 399.073879][T10507] ? lockdep_hardirqs_on+0x7c/0x110 [ 399.073899][T10507] ? read_tsc+0x9/0x20 [ 399.073919][T10507] ? ktime_get_ts64+0x256/0x400 [ 399.073943][T10507] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 399.073964][T10507] poll_select_finish+0x557/0x6b0 [ 399.073983][T10507] ? __pfx_poll_select_finish+0x10/0x10 [ 399.074013][T10507] do_pselect.constprop.0+0x1b3/0x1e0 [ 399.074027][T10507] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 399.074044][T10507] __x64_sys_pselect6+0x182/0x240 [ 399.074056][T10507] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 399.074072][T10507] do_syscall_64+0xcd/0x4e0 [ 399.074088][T10507] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 399.074099][T10507] RIP: 0033:0x7f1a3538eec9 [ 399.074109][T10507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.074119][T10507] RSP: 002b:00007f1a36186038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 399.074131][T10507] RAX: ffffffffffffffda RBX: 00007f1a355e6090 RCX: 00007f1a3538eec9 [ 399.074138][T10507] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000040 [ 399.074144][T10507] RBP: 00007f1a36186090 R08: 0000200000000300 R09: 0000000000000000 [ 399.074150][T10507] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 399.074157][T10507] R13: 00007f1a355e6128 R14: 00007f1a355e6090 R15: 00007ffe49ebf178 [ 399.074170][T10507] [ 402.074800][ T30] kauditd_printk_skb: 9579 callbacks suppressed [ 402.074816][ T30] audit: type=1400 audit(1758687378.011:82289): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.132869][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 402.142879][ T5516] audit: audit_lost=5547 audit_rate_limit=0 audit_backlog_limit=64 [ 402.176861][ T5516] audit: backlog limit exceeded [ 402.203787][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 402.213747][ T30] audit: type=1400 audit(1758687378.011:82290): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.223754][ T5516] audit: audit_lost=5548 audit_rate_limit=0 audit_backlog_limit=64 [ 402.283383][ T30] audit: type=1400 audit(1758687378.011:82291): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 402.304550][ T5516] audit: backlog limit exceeded [ 402.304800][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 402.436342][T10548] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1241'. [ 403.211141][T10560] FAULT_INJECTION: forcing a failure. [ 403.211141][T10560] name failslab, interval 1, probability 0, space 0, times 0 [ 403.345978][T10560] CPU: 0 UID: 0 PID: 10560 Comm: syz.3.1245 Not tainted syzkaller #0 PREEMPT(full) [ 403.346003][T10560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 403.346014][T10560] Call Trace: [ 403.346020][T10560] [ 403.346027][T10560] dump_stack_lvl+0x16c/0x1f0 [ 403.346054][T10560] should_fail_ex+0x512/0x640 [ 403.346075][T10560] ? fs_reclaim_acquire+0xae/0x150 [ 403.346100][T10560] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 403.346125][T10560] should_failslab+0xc2/0x120 [ 403.346145][T10560] __kmalloc_noprof+0xd2/0x510 [ 403.346169][T10560] tomoyo_realpath_from_path+0xc2/0x6e0 [ 403.346197][T10560] ? tomoyo_profile+0x47/0x60 [ 403.346222][T10560] tomoyo_path_number_perm+0x245/0x580 [ 403.346243][T10560] ? tomoyo_path_number_perm+0x237/0x580 [ 403.346268][T10560] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 403.346291][T10560] ? find_held_lock+0x2b/0x80 [ 403.346336][T10560] ? find_held_lock+0x2b/0x80 [ 403.346355][T10560] ? hook_file_ioctl_common+0x145/0x410 [ 403.346380][T10560] ? __fget_files+0x20e/0x3c0 [ 403.346404][T10560] security_file_ioctl+0x9b/0x240 [ 403.346430][T10560] __x64_sys_ioctl+0xb7/0x210 [ 403.346458][T10560] do_syscall_64+0xcd/0x4e0 [ 403.346483][T10560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 403.346500][T10560] RIP: 0033:0x7fe94c18eec9 [ 403.346514][T10560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.346530][T10560] RSP: 002b:00007fe94cfb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.346548][T10560] RAX: ffffffffffffffda RBX: 00007fe94c3e5fa0 RCX: 00007fe94c18eec9 [ 403.346559][T10560] RDX: 0000000000000000 RSI: 0000000000005437 RDI: 0000000000000004 [ 403.346570][T10560] RBP: 00007fe94cfb4090 R08: 0000000000000000 R09: 0000000000000000 [ 403.346580][T10560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.346590][T10560] R13: 00007fe94c3e6038 R14: 00007fe94c3e5fa0 R15: 00007ffd1e7e6318 [ 403.346614][T10560] [ 403.346621][T10560] ERROR: Out of memory at tomoyo_realpath_from_path. [ 403.568083][T10566] sp0: Synchronizing with TNC [ 403.854817][T10580] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1253'. [ 404.397462][T10596] sp0: Synchronizing with TNC [ 405.683734][T10619] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1267'. [ 405.928285][T10623] FAULT_INJECTION: forcing a failure. [ 405.928285][T10623] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.989954][T10623] CPU: 1 UID: 0 PID: 10623 Comm: syz.1.1268 Not tainted syzkaller #0 PREEMPT(full) [ 405.989979][T10623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 405.989988][T10623] Call Trace: [ 405.989994][T10623] [ 405.990001][T10623] dump_stack_lvl+0x16c/0x1f0 [ 405.990026][T10623] should_fail_ex+0x512/0x640 [ 405.990051][T10623] _copy_from_iter+0x29f/0x1720 [ 405.990078][T10623] ? __alloc_skb+0x200/0x380 [ 405.990098][T10623] ? __pfx__copy_from_iter+0x10/0x10 [ 405.990123][T10623] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 405.990162][T10623] netlink_sendmsg+0x829/0xdd0 [ 405.990189][T10623] ? __pfx_netlink_sendmsg+0x10/0x10 [ 405.990221][T10623] ____sys_sendmsg+0xa95/0xc70 [ 405.990246][T10623] ? copy_msghdr_from_user+0x10a/0x160 [ 405.990266][T10623] ? __pfx_____sys_sendmsg+0x10/0x10 [ 405.990302][T10623] ___sys_sendmsg+0x134/0x1d0 [ 405.990324][T10623] ? __pfx____sys_sendmsg+0x10/0x10 [ 405.990374][T10623] __sys_sendmsg+0x16d/0x220 [ 405.990394][T10623] ? __pfx___sys_sendmsg+0x10/0x10 [ 405.990429][T10623] do_syscall_64+0xcd/0x4e0 [ 405.990454][T10623] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 405.990471][T10623] RIP: 0033:0x7f1a3538eec9 [ 405.990485][T10623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.990500][T10623] RSP: 002b:00007f1a361a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.990517][T10623] RAX: ffffffffffffffda RBX: 00007f1a355e5fa0 RCX: 00007f1a3538eec9 [ 405.990528][T10623] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 405.990538][T10623] RBP: 00007f1a361a7090 R08: 0000000000000000 R09: 0000000000000000 [ 405.990548][T10623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.990558][T10623] R13: 00007f1a355e6038 R14: 00007f1a355e5fa0 R15: 00007ffe49ebf178 [ 405.990581][T10623] [ 406.920295][T10638] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1274'. [ 407.084794][ T30] kauditd_printk_skb: 6090 callbacks suppressed [ 407.084809][ T30] audit: type=1400 audit(1758687383.011:87963): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 407.129584][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.137281][ T5516] audit: audit_lost=5689 audit_rate_limit=0 audit_backlog_limit=64 [ 407.138852][T10640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.145449][ T5516] audit: backlog limit exceeded [ 407.161899][ T30] audit: type=1400 audit(1758687383.021:87964): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 407.187359][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 407.197205][ T5516] audit: audit_lost=5690 audit_rate_limit=0 audit_backlog_limit=64 [ 407.205278][T10640] audit: audit_lost=5691 audit_rate_limit=0 audit_backlog_limit=64 [ 407.214482][ T30] audit: type=1400 audit(1758687383.021:87965): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 407.525988][T10649] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1279'. [ 408.345540][T10677] FAULT_INJECTION: forcing a failure. [ 408.345540][T10677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.513962][T10680] netlink: 'syz.1.1288': attribute type 4 has an invalid length. [ 408.579319][T10677] CPU: 1 UID: 0 PID: 10677 Comm: syz.4.1287 Not tainted syzkaller #0 PREEMPT(full) [ 408.579343][T10677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 408.579353][T10677] Call Trace: [ 408.579359][T10677] [ 408.579370][T10677] dump_stack_lvl+0x16c/0x1f0 [ 408.579399][T10677] should_fail_ex+0x512/0x640 [ 408.579425][T10677] _copy_from_user+0x2e/0xd0 [ 408.579451][T10677] memdup_user+0x6b/0xe0 [ 408.579470][T10677] strndup_user+0x78/0xe0 [ 408.579489][T10677] __x64_sys_mount+0x180/0x310 [ 408.579513][T10677] ? __pfx___x64_sys_mount+0x10/0x10 [ 408.579543][T10677] do_syscall_64+0xcd/0x4e0 [ 408.579568][T10677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 408.579586][T10677] RIP: 0033:0x7f89fcb8eec9 [ 408.579600][T10677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.579616][T10677] RSP: 002b:00007f89fadcd038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 408.579634][T10677] RAX: ffffffffffffffda RBX: 00007f89fcde6090 RCX: 00007f89fcb8eec9 [ 408.579646][T10677] RDX: 0000200000000200 RSI: 0000200000000100 RDI: 0000200000000040 [ 408.579657][T10677] RBP: 00007f89fadcd090 R08: 0000000000000000 R09: 0000000000000000 [ 408.579667][T10677] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000001 [ 408.579677][T10677] R13: 00007f89fcde6128 R14: 00007f89fcde6090 R15: 00007fff2ac818d8 [ 408.579701][T10677] [ 408.902163][T10678] netlink: 'syz.1.1288': attribute type 4 has an invalid length. [ 409.795723][T10692] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1291'. [ 411.660387][T10731] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1305'. [ 412.095278][ T30] kauditd_printk_skb: 7330 callbacks suppressed [ 412.095288][ T30] audit: type=1400 audit(1758687388.021:94145): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 412.162101][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 412.168998][ T5516] audit: audit_lost=6075 audit_rate_limit=0 audit_backlog_limit=64 [ 412.178821][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 412.188432][ T30] audit: type=1400 audit(1758687388.031:94146): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 412.191092][ T5844] audit: audit_lost=6076 audit_rate_limit=0 audit_backlog_limit=64 [ 412.249951][ T30] audit: type=1400 audit(1758687388.031:94147): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 412.250262][ T5844] audit: backlog limit exceeded [ 412.271493][ T5516] audit: backlog limit exceeded [ 412.281256][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 413.099872][T10761] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1317'. [ 413.357906][T10770] syz_tun (unregistering): left promiscuous mode [ 414.206164][T10801] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1330'. [ 414.818942][T10822] macvlan6: entered promiscuous mode [ 415.055774][T10829] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1342'. [ 416.250340][T10859] veth0_to_team: entered promiscuous mode [ 416.402883][T10863] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1353'. [ 416.589071][T10870] IPVS: sync thread started: state = MASTER, mcast_ifn = geneve1, syncid = 0, id = 0 [ 417.210628][ T30] kauditd_printk_skb: 9006 callbacks suppressed [ 417.210642][ T30] audit: type=1400 audit(1758687393.141:102564): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.380284][ T30] audit: type=1400 audit(1758687393.141:102565): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.454910][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 417.468212][ T30] audit: type=1400 audit(1758687393.141:102566): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.553385][ T5516] audit: audit_lost=6274 audit_rate_limit=0 audit_backlog_limit=64 [ 417.563181][T10885] netlink: 'syz.3.1360': attribute type 4 has an invalid length. [ 417.567140][ T30] audit: type=1400 audit(1758687393.141:102567): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.573021][ T5516] audit: backlog limit exceeded [ 417.647161][ T30] audit: type=1400 audit(1758687393.141:102568): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 417.652941][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 417.761538][T10890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 418.356543][T10902] macvlan7: entered promiscuous mode [ 418.448418][T10900] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1365'. [ 418.731217][T10906] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1368'. [ 419.601332][T10919] macvlan8: entered promiscuous mode [ 421.315441][T10943] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1378'. [ 421.965325][T10952] macvlan7: entered promiscuous mode [ 422.219063][ T5516] audit_log_start: 10068 callbacks suppressed [ 422.219079][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.234455][ T5516] audit: audit_lost=7782 audit_rate_limit=0 audit_backlog_limit=64 [ 422.242538][ T5516] audit: backlog limit exceeded [ 422.247706][ T30] audit: type=1400 audit(1758687398.121:108118): avc: denied { create } for pid=10951 comm="syz.3.1381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=0 [ 422.291776][ T30] audit: type=1400 audit(1758687398.131:108119): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 422.336984][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 422.653012][ T5516] audit: audit_lost=7783 audit_rate_limit=0 audit_backlog_limit=64 [ 422.662337][ T30] audit: type=1400 audit(1758687398.131:108120): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 422.673574][ T5516] audit: backlog limit exceeded [ 422.683836][ T30] audit: type=1400 audit(1758687398.141:108121): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 423.143311][T10971] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1389'. [ 423.607764][T10988] FAULT_INJECTION: forcing a failure. [ 423.607764][T10988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.675691][T10988] CPU: 1 UID: 0 PID: 10988 Comm: syz.4.1394 Not tainted syzkaller #0 PREEMPT(full) [ 423.675716][T10988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 423.675726][T10988] Call Trace: [ 423.675732][T10988] [ 423.675740][T10988] dump_stack_lvl+0x16c/0x1f0 [ 423.675767][T10988] should_fail_ex+0x512/0x640 [ 423.675794][T10988] _copy_from_user+0x2e/0xd0 [ 423.675820][T10988] vmemdup_user+0x66/0xe0 [ 423.675840][T10988] setxattr_copy+0x148/0x210 [ 423.675862][T10988] path_setxattrat+0x104/0x2a0 [ 423.675882][T10988] ? __pfx_path_setxattrat+0x10/0x10 [ 423.675905][T10988] ? ksys_write+0x190/0x250 [ 423.675943][T10988] ? fput+0x9b/0xd0 [ 423.675966][T10988] ? ksys_write+0x1ac/0x250 [ 423.675982][T10988] ? __pfx_ksys_write+0x10/0x10 [ 423.676004][T10988] __x64_sys_lsetxattr+0xc9/0x140 [ 423.676024][T10988] ? do_syscall_64+0x91/0x4e0 [ 423.676046][T10988] ? lockdep_hardirqs_on+0x7c/0x110 [ 423.676067][T10988] do_syscall_64+0xcd/0x4e0 [ 423.676091][T10988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.676109][T10988] RIP: 0033:0x7f89fcb8eec9 [ 423.676124][T10988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.676149][T10988] RSP: 002b:00007f89fadee038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 423.676166][T10988] RAX: ffffffffffffffda RBX: 00007f89fcde5fa0 RCX: 00007f89fcb8eec9 [ 423.676178][T10988] RDX: 0000200000000180 RSI: 0000200000000140 RDI: 00002000000000c0 [ 423.676188][T10988] RBP: 00007f89fadee090 R08: 0000000000000003 R09: 0000000000000000 [ 423.676199][T10988] R10: 000000000000001f R11: 0000000000000246 R12: 0000000000000001 [ 423.676210][T10988] R13: 00007f89fcde6038 R14: 00007f89fcde5fa0 R15: 00007fff2ac818d8 [ 423.676233][T10988] [ 424.548426][T11006] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1401'. [ 424.658725][T11013] macvlan7: entered promiscuous mode [ 426.641073][T11042] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1412'. [ 427.235341][ T30] kauditd_printk_skb: 5248 callbacks suppressed [ 427.235357][ T30] audit: type=1400 audit(1758687403.171:112743): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 427.350556][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.357625][ T30] audit: type=1400 audit(1758687403.251:112744): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 427.381614][ T5516] audit: audit_lost=7993 audit_rate_limit=0 audit_backlog_limit=64 [ 427.396884][ T5516] audit: backlog limit exceeded [ 427.408430][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 427.420922][ T30] audit: type=1400 audit(1758687403.251:112745): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 427.450405][ T5516] audit: audit_lost=7994 audit_rate_limit=0 audit_backlog_limit=64 [ 427.467185][ T5516] audit: backlog limit exceeded [ 427.477564][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 429.020138][T11073] FAULT_INJECTION: forcing a failure. [ 429.020138][T11073] name failslab, interval 1, probability 0, space 0, times 0 [ 429.047216][T11073] CPU: 0 UID: 0 PID: 11073 Comm: syz.4.1421 Not tainted syzkaller #0 PREEMPT(full) [ 429.047242][T11073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 429.047253][T11073] Call Trace: [ 429.047259][T11073] [ 429.047266][T11073] dump_stack_lvl+0x16c/0x1f0 [ 429.047294][T11073] should_fail_ex+0x512/0x640 [ 429.047317][T11073] ? kmem_cache_alloc_lru_noprof+0x5f/0x3b0 [ 429.047338][T11073] should_failslab+0xc2/0x120 [ 429.047358][T11073] kmem_cache_alloc_lru_noprof+0x72/0x3b0 [ 429.047375][T11073] ? reacquire_held_locks+0xcd/0x1f0 [ 429.047403][T11073] ? __d_alloc+0x32/0xae0 [ 429.047428][T11073] __d_alloc+0x32/0xae0 [ 429.047453][T11073] d_alloc_parallel+0x111/0x1480 [ 429.047485][T11073] ? find_held_lock+0x2b/0x80 [ 429.047508][T11073] ? __d_lookup+0x25c/0x4a0 [ 429.047534][T11073] ? __pfx_d_alloc_parallel+0x10/0x10 [ 429.047562][T11073] ? __d_lookup+0x266/0x4a0 [ 429.047587][T11073] ? lockdep_init_map_type+0x5c/0x280 [ 429.047606][T11073] ? lockdep_init_map_type+0x5c/0x280 [ 429.047628][T11073] proc_fill_cache+0x2e6/0x470 [ 429.047652][T11073] ? __pfx_proc_task_instantiate+0x10/0x10 [ 429.047678][T11073] ? __pfx_proc_fill_cache+0x10/0x10 [ 429.047701][T11073] ? __pfx_vsnprintf+0x10/0x10 [ 429.047730][T11073] ? snprintf+0xc7/0x100 [ 429.047756][T11073] ? __task_pid_nr_ns+0x17c/0x500 [ 429.047781][T11073] proc_task_readdir+0x4c2/0xf00 [ 429.047806][T11073] ? proc_task_readdir+0x3c3/0xf00 [ 429.047834][T11073] ? __pfx_proc_task_readdir+0x10/0x10 [ 429.047857][T11073] ? btrfs_update_block_group+0x2f0/0x13b0 [ 429.047887][T11073] iterate_dir+0x293/0xaf0 [ 429.047918][T11073] __x64_sys_getdents64+0x13c/0x2c0 [ 429.047936][T11073] ? __pfx___x64_sys_getdents64+0x10/0x10 [ 429.047954][T11073] ? __pfx_filldir64+0x10/0x10 [ 429.047995][T11073] do_syscall_64+0xcd/0x4e0 [ 429.048021][T11073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.048039][T11073] RIP: 0033:0x7f89fcb8eec9 [ 429.048053][T11073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.048070][T11073] RSP: 002b:00007f89fadcd038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 429.048088][T11073] RAX: ffffffffffffffda RBX: 00007f89fcde6090 RCX: 00007f89fcb8eec9 [ 429.048099][T11073] RDX: 000000000000004f RSI: 0000200000000340 RDI: 0000000000000007 [ 429.048110][T11073] RBP: 00007f89fadcd090 R08: 0000000000000000 R09: 0000000000000000 [ 429.048120][T11073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.048130][T11073] R13: 00007f89fcde6128 R14: 00007f89fcde6090 R15: 00007fff2ac818d8 [ 429.048153][T11073] [ 429.717899][T11081] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1424'. [ 432.261305][ T30] kauditd_printk_skb: 5730 callbacks suppressed [ 432.261318][ T30] audit: type=1400 audit(1758687408.151:117808): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 432.357961][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.364702][ T5516] audit: audit_lost=8218 audit_rate_limit=0 audit_backlog_limit=64 [ 432.373091][ T5516] audit: backlog limit exceeded [ 432.378224][ T30] audit: type=1400 audit(1758687408.251:117809): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 432.402355][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.409020][ T5516] audit: audit_lost=8219 audit_rate_limit=0 audit_backlog_limit=64 [ 432.417184][ T5516] audit: backlog limit exceeded [ 432.422165][ T30] audit: type=1400 audit(1758687408.251:117810): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 432.444209][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 432.997608][T11120] FAULT_INJECTION: forcing a failure. [ 432.997608][T11120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.014417][T11120] CPU: 1 UID: 0 PID: 11120 Comm: syz.4.1435 Not tainted syzkaller #0 PREEMPT(full) [ 433.014437][T11120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 433.014443][T11120] Call Trace: [ 433.014448][T11120] [ 433.014452][T11120] dump_stack_lvl+0x16c/0x1f0 [ 433.014469][T11120] should_fail_ex+0x512/0x640 [ 433.014487][T11120] _copy_from_user+0x2e/0xd0 [ 433.014503][T11120] memdup_user+0x6b/0xe0 [ 433.014516][T11120] strndup_user+0x78/0xe0 [ 433.014528][T11120] __x64_sys_mount+0x180/0x310 [ 433.014543][T11120] ? __pfx___x64_sys_mount+0x10/0x10 [ 433.014562][T11120] do_syscall_64+0xcd/0x4e0 [ 433.014578][T11120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.014589][T11120] RIP: 0033:0x7f89fcb8eec9 [ 433.014598][T11120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.014609][T11120] RSP: 002b:00007f89fadee038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 433.014620][T11120] RAX: ffffffffffffffda RBX: 00007f89fcde5fa0 RCX: 00007f89fcb8eec9 [ 433.014627][T11120] RDX: 0000200000000180 RSI: 0000200000000040 RDI: 0000200000000140 [ 433.014634][T11120] RBP: 00007f89fadee090 R08: 0000000000000000 R09: 0000000000000000 [ 433.014640][T11120] R10: 0000000002208004 R11: 0000000000000246 R12: 0000000000000001 [ 433.014646][T11120] R13: 00007f89fcde6038 R14: 00007f89fcde5fa0 R15: 00007fff2ac818d8 [ 433.014659][T11120] [ 433.352980][T11129] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1437'. [ 433.673961][T11142] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1438'. [ 433.697011][T11142] geneve2: entered allmulticast mode [ 434.567192][T11151] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1444'. [ 434.901587][T11163] FAULT_INJECTION: forcing a failure. [ 434.901587][T11163] name failslab, interval 1, probability 0, space 0, times 0 [ 434.920769][T11163] CPU: 1 UID: 0 PID: 11163 Comm: syz.2.1447 Not tainted syzkaller #0 PREEMPT(full) [ 434.920793][T11163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 434.920802][T11163] Call Trace: [ 434.920808][T11163] [ 434.920815][T11163] dump_stack_lvl+0x16c/0x1f0 [ 434.920842][T11163] should_fail_ex+0x512/0x640 [ 434.920863][T11163] ? __kmalloc_noprof+0xbf/0x510 [ 434.920883][T11163] ? constrain_params_by_rules+0x175/0xca0 [ 434.920910][T11163] should_failslab+0xc2/0x120 [ 434.920931][T11163] __kmalloc_noprof+0xd2/0x510 [ 434.920948][T11163] ? unwind_get_return_address+0x59/0xa0 [ 434.920974][T11163] constrain_params_by_rules+0x175/0xca0 [ 434.921011][T11163] ? stack_trace_save+0x8e/0xc0 [ 434.921039][T11163] ? __pfx_constrain_params_by_rules+0x10/0x10 [ 434.921071][T11163] ? __kasan_kmalloc+0xaa/0xb0 [ 434.921087][T11163] ? snd_pcm_oss_change_params_locked+0x247/0x3a30 [ 434.921113][T11163] ? snd_pcm_oss_make_ready_locked+0xb7/0x130 [ 434.921138][T11163] ? snd_pcm_oss_read+0x39b/0x760 [ 434.921161][T11163] ? rcu_is_watching+0x12/0xc0 [ 434.921182][T11163] ? snd_interval_refine+0x2fa/0x580 [ 434.921205][T11163] snd_pcm_hw_refine+0x7de/0xad0 [ 434.921237][T11163] ? __pfx_snd_pcm_hw_refine+0x10/0x10 [ 434.921272][T11163] ? __asan_memset+0x23/0x50 [ 434.921297][T11163] ? _snd_pcm_hw_param_min+0x259/0x630 [ 434.921326][T11163] snd_pcm_oss_change_params_locked+0x65e/0x3a30 [ 434.921361][T11163] ? __mutex_lock+0x1c5/0x1060 [ 434.921386][T11163] ? __pfx_snd_pcm_oss_change_params_locked+0x10/0x10 [ 434.921420][T11163] ? __lock_acquire+0x62e/0x1ce0 [ 434.921452][T11163] ? import_ubuf+0x1b6/0x220 [ 434.921479][T11163] snd_pcm_oss_make_ready_locked+0xb7/0x130 [ 434.921508][T11163] snd_pcm_oss_read+0x39b/0x760 [ 434.921525][T11163] ? security_file_permission+0x71/0x210 [ 434.921555][T11163] ? __pfx_snd_pcm_oss_read+0x10/0x10 [ 434.921571][T11163] vfs_readv+0x5c1/0x8b0 [ 434.921594][T11163] ? __pfx_vfs_readv+0x10/0x10 [ 434.921629][T11163] ? __fget_files+0x20e/0x3c0 [ 434.921646][T11163] ? __fget_files+0x190/0x3c0 [ 434.921672][T11163] ? do_readv+0x132/0x340 [ 434.921686][T11163] do_readv+0x132/0x340 [ 434.921702][T11163] ? __pfx_do_readv+0x10/0x10 [ 434.921726][T11163] do_syscall_64+0xcd/0x4e0 [ 434.921750][T11163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 434.921767][T11163] RIP: 0033:0x7fe56638eec9 [ 434.921782][T11163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.921799][T11163] RSP: 002b:00007fe56719e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 434.921816][T11163] RAX: ffffffffffffffda RBX: 00007fe5665e6090 RCX: 00007fe56638eec9 [ 434.921828][T11163] RDX: 0000000000000001 RSI: 00002000000002c0 RDI: 0000000000000003 [ 434.921838][T11163] RBP: 00007fe56719e090 R08: 0000000000000000 R09: 0000000000000000 [ 434.921849][T11163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.921859][T11163] R13: 00007fe5665e6128 R14: 00007fe5665e6090 R15: 00007fff259465d8 [ 434.921883][T11163] [ 436.420622][T11178] macvlan7: entered promiscuous mode [ 437.263785][ T30] kauditd_printk_skb: 7194 callbacks suppressed [ 437.263799][ T30] audit: type=1400 audit(1758687413.191:121178): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 437.437090][ T5858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.454532][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.494950][ T5516] audit: audit_lost=9496 audit_rate_limit=0 audit_backlog_limit=64 [ 437.510272][T11196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.518041][ T30] audit: type=1400 audit(1758687413.231:121179): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 437.539746][ T5516] audit: backlog limit exceeded [ 437.553744][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 437.561488][ T5516] audit: audit_lost=9497 audit_rate_limit=0 audit_backlog_limit=64 [ 437.571072][T11196] audit: audit_lost=9498 audit_rate_limit=0 audit_backlog_limit=64 [ 437.591904][T11196] macvlan9: entered promiscuous mode [ 439.570958][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.595459][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 440.549392][T11242] macvlan3: entered promiscuous mode [ 440.617275][T11245] veth13: entered promiscuous mode [ 440.622549][T11245] veth13: entered allmulticast mode [ 440.866526][T11251] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1475'. [ 441.004132][T11255] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1477'. [ 442.275051][ T30] kauditd_printk_skb: 9533 callbacks suppressed [ 442.275067][ T30] audit: type=1400 audit(1758687418.211:125558): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 442.309517][ T30] audit: type=1400 audit(1758687418.211:125559): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 443.348954][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 443.349309][ T5858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 443.366996][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 443.373486][ T8130] audit: audit_lost=11217 audit_rate_limit=0 audit_backlog_limit=64 [ 443.382045][ T8130] audit: backlog limit exceeded [ 443.388593][ T30] audit: type=1400 audit(1758687418.211:125560): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 443.409813][ T5858] audit: audit_lost=11218 audit_rate_limit=0 audit_backlog_limit=64 [ 443.409831][ T5858] audit: backlog limit exceeded [ 443.482475][T11279] veth17: entered promiscuous mode [ 443.498277][T11279] veth17: entered allmulticast mode [ 443.564692][T11285] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1487'. [ 444.535418][T11302] veth9: entered promiscuous mode [ 444.549337][T11302] veth9: entered allmulticast mode [ 446.182138][T11332] macvlan8: entered promiscuous mode [ 446.187558][T11332] macvlan8: entered allmulticast mode [ 447.061772][T11335] veth5: entered promiscuous mode [ 447.071867][T11335] veth5: entered allmulticast mode [ 447.287448][ T30] kauditd_printk_skb: 11031 callbacks suppressed [ 447.287464][ T30] audit: type=1400 audit(1758687423.221:129573): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.332931][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.366263][ T5516] audit: audit_lost=13559 audit_rate_limit=0 audit_backlog_limit=64 [ 447.376705][ T5858] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.400885][ T5516] audit: backlog limit exceeded [ 447.416162][ T30] audit: type=1400 audit(1758687423.221:129574): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 447.437515][ T5858] audit: audit_lost=13560 audit_rate_limit=0 audit_backlog_limit=64 [ 447.453829][T11340] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.462771][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 447.470628][T11340] audit: audit_lost=13561 audit_rate_limit=0 audit_backlog_limit=64 [ 447.500087][T11340] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1503'. [ 448.894508][T11364] netlink: 'syz.4.1510': attribute type 11 has an invalid length. [ 448.952419][T11359] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1507'. [ 449.408540][T11374] veth11: entered promiscuous mode [ 449.415936][T11374] veth11: entered allmulticast mode [ 449.562094][T11378] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1515'. [ 451.033819][T11401] could not allocate digest TFM handle  [ 452.186335][T11415] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1526'. [ 452.295026][ T30] kauditd_printk_skb: 4457 callbacks suppressed [ 452.295041][ T30] audit: type=1400 audit(1758687428.231:133824): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 452.311800][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.356128][T11418] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.364033][ T5516] audit: audit_lost=13631 audit_rate_limit=0 audit_backlog_limit=64 [ 452.372151][T11418] audit: audit_lost=13632 audit_rate_limit=0 audit_backlog_limit=64 [ 452.380956][ T5516] audit: backlog limit exceeded [ 452.393312][ T30] audit: type=1400 audit(1758687428.231:133825): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 452.416218][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 452.429930][T11418] audit: backlog limit exceeded [ 452.435119][T11419] audit: audit_backlog=65 > audit_backlog_limit=64 [ 453.455225][T11433] macvlan8: entered promiscuous mode [ 454.366017][T11457] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.1539'. [ 455.646515][T11481] macvlan10: entered promiscuous mode [ 456.651530][T11496] macvlan11: entered promiscuous mode [ 457.304549][ T30] kauditd_printk_skb: 25584 callbacks suppressed [ 457.304565][ T30] audit: type=1400 audit(1758687433.241:139483): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.351082][ T30] audit: type=1400 audit(1758687433.241:139484): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.376514][ T30] audit: type=1400 audit(1758687433.241:139485): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.404748][ T30] audit: type=1400 audit(1758687433.241:139486): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.429876][ T30] audit: type=1400 audit(1758687433.241:139487): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.430402][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 457.453337][ T30] audit: type=1400 audit(1758687433.241:139488): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.481026][ T30] audit: type=1400 audit(1758687433.241:139489): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.531000][ T30] audit: type=1400 audit(1758687433.241:139490): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 457.565498][T11508] audit: audit_backlog=65 > audit_backlog_limit=64 [ 457.950116][T11519] netlink: 'syz.2.1557': attribute type 4 has an invalid length. [ 458.084673][T11519] netlink: 'syz.2.1557': attribute type 4 has an invalid length. [ 459.491216][T11549] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 461.318311][T11571] netlink: 'syz.4.1574': attribute type 4 has an invalid length. [ 461.385083][T11571] netlink: 'syz.4.1574': attribute type 4 has an invalid length. [ 462.314786][ T30] kauditd_printk_skb: 5711 callbacks suppressed [ 462.314797][ T30] audit: type=1400 audit(1758687438.251:144364): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 462.368395][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 462.375152][ T30] audit: type=1400 audit(1758687438.281:144365): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 462.396658][ T5516] audit: audit_lost=20556 audit_rate_limit=0 audit_backlog_limit=64 [ 462.404933][ T5516] audit: backlog limit exceeded [ 462.410099][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 462.478741][ T30] audit: type=1400 audit(1758687438.281:144366): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 462.505372][ T5516] audit: audit_lost=20557 audit_rate_limit=0 audit_backlog_limit=64 [ 462.529729][ T5516] audit: backlog limit exceeded [ 462.551300][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 463.128808][T11593] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 467.329055][ T30] kauditd_printk_skb: 6057 callbacks suppressed [ 467.329071][ T30] audit: type=1400 audit(1758687443.251:150419): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 467.370050][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.385545][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.392034][ T8130] audit: audit_lost=20560 audit_rate_limit=0 audit_backlog_limit=64 [ 467.403262][ T5516] audit: audit_lost=20561 audit_rate_limit=0 audit_backlog_limit=64 [ 467.438396][ T30] audit: type=1400 audit(1758687443.251:150420): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 467.462294][ T30] audit: type=1400 audit(1758687443.251:150421): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 467.486813][ T30] audit: type=1400 audit(1758687443.251:150422): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 467.537206][ T5516] audit: backlog limit exceeded [ 467.547260][ T8130] audit: backlog limit exceeded [ 468.448543][T11646] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 468.681859][T11655] veth15: entered promiscuous mode [ 468.687236][T11655] veth15: entered allmulticast mode [ 469.125793][T11658] netlink: 'syz.0.1601': attribute type 4 has an invalid length. [ 469.164310][T11658] netlink: 'syz.0.1601': attribute type 4 has an invalid length. [ 472.159896][T11696] veth13: entered promiscuous mode [ 472.168605][T11696] veth13: entered allmulticast mode [ 472.335697][ T30] kauditd_printk_skb: 8793 callbacks suppressed [ 472.335711][ T30] audit: type=1400 audit(1758687448.271:157458): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 472.385553][ T30] audit: type=1400 audit(1758687448.301:157459): avc: denied { execmem } for pid=11704 comm="syz.0.