last executing test programs: 26.020253286s ago: executing program 3 (id=2868): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @remote}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) recvmsg(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0}, 0x40000000) 25.81069355s ago: executing program 3 (id=2872): r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'gre0\x00', 0x1}) syz_usb_connect$midi(0x4, 0x31, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x0) getpid() syz_init_net_socket$llc(0x1a, 0x2, 0x0) (async) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'gre0\x00', 0x1}) (async) syz_usb_connect$midi(0x4, 0x31, &(0x7f00000001c0)=ANY=[@ANYRES32=r0], 0x0) (async) getpid() (async) 24.563665945s ago: executing program 3 (id=2877): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8b, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x800, 0x0, 0x2, 0x1}, 0x20) mount(&(0x7f00000000c0)=@nullb, &(0x7f0000000040)='.\x00', &(0x7f0000000000)='minix\x00', 0x0, 0x0) add_key$fscrypt_v1(&(0x7f00000002c0), &(0x7f0000000300)={'fscrypt:', @auto=[0x64, 0x34, 0x34, 0x62, 0x63, 0x36, 0x33, 0x35, 0x36, 0x32, 0x62, 0x61, 0x64, 0x37, 0x36, 0x64]}, 0x0, 0x0, 0xffffffffffffffff) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) unshare(0x2c020400) open_tree(r4, 0x0, 0x9901) sendmsg$inet(0xffffffffffffffff, 0x0, 0x44810) r5 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r5, &(0x7f0000000400)={0x18, 0x0, {0x4, @link_local, 'lo\x00'}}, 0x1e) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3000000010000100000000000020000800000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000080004000006000008001b"], 0x30}}, 0x0) connect$pppoe(r5, &(0x7f00000000c0)={0x18, 0x0, {0x0, @empty, 'pimreg1\x00'}}, 0x1e) socket$nl_route(0x10, 0x3, 0x0) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r6, 0xaf01, 0x0) 23.313021592s ago: executing program 3 (id=2890): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000040085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x5, 0xe, 0x0, &(0x7f00000003c0)="000000000000000000000001e370", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x22}, 0x50) 22.614962399s ago: executing program 3 (id=2894): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000240)={0x8, "0d221e833de46c4d"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) (fail_nth: 2) 21.986592297s ago: executing program 3 (id=2898): r0 = syz_open_dev$usbfs(&(0x7f0000000340), 0x4, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000440)) syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @random="518440db9de1"}, 0x14) bind$packet(r1, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000001040)=0x6) r3 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r3, &(0x7f0000032680)=""/102392, 0x18ff8) connect$802154_dgram(0xffffffffffffffff, 0x0, 0x0) eventfd2(0x0, 0x1) io_setup(0x3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x40081, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x7) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000000c0)=0xf9) r5 = landlock_create_ruleset(&(0x7f0000000000)={0x110, 0x5a33f6a22b8002aa, 0x3}, 0x18, 0x0) landlock_restrict_self(r5, 0x0) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) landlock_restrict_self(0xffffffffffffffff, 0x0) tkill(r6, 0x18) ioctl$KDADDIO(r4, 0x4b34, 0x5) 10.793256185s ago: executing program 1 (id=2937): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000340)=0xfffffff9) ioctl$TCFLSH(r1, 0x400455c8, 0x1) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000140)=0xdb) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000240)=0x17) 10.723153234s ago: executing program 4 (id=2939): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r0, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000540)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000300), 0x4) 9.24328994s ago: executing program 4 (id=2942): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r0 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r0, &(0x7f0000002700)=""/102392, 0x18ff8) syz_open_dev$vim2m(&(0x7f0000000100), 0x0, 0x2) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) r2 = fsmount(0xffffffffffffffff, 0x1, 0x6) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000040)={0x0, 0x4, 0x9, 0x5, "7d2fe763523b7b43af6b8a3bd1c31a3d2825ef8654330114cac0207e5446e266"}) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x40) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=@ipv4_getnexthop={0x2c, 0x6a, 0x605, 0x70bd2c, 0x25dfdbfb, {}, [@NHA_FDB={0x4}, @NHA_FDB={0x4}, @NHA_FDB={0x4}, @NHA_OIF={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) r4 = socket(0x40000000015, 0x805, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r5, 0x90009427, &(0x7f00000000c0)) getsockopt(r4, 0x114, 0x271b, &(0x7f0000000440)=""/102392, &(0x7f00000000c0)=0x18ff8) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2}, &(0x7f00000002c0), &(0x7f0000000340)=r1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x2, &(0x7f00000003c0)=@raw=[@map_fd={0x18, 0x3}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2000c000) r6 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) ioctl$sock_netdev_private(r7, 0x8914, &(0x7f0000000000)) ioctl$sock_ifreq(r6, 0x8990, &(0x7f0000000180)={'bond0\x00', @ifru_names='rose0\x00'}) 7.61615584s ago: executing program 0 (id=2943): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000001340)=0x33, 0x2) connect$bt_sco(r0, &(0x7f00000016c0)={0x1f, @none}, 0x8) (fail_nth: 2) 7.615929343s ago: executing program 1 (id=2944): syz_usb_connect(0x0, 0x36, &(0x7f0000000680)=ANY=[@ANYBLOB="12010000f2303920422c021240850102030109022400010000100009040c0202c17f0c0009850202000202000009058202"], 0x0) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff}, 0x80) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r0, 0x5761, &(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000007"]) 7.615445796s ago: executing program 2 (id=2945): syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r5 = openat$uhid(0xffffff9c, &(0x7f0000000100), 0x802, 0x0) r6 = dup2(r5, r4) read$FUSE(r6, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f00000060c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000007c0)='y', 0x1}, {&(0x7f0000000340)="b9", 0x1}, {&(0x7f0000000940)="99", 0x1}, {&(0x7f00000008c0)='z', 0x1}, {&(0x7f00000009c0)='~', 0x1}, {&(0x7f0000000a00)='x', 0x1}, {&(0x7f0000000440)="06", 0x1}, {&(0x7f0000000580)='k', 0xffffffc6}, {&(0x7f00000006c0)="1d", 0x1}, {&(0x7f0000000800)='a', 0x1}, {&(0x7f0000000280)='$', 0x1}], 0xc}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001040)="fc"}, {&(0x7f0000001080)="c9", 0x1}, {&(0x7f0000002180)='-', 0x1}, {&(0x7f0000002240)='R', 0x1}, {&(0x7f00000033c0)="c4", 0x1}], 0x10000000000000ed}}], 0x2, 0x4000000) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000010028bd70000000000000000000", @ANYBLOB="448787a5b2ac645be07dd591ab4931f07404155ad7c920335fb52ce86f5cc21cfe811227176253acba69", @ANYBLOB="01800000000000000000f5000014001680100001800c0009008000000002f600000e"], 0x48}, 0x1, 0x0, 0x0, 0x401}, 0x40) add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f00000000c0)={'fscrypt:', @auto=[0x6, 0x31, 0x30, 0x39, 0x66, 0x38, 0x37, 0x35, 0x5f, 0x65, 0x33, 0x66, 0x34, 0x36, 0x65, 0x31]}, &(0x7f0000000100)={0x0, "479010579d71e99dd144e7c9afd969173a20bcace78ec270fd26f04a9973d2fecbb5d9d23c66d8466ea892b8ae3169d3f36c3cfbca48235b40f7986b39ed2eab", 0x80003f}, 0x48, r7) 7.612973948s ago: executing program 4 (id=2946): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x4e23, @broadcast}, 0x2, 0x0, 0x4}}, 0x2e) bind$inet6(r1, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x50, &(0x7f0000000600)={@link_local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "010100", 0x16, 0x11, 0xff, @remote, @local, {[], {0x0, 0xe22, 0x16, 0x0, @gue={{0x2, 0x0, 0x0, 0x3}, "30b00afe4e79"}}}}}}}, 0x0) (fail_nth: 2) 5.871131566s ago: executing program 0 (id=2947): socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x80102, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff1000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) write(0xffffffffffffffff, &(0x7f0000005c00)='\'\x00\x00\x00', 0x4) pipe2(0x0, 0x80080) r2 = io_uring_setup(0x2fb1, &(0x7f00000001c0)={0x0, 0x3cb1, 0x200, 0x1, 0x20002f7}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) io_uring_enter(r2, 0x2219, 0xfc89, 0x18, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={0xffffffffffffffff, 0x7, 0x3}) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[], 0x90}, 0x1, 0x0, 0x0, 0x2000c091}, 0x800) r4 = syz_open_dev$vim2m(&(0x7f00000002c0), 0x2000000f5, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000000)={0xf0f071, 0x19}) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000380)}) r6 = dup2(r3, 0xffffffffffffffff) syz_open_dev$dri(0x0, 0x1, 0x214800) r7 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000b40)=ANY=[@ANYBLOB="1201000000000010580413500000000000010902240001000050000904000081030000000921faff000122a000090581"], 0x0) syz_usb_control_io(r7, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000540)={0x2c, &(0x7f0000000240)=ANY=[@ANYRES64=r2, @ANYRES8=r5, @ANYRES8=r5], 0x0, 0x0, 0x0, 0x0}, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0x0) ioctl$EVIOCGKEYCODE_V2(r8, 0x80284504, &(0x7f0000000040)=""/185) recvmmsg(r6, 0x0, 0x0, 0x2, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x0, 0x0, 0x6000) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x200, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000100), 0x10000000000000, 0x4042) 5.870344568s ago: executing program 1 (id=2948): r0 = socket$nl_route(0x10, 0x3, 0x0) (async) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0xf4) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c40)=@newqdisc={0x150, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x16, 0xffe0}}, [@qdisc_kind_options=@q_red={{0x8}, {0x124, 0x2, [@TCA_RED_STAB={0x104, 0x2, "09000020000000008f29d158039b90627d7b60f0d5ca47f33eed46409b7c8722ce020df6b24c2e6ac7b97dc04d01be2092874115214b1ebb764511f69cd1e9f6263346363d2c639c76000067af25166c2f0f85f36aa8867406119c010400002e31dea98204000000d560eae59ea49ef95d73202a6e3b5e1eb38244e694e7410d33bc92794ad27031f2a19698b5142ddf36e2a876a4fc871207bf12a84f1d4d132f5bb7edcf2d08d677e6a7268e106b6ced3c7f53df24092ddb9e0fac6a1153c3fc88bfd1404fef22cf3e825a6e19c6a48a5444eabb459ac3ec9a278df4011773d2f2e6529ed0ad424b47ec67522477f979360b76d1008000"}, @TCA_RED_PARMS={0x14, 0x1, {0x3f26, 0x100007, 0x81, 0x2, 0xb, 0x12, 0x5}}, @TCA_RED_MAX_P={0x8, 0x3, 0x1}]}}]}, 0x150}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)=@ipv4_newroute={0x30, 0x18, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x80, 0x0, 0x1, 0xfd, 0x3, 0xfe, 0x4, 0x3f00}, [@RTA_UID={0x8, 0x19, 0xee01}, @RTA_MULTIPATH={0xc, 0x9, {0x80, 0x2e, 0x9, r2}}]}, 0x30}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) r4 = syz_open_dev$MSR(&(0x7f0000000100), 0x0, 0x0) read$msr(r4, &(0x7f0000032680)=""/102400, 0x19000) (async) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r3, 0x3ba0, &(0x7f0000000240)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = inotify_init() (async) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f00000000c0)=0x0) (async) read$FUSE(r3, &(0x7f0000000980)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) kcmp(r7, r8, 0x2, r4, r6) (async) move_pages(r7, 0x4, &(0x7f0000000100)=[&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil], &(0x7f0000000140)=[0xfffffff6, 0xf7], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) 5.869216694s ago: executing program 2 (id=2949): socket(0x1e, 0x805, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="010000000000000000001400000008000200fc00000018000180140002006e657464657673696d300000000000000800050000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES32=r1, @ANYRESOCT=r0], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0xfffffffffffffe3e) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x3, 0x0, 0x800010, 0x0, 0x2, 0x89, 0x8, 0xb319, 0x3}, 0x0) syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x4e24, 0x2, @empty, 0xcac2d78a}}, 0x0, 0x0, 0x43, 0x0, "ee8b0e651926a96ecc136e7fb980e939488f651a8de213eb94cd46e19d9c65a018444a131f4da58ae34456dd38ea6c029607462029add09240005c6776267517308a3d40aa1c788df600"}, 0xd8) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x303}, "6ae04425ace3f60c", "acba84f0a6731f234db1cc7f3f382ad796bd667cb12ea99509873931d2873103", '\x00', "00001000"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$int_in(r5, 0x5421, &(0x7f0000000140)=0x1) writev(r5, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x1) close(r5) 5.863525205s ago: executing program 4 (id=2950): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x5, &(0x7f0000000000)=[{0x18e, 0xf0, 0x8, 0xb4a8}, {0x2, 0x1, 0xe, 0x4}, {0x8, 0x1, 0x6, 0x1ff}, {0x65, 0x81, 0x1, 0x3}, {0x4, 0x7, 0x7, 0x4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200047fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f00000000c0)={0x3, 'ip6gretap0\x00', {0xfffffffc}, 0x8}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr', 0x37) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000fc0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x4, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18020000000c000000000000ff250000850000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002280)={r4, 0x0, 0xe, 0x0, &(0x7f00000008c0)="e02742e8680d85ff9782762f86dd", 0x0, 0x57af, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000006a80), 0x1, 0x0) write$vga_arbiter(r5, 0x0, 0x13) write$binfmt_elf64(r1, &(0x7f0000000f80)=ANY=[], 0x540) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r1) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040), 0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r1) shutdown(r0, 0x1) 4.041125451s ago: executing program 0 (id=2951): socket$inet_sctp(0x2, 0x5, 0x84) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r0, 0x0) syz_clone(0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0) ftruncate(r0, 0xc17a) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0x9a, &(0x7f00000000c0)=ANY=[], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x80) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000040)=0x8) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x19) r3 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r3, 0x7a7, &(0x7f00000000c0)=0xb0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, &(0x7f0000000180)={@hyper, 0x1}) ioctl$IOCTL_VMCI_DATAGRAM_SEND(r3, 0x7cb, &(0x7f0000000100)={&(0x7f0000001080)={{@any, 0xfff}, {@local, 0x10000}, 0x400, "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"}, 0x418, 0x8}) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x2, 0x7fff7fec}]}) close_range(r4, 0xffffffffffffffff, 0x200000000000000) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r5 = syz_open_dev$sndpcmc(&(0x7f0000000340), 0x1, 0x80) ioctl$SNDRV_PCM_IOCTL_UNLINK(r5, 0x4161, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) 4.040782835s ago: executing program 1 (id=2952): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket(0x40000000015, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r4, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @none}, 0x8) listen(0xffffffffffffffff, 0x1) listen(0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0xc806, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r0) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)={0x34, r5, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000090}, 0x20004000) 4.03795648s ago: executing program 2 (id=2953): mount$fuse(0x0, 0x0, 0x0, 0x1000004, &(0x7f00000000c0)=ANY=[@ANYBLOB='fd=', @ANYRESOCT, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESHEX]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="3800000040000701feffffff02000000017c0000040042800c00018006000600800a00001400028010000b800c00"], 0x38}, 0x1, 0x0, 0x0, 0x4048011}, 0xc800) unshare(0x800) 4.036692389s ago: executing program 4 (id=2954): fsopen(&(0x7f0000000580)='overlay\x00', 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x801, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r2, 0x3ba0, &(0x7f0000000200)={0x48}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000640)=@filter={'filter\x00', 0x42, 0x4, 0x300, 0xffffffff, 0x1b8, 0x0, 0x1b8, 0xffffffff, 0xffffffff, 0x2b0, 0x2b0, 0x2b0, 0xffffffff, 0x4, 0x0, {[{{@ip={@empty, @loopback, 0x0, 0x0, 'veth0_to_batadv\x00', 'wlan0\x00', {}, {}, 0x11}, 0x0, 0xd0, 0xf8, 0x0, {0x100000000000000}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x3, 0x0, 0xf}}, @common=@unspec=@connmark={{0x30}, {0x5}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@ip={@multicast2, @private=0xa010102, 0x0, 0x0, 'veth1_virt_wifi\x00', '\x00', {}, {}, 0x0, 0x1}, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@unspec=@connlabel={{0x28}, {0xf, 0x2}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000100)=@req={0x0, 0x2, 0xc, 0x9}, 0xc) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, 0x0, 0x110) r5 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x22902, 0x0) r6 = syz_open_dev$media(&(0x7f0000000380), 0x3, 0x0) ioctl$MEDIA_IOC_G_TOPOLOGY(r6, 0xc0487c04, &(0x7f00000005c0)={0x0, 0x7, 0x0, &(0x7f0000001040)=[{}, {}, {}, {}, {}, {}, {}], 0x2, 0x0, &(0x7f0000000c80)=[{}, {}], 0x4, 0x0, &(0x7f0000000400)=[{}, {}, {}, {}], 0x0, 0x0, &(0x7f00000004c0)}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r7, 0x0, 0x0, 0x20000010, &(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10) ioctl$FBIOBLANK(r5, 0x4611, 0x3) ioctl$FBIO_WAITFORVSYNC(r5, 0x40044620, 0x0) r8 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x3fd, @empty, 0x3}, 0x1c) setsockopt$inet6_udp_encap(r8, 0x11, 0x64, &(0x7f00000000c0)=0x2, 0x4) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e20004db0"], 0x0) 2.106510848s ago: executing program 0 (id=2955): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x919009, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=0x0]) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='autofs\x00', 0x201000c, &(0x7f0000000040)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0xc0089364, &(0x7f00000000c0)=0x4) 2.105870406s ago: executing program 1 (id=2956): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sndseq(0xffffff9c, &(0x7f0000000000), 0x181901) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000280)='dynset\x00', &(0x7f0000000340)=':-\x00', 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000840)='cmdline\x00') pread64(r3, 0x0, 0x0, 0x81) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/user\x00') mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='fd/4\x00') readlinkat(r4, &(0x7f0000000100)='./mnt\x00', &(0x7f0000000840)=""/66, 0x42) r5 = syz_clone3(&(0x7f0000000200)={0x4304000, 0x0, 0x0, 0x0, {0x16}, 0x0, 0x0, 0x0, 0x0}, 0x63) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newqdisc={0x44, 0x24, 0x800, 0x70bd29, 0x25dfdc00, {0x60, 0x0, 0x0, 0x0, {0xfff1, 0xfff2}, {0x1, 0xc}, {0xfff3, 0x5}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_AUTORATE={0x8, 0x9, 0x3}, @TCA_CAKE_INGRESS={0x8}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x44045}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=r6, @ANYRES64=r5], 0x50}, 0x1, 0x0, 0x0, 0x40044}, 0x40004) sendmsg$NFT_MSG_GETSETELEM(r4, &(0x7f0000002040)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002000)={&(0x7f00000008c0)={0x1708, 0xd, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x16e8, 0x3, 0x0, 0x1, [{0x228, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPRESSIONS={0x154, 0xb, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @dynset={{0xb}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DYNSET_SREG_KEY={0x8, 0x4, 0x1, 0x0, 0x2}]}}}, {0xc, 0x1, 0x0, 0x1, @nat={{0x8}, @void}}, {0x20, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_SET={0x9, 0x1, 'syz1\x00'}]}}}, {0xd8, 0x1, 0x0, 0x1, @target={{0xb}, @val={0xc8, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x88, 0x3, "c707c7d4e86b68b787300d73be0ed6b6a6b7b377b669b431eca510cded1965e3c49b1509adf522fb50c5b571acb9460d0130cb9c3a7bb0ee4dc940107b8593a47bb9bca7ec862193b6d7e693f4e1f5f2c57ca5eaff8ad9c146065d324d3ef004b1a054cc6da4f85835fd13c2fff63276cfb52961649a61c81c8fa7d0d37e7b4d705d4ddc"}, @NFTA_TARGET_INFO={0x31, 0x3, "057c1e89d307726e02fe8a3692eabf186a1157e1a53851ab486322146c65c15938c44b76db8ffc9bc2af0bd608"}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x3}]}}}, {0x14, 0x1, 0x0, 0x1, @connlimit={{0xe}, @void}}, {0x1c, 0x1, 0x0, 0x1, @queue={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_QUEUE_FLAGS={0x6, 0x3, 0x1, 0x0, 0x2}]}}}]}, @NFTA_SET_ELEM_USERDATA={0xa1, 0x6, 0x1, 0x0, "258bdb73073acf86f18d2216877450bb31a9e24b6056429965d7d4cbaaf3acd178228fcb60332452dcd05b95bae64ab980d5a52945d48127005147e5a9b5cf5bac6681fadfa6aa5b047c13592bbb9b759b37e4462074b3449c4e25f60d6b7c6363c06ea6cd9276967867f170e7d41842145f6226af188a2b26ceb3c233a0c2e80135f07d140ba2eb4a70e805dc0aca96849384d145aeafb33c858018ca"}]}, {0x142c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xcd, 0x6, 0x1, 0x0, "b15a16737713bfb1df58221d7e6ece5bf28957d38867898683748b86d11a68b33d7aef058cc74e665f935efaa212a3a43f021045f2c84b0a11a5b8388a6c536f38cc5e6f566be4498d082de7a2f469fb54868eb57042fe6ecdecc2c533a3397eed9b21787c189721f42048b6c1da779197d82a5c325bae1c0260ed7e307c1ac759e2e07fec8d649713b989590374b44441fe33541da32e76d3c5b5545f7a9b06c869c395d12bc828eef6bd28920886a7206cd2e1631e40627c620ccdb1892b3a75a9c1e405e322231b"}, @NFTA_SET_ELEM_DATA={0xc8, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x3c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0x1}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VALUE={0x54, 0x1, "fb0f592a558d4ad92c4cd2fb09909bcd9b3cdde18e6f16f8141b5f832bd8b5e2aac8c17a7ee6e98b4d49ca32c3d5f03f94f504276b0afb851c957ccbdf929432f5ef01a4b73afaad39008de6a04414be"}]}, @NFTA_SET_ELEM_USERDATA={0x49, 0x6, 0x1, 0x0, "28edb3ca6ac563618f773542825a55b4d9710c5fae6c24f422911249756cd8b1b59a45aae3975933d49f33971ff0c5d40638b28353aee49df9152b38c0e9154bd6592a99c6"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7fff}, @NFTA_SET_ELEM_EXPRESSIONS={0x18, 0xb, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @immediate={{0xe}, @void}}]}, @NFTA_SET_ELEM_EXPRESSIONS={0xb4, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @socket={{0xb}, @void}}, {0x48, 0x1, 0x0, 0x1, @lookup={{0xb}, @val={0x38, 0x2, 0x0, 0x1, [@NFTA_LOOKUP_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}, @NFTA_LOOKUP_FLAGS={0x8}, @NFTA_LOOKUP_SET={0x9, 0x1, 'syz0\x00'}, @NFTA_LOOKUP_SREG={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x16}, @NFTA_LOOKUP_DREG={0x8, 0x3, 0x1, 0x0, 0x5}]}}}, {0x10, 0x1, 0x0, 0x1, @counter={{0xc}, @void}}, {0x48, 0x1, 0x0, 0x1, @byteorder={{0xe}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0x1d}, @NFTA_BYTEORDER_SREG={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_BYTEORDER_LEN={0x8, 0x4, 0x1, 0x0, 0xf8}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0x15}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_BYTEORDER_DREG={0x8, 0x2, 0x1, 0x0, 0xc}]}}}]}, @NFTA_SET_ELEM_EXPR={0x28, 0x7, 0x0, 0x1, @quota={{0xa}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_QUOTA_CONSUMED={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_QUOTA_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}}}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xce}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_KEY_END={0x112c, 0xa, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x40, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x2}]}, @NFTA_DATA_VALUE={0xbf, 0x1, "ab5f5622adf5b2d3b8768f75987c95eeda8db9d71c309beee71fc7560af03294c990f11138c5551d17fb02c7bde082ffb8b4a7b66286cfc451ff042a8d1f0e0e034485379fcb8932ffa740f9abd521456b86ca58087dce3e46fcbdf9a32357ccf07bbf7d9703fcede0d27fcc4e9437d3e03f5d7546808840e3751e1cb8c23378eb6e30a5843ed448513d29aacf01fde5f5c3df2af46155700c39ebedfe7f3694b1c23872d4ed6627876f78e5f77507285ce800f9d50eb22f519913"}, @NFTA_DATA_VALUE={0x21, 0x1, "122690ef1d0bb4dfb678b02a3dcb278fbaad25b948ce7f82ed98fffda5"}, @NFTA_DATA_VALUE={0x1004, 0x1, "2d08a2586afce26ed1bf9ddfeab9a4923982b2cf2142a31adcc729590ba9e6a8149fd252cc89fd828ed0fe7954711027c5cdf31d9c9d23ae9b7dc7132261e99fe2c80e509f0145a7cd2dad07a8bfbc3f4c8660d393966f3b91670c52b413884f020573a2d2197efcb62ffe9c3a2d2e81fabdf8805ee9ce0e49496f738dea3bba8d6b40d490a3465316929d89013dfd63bd310b6a8cf72748ddfc18c5ebd42a1c3fb1cc3cee44475fd18a18a20d01db18a9745930c6c6e0ea0d50c0146ec91cd5786162d3ff37153f85525b0e10bf3ce45b392b5af101c16ae6d67fdb35d51e2758c064dd754104045cab7cad4e275a8883a9ff32e5756a1a2ae45ad9230fe64d00ac6f1ddf22a24e03ce81a38e9e39df66e984174c325edbaa1a88f1adee9fb19fb19950360c7e370e27a026c1e25c0e28b96251419a1b126101954d6116cac97f0f0c5d5b45e6ee0e24df739d259acfb029e995c634204faa676d8313e1c46952e8108486e89e302b38ef638a788a2f0c299a3cb63f5d78a106eaa9fc9150dc76ac90b1f6ed5e668bde37490147c158eb285927f357fa50434826671af24f3629124f22658ebfe4285ffcd179928a8da20f761e3bf26ed47fe0991ce793397ae333a658d707c08bbf2e962b9a3821245247a0a9d0bd31b863dc1e4b8acf3dd4e757260b2c71cd10fe1da9601a934b65a7e1014752935dbdc68f24671c7eccdfc757f2516f0e203a1c28c94f9d033adbaf561d7c56cb0fa1cd3a623265c7110dcccc100b86c5185551b242e4d9aee775bf52e1eae94a31bb58e912be39e8734b2b336d4107b94a464f2c2824070f3c84124d8e8e4af445e393dfb9a0ce934cc7d753825392a8a2f10e4846573cb773feec04b831c62a037af75491fa0d70219fcfde7b66c6b3c2eb499f7f3f1b0cb915a969ca2c4f1a9bf9e452f25aaaebe6a420f978f82939ffc77ef14fce27d6329cbd89e5e2b9d4ca504c35b1b1e402e28c9216b14837b9ef25047d7dd44916153337dcb30441a61609d52ea22415d6f3af90931c304c1610474b016620898832fa05f2c1b30354b9ab0d17e3943445af8b16731def8b99f32e47df323269f79676532087b91850f82d8bdc3c3819bad8b33c12291cb46c0b95f3294873f2a1ab6c47f827020d482ffe2bd18d78baf8d64036232f562bee4e8e67d59760e69370f6f52b6552b772d4752aa9064c33ee5c3c30826b6eb0ed4248b21582483f0872b2b05b6ace85f1834d0b9739f445dc6913b08555ee3e456112a2987b52dc697f4a583130bc01e2c523eddeede156e6d63825b6c726723509a91ec3c68f7f44ba97cd098f3e2c4988aa2eec7463afeb408584cd0d6cca5705f6883c993c2a6f31efb52c5367879432902bef2779659af28be0c88eaaf29f0da1e80c77a46cd72eded7e9bb10874667549071698013d9be5b0c54152641c238e20b0ae85d27bed2519a8d9159e2fa6e720fe1fb19c5a3717aaafa795fc0d8dbb85c2108d7713adf2afadcbbf9d9e5256f711275d3422f7692c36e035373db592d1cd531a80c055d7d22386b81ea88ab141d8b3db3dfb373384ee77dd561d8acf09df4f9a44f6ec90c934dffc23ac08e10831447e70f50163f7fc166f0939e46d5ff4e7c12a32d512865916f3f386f01bafbb557b43b50b5ab7dc57237764b2814501603f5f0926ae885b345121ab8199d89d7649522cc0c91ea505c21e7cf3a97f27443b11b23ea2c893dffd496ced2fd4a1936a6ad4b0e00ce3193191b49807c30ab2e43851fb09cf5abf5ddc58e98f1f4da67228f527b4ed850e1e449870de645e040905745757be4f237cefb0c128518bcbbcd5f094b65674bd5c913d22073f08cb5452fdad7a9565effba05d6e1b1e7ff451ead64ea6fbe160d0710ea2d7070d832ff5b752a7b85842107a72d866645006a65edbb9074f03f27f71bdeb7f3f450bda6ab7529c759d6a19525590637ccda2c125e2821061ebc6ab32f45558139cb883989babc5d37a6c47439c29c72a68dc7370a796e884c95e89a2d86fd688f93163d48ab47aad7e3182aaa4bc153bd566337e34dcf9b6bf122f6ff5c01cbb20b20a39d957ebced541fe2126b1d452f2b68898d84369ab1de2c3e1af7e07495c66c130f2c956731feee94fce06d6e5b1d8c842a5b57d552bdd16712ce38b6b5bb69e7674aea4957678f0e2dd2313bd2ba43f07c97cafa49f25e022601029bc1b1f9e53c91f80092bab35d5d45634b6218061bdf2266b771e408f15a1278cabd5ea3b1f5dc42c2587926944d783ebee2d95845d919d037d09bab63c9e00f91712e5d9123bf0c2a0182990af28951c6d4ef69834a1cf0d4c1d235616d01126259d4b19d4d3e531be3dab6449954b4c793af9fca69ff4d7fcc3bfa384f92f0b948d735d33d68f690c0b716d223d99b1bf4cc46f5f0bce4959254b97902563b5e48b6fbb3a5ac5962e86ab35cb68e6d84e0f9f22ff3b3d5fd7e5445b38059401d93ab3d0bb7dfac9c2b211e65ae1bb1db2aec7ba763c5d8132da43564e025f4bd845e137d179444dd8897cfeb202b6bc18e19508cb373dcd49ab48976de676923b0166b5f1366c3543849c6f4d0f8fe4db5f857a6314b92c63125d4cea7dec293f7915c8b3a90be5b6266c1cd80f3046da425813304702a1a12395d701c5b5e849e2369af8b4f95b529086aa76fdc66274e2dfbbd9b6f257476d74bacdc12fc41538a34995d21c64632c18d3b384fb2f9629ff25f0137ad1132f0e1c62fc7c5259fc6affa40937ad304ed42a265d5f936b9b23d228ecedce7d0e8af31b1dacd8f6bb173f16b1a833d6c33e9ded3088e083874c959dbc6b3781f531ee2a10b0fa64f68337ceaaf110da442c87e751dcce6aa5be248852568f93114bc4cebab83416e402ac353ab6faff745cfe0b0a178b214e795f6cae62fafceab8dce4821f71dccaebcee223130c928b9969ce1fbad994e199ff9e34a0075336487e0ecb06d9413210c67d3c7b2c4c51fbad0af144c1db1841686e79165111834ced49cb8a9b9280e0ce87eeeba8282a2488b424d97303ee213e547554adea8880a90a8717728d84713374e936fb72f2a35a9f13f5d5f5a59a514bcc4d9372b3bb3e74db11970580550e83b44f9068a59852f3e6d86a8fef80b881410ca4b6eaf510c8374676b64174461e29bf9de6969f2a1bb02a1a27fd534bd0e5bee450fa29556e0e56be7ddea1216972ee29652d598b83756d2a356ef339d7b372fdd499f7a171166d615bedf2e20b07bb529b148e7e02587c7780eb5361b7f38400104b0bfd136ec00c0690f9b3aa32449181a8207435db5a5d717bfdeafa1f82fae1d6d6c17f6211841448c2556d990e62c9751c935fc9e8c97808ec9702cacdae069fa849bf5a4d2d07bc4012d1b2c6feea8e820ee00077938d2789bbf5c5ac354370b1826f2ac704747aa41264b0baa82276e7ddb89a6be2c2130ee4483e15aa1dd03f9dd87b3d254f0b6e5e0a47a203c9eec0833da521ebe95d9395559665f0c40e8c9a18b9df125cb68a896d7a9c6f453d956c1e8e99bb5985fd4dfd0070f6fb6b515ceb3b844f52cb36f92dfd4a220069cddcea692decd86d049144d45401586349cc77ffd7b716a05e97330f60a33cb8c41dfec0b9d90c8fb01bcee8d638511607a98bbf317332982a7a2350375ad35ed8f92dac5f5383532687601569c686c3865a94e6c5cf5404b3bc85fb305d4f1e5ece235c208c29c27d5aa7b41891840549db5e180e0fbd8ab521d1b9c5cd12638da353c6e56e6b811bbcc134adb3e9936b7680ff72546e78e66bdf18c24eb0dcea8fa21a045bf60e6a425714c80dde6af4f6a8cf63ad24e2d97c20b35a61fc197d4a8f1d3d184d8063dcd71098c38706cc1a4eb840b46cca2c2b74413e8e1ae88730cee22cd3007de4defec22886e7d5e69ff325f1274fdab9723733fbe3e9aec5e070d11179e4fd1c82b56b80ccd5cb9832b7fbf0336d3d7b88558474cca6e0b63da3506a57a6a758efd84fb4179e21d98c454547601a70c5ce457e76ccdee0402359a5c9596095e40b5fd2448854fca446f7845acd223474900a4e3ecee3d04f09dff2110b3e473e8b7ff8e914e736bfdfd490cd8c6a1ca478625316a3a602734c33ca9f8eeb10fc6d2555c9e6082e50a11213c2fc0f5544c5ff05d63f6c0a079141eb4cf3d06c53e08b6213b41597ae59e1c3ae1894c863d7db55778182fafe44b08198ebb61189dc46ee6160f1a4632ca4cc4a44c48da3358f9e1f73421905bc2ac65bcddbf68611e1207681fedc7ae66b85f6a14db490599fa97a4b0ddfa39f3a6f18c33a4ebf01a04cde19c4293c9e5bbe065075534b26ca676f4aaba64ec5e7d9e7d98100c2c11ebb8538cb338acef77272b71e2120c66a74aef955339de80aef0090e607ceb2deb6757228203d2b5edde52c14a79f01f8aa0454f212d99ea01561333a36c5b9646e5f87322d9cb709a7b937ab8cde619ad0ac15ddab44bea09e69ca0c2a387361388b67c9bdac0efb654dc217158b1fcd5ca09d34d1178e4d6167564f35eca4db58cc5cf2e264ac8817ba90f88428d9dbcbbf52c27455c1a6124fc7eb12130b8be3f70b86ccd65c5cbe9156767b435b860cab83c47f57b6f39a3aa5d5e04a647a3d51f916ad8f96bbad1aca46c262553ab36f376ed95c1d006fd1ecbfb7f6e76e57b758b5f2d64c6e9e1c4da603caefc50abeda234173bbab98c643e0d9302247632af64177c09d8e289e54a3ad2c47125d499011426459b11455733503002f98830b96cf4bc3911dfc16407baf89f5f6caaa6f10ee10ae0c6047da19312a447d7966da108a55918aa048de60a5cf2b4dd92b0677e86b4017640f5fdf047cb6a14ef84a47a7379a03e7fe744ac1e87df1d8056a5809d105a4c4beae680b10eaf201e50599e9280f02a83e998ab3c5f6f31a27a03d31fc34aea912e8d8270f98d2b4d0a69982443a52639eb9e48f9a756e9297ad0e0a090a26ec4d7c6762d868a15fe2a3a2152079cac6863a0b1aa6396a406cbe032e4ec1720890eb269aa2edb75e6774cf0d333dd0ae8876a5138fc24ce5e94a43a44796ddf789c25f2fe001ce266ba07e867e2877f5dd9ad1941ebfc056e67d0f5733eb63e9f66a4b29cf1d6788df486c8c38dfdfa7b5a327c55cafc902ce096672eafdf036cf409f2aa12a42c4e46e884d8c7c5c12c0bd3d6457f4bbdcc412706f504d7b7289d9ef2376edd6c311e63a02b752c28a1b1d810fcad73b50485d7de59f32890478e48c0984b734674a3d8a85353fe399e0c355f70d1984f656d7286377d82473db68c0507d2a6542a159ddd9f8f5dc57d0ce75b698aa797ecaae51ee40e4c8bc3d9ad42d02fbbdfa0a515aba09047f64be6491e28295c551ed2784b9937ddb322cc57fe7bf819236ad6fa067cad6d92c99997f5f747ea976b129f924dee94020666398b81f1bb633e160071a0094556f4df03d928b761e79ba202fd64d71b2b29bb37b2bf888ed125ffd2a8eedef888ea43d2cad8f09c0c6b03e21c8a9393fb194756b1ebccaf7805b740c4ccf499c0c7465545a1a6634f1af17b00bf938052266b1966d969f67e6d3159a30fcee6609c73d870b6a893b20633338ae5c687717fd4020912f635a36e717994176bd3e9f44e484060f7b81dec65b2b9b3331902b740a04803b7a92fbd067618e0502787d423c1e8f7bcb0380491932391a0069ebb7bfc2e27d49e971b91255897844ccb730786cbc9af4d3b354525b3bcfbdc92e13166fb2dd74a7ba57770"}]}]}, {0x90, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPRESSIONS={0x8c, 0xb, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, @target={{0xb}, @void}}, {0x78, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x68, 0x2, 0x0, 