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 472.409198][T11703] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 472.466145][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.471859][ T30] audit: type=1400 audit(1758687448.311:157460): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 472.497774][T11710] audit: audit_backlog=65 > audit_backlog_limit=64 [ 472.505161][T11710] audit: audit_lost=21148 audit_rate_limit=0 audit_backlog_limit=64 [ 472.513223][ T30] audit: type=1400 audit(1758687448.311:157461): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 472.516684][ T5516] audit: audit_lost=21149 audit_rate_limit=0 audit_backlog_limit=64 [ 472.542926][T11710] audit: backlog limit exceeded [ 472.556689][T11710] macvlan9: entered promiscuous mode [ 472.563893][ T30] audit: type=1400 audit(1758687448.311:157462): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 473.189243][T11722] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1618'. [ 474.736833][T11744] veth17: entered promiscuous mode [ 474.742082][T11744] veth17: entered allmulticast mode [ 476.273025][T11762] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 477.343590][ T30] kauditd_printk_skb: 5115 callbacks suppressed [ 477.343606][ T30] audit: type=1400 audit(1758687453.271:162562): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 477.361038][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 477.371629][ T30] audit: type=1400 audit(1758687453.281:162563): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 477.379771][ T5516] audit: audit_lost=21155 audit_rate_limit=0 audit_backlog_limit=64 [ 477.399301][ T30] audit: type=1400 audit(1758687453.281:162564): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 477.429050][ T30] audit: type=1400 audit(1758687453.281:162565): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 477.452273][ T5516] audit: backlog limit exceeded [ 477.458140][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 477.467179][ T5516] audit: audit_lost=21156 audit_rate_limit=0 audit_backlog_limit=64 [ 477.475489][ T5516] audit: backlog limit exceeded [ 477.639754][T11786] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1638'. [ 478.115891][T11792] macvlan10: entered promiscuous mode [ 479.071478][T11810] FAULT_INJECTION: forcing a failure. [ 479.071478][T11810] name failslab, interval 1, probability 0, space 0, times 0 [ 479.106356][T11810] CPU: 1 UID: 0 PID: 11810 Comm: syz.3.1644 Not tainted syzkaller #0 PREEMPT(full) [ 479.106381][T11810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 479.106392][T11810] Call Trace: [ 479.106398][T11810] [ 479.106405][T11810] dump_stack_lvl+0x16c/0x1f0 [ 479.106437][T11810] should_fail_ex+0x512/0x640 [ 479.106458][T11810] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 479.106477][T11810] should_failslab+0xc2/0x120 [ 479.106497][T11810] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 479.106515][T11810] ? security_file_alloc+0x34/0x2b0 [ 479.106545][T11810] security_file_alloc+0x34/0x2b0 [ 479.106571][T11810] init_file+0x93/0x4c0 [ 479.106594][T11810] alloc_empty_file+0x73/0x1e0 [ 479.106618][T11810] path_openat+0xda/0x2cb0 [ 479.106636][T11810] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.106662][T11810] ? __pfx_path_openat+0x10/0x10 [ 479.106688][T11810] do_filp_open+0x20b/0x470 [ 479.106707][T11810] ? __pfx_do_filp_open+0x10/0x10 [ 479.106744][T11810] ? alloc_fd+0x471/0x7d0 [ 479.106771][T11810] do_sys_openat2+0x11b/0x1d0 [ 479.106795][T11810] ? __pfx_do_sys_openat2+0x10/0x10 [ 479.106816][T11810] ? find_held_lock+0x2b/0x80 [ 479.106838][T11810] ? handle_mm_fault+0x2ab/0xd10 [ 479.106870][T11810] __x64_sys_openat+0x174/0x210 [ 479.106892][T11810] ? __pfx___x64_sys_openat+0x10/0x10 [ 479.106919][T11810] ? do_user_addr_fault+0x843/0x1370 [ 479.106943][T11810] do_syscall_64+0xcd/0x4e0 [ 479.106967][T11810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.106984][T11810] RIP: 0033:0x7fe94c18d710 [ 479.106999][T11810] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 479.107014][T11810] RSP: 002b:00007fe94cf92b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 479.107031][T11810] RAX: ffffffffffffffda RBX: 0000000000082080 RCX: 00007fe94c18d710 [ 479.107042][T11810] RDX: 0000000000082080 RSI: 00007fe94cf92c10 RDI: 00000000ffffff9c [ 479.107053][T11810] RBP: 00007fe94cf92c10 R08: 0000000000000000 R09: 0000000000000000 [ 479.107063][T11810] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 479.107073][T11810] R13: 00007fe94c3e6128 R14: 00007fe94c3e6090 R15: 00007ffd1e7e6318 [ 479.107096][T11810] [ 481.836746][T11839] macvlan4: entered promiscuous mode [ 482.359223][ T30] kauditd_printk_skb: 9535 callbacks suppressed [ 482.359238][ T30] audit: type=1400 audit(1758687458.291:168168): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.435955][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 482.461584][ T5516] audit: audit_lost=22468 audit_rate_limit=0 audit_backlog_limit=64 [ 482.477231][ T5516] audit: backlog limit exceeded [ 482.490921][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 482.501485][ T30] audit: type=1400 audit(1758687458.291:168169): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.526902][ T5516] audit: audit_lost=22469 audit_rate_limit=0 audit_backlog_limit=64 [ 482.536065][ T30] audit: type=1400 audit(1758687458.321:168170): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.559030][ T30] audit: type=1400 audit(1758687458.321:168171): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 482.566061][ T5516] audit: backlog limit exceeded [ 482.916438][T11856] veth7: entered promiscuous mode [ 482.927828][T11856] veth7: entered allmulticast mode [ 483.990770][T11880] macvlan11: entered promiscuous mode [ 484.572018][T11888] veth11: entered promiscuous mode [ 484.579719][T11888] veth11: entered allmulticast mode [ 486.066611][T11917] FAULT_INJECTION: forcing a failure. [ 486.066611][T11917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.110686][T11917] CPU: 1 UID: 0 PID: 11917 Comm: syz.2.1681 Not tainted syzkaller #0 PREEMPT(full) [ 486.110711][T11917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 486.110721][T11917] Call Trace: [ 486.110727][T11917] [ 486.110733][T11917] dump_stack_lvl+0x16c/0x1f0 [ 486.110759][T11917] should_fail_ex+0x512/0x640 [ 486.110784][T11917] should_fail_alloc_page+0xe7/0x130 [ 486.110806][T11917] prepare_alloc_pages+0x3c2/0x610 [ 486.110833][T11917] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 486.110854][T11917] ? do_sys_poll+0x24a/0xdf0 [ 486.110872][T11917] ? stack_trace_save+0x8e/0xc0 [ 486.110895][T11917] ? __pfx_stack_trace_save+0x10/0x10 [ 486.110917][T11917] ? stack_depot_save_flags+0x29/0x9c0 [ 486.110942][T11917] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 486.110960][T11917] ? do_sys_poll+0x24a/0xdf0 [ 486.110976][T11917] ? kasan_save_stack+0x33/0x60 [ 486.110993][T11917] ? __kasan_kmalloc+0xaa/0xb0 [ 486.111013][T11917] ? __kmalloc_noprof+0x223/0x510 [ 486.111028][T11917] ? do_sys_poll+0x24a/0xdf0 [ 486.111042][T11917] ? __x64_sys_ppoll+0x254/0x2d0 [ 486.111058][T11917] ? do_syscall_64+0xcd/0x4e0 [ 486.111079][T11917] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.111101][T11917] ? __lock_acquire+0xb97/0x1ce0 [ 486.111131][T11917] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 486.111153][T11917] ? policy_nodemask+0xea/0x4e0 [ 486.111176][T11917] alloc_pages_mpol+0x1fb/0x550 [ 486.111198][T11917] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 486.111226][T11917] alloc_pages_noprof+0x131/0x390 [ 486.111246][T11917] get_free_pages_noprof+0x10/0xb0 [ 486.111267][T11917] __pollwait+0x295/0x490 [ 486.111292][T11917] pipe_poll+0x23c/0x660 [ 486.111310][T11917] ? __pfx___pollwait+0x10/0x10 [ 486.111327][T11917] ? __pfx_pipe_poll+0x10/0x10 [ 486.111344][T11917] do_sys_poll+0x55c/0xdf0 [ 486.111368][T11917] ? __pfx_do_sys_poll+0x10/0x10 [ 486.111396][T11917] ? find_held_lock+0x2b/0x80 [ 486.111409][T11917] ? __pfx___pollwait+0x10/0x10 [ 486.111422][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111433][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111445][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111456][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111468][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111479][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111491][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111502][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111513][T11917] ? __pfx_pollwake+0x10/0x10 [ 486.111524][T11917] ? __mutex_unlock_slowpath+0x161/0x7b0 [ 486.111542][T11917] ? set_user_sigmask+0x21b/0x2b0 [ 486.111561][T11917] ? __pfx_set_user_sigmask+0x10/0x10 [ 486.111579][T11917] ? __fget_files+0x20e/0x3c0 [ 486.111595][T11917] __x64_sys_ppoll+0x254/0x2d0 [ 486.111608][T11917] ? __pfx___x64_sys_ppoll+0x10/0x10 [ 486.111619][T11917] ? ksys_write+0x1ac/0x250 [ 486.111630][T11917] ? __pfx_ksys_write+0x10/0x10 [ 486.111645][T11917] do_syscall_64+0xcd/0x4e0 [ 486.111667][T11917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.111684][T11917] RIP: 0033:0x7fe56638eec9 [ 486.111694][T11917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.111705][T11917] RSP: 002b:00007fe5671bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 486.111716][T11917] RAX: ffffffffffffffda RBX: 00007fe5665e5fa0 RCX: 00007fe56638eec9 [ 486.111723][T11917] RDX: 0000000000000000 RSI: 20000000000000dc RDI: 00002000000000c0 [ 486.111729][T11917] RBP: 00007fe5671bf090 R08: 0000000000000000 R09: 0000000000000000 [ 486.111736][T11917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.111742][T11917] R13: 00007fe5665e6038 R14: 00007fe5665e5fa0 R15: 00007fff259465d8 [ 486.111755][T11917] [ 486.875483][T11920] macvlan9: entered promiscuous mode [ 487.122970][T11928] veth19: entered promiscuous mode [ 487.130721][T11928] veth19: entered allmulticast mode [ 487.366297][ T30] kauditd_printk_skb: 9676 callbacks suppressed [ 487.366313][ T30] audit: type=1400 audit(1758687463.301:177725): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 487.385140][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.401505][T11933] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.408859][ T5516] audit: audit_lost=22511 audit_rate_limit=0 audit_backlog_limit=64 [ 487.417147][T11933] audit: audit_lost=22512 audit_rate_limit=0 audit_backlog_limit=64 [ 487.417288][ T5516] audit: backlog limit exceeded [ 487.430420][T11933] audit: backlog limit exceeded [ 487.432288][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 487.440539][ T30] audit: type=1400 audit(1758687463.301:177726): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 487.441995][ T5516] audit: audit_lost=22513 audit_rate_limit=0 audit_backlog_limit=64 [ 488.034879][T11942] FAULT_INJECTION: forcing a failure. [ 488.034879][T11942] name failslab, interval 1, probability 0, space 0, times 0 [ 488.052982][T11942] CPU: 0 UID: 0 PID: 11942 Comm: syz.3.1690 Not tainted syzkaller #0 PREEMPT(full) [ 488.053007][T11942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 488.053016][T11942] Call Trace: [ 488.053022][T11942] [ 488.053029][T11942] dump_stack_lvl+0x16c/0x1f0 [ 488.053056][T11942] should_fail_ex+0x512/0x640 [ 488.053078][T11942] ? fs_reclaim_acquire+0xae/0x150 [ 488.053104][T11942] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 488.053130][T11942] should_failslab+0xc2/0x120 [ 488.053151][T11942] __kmalloc_noprof+0xd2/0x510 [ 488.053174][T11942] tomoyo_realpath_from_path+0xc2/0x6e0 [ 488.053203][T11942] ? tomoyo_profile+0x47/0x60 [ 488.053224][T11942] tomoyo_path_number_perm+0x245/0x580 [ 488.053245][T11942] ? tomoyo_path_number_perm+0x237/0x580 [ 488.053275][T11942] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 488.053298][T11942] ? find_held_lock+0x2b/0x80 [ 488.053343][T11942] ? find_held_lock+0x2b/0x80 [ 488.053363][T11942] ? hook_file_ioctl_common+0x145/0x410 [ 488.053387][T11942] ? __fget_files+0x20e/0x3c0 [ 488.053411][T11942] security_file_ioctl+0x9b/0x240 [ 488.053438][T11942] __x64_sys_ioctl+0xb7/0x210 [ 488.053470][T11942] do_syscall_64+0xcd/0x4e0 [ 488.053495][T11942] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 488.053511][T11942] RIP: 0033:0x7fe94c18eec9 [ 488.053525][T11942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 488.053542][T11942] RSP: 002b:00007fe94cf93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 488.053559][T11942] RAX: ffffffffffffffda RBX: 00007fe94c3e6090 RCX: 00007fe94c18eec9 [ 488.053571][T11942] RDX: 0000200000000000 RSI: 0000000000005412 RDI: 0000000000000007 [ 488.053581][T11942] RBP: 00007fe94cf93090 R08: 0000000000000000 R09: 0000000000000000 [ 488.053591][T11942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 488.053601][T11942] R13: 00007fe94c3e6128 R14: 00007fe94c3e6090 R15: 00007ffd1e7e6318 [ 488.053625][T11942] [ 488.253213][T11942] ERROR: Out of memory at tomoyo_realpath_from_path. [ 488.430141][T11947] macvlan8: entered promiscuous mode [ 489.284074][T11962] veth13: entered promiscuous mode [ 489.289473][T11962] veth13: entered allmulticast mode [ 490.625960][T11987] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1704'. [ 491.266498][T12001] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 492.375698][ T30] kauditd_printk_skb: 10452 callbacks suppressed [ 492.375713][ T30] audit: type=1400 audit(1758687468.311:185814): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.403324][ C0] vkms_vblank_simulate: vblank timer overrun [ 492.409608][ T30] audit: type=1400 audit(1758687468.311:185815): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.411830][T12024] macvlan5: entered promiscuous mode [ 492.462471][ T30] audit: type=1400 audit(1758687468.311:185816): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.530023][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 492.561093][ T5516] audit: audit_lost=23302 audit_rate_limit=0 audit_backlog_limit=64 [ 492.562172][ T30] audit: type=1400 audit(1758687468.311:185817): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.590758][ C0] vkms_vblank_simulate: vblank timer overrun [ 492.597316][ T30] audit: type=1400 audit(1758687468.311:185818): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.623283][ T30] audit: type=1400 audit(1758687468.311:185819): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.644607][ T30] audit: type=1400 audit(1758687468.311:185820): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 492.653230][ T5516] audit: backlog limit exceeded [ 494.172066][T12059] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 496.034489][T12097] 8021q: adding VLAN 0 to HW filter on device bond1 [ 496.078585][T12102] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 496.144734][ T44] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 496.170895][T12104] bond_slave_0: entered promiscuous mode [ 496.176737][T12104] bond_slave_1: entered promiscuous mode [ 496.207291][T12104] 8021q: adding VLAN 0 to HW filter on device macvlan10 [ 496.225996][T12104] bond1: (slave macvlan10): Enslaving as a backup interface with an up link [ 496.263724][ T13] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 496.282070][T12103] veth15: entered promiscuous mode [ 496.288544][T12103] veth15: entered allmulticast mode [ 497.508178][ T30] kauditd_printk_skb: 6071 callbacks suppressed [ 497.508192][ T30] audit: type=1400 audit(1758687473.311:191892): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.552107][ T30] audit: type=1400 audit(1758687473.441:191893): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.578752][ T30] audit: type=1400 audit(1758687473.441:191894): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.596124][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 497.602215][ T30] audit: type=1400 audit(1758687473.441:191895): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.630433][ T30] audit: type=1400 audit(1758687473.441:191896): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.656912][ T5516] audit: audit_lost=23303 audit_rate_limit=0 audit_backlog_limit=64 [ 497.665500][ T30] audit: type=1400 audit(1758687473.441:191897): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.688807][ T30] audit: type=1400 audit(1758687473.441:191898): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.712584][ T30] audit: type=1400 audit(1758687473.441:191899): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 497.830957][T12126] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 497.995103][T12128] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1752'. [ 498.147634][T12130] macvlan9: entered promiscuous mode [ 500.455440][T12174] macvlan12: entered promiscuous mode [ 501.016919][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.023222][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 502.109148][T12189] libceph: resolve '4' (ret=-3): failed [ 502.593898][ T30] kauditd_printk_skb: 11335 callbacks suppressed [ 502.593913][ T30] audit: type=1400 audit(1758687478.511:198440): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.639135][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.828589][T12196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.839591][ T5516] audit: audit_lost=24902 audit_rate_limit=0 audit_backlog_limit=64 [ 502.854136][ T5516] audit: backlog limit exceeded [ 