0x1, [@NFTA_RANGE_FROM_DATA={0x5c, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x3}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x1}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN_ID={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xcdcbc76534fba7a8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}]}, @NFTA_RANGE_SREG={0x8, 0x1, 0x1, 0x0, 0x11}]}}}]}]}]}]}, 0x1708}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r7, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)={0x20, r8, 0x1f1179dba23aa3cd, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x24044404}, 0x8040) 2.105718609s ago: executing program 2 (id=2957): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)={0x20, r1, 0x1f1179dba23aa3cd, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x24044404}, 0x8040) 2.105127933s ago: executing program 4 (id=2958): syz_open_dev$sndpcmc(&(0x7f0000004240), 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8001}, 0x4) syz_emit_ethernet(0x72, &(0x7f0000000400)=ANY=[@ANYBLOB="0180c2286ccedf3f6642531e8847000000000000000000000f00fe4e726c17ec9c1593d59be448cb048caf8f13d9751470c1352cea999e114783bc3c452509dfefc83735767d2761e1bd662f4812af503b042925b392bdb834cd588a569d6b624082a8eccdb9df142d6e62f206ca3b9c6076"], 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x1, 0x8000000}]}]}}, 0x0, 0x42}, 0x20) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000080)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x1}, 0x50) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast2, @multicast2}, &(0x7f0000000200)=0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1e00000008000000070000000800000041000000", @ANYRES32=r2, @ANYBLOB="01000000400000000000000000000000004c0400", @ANYRES32=r3, @ANYRES32=r1, @ANYBLOB="0000000003000000030000000f00"/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/address_bits', 0x0, 0x0) getdents64(r4, 0xfffffffffffffffe, 0x26) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x5, 0x8, 0x0, &(0x7f0000000240)="41e178b73f92f525", 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) sendto$packet(r4, &(0x7f0000000400), 0x0, 0x24000000, 0x0, 0x0) mq_getsetattr(r4, &(0x7f0000000780)={0x81, 0x5, 0x8, 0x23d2bbe3}, &(0x7f00000007c0)) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_usb_connect(0x5, 0x27, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000b75c7f40470501026411010203010902120001000000000904"], 0x0) r9 = syz_open_dev$I2C(&(0x7f0000000040), 0x1, 0x2003) ioctl$I2C_RDWR(r9, 0x707, &(0x7f0000000a40)={&(0x7f00000008c0)=[{0xee, 0x4a11, 0x1, &(0x7f0000000180)='W'}, {0x1, 0x6801, 0x5, &(0x7f0000000900)="a803e7853a"}], 0x2}) connect$unix(r7, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x400000000000041, 0x0) recvmsg$unix(r8, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000540)=""/63, 0x3f}, {&(0x7f0000000580)=""/186, 0xba}], 0x2, &(0x7f00000006c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x10001) recvmmsg(r7, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) syz_open_dev$radio(&(0x7f0000000000), 0x3, 0x2) 2.028809172s ago: executing program 2 (id=2959): syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000540)=0x1, 0x4) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r5 = openat$uhid(0xffffff9c, &(0x7f0000000100), 0x802, 0x0) r6 = dup2(r5, r4) read$FUSE(r6, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) sendmmsg$inet(r0, &(0x7f00000060c0)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)='@', 0x1}, {&(0x7f00000007c0)='y', 0x1}, {&(0x7f0000000340)="b9", 0x1}, {&(0x7f0000000940)="99", 0x1}, {&(0x7f00000008c0)='z', 0x1}, {&(0x7f00000009c0)='~', 0x1}, {&(0x7f0000000a00)='x', 0x1}, {&(0x7f0000000440)="06", 0x1}, {&(0x7f0000000580)='k', 0xffffffc6}, {&(0x7f00000006c0)="1d", 0x1}, {&(0x7f0000000800)='a', 0x1}, {&(0x7f0000000280)='$', 0x1}], 0xc}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000001040)="fc"}, {&(0x7f0000001080)="c9", 0x1}, {&(0x7f0000002180)='-', 0x1}, {&(0x7f0000002240)='R', 0x1}, {&(0x7f00000033c0)="c4", 0x1}], 0x10000000000000ed}}], 0x2, 0x4000000) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000000)=0x7fffffff, 0x4) r7 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000010028bd70000000000000000000", @ANYBLOB="448787a5b2ac645be07dd591ab4931f07404155ad7c920335fb52ce86f5cc21cfe811227176253acba69", @ANYBLOB="01800000000000000000f5000014001680100001800c0009008000000002f600000e"], 0x48}, 0x1, 0x0, 0x0, 0x401}, 0x40) add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f00000000c0)={'fscrypt:', @auto=[0x6, 0x31, 0x30, 0x39, 0x66, 0x38, 0x37, 0x35, 0x5f, 0x65, 0x33, 0x66, 0x34, 0x36, 0x65, 0x31]}, &(0x7f0000000100)={0x0, "479010579d71e99dd144e7c9afd969173a20bcace78ec270fd26f04a9973d2fecbb5d9d23c66d8466ea892b8ae3169d3f36c3cfbca48235b40f7986b39ed2eab", 0x80003f}, 0x48, r7) 2.027188816s ago: executing program 0 (id=2960): syz_open_dev$video4linux(&(0x7f0000000240), 0x800000000401, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000240), 0x0, 0xfffffffffffffffa) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)={'ip_vti0\x00', 0x0, 0x8780, 0x80, 0x0, 0x8, {{0x7, 0x4, 0x0, 0x3, 0x1c, 0x64, 0x0, 0x3, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x32}, @empty, {[@cipso={0x86, 0x8, 0xffffffffffffffff, [{0x1, 0x2}]}]}}}}}) ioctl$KVM_CAP_X86_USER_SPACE_MSR(0xffffffffffffffff, 0x4068aea3, 0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600707, 0x18) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x420, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000040)={0x3ffffffffffffe96, &(0x7f0000000000)=[{0x2000, 0x5}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/20, @ANYBLOB="0e000000040000000800000008000000ab5e3e", @ANYRES64=r2, @ANYRES32=0x0, @ANYBLOB='\x00'/21, @ANYRES8=r2, @ANYRESOCT=r2], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000007c0)=ANY=[@ANYBLOB="95bc497202b695267218000000000000000000000100000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000d2453522ab68a2046b21c336675700a75fc10b0faa6457dd7f6a7a768a4def4dd7f4895cf3ab8c7e4b801732967d40b8aabdec19ef6b1d6b3f4f71becfdd726b", @ANYRES32=r3, @ANYRESOCT=r3], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x363af618}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0), 0x9) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010000480000001c9c5549dc827698ac6e3b", @ANYRES32=r5, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="44000000190001090000000000000000021800000000fd010000000008000100ac141400100016800c0001000000000000010fff080005000a0101020600150006000000"], 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYRES64=r2, @ANYRES32=0x0, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c0002808600010004000000"], 0x3c}, 0x1, 0x0, 0x0, 0x20000601}, 0x4001) 2.36554ms ago: executing program 0 (id=2961): bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="10797fcd6cd957d2b903c6bf46b4abf3629ff075475e4bd6e43be1712bf8", 0x1e) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmmsg$alg(r0, &(0x7f0000000980)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4004080}], 0x1, 0x40002) io_setup(0xff, &(0x7f0000000380)=0x0) io_submit(r1, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x1000000, 0x0, 0x700000000000000, 0x0, 0x0, r0, &(0x7f0000000340), 0x41}]) r2 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000019680)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000b40)="8b", 0x1}, {0x0}], 0x2}}], 0x1, 0x48800) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 714.352µs ago: executing program 1 (id=2962): ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4f8}}, './file0\x00'}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x0, @empty}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3d0, 0x210, 0x940c, 0x3002, 0x210, 0x2c0, 0x300, 0x3d8, 0x3d8, 0x300, 0x3d8, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, @private2, [0xff000000, 0xff000000, 0xff000000, 0xff000000], [0xff, 0xff000000, 0xffffffff, 0xff], 'veth1_to_team\x00', 'macsec0\x00', {}, {}, 0x62, 0x61, 0x0, 0x8}, 0x0, 0x1c8, 0x210, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x1ffffc, 0x0, 0x1, 0x0, 'syz1\x00'}}, @common=@unspec=@addrtype1={{0x28}, {0x2, 0x140, 0xc}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x916, {0x7c7a1f6d}}}}, {{@ipv6={@mcast1, @remote, [0xff000000, 0x0, 0xffffffff, 0xffffffff], [0xffffff00, 0x0, 0xff000000, 0xffffff00], 'syzkaller0\x00', 'pimreg0\x00', {0xff}, {0xff}, 0x33, 0x9, 0x4, 0x10}, 0x0, 0xd0, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) 0s ago: executing program 2 (id=2963): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)={0x20, r1, 0x644ad2ec32b79f57, 0x70bd29, 0x25cfdc03, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x4018010}, 0x4000) (fail_nth: 2) kernel console output (not intermixed with test programs): 70][T11286] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.891081][T11286] RIP: 0033:0x7ff780f5d04e [ 360.891091][T11286] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 360.891101][T11286] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 360.891112][T11286] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 360.891119][T11286] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000006 [ 360.891125][T11286] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 360.891131][T11286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.891137][T11286] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 360.891150][T11286] [ 361.367778][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.374688][T11291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 362.069265][T11308] FAULT_INJECTION: forcing a failure. [ 362.069265][T11308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 362.303564][T11308] CPU: 0 UID: 0 PID: 11308 Comm: syz.4.1874 Tainted: G L syzkaller #0 PREEMPT(full) [ 362.303584][T11308] Tainted: [L]=SOFTLOCKUP [ 362.303588][T11308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 362.303595][T11308] Call Trace: [ 362.303599][T11308] [ 362.303603][T11308] dump_stack_lvl+0x100/0x190 [ 362.303626][T11308] should_fail_ex.cold+0x5/0xa [ 362.303641][T11308] _copy_to_user+0x32/0xd0 [ 362.303655][T11308] simple_read_from_buffer+0xcb/0x170 [ 362.303668][T11308] proc_fail_nth_read+0x1af/0x230 [ 362.303685][T11308] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 362.303710][T11308] ? rw_verify_area+0xce/0x6d0 [ 362.303725][T11308] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 362.303740][T11308] vfs_read+0x1e4/0xb30 [ 362.303751][T11308] ? __pfx_vfs_read+0x10/0x10 [ 362.303761][T11308] ? __fget_files+0x215/0x3d0 [ 362.303776][T11308] ? __fget_files+0x21f/0x3d0 [ 362.303791][T11308] ksys_read+0x12a/0x250 [ 362.303801][T11308] ? __pfx_ksys_read+0x10/0x10 [ 362.303814][T11308] do_syscall_64+0x106/0xf80 [ 362.303824][T11308] ? clear_bhb_loop+0x40/0x90 [ 362.303838][T11308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.303848][T11308] RIP: 0033:0x7f302bd5d04e [ 362.303858][T11308] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 362.303868][T11308] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 362.303879][T11308] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 362.303886][T11308] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 362.303891][T11308] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 362.303898][T11308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 362.303903][T11308] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 362.303917][T11308] [ 364.102454][T11344] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1887'. [ 365.200743][ T30] kauditd_printk_skb: 5704 callbacks suppressed [ 365.200760][ T30] audit: type=1400 audit(1775427362.834:316276): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 365.291263][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 365.327790][ T5471] audit: audit_lost=54135 audit_rate_limit=0 audit_backlog_limit=64 [ 365.452815][ T30] audit: type=1400 audit(1775427362.844:316277): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 365.561176][T11360] audit: audit_backlog=65 > audit_backlog_limit=64 [ 365.573187][ T5471] audit: backlog limit exceeded [ 365.583594][ T30] audit: type=1400 audit(1775427362.844:316278): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 365.613759][T11360] audit: audit_lost=54136 audit_rate_limit=0 audit_backlog_limit=64 [ 365.664211][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 365.695472][ T30] audit: type=1400 audit(1775427362.844:316279): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 366.982630][T11388] FAULT_INJECTION: forcing a failure. [ 366.982630][T11388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.102417][T11388] CPU: 0 UID: 0 PID: 11388 Comm: syz.4.1901 Tainted: G L syzkaller #0 PREEMPT(full) [ 367.102438][T11388] Tainted: [L]=SOFTLOCKUP [ 367.102442][T11388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 367.102448][T11388] Call Trace: [ 367.102452][T11388] [ 367.102458][T11388] dump_stack_lvl+0x100/0x190 [ 367.102480][T11388] should_fail_ex.cold+0x5/0xa [ 367.102495][T11388] _copy_from_user+0x2e/0xd0 [ 367.102508][T11388] __sys_bpf+0x243/0x4b90 [ 367.102523][T11388] ? __pfx___sys_bpf+0x10/0x10 [ 367.102534][T11388] ? proc_fail_nth_write+0x9f/0x220 [ 367.102549][T11388] ? find_held_lock+0x2b/0x80 [ 367.102567][T11388] ? find_held_lock+0x2b/0x80 [ 367.102580][T11388] ? ksys_write+0x190/0x250 [ 367.102593][T11388] ? __mutex_unlock_slowpath+0x15c/0x790 [ 367.102604][T11388] ? __fget_files+0x215/0x3d0 [ 367.102622][T11388] ? fput+0x79/0x100 [ 367.102634][T11388] ? ksys_write+0x1ac/0x250 [ 367.102643][T11388] ? __pfx_ksys_write+0x10/0x10 [ 367.102655][T11388] __x64_sys_bpf+0x7b/0xc0 [ 367.102668][T11388] ? lockdep_hardirqs_on+0x78/0x100 [ 367.102684][T11388] do_syscall_64+0x106/0xf80 [ 367.102693][T11388] ? clear_bhb_loop+0x40/0x90 [ 367.102712][T11388] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.102723][T11388] RIP: 0033:0x7f302bd9c819 [ 367.102733][T11388] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 367.102743][T11388] RSP: 002b:00007f302cbf6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 367.102754][T11388] RAX: ffffffffffffffda RBX: 00007f302c015fa0 RCX: 00007f302bd9c819 [ 367.102760][T11388] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 367.102767][T11388] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 367.102773][T11388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.102779][T11388] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 367.102791][T11388] [ 367.599197][T11406] FAULT_INJECTION: forcing a failure. [ 367.599197][T11406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.613104][T11406] CPU: 0 UID: 0 PID: 11406 Comm: syz.2.1910 Tainted: G L syzkaller #0 PREEMPT(full) [ 367.613133][T11406] Tainted: [L]=SOFTLOCKUP [ 367.613139][T11406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 367.613149][T11406] Call Trace: [ 367.613155][T11406] [ 367.613161][T11406] dump_stack_lvl+0x100/0x190 [ 367.613193][T11406] should_fail_ex.cold+0x5/0xa [ 367.613217][T11406] _copy_to_user+0x32/0xd0 [ 367.613239][T11406] simple_read_from_buffer+0xcb/0x170 [ 367.613260][T11406] proc_fail_nth_read+0x1af/0x230 [ 367.613288][T11406] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 367.613315][T11406] ? rw_verify_area+0xce/0x6d0 [ 367.613340][T11406] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 367.613365][T11406] vfs_read+0x1e4/0xb30 [ 367.613384][T11406] ? __pfx_vfs_read+0x10/0x10 [ 367.613400][T11406] ? __fget_files+0x215/0x3d0 [ 367.613426][T11406] ? __fget_files+0x21f/0x3d0 [ 367.613451][T11406] ksys_read+0x12a/0x250 [ 367.613467][T11406] ? __pfx_ksys_read+0x10/0x10 [ 367.613482][T11406] ? arch_syscall_is_vdso_sigreturn+0xb6/0x200 [ 367.613508][T11406] ? syscall_user_dispatch+0x76/0x130 [ 367.613533][T11406] do_syscall_64+0x106/0xf80 [ 367.613549][T11406] ? clear_bhb_loop+0x40/0x90 [ 367.613571][T11406] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.613590][T11406] RIP: 0033:0x7ff780f5d04e [ 367.613605][T11406] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 367.613621][T11406] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 367.613639][T11406] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 367.613651][T11406] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 367.613661][T11406] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 367.613672][T11406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.613682][T11406] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 367.613712][T11406] [ 368.646315][T11430] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1915'. [ 369.100992][T11436] FAULT_INJECTION: forcing a failure. [ 369.100992][T11436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.156708][T11436] CPU: 0 UID: 0 PID: 11436 Comm: syz.4.1919 Tainted: G L syzkaller #0 PREEMPT(full) [ 369.156738][T11436] Tainted: [L]=SOFTLOCKUP [ 369.156744][T11436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 369.156753][T11436] Call Trace: [ 369.156759][T11436] [ 369.156766][T11436] dump_stack_lvl+0x100/0x190 [ 369.156802][T11436] should_fail_ex.cold+0x5/0xa [ 369.156826][T11436] _copy_to_user+0x32/0xd0 [ 369.156844][T11436] simple_read_from_buffer+0xcb/0x170 [ 369.156863][T11436] proc_fail_nth_read+0x1af/0x230 [ 369.156888][T11436] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 369.156912][T11436] ? rw_verify_area+0xce/0x6d0 [ 369.156936][T11436] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 369.156962][T11436] vfs_read+0x1e4/0xb30 [ 369.156981][T11436] ? __pfx_vfs_read+0x10/0x10 [ 369.156997][T11436] ? __fget_files+0x215/0x3d0 [ 369.157022][T11436] ? __fget_files+0x21f/0x3d0 [ 369.157048][T11436] ksys_read+0x12a/0x250 [ 369.157064][T11436] ? __pfx_ksys_read+0x10/0x10 [ 369.157087][T11436] do_syscall_64+0x106/0xf80 [ 369.157104][T11436] ? clear_bhb_loop+0x40/0x90 [ 369.157126][T11436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 369.157144][T11436] RIP: 0033:0x7f302bd5d04e [ 369.157160][T11436] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 369.157176][T11436] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 369.157194][T11436] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 369.157205][T11436] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 369.157215][T11436] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 369.157224][T11436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.157233][T11436] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 369.157257][T11436] [ 369.744591][T11448] can0: slcan on ptm0. [ 369.860128][T11453] sp0: Synchronizing with TNC [ 369.899686][T11453] FAULT_INJECTION: forcing a failure. [ 369.899686][T11453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.949385][T11453] CPU: 1 UID: 0 PID: 11453 Comm: syz.0.1927 Tainted: G L syzkaller #0 PREEMPT(full) [ 369.949415][T11453] Tainted: [L]=SOFTLOCKUP [ 369.949419][T11453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 369.949432][T11453] Call Trace: [ 369.949438][T11453] [ 369.949445][T11453] dump_stack_lvl+0x100/0x190 [ 369.949478][T11453] should_fail_ex.cold+0x5/0xa [ 369.949500][T11453] _copy_from_user+0x2e/0xd0 [ 369.949517][T11453] do_fcntl+0x610/0x1670 [ 369.949541][T11453] ? __pfx_do_fcntl+0x10/0x10 [ 369.949562][T11453] ? __fget_files+0x215/0x3d0 [ 369.949585][T11453] ? selinux_file_fcntl+0xe8/0x160 [ 369.949610][T11453] __x64_sys_fcntl+0x163/0x200 [ 369.949637][T11453] do_syscall_64+0x106/0xf80 [ 369.949654][T11453] ? clear_bhb_loop+0x40/0x90 [ 369.949674][T11453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 369.949690][T11453] RIP: 0033:0x7effe359c819 [ 369.949708][T11453] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 369.949722][T11453] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 369.949737][T11453] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 369.949746][T11453] RDX: 00002000000000c0 RSI: 0000000000000410 RDI: 0000000000000006 [ 369.949754][T11453] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 369.949763][T11453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.949772][T11453] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 369.949794][T11453] [ 370.334821][ T30] kauditd_printk_skb: 4549 callbacks suppressed [ 370.334836][ T30] audit: type=1400 audit(1775427367.824:319515): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 370.373278][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 370.379786][ T5471] audit: audit_lost=54575 audit_rate_limit=0 audit_backlog_limit=64 [ 370.389510][T11447] can0 (unregistered): slcan off ptm0. [ 370.407720][ T5471] audit: backlog limit exceeded [ 370.417862][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 370.427305][ T30] audit: type=1400 audit(1775427367.824:319516): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 370.451188][ T5471] audit: audit_lost=54576 audit_rate_limit=0 audit_backlog_limit=64 [ 370.465936][ T5471] audit: backlog limit exceeded [ 370.473788][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 370.504345][ T5471] audit: audit_lost=54577 audit_rate_limit=0 audit_backlog_limit=64 [ 370.678309][T11452] [U] è [ 370.722224][T11434] geneve2: entered promiscuous mode [ 371.114824][T11464] sp0: Synchronizing with TNC [ 371.757955][T11474] netlink: 152 bytes leftover after parsing attributes in process `syz.0.1933'. [ 371.822902][T11474] netlink: 108 bytes leftover after parsing attributes in process `syz.0.1933'. [ 372.995519][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 373.001886][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 374.478367][T11547] FAULT_INJECTION: forcing a failure. [ 374.478367][T11547] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 374.636502][T11547] CPU: 1 UID: 0 PID: 11547 Comm: syz.4.1962 Tainted: G L syzkaller #0 PREEMPT(full) [ 374.636533][T11547] Tainted: [L]=SOFTLOCKUP [ 