502.859259][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.866025][T12196] audit: audit_lost=24903 audit_rate_limit=0 audit_backlog_limit=64 [ 502.873546][ T30] audit: type=1400 audit(1758687478.511:198441): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.874321][T12196] audit: backlog limit exceeded [ 502.902458][ T5516] audit: audit_lost=24904 audit_rate_limit=0 audit_backlog_limit=64 [ 503.113426][T12204] netlink: 'syz.0.1778': attribute type 2 has an invalid length. [ 503.229840][T12206] veth21: entered promiscuous mode [ 503.238089][T12206] veth21: entered allmulticast mode [ 503.251662][T12208] macvlan12: entered promiscuous mode [ 503.535456][T12219] veth23: entered promiscuous mode [ 503.542749][T12219] veth23: entered allmulticast mode [ 503.991469][T12222] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 504.352140][T12229] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 505.720381][T12244] netlink: 16402 bytes leftover after parsing attributes in process `syz.3.1793'. [ 505.932632][T12246] veth17: entered promiscuous mode [ 505.938232][T12246] veth17: entered allmulticast mode [ 506.877059][T12260] sch_tbf: burst 19920 is lower than device lo mtu (11337746) ! [ 507.603529][ T30] kauditd_printk_skb: 15293 callbacks suppressed [ 507.603544][ T30] audit: type=1400 audit(1758687483.531:206864): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.648413][ T30] audit: type=1400 audit(1758687483.571:206865): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.670337][ T30] audit: type=1400 audit(1758687483.571:206866): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.724149][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.732861][ T5516] audit: audit_lost=27195 audit_rate_limit=0 audit_backlog_limit=64 [ 507.743935][T12273] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.761151][ T5516] audit: backlog limit exceeded [ 507.768456][T12273] audit: audit_lost=27196 audit_rate_limit=0 audit_backlog_limit=64 [ 507.783822][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.790381][T12275] audit: audit_backlog=65 > audit_backlog_limit=64 [ 508.280849][T12280] veth9: entered promiscuous mode [ 508.288229][T12280] veth9: entered allmulticast mode [ 508.517587][T12282] netlink: 16402 bytes leftover after parsing attributes in process `syz.4.1805'. [ 508.709720][T12287] veth19: entered promiscuous mode [ 508.717560][T12287] veth19: entered allmulticast mode [ 509.180503][T12305] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1812'. [ 509.560498][T12311] netlink: 'syz.4.1813': attribute type 4 has an invalid length. [ 509.590764][T12311] netlink: 'syz.4.1813': attribute type 4 has an invalid length. [ 510.551782][T12319] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1817'. [ 511.139005][T12335] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 511.366933][T12348] netlink: 'syz.2.1825': attribute type 4 has an invalid length. [ 511.428664][T12350] netlink: 'syz.2.1825': attribute type 4 has an invalid length. [ 512.703207][ T30] kauditd_printk_skb: 7562 callbacks suppressed [ 512.703222][ T30] audit: type=1400 audit(1758687488.631:212894): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 512.714255][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.861486][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 513.074267][ T5516] audit: audit_lost=27709 audit_rate_limit=0 audit_backlog_limit=64 [ 513.082490][ T5516] audit: backlog limit exceeded [ 513.088442][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 513.090426][ T8130] audit: audit_lost=27710 audit_rate_limit=0 audit_backlog_limit=64 [ 513.106126][ T30] audit: type=1400 audit(1758687488.631:212895): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 513.128689][ T8130] audit: backlog limit exceeded [ 513.138767][ T5516] audit: audit_lost=27711 audit_rate_limit=0 audit_backlog_limit=64 [ 513.996651][T12377] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1834'. [ 514.174507][T12385] netlink: 'syz.4.1837': attribute type 4 has an invalid length. [ 514.223826][T12385] netlink: 'syz.4.1837': attribute type 4 has an invalid length. [ 515.595356][T12397] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 516.274667][T12413] macvlan6: entered promiscuous mode [ 517.833714][ T30] kauditd_printk_skb: 8570 callbacks suppressed [ 517.833728][ T30] audit: type=1400 audit(1758687493.761:219365): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.909123][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.937605][T12442] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.955070][T12442] audit: audit_lost=28412 audit_rate_limit=0 audit_backlog_limit=64 [ 517.965467][ T5516] audit: audit_lost=28413 audit_rate_limit=0 audit_backlog_limit=64 [ 517.974426][ T30] audit: type=1400 audit(1758687493.761:219366): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.996137][ T5516] audit: backlog limit exceeded [ 518.022116][T12442] audit: backlog limit exceeded [ 518.046207][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 518.055058][ T5516] audit: audit_lost=28414 audit_rate_limit=0 audit_backlog_limit=64 [ 520.640863][T12472] veth11: entered promiscuous mode [ 520.647183][T12472] veth11: entered allmulticast mode [ 521.097474][T12484] netlink: 'syz.0.1864': attribute type 4 has an invalid length. [ 521.133065][T12484] netlink: 'syz.0.1864': attribute type 4 has an invalid length. [ 522.843525][ T30] kauditd_printk_skb: 6537 callbacks suppressed [ 522.843540][ T30] audit: type=1400 audit(1758687498.771:225558): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 522.949171][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.959903][ T5516] audit: audit_lost=28530 audit_rate_limit=0 audit_backlog_limit=64 [ 522.971181][ T30] audit: type=1400 audit(1758687498.821:225559): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 523.001504][ T5516] audit: backlog limit exceeded [ 523.011049][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 523.019041][ T5516] audit: audit_lost=28531 audit_rate_limit=0 audit_backlog_limit=64 [ 523.029881][ T30] audit: type=1400 audit(1758687498.821:225560): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 523.055183][ T5516] audit: backlog limit exceeded [ 523.078234][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 523.294427][T12532] macvlan13: entered promiscuous mode [ 523.426159][T12535] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.1876'. [ 525.447055][T12563] netlink: 'syz.3.1883': attribute type 4 has an invalid length. [ 525.773970][T12563] netlink: 'syz.3.1883': attribute type 4 has an invalid length. [ 526.386499][T12577] mkiss: ax0: crc mode is auto. [ 527.417274][T12598] macvlan13: entered promiscuous mode [ 527.860408][ T30] kauditd_printk_skb: 7580 callbacks suppressed [ 527.860423][ T30] audit: type=1400 audit(1758687503.771:230523): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.895293][ T30] audit: type=1400 audit(1758687503.831:230524): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.925797][ T30] audit: type=1400 audit(1758687503.831:230525): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.948748][ T30] audit: type=1400 audit(1758687503.831:230526): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.974474][ T30] audit: type=1400 audit(1758687503.831:230527): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 527.997049][ T30] audit: type=1400 audit(1758687503.831:230528): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.019650][ T30] audit: type=1400 audit(1758687503.831:230529): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.045698][ T30] audit: type=1400 audit(1758687503.831:230530): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.068904][ T30] audit: type=1400 audit(1758687503.831:230531): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.092937][ T30] audit: type=1400 audit(1758687503.831:230532): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.718813][T12622] macvlan11: entered promiscuous mode [ 529.217916][T12633] macvlan14: entered promiscuous mode [ 529.905305][T12650] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1915'. [ 530.446308][ T31] INFO: task kworker/0:3:978 blocked for more than 143 seconds. [ 530.500137][ T31] Not tainted syzkaller #0 [ 530.575790][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 530.650804][ T31] task:kworker/0:3 state:D stack:22232 pid:978 tgid:978 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 530.680280][ T31] Workqueue: usb_hub_wq hub_event [ 530.705698][ T31] Call Trace: [ 530.713569][ T31] [ 530.719173][ T31] __schedule+0x1190/0x5de0 [ 530.729273][ T31] ? __pfx___schedule+0x10/0x10 [ 530.740075][ T31] ? find_held_lock+0x2b/0x80 [ 530.750404][ T31] ? schedule+0x2d7/0x3a0 [ 530.759095][ T31] schedule+0xe7/0x3a0 [ 530.768844][ T31] usb_kill_urb+0x253/0x320 [ 530.778574][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 530.789994][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 530.803540][ T31] ? lockdep_init_map_type+0xd0/0x280 [ 530.815201][ T31] usb_start_wait_urb+0x250/0x4b0 [ 530.826018][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 530.837971][ T31] ? __asan_memset+0x23/0x50 [ 530.845240][ T31] usb_control_msg+0x326/0x4a0 [ 530.857451][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 530.868416][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 530.881302][ T31] hub_port_init+0x690/0x3a70 [ 530.892035][ T31] hub_event+0x2ce1/0x4fe0 [ 530.903319][ T31] ? __pfx_hub_event+0x10/0x10 [ 530.912640][ T31] ? assoc_array_insert+0x1520/0x3970 [ 530.925378][ T31] ? rcu_is_watching+0x12/0xc0 [ 530.935749][ T31] process_one_work+0x9cc/0x1b70 [ 530.946286][ T31] ? __pfx_hcd_resume_work+0x10/0x10 [ 530.958133][ T31] ? __pfx_process_one_work+0x10/0x10 [ 530.968929][ T31] ? assign_work+0x1a0/0x250 [ 530.979370][ T31] worker_thread+0x6c8/0xf10 [ 530.989098][ T31] ? __kthread_parkme+0x19e/0x250 [ 530.999958][ T31] ? __pfx_worker_thread+0x10/0x10 [ 531.008700][ T31] kthread+0x3c2/0x780 [ 531.023027][ T31] ? __pfx_kthread+0x10/0x10 [ 531.029407][ T31] ? rcu_is_watching+0x12/0xc0 [ 531.035543][ T31] ? __pfx_kthread+0x10/0x10 [ 531.040697][ T31] ret_from_fork+0x56a/0x730 [ 531.070331][ T31] ? __pfx_kthread+0x10/0x10 [ 531.082696][ T31] ret_from_fork_asm+0x1a/0x30 [ 531.098504][ T31] [ 531.106053][ T31] [ 531.106053][ T31] Showing all locks held in the system: [ 531.131473][ T31] 1 lock held by khungtaskd/31: [ 531.142748][ T31] #0: ffffffff8e5c15a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 531.155361][ T31] 3 locks held by kworker/u8:2/36: [ 531.160818][ T31] 5 locks held by kworker/0:3/978: [ 531.168011][ T31] #0: ffff8881446ee148 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 531.180639][ T31] #1: ffffc90003c17d10 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 531.193864][ T31] #2: ffff888145f51198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x4fe0 [ 531.213043][ T31] #3: ffff888145f54518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2981/0x4fe0 [ 531.225990][ T31] #4: ffff88802902bd68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x29aa/0x4fe0 [ 531.240358][ T31] 2 locks held by getty/5611: [ 531.246835][ T31] #0: ffff88814dfae0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 531.265372][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 531.278804][ T31] 1 lock held by syz.4.1917/12663: [ 531.284103][ T31] #0: ffffffff8e5ccb38 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x284/0x3c0 [ 531.296238][ T31] [ 531.300860][ T31] ============================================= [ 531.300860][ T31] [ 531.325693][ T31] NMI backtrace for cpu 1 [ 531.325707][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 531.325727][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 531.325737][ T31] Call Trace: [ 531.325742][ T31] [ 531.325749][ T31] dump_stack_lvl+0x116/0x1f0 [ 531.325776][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 531.325797][ T31] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 531.325824][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 531.325852][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 531.325873][ T31] watchdog+0xf0e/0x1260 [ 531.325898][ T31] ? __pfx_watchdog+0x10/0x10 [ 531.325915][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 531.325938][ T31] ? __kthread_parkme+0x19e/0x250 [ 531.325964][ T31] ? __pfx_watchdog+0x10/0x10 [ 531.325983][ T31] kthread+0x3c2/0x780 [ 531.326006][ T31] ? __pfx_kthread+0x10/0x10 [ 531.326025][ T31] ? rcu_is_watching+0x12/0xc0 [ 531.326047][ T31] ? __pfx_kthread+0x10/0x10 [ 531.326065][ T31] ret_from_fork+0x56a/0x730 [ 531.326081][ T31] ? __pfx_kthread+0x10/0x10 [ 531.326099][ T31] ret_from_fork_asm+0x1a/0x30 [ 531.326132][ T31] [ 531.326167][ T31] Sending NMI from CPU 1 to CPUs 0: [ 531.447409][ C0] NMI backtrace for cpu 0 [ 531.447422][ C0] CPU: 0 UID: 0 PID: 5203 Comm: syslogd Not tainted syzkaller #0 PREEMPT(full) [ 531.447442][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 531.447450][ C0] RIP: 0010:lock_acquire+0x15f/0x350 [ 531.447466][ C0] Code: c7 c7 8c 64 f4 8d e8 90 09 fd 09 45 89 e0 89 e9 44 89 ea 65 ff 05 59 47 3f 12 48 81 24 24 00 02 00 00 44 89 f6 48 89 df 6a 00 <6a> 00 6a 00 ff b4 24 88 00 00 00 41 0f 94 c1 41 57 45 0f b6 c9 e8 [ 531.447479][ C0] RSP: 0018:ffffc9000488f860 EFLAGS: 00000006 [ 531.447490][ C0] RAX: 0000000000000000 RBX: ffff88807d87b8e0 RCX: 0000000000000000 [ 531.447498][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88807d87b8e0 [ 531.447505][ C0] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [ 531.447512][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 531.447519][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 531.447526][ C0] FS: 00007fcafd1aec80(0000) GS:ffff8881246b2000(0000) knlGS:0000000000000000 [ 531.447540][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 531.447548][ C0] CR2: 00007ffe49ebdc58 CR3: 000000003242c000 CR4: 00000000003526f0 [ 531.447556][ C0] Call Trace: [ 531.447561][ C0] [ 531.447566][ C0] ? __pfx___might_resched+0x10/0x10 [ 531.447585][ C0] ? __unix_dgram_recvmsg+0x255/0xc30 [ 531.447601][ C0] __mutex_lock+0x193/0x1060 [ 531.447617][ C0] ? __unix_dgram_recvmsg+0x255/0xc30 [ 531.447632][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 531.447646][ C0] ? prepare_to_wait_exclusive+0xe4/0x2b0 [ 531.447665][ C0] ? __pfx___mutex_lock+0x10/0x10 [ 531.447681][ C0] ? __pfx___skb_wait_for_more_packets+0x10/0x10 [ 531.447698][ C0] ? __pfx_avc_has_perm+0x10/0x10 [ 531.447713][ C0] ? __unix_dgram_recvmsg+0x255/0xc30 [ 531.447727][ C0] __unix_dgram_recvmsg+0x255/0xc30 [ 531.447745][ C0] ? __pfx___unix_dgram_recvmsg+0x10/0x10 [ 531.447766][ C0] unix_dgram_recvmsg+0xd0/0x110 [ 531.447783][ C0] sock_recvmsg+0x1f6/0x250 [ 531.447800][ C0] sock_read_iter+0x2b9/0x3b0 [ 531.447817][ C0] ? __pfx_sock_read_iter+0x10/0x10 [ 531.447836][ C0] ? bpf_lsm_file_permission+0x9/0x10 [ 531.447852][ C0] ? security_file_permission+0x71/0x210 [ 531.447870][ C0] ? rw_verify_area+0xcf/0x6c0 [ 531.447889][ C0] vfs_read+0xa98/0xcf0 [ 531.447902][ C0] ? __pfx_vfs_read+0x10/0x10 [ 531.447915][ C0] ? rcu_is_watching+0x12/0xc0 [ 531.447933][ C0] ksys_read+0x1f8/0x250 [ 531.447945][ C0] ? __pfx_ksys_read+0x10/0x10 [ 531.447959][ C0] do_syscall_64+0xcd/0x4e0 [ 531.447976][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.447988][ C0] RIP: 0033:0x7fcafd2fe407 [ 531.447997][ C0] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 531.448009][ C0] RSP: 002b:00007ffd9e65a850 EFLAGS: 00000202 ORIG_RAX: 0000000000000000 [ 531.448020][ C0] RAX: ffffffffffffffda RBX: 00007fcafd1aec80 RCX: 00007fcafd2fe407 [ 531.448028][ C0] RDX: 00000000000000ff RSI: 0000555b49252300 RDI: 0000000000000000 [ 531.448036][ C0] RBP: 0000555b492522c0 R08: 0000000000000000 R09: 0000000000000000 [ 531.448044][ C0] R10: 0000000000000000 R11: 0000000000000202 R12: 0000555b4925233f [ 531.448051][ C0] R13: 0000000000000000 R14: 0000555b49252300 R15: 0000555b33420d98 [ 531.448063][ C0] [ 531.448644][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 531.785782][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 531.794872][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 531.804908][ T31] Call Trace: [ 531.808170][ T31] [ 531.811079][ T31] dump_stack_lvl+0x3d/0x1f0 [ 531.815657][ T31] vpanic+0x6e8/0x7a0 [ 531.819631][ T31] ? __pfx_vpanic+0x10/0x10 [ 531.824122][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 531.830093][ T31] panic+0xca/0xd0 [ 531.833792][ T31] ? __pfx_panic+0x10/0x10 [ 531.838195][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 531.843558][ T31] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 531.849704][ T31] ? watchdog+0xd78/0x1260 [ 531.854104][ T31] ? watchdog+0xd6b/0x1260 [ 531.858503][ T31] watchdog+0xd89/0x1260 [ 531.862731][ T31] ? __pfx_watchdog+0x10/0x10 [ 531.867387][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 531.872568][ T31] ? __kthread_parkme+0x19e/0x250 [ 531.877596][ T31] ? __pfx_watchdog+0x10/0x10 [ 531.882340][ T31] kthread+0x3c2/0x780 [ 531.886390][ T31] ? __pfx_kthread+0x10/0x10 [ 531.890959][ T31] ? rcu_is_watching+0x12/0xc0 [ 531.895706][ T31] ? __pfx_kthread+0x10/0x10 [ 531.900284][ T31] ret_from_fork+0x56a/0x730 [ 531.904855][ T31] ? __pfx_kthread+0x10/0x10 [ 531.909423][ T31] ret_from_fork_asm+0x1a/0x30 [ 531.914177][ T31] [ 531.917354][ T31] Kernel Offset: disabled [ 531.921652][ T31] Rebooting in 86400 seconds..