374.636539][T11547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 374.636550][T11547] Call Trace: [ 374.636555][T11547] [ 374.636562][T11547] dump_stack_lvl+0x100/0x190 [ 374.636595][T11547] should_fail_ex.cold+0x5/0xa [ 374.636619][T11547] _copy_to_user+0x32/0xd0 [ 374.636641][T11547] simple_read_from_buffer+0xcb/0x170 [ 374.636663][T11547] proc_fail_nth_read+0x1af/0x230 [ 374.636691][T11547] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 374.636718][T11547] ? rw_verify_area+0xce/0x6d0 [ 374.636742][T11547] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 374.636767][T11547] vfs_read+0x1e4/0xb30 [ 374.636786][T11547] ? __pfx_vfs_read+0x10/0x10 [ 374.636802][T11547] ? __fget_files+0x215/0x3d0 [ 374.636827][T11547] ? __fget_files+0x21f/0x3d0 [ 374.636853][T11547] ksys_read+0x12a/0x250 [ 374.636869][T11547] ? __pfx_ksys_read+0x10/0x10 [ 374.636892][T11547] do_syscall_64+0x106/0xf80 [ 374.636909][T11547] ? clear_bhb_loop+0x40/0x90 [ 374.636930][T11547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 374.636949][T11547] RIP: 0033:0x7f302bd5d04e [ 374.636964][T11547] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 374.636981][T11547] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 374.636999][T11547] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 374.637011][T11547] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 374.637021][T11547] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 374.637031][T11547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.637042][T11547] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 374.637065][T11547] [ 375.416525][ T30] kauditd_printk_skb: 7008 callbacks suppressed [ 375.416543][ T30] audit: type=1400 audit(1775427373.054:326521): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 375.517302][ T30] audit: type=1400 audit(1775427373.084:326522): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 375.544488][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.560727][ T5471] audit: audit_lost=54579 audit_rate_limit=0 audit_backlog_limit=64 [ 375.577842][ T5471] audit: backlog limit exceeded [ 375.638069][T11564] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.644981][T11564] audit: audit_lost=54580 audit_rate_limit=0 audit_backlog_limit=64 [ 375.681546][T11564] audit: backlog limit exceeded [ 375.817320][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.826168][ T30] audit: type=1400 audit(1775427373.084:326523): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.330353][T11573] FAULT_INJECTION: forcing a failure. [ 376.330353][T11573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 376.360003][T11573] CPU: 0 UID: 0 PID: 11573 Comm: syz.2.1969 Tainted: G L syzkaller #0 PREEMPT(full) [ 376.360032][T11573] Tainted: [L]=SOFTLOCKUP [ 376.360038][T11573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 376.360049][T11573] Call Trace: [ 376.360055][T11573] [ 376.360062][T11573] dump_stack_lvl+0x100/0x190 [ 376.360098][T11573] should_fail_ex.cold+0x5/0xa [ 376.360123][T11573] _copy_to_user+0x32/0xd0 [ 376.360146][T11573] simple_read_from_buffer+0xcb/0x170 [ 376.360168][T11573] proc_fail_nth_read+0x1af/0x230 [ 376.360196][T11573] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 376.360223][T11573] ? rw_verify_area+0xce/0x6d0 [ 376.360248][T11573] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 376.360273][T11573] vfs_read+0x1e4/0xb30 [ 376.360293][T11573] ? __pfx_vfs_read+0x10/0x10 [ 376.360308][T11573] ? __fget_files+0x215/0x3d0 [ 376.360332][T11573] ? __fget_files+0x21f/0x3d0 [ 376.360359][T11573] ksys_read+0x12a/0x250 [ 376.360374][T11573] ? __pfx_ksys_read+0x10/0x10 [ 376.360399][T11573] do_syscall_64+0x106/0xf80 [ 376.360415][T11573] ? clear_bhb_loop+0x40/0x90 [ 376.360436][T11573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 376.360454][T11573] RIP: 0033:0x7ff780f5d04e [ 376.360469][T11573] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 376.360485][T11573] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 376.360507][T11573] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 376.360518][T11573] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 376.360528][T11573] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 376.360538][T11573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.360547][T11573] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 376.360575][T11573] [ 376.594841][T11578] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1971'. [ 376.608692][T11578] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1971'. [ 376.624600][T11580] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1972'. [ 377.251201][T11596] FAULT_INJECTION: forcing a failure. [ 377.251201][T11596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.272606][T11596] CPU: 1 UID: 0 PID: 11596 Comm: syz.2.1977 Tainted: G L syzkaller #0 PREEMPT(full) [ 377.272635][T11596] Tainted: [L]=SOFTLOCKUP [ 377.272642][T11596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 377.272651][T11596] Call Trace: [ 377.272657][T11596] [ 377.272664][T11596] dump_stack_lvl+0x100/0x190 [ 377.272699][T11596] should_fail_ex.cold+0x5/0xa [ 377.272721][T11596] _copy_from_user+0x2e/0xd0 [ 377.272740][T11596] copy_msghdr_from_user+0x9f/0x4f0 [ 377.272762][T11596] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 377.272793][T11596] ___sys_sendmsg+0x106/0x1e0 [ 377.272815][T11596] ? __pfx____sys_sendmsg+0x10/0x10 [ 377.272863][T11596] __sys_sendmsg+0x170/0x220 [ 377.272889][T11596] ? __pfx___sys_sendmsg+0x10/0x10 [ 377.272929][T11596] do_syscall_64+0x106/0xf80 [ 377.272945][T11596] ? clear_bhb_loop+0x40/0x90 [ 377.272968][T11596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.272985][T11596] RIP: 0033:0x7ff780f9c819 [ 377.273002][T11596] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 377.273017][T11596] RSP: 002b:00007ff781d7f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 377.273034][T11596] RAX: ffffffffffffffda RBX: 00007ff781215fa0 RCX: 00007ff780f9c819 [ 377.273045][T11596] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000003 [ 377.273054][T11596] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 377.273064][T11596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 377.273074][T11596] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 377.273097][T11596] [ 377.663302][T11608] sp0: Synchronizing with TNC [ 378.369140][T11641] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1992'. [ 378.577222][T11644] sp0: Synchronizing with TNC [ 379.920141][T11667] sock: sock_timestamping_bind_phc: sock not bind to device [ 380.421092][ T30] kauditd_printk_skb: 8618 callbacks suppressed [ 380.421109][ T30] audit: type=1400 audit(1775427378.064:334069): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 380.481116][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 380.495763][ T5471] audit: audit_lost=54939 audit_rate_limit=0 audit_backlog_limit=64 [ 380.496243][ T30] audit: type=1400 audit(1775427378.064:334070): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 380.540776][ T5471] audit: backlog limit exceeded [ 380.563997][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 380.581358][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 380.602294][ T5809] audit: audit_lost=54940 audit_rate_limit=0 audit_backlog_limit=64 [ 380.610296][ T5809] audit: backlog limit exceeded [ 380.622101][T11675] audit: audit_backlog=65 > audit_backlog_limit=64 [ 380.948252][T11681] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2006'. [ 381.192732][T11687] netlink: 52 bytes leftover after parsing attributes in process `syz.0.2008'. [ 382.297751][T11704] sp0: Synchronizing with TNC [ 382.684215][T11708] FAULT_INJECTION: forcing a failure. [ 382.684215][T11708] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 382.816738][T11708] CPU: 0 UID: 0 PID: 11708 Comm: syz.0.2017 Tainted: G L syzkaller #0 PREEMPT(full) [ 382.816766][T11708] Tainted: [L]=SOFTLOCKUP [ 382.816769][T11708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 382.816776][T11708] Call Trace: [ 382.816780][T11708] [ 382.816785][T11708] dump_stack_lvl+0x100/0x190 [ 382.816808][T11708] should_fail_ex.cold+0x5/0xa [ 382.816823][T11708] _copy_from_user+0x2e/0xd0 [ 382.816835][T11708] __sys_bpf+0x243/0x4b90 [ 382.816849][T11708] ? __pfx___sys_bpf+0x10/0x10 [ 382.816860][T11708] ? proc_fail_nth_write+0x9f/0x220 [ 382.816875][T11708] ? find_held_lock+0x2b/0x80 [ 382.816892][T11708] ? find_held_lock+0x2b/0x80 [ 382.816906][T11708] ? ksys_write+0x190/0x250 [ 382.816918][T11708] ? __mutex_unlock_slowpath+0x15c/0x790 [ 382.816930][T11708] ? __fget_files+0x215/0x3d0 [ 382.816948][T11708] ? fput+0x79/0x100 [ 382.816961][T11708] ? ksys_write+0x1ac/0x250 [ 382.816970][T11708] ? __pfx_ksys_write+0x10/0x10 [ 382.816982][T11708] __x64_sys_bpf+0x7b/0xc0 [ 382.816994][T11708] ? lockdep_hardirqs_on+0x78/0x100 [ 382.817011][T11708] do_syscall_64+0x106/0xf80 [ 382.817021][T11708] ? clear_bhb_loop+0x40/0x90 [ 382.817034][T11708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 382.817045][T11708] RIP: 0033:0x7effe359c819 [ 382.817054][T11708] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 382.817065][T11708] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.817076][T11708] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 382.817083][T11708] RDX: 000000000000004c RSI: 0000200000000240 RDI: 000000000000000a [ 382.817089][T11708] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 382.817095][T11708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.817101][T11708] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 382.817114][T11708] [ 383.489882][T11722] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2020'. [ 383.522476][T11722] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11722 comm=syz.4.2020 [ 384.595664][T11748] FAULT_INJECTION: forcing a failure. [ 384.595664][T11748] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.625636][T11748] CPU: 0 UID: 0 PID: 11748 Comm: syz.3.2031 Tainted: G L syzkaller #0 PREEMPT(full) [ 384.625667][T11748] Tainted: [L]=SOFTLOCKUP [ 384.625673][T11748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 384.625683][T11748] Call Trace: [ 384.625689][T11748] [ 384.625696][T11748] dump_stack_lvl+0x100/0x190 [ 384.625732][T11748] should_fail_ex.cold+0x5/0xa [ 384.625757][T11748] _copy_from_iter+0x1f4/0x1690 [ 384.625785][T11748] ? __pfx__copy_from_iter+0x10/0x10 [ 384.625804][T11748] ? _parse_integer_limit+0x17f/0x1d0 [ 384.625832][T11748] ? _kstrtoull+0x13c/0x1f0 [ 384.625855][T11748] ? __pfx__kstrtoull+0x10/0x10 [ 384.625881][T11748] tun_get_user+0x265/0x3e10 [ 384.625905][T11748] ? __lock_acquire+0x4a5/0x2630 [ 384.625928][T11748] ? __pfx_tun_get_user+0x10/0x10 [ 384.625948][T11748] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 384.625978][T11748] ? find_held_lock+0x2b/0x80 [ 384.626001][T11748] ? tun_get+0x191/0x370 [ 384.626015][T11748] ? tun_get+0x191/0x370 [ 384.626037][T11748] tun_chr_write_iter+0xdc/0x200 [ 384.626058][T11748] vfs_write+0x6ac/0x1070 [ 384.626076][T11748] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 384.626112][T11748] ? __pfx_vfs_write+0x10/0x10 [ 384.626127][T11748] ? find_held_lock+0x2b/0x80 [ 384.626164][T11748] ksys_write+0x12a/0x250 [ 384.626179][T11748] ? __pfx_ksys_write+0x10/0x10 [ 384.626203][T11748] do_syscall_64+0x106/0xf80 [ 384.626220][T11748] ? clear_bhb_loop+0x40/0x90 [ 384.626243][T11748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.626261][T11748] RIP: 0033:0x7f48f999c819 [ 384.626276][T11748] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 384.626293][T11748] RSP: 002b:00007f48fa7bf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 384.626310][T11748] RAX: ffffffffffffffda RBX: 00007f48f9c15fa0 RCX: 00007f48f999c819 [ 384.626322][T11748] RDX: 0000000000000032 RSI: 0000200000000480 RDI: 0000000000000003 [ 384.626338][T11748] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 384.626348][T11748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 384.626358][T11748] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 384.626381][T11748] [ 384.886868][ T146] Bluetooth: Error in BCSP hdr checksum [ 385.115227][T11752] sp0: Synchronizing with TNC [ 385.141522][ T146] Bluetooth: Error in BCSP hdr checksum [ 385.460520][ T30] kauditd_printk_skb: 10997 callbacks suppressed [ 385.460537][ T30] audit: type=1400 audit(1775427383.084:343442): avc: denied { read write } for pid=5803 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.511422][ T30] audit: type=1400 audit(1775427383.024:343441): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.538545][ T30] audit: type=1400 audit(1775427383.104:343443): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.553102][T11755] FAULT_INJECTION: forcing a failure. [ 385.553102][T11755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 385.577994][ T30] audit: type=1400 audit(1775427383.134:343444): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.578809][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 385.608359][ T30] audit: type=1400 audit(1775427383.134:343445): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.630413][ T30] audit: type=1400 audit(1775427383.134:343446): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.647756][T11755] CPU: 0 UID: 0 PID: 11755 Comm: syz.4.2035 Tainted: G L syzkaller #0 PREEMPT(full) [ 385.647784][T11755] Tainted: [L]=SOFTLOCKUP [ 385.647790][T11755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 385.647799][T11755] Call Trace: [ 385.647804][T11755] [ 385.647810][T11755] dump_stack_lvl+0x100/0x190 [ 385.647840][T11755] should_fail_ex.cold+0x5/0xa [ 385.647861][T11755] _copy_to_user+0x32/0xd0 [ 385.647880][T11755] simple_read_from_buffer+0xcb/0x170 [ 385.647898][T11755] proc_fail_nth_read+0x1af/0x230 [ 385.647922][T11755] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 385.647945][T11755] ? rw_verify_area+0xce/0x6d0 [ 385.647966][T11755] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 385.647987][T11755] vfs_read+0x1e4/0xb30 [ 385.648004][T11755] ? __pfx_vfs_read+0x10/0x10 [ 385.648017][T11755] ? __fget_files+0x215/0x3d0 [ 385.648038][T11755] ? __fget_files+0x21f/0x3d0 [ 385.648060][T11755] ksys_read+0x12a/0x250 [ 385.648074][T11755] ? __pfx_ksys_read+0x10/0x10 [ 385.648094][T11755] do_syscall_64+0x106/0xf80 [ 385.648108][T11755] ? clear_bhb_loop+0x40/0x90 [ 385.648127][T11755] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.648142][T11755] RIP: 0033:0x7f302bd5d04e [ 385.648155][T11755] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 385.648169][T11755] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 385.648184][T11755] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 385.648194][T11755] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 385.648203][T11755] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 385.648212][T11755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.648220][T11755] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 385.648240][T11755] [ 385.658400][ T5471] audit: audit_lost=55484 audit_rate_limit=0 audit_backlog_limit=64 [ 385.679357][ T30] audit: type=1400 audit(1775427383.134:343447): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 385.721044][ T5471] audit: backlog limit exceeded [ 386.431182][ T5812] Bluetooth: hci5: command 0x1003 tx timeout [ 386.431470][ T5815] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 386.682176][T11776] xt_CT: You must specify a L4 protocol and not use inversions on it [ 387.363344][T11784] sp0: Synchronizing with TNC [ 387.416959][T11786] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2046'. [ 388.641054][T11805] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2051'. [ 389.215255][T11807] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2052'. [ 389.811626][T11816] netlink: 'syz.1.2054': attribute type 4 has an invalid length. [ 389.864594][T11816] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2054'. [ 390.461126][ T30] kauditd_printk_skb: 8131 callbacks suppressed [ 390.461139][ T30] audit: type=1400 audit(1775427388.094:350631): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 390.506556][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 390.528898][ T5471] audit: audit_lost=55801 audit_rate_limit=0 audit_backlog_limit=64 [ 390.538132][ T30] audit: type=1400 audit(1775427388.094:350632): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 390.570942][ T5471] audit: backlog limit exceeded [ 390.594538][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 390.607776][ T5471] audit: audit_lost=55802 audit_rate_limit=0 audit_backlog_limit=64 [ 390.610544][ T30] audit: type=1400 audit(1775427388.094:350633): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 390.620148][ T5471] audit: backlog limit exceeded [ 390.639452][T11831] audit: audit_backlog=65 > audit_backlog_limit=64 [ 391.809525][T11854] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 391.911029][T11854] block device autoloading is deprecated and will be removed. [ 392.194454][T11869] FAULT_INJECTION: forcing a failure. [ 392.194454][T11869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 392.208593][T11869] CPU: 1 UID: 0 PID: 11869 Comm: syz.2.2073 Tainted: G L syzkaller #0 PREEMPT(full) [ 392.208622][T11869] Tainted: [L]=SOFTLOCKUP [ 392.208628][T11869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 392.208637][T11869] Call Trace: [ 392.208643][T11869] [ 392.208649][T11869] dump_stack_lvl+0x100/0x190 [ 392.208683][T11869] should_fail_ex.cold+0x5/0xa [ 392.208707][T11869] _copy_to_user+0x32/0xd0 [ 392.208728][T11869] simple_read_from_buffer+0xcb/0x170 [ 392.208750][T11869] proc_fail_nth_read+0x1af/0x230 [ 392.208775][T11869] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 392.208802][T11869] ? rw_verify_area+0xce/0x6d0 [ 392.208827][T11869] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 392.208849][T11869] vfs_read+0x1e4/0xb30 [ 392.208867][T11869] ? __pfx_vfs_read+0x10/0x10 [ 392.208882][T11869] ? __fget_files+0x215/0x3d0 [ 392.208904][T11869] ? __fget_files+0x21f/0x3d0 [ 392.208928][T11869] ksys_read+0x12a/0x250 [ 392.208943][T11869] ? __pfx_ksys_read+0x10/0x10 [ 392.208965][T11869] do_syscall_64+0x106/0xf80 [ 392.208982][T11869] ? clear_bhb_loop+0x40/0x90 [ 392.209004][T11869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.209021][T11869] RIP: 0033:0x7ff780f5d04e [ 392.209034][T11869] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 392.209047][T11869] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 392.209062][T11869] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 392.209071][T11869] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 392.209079][T11869] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 392.209087][T11869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.209095][T11869] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 392.209114][T11869] [ 392.836246][T11879] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2076'. [ 393.088038][T11881] FAULT_INJECTION: forcing a failure. [ 393.088038][T11881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.176577][T11881] CPU: 0 UID: 0 PID: 11881 Comm: syz.1.2080 Tainted: G L syzkaller #0 PREEMPT(full) [ 393.176606][T11881] Tainted: [L]=SOFTLOCKUP [ 393.176612][T11881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 393.176622][T11881] Call Trace: [ 393.176628][T11881] [ 393.176635][T11881] dump_stack_lvl+0x100/0x190 [ 393.176670][T11881] should_fail_ex.cold+0x5/0xa [ 393.176695][T11881] _copy_from_user+0x2e/0xd0 [ 393.176717][T11881] copy_msghdr_from_user+0x9f/0x4f0 [ 393.176739][T11881] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 393.176770][T11881] ___sys_sendmsg+0x106/0x1e0 [ 393.176792][T11881] ? __pfx____sys_sendmsg+0x10/0x10 [ 393.176840][T11881] __sys_sendmsg+0x170/0x220 [ 393.176865][T11881] ? __pfx___sys_sendmsg+0x10/0x10 [ 393.176905][T11881] do_syscall_64+0x106/0xf80 [ 393.176922][T11881] ? clear_bhb_loop+0x40/0x90 [ 393.176944][T11881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.176962][T11881] RIP: 0033:0x7f699fd9c819 [ 393.176977][T11881] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 393.176993][T11881] RSP: 002b:00007f69a0cd9028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.177010][T11881] RAX: ffffffffffffffda RBX: 00007f69a0015fa0 RCX: 00007f699fd9c819 [ 393.177020][T11881] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000004 [ 393.177030][T11881] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 393.177040][T11881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.177050][T11881] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 393.177073][T11881] [ 394.063485][T11896] netlink: 'syz.3.2083': attribute type 4 has an invalid length. [ 394.140935][T11896] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2083'. [ 394.159203][T11899] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2085'. [ 394.174961][T11899] vlan3: entered allmulticast mode [ 394.180784][T11899] batman_adv: batadv0: Adding interface: vlan3 [ 394.231506][T11899] batman_adv: batadv0: The MTU of interface vlan3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 394.319069][T11899] batman_adv: batadv0: Not using interface vlan3 (retrying later): interface not active [ 395.558185][ T30] kauditd_printk_skb: 5026 callbacks suppressed [ 395.558200][ T30] audit: type=1400 audit(1775427393.194:355469): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 395.586369][ T30] audit: type=1400 audit(1775427393.194:355470): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 395.625145][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 395.637442][ T5471] audit: audit_lost=55867 audit_rate_limit=0 audit_backlog_limit=64 [ 395.655651][ T5471] audit: backlog limit exceeded [ 395.696647][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 395.711175][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 395.717881][ T5471] audit: audit_lost=55868 audit_rate_limit=0 audit_backlog_limit=64 [ 395.725757][T11923] audit: audit_backlog=65 > audit_backlog_limit=64 [ 395.732590][ T30] audit: type=1400 audit(1775427393.194:355471): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 396.176045][T11933] FAULT_INJECTION: forcing a failure. [ 396.176045][T11933] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 396.268839][T11933] CPU: 1 UID: 0 PID: 11933 Comm: syz.1.2097 Tainted: G L syzkaller #0 PREEMPT(full) [ 396.268858][T11933] Tainted: [L]=SOFTLOCKUP [ 396.268862][T11933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 396.268869][T11933] Call Trace: [ 396.268872][T11933] [ 396.268877][T11933] dump_stack_lvl+0x100/0x190 [ 396.268900][T11933] should_fail_ex.cold+0x5/0xa [ 396.268915][T11933] _copy_to_user+0x32/0xd0 [ 396.268929][T11933] simple_read_from_buffer+0xcb/0x170 [ 396.268942][T11933] proc_fail_nth_read+0x1af/0x230 [ 396.268959][T11933] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 396.268975][T11933] ? rw_verify_area+0xce/0x6d0 [ 396.268990][T11933] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 396.269006][T11933] vfs_read+0x1e4/0xb30 [ 396.269017][T11933] ? __pfx_vfs_read+0x10/0x10 [ 396.269026][T11933] ? __fget_files+0x215/0x3d0 [ 396.269041][T11933] ? __fget_files+0x21f/0x3d0 [ 396.269056][T11933] ksys_read+0x12a/0x250 [ 396.269066][T11933] ? __pfx_ksys_read+0x10/0x10 [ 396.269079][T11933] do_syscall_64+0x106/0xf80 [ 396.269089][T11933] ? clear_bhb_loop+0x40/0x90 [ 396.269102][T11933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 396.269113][T11933] RIP: 0033:0x7f699fd5d04e [ 396.269123][T11933] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 396.269134][T11933] RSP: 002b:00007f69a0cd8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 396.269150][T11933] RAX: ffffffffffffffda RBX: 00007f69a0cd96c0 RCX: 00007f699fd5d04e [ 396.269156][T11933] RDX: 000000000000000f RSI: 00007f69a0cd90a0 RDI: 0000000000000003 [ 396.269162][T11933] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 396.269168][T11933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.269174][T11933] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 396.269187][T11933] [ 396.843311][T11945] netlink: 'syz.1.2099': attribute type 4 has an invalid length. [ 396.862007][T11944] netlink: 'syz.4.2101': attribute type 4 has an invalid length. [ 396.869842][T11945] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2099'. [ 396.908996][T11944] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2101'. [ 400.082514][T12001] libceph: resolve '0..' (ret=-3): failed [ 400.594065][ T30] kauditd_printk_skb: 6448 callbacks suppressed [ 400.594080][ T30] audit: type=1400 audit(1775427398.234:359845): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 400.621217][ T0] NOHZ tick-stop error: local softirq work is pending, handler #42!!! [ 400.638876][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 400.680408][ T5471] audit: audit_lost=56561 audit_rate_limit=0 audit_backlog_limit=64 [ 400.688954][ T5471] audit: backlog limit exceeded [ 400.699420][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 400.708235][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 400.715812][ T5471] audit: audit_lost=56562 audit_rate_limit=0 audit_backlog_limit=64 [ 400.724679][ T5801] audit: audit_lost=56563 audit_rate_limit=0 audit_backlog_limit=64 [ 400.726971][ T30] audit: type=1400 audit(1775427398.234:359846): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 400.741028][ T5471] audit: backlog limit exceeded [ 400.851265][T12012] FAULT_INJECTION: forcing a failure. [ 400.851265][T12012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 400.875300][T12012] CPU: 1 UID: 0 PID: 12012 Comm: syz.2.2123 Tainted: G L syzkaller #0 PREEMPT(full) [ 400.875334][T12012] Tainted: [L]=SOFTLOCKUP [ 400.875340][T12012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 400.875350][T12012] Call Trace: [ 400.875356][T12012] [ 400.875363][T12012] dump_stack_lvl+0x100/0x190 [ 400.875399][T12012] should_fail_ex.cold+0x5/0xa [ 400.875430][T12012] _copy_to_user+0x32/0xd0 [ 400.875452][T12012] simple_read_from_buffer+0xcb/0x170 [ 400.875474][T12012] proc_fail_nth_read+0x1af/0x230 [ 400.875503][T12012] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 400.875530][T12012] ? rw_verify_area+0xce/0x6d0 [ 400.875555][T12012] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 400.875580][T12012] vfs_read+0x1e4/0xb30 [ 400.875600][T12012] ? __pfx_vfs_read+0x10/0x10 [ 400.875616][T12012] ? __fget_files+0x215/0x3d0 [ 400.875642][T12012] ? __fget_files+0x21f/0x3d0 [ 400.875668][T12012] ksys_read+0x12a/0x250 [ 400.875685][T12012] ? __pfx_ksys_read+0x10/0x10 [ 400.875709][T12012] do_syscall_64+0x106/0xf80 [ 400.875726][T12012] ? clear_bhb_loop+0x40/0x90 [ 400.875751][T12012] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 400.875770][T12012] RIP: 0033:0x7ff780f5d04e [ 400.875785][T12012] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 400.875802][T12012] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 400.875820][T12012] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 400.875832][T12012] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000004 [ 400.875841][T12012] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 400.875851][T12012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 400.875861][T12012] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 400.875885][T12012] [ 401.239105][T12014] sp0: Synchronizing with TNC [ 401.781580][T12022] netlink: 'syz.4.2126': attribute type 4 has an invalid length. [ 402.707847][T12038] FAULT_INJECTION: forcing a failure. [ 402.707847][T12038] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.830841][T12038] CPU: 1 UID: 0 PID: 12038 Comm: syz.0.2132 Tainted: G L syzkaller #0 PREEMPT(full) [ 402.830872][T12038] Tainted: [L]=SOFTLOCKUP [ 402.830878][T12038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 402.830888][T12038] Call Trace: [ 402.830894][T12038] [ 402.830901][T12038] dump_stack_lvl+0x100/0x190 [ 402.830935][T12038] should_fail_ex.cold+0x5/0xa [ 402.830959][T12038] _copy_to_user+0x32/0xd0 [ 402.830982][T12038] simple_read_from_buffer+0xcb/0x170 [ 402.831003][T12038] proc_fail_nth_read+0x1af/0x230 [ 402.831028][T12038] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 402.831054][T12038] ? rw_verify_area+0xce/0x6d0 [ 402.831078][T12038] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 402.831102][T12038] vfs_read+0x1e4/0xb30 [ 402.831121][T12038] ? __pfx_vfs_read+0x10/0x10 [ 402.831135][T12038] ? __fget_files+0x215/0x3d0 [ 402.831166][T12038] ? __fget_files+0x21f/0x3d0 [ 402.831188][T12038] ksys_read+0x12a/0x250 [ 402.831203][T12038] ? __pfx_ksys_read+0x10/0x10 [ 402.831226][T12038] do_syscall_64+0x106/0xf80 [ 402.831242][T12038] ? clear_bhb_loop+0x40/0x90 [ 402.831263][T12038] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.831281][T12038] RIP: 0033:0x7effe355d04e [ 402.831296][T12038] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 402.831312][T12038] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 402.831330][T12038] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 402.831342][T12038] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 402.831352][T12038] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 402.831362][T12038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.831371][T12038] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 402.831395][T12038] [ 403.584586][T12055] netlink: 'syz.0.2137': attribute type 4 has an invalid length. [ 403.632577][T12055] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2137'. [ 404.577698][T12063] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2140'. [ 404.799647][T12068] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2143'. [ 404.839180][T12070] FAULT_INJECTION: forcing a failure. [ 404.839180][T12070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 404.882442][T12068] vlan3: entered allmulticast mode [ 404.892641][T12070] CPU: 1 UID: 0 PID: 12070 Comm: syz.4.2144 Tainted: G L syzkaller #0 PREEMPT(full) [ 404.892670][T12070] Tainted: [L]=SOFTLOCKUP [ 404.892676][T12070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 404.892686][T12070] Call Trace: [ 404.892692][T12070] [ 404.892699][T12070] dump_stack_lvl+0x100/0x190 [ 404.892734][T12070] should_fail_ex.cold+0x5/0xa [ 404.892758][T12070] _copy_from_user+0x2e/0xd0 [ 404.892781][T12070] copy_msghdr_from_user+0x9f/0x4f0 [ 404.892803][T12070] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 404.892835][T12070] ___sys_sendmsg+0x106/0x1e0 [ 404.892857][T12070] ? __pfx____sys_sendmsg+0x10/0x10 [ 404.892903][T12070] __sys_sendmsg+0x170/0x220 [ 404.892929][T12070] ? __pfx___sys_sendmsg+0x10/0x10 [ 404.892968][T12070] do_syscall_64+0x106/0xf80 [ 404.892986][T12070] ? clear_bhb_loop+0x40/0x90 [ 404.893009][T12070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 404.893027][T12070] RIP: 0033:0x7f302bd9c819 [ 404.893042][T12070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 404.893059][T12070] RSP: 002b:00007f302cbf6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 404.893083][T12070] RAX: ffffffffffffffda RBX: 00007f302c015fa0 RCX: 00007f302bd9c819 [ 404.893095][T12070] RDX: 0000000004000000 RSI: 0000200000000280 RDI: 0000000000000004 [ 404.893106][T12070] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 404.893116][T12070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.893126][T12070] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 404.893149][T12070] [ 404.898330][T12068] batman_adv: batadv0: Adding interface: vlan3 [ 405.100747][T12068] batman_adv: batadv0: The MTU of interface vlan3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 405.147224][T12080] libceph: resolve '0..' (ret=-3): failed [ 405.192267][T12068] batman_adv: batadv0: Not using interface vlan3 (retrying later): interface not active [ 405.605286][ T30] kauditd_printk_skb: 6151 callbacks suppressed [ 405.605297][ T30] audit: type=1400 audit(1775427403.244:363774): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 405.787873][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.814552][ T5471] audit: audit_lost=57305 audit_rate_limit=0 audit_backlog_limit=64 [ 405.829928][T12086] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.836575][ T30] audit: type=1400 audit(1775427403.284:363775): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 405.858181][ T5471] audit: backlog limit exceeded [ 405.881032][T12086] audit: audit_lost=57306 audit_rate_limit=0 audit_backlog_limit=64 [ 405.889470][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 405.896191][T12086] audit: backlog limit exceeded [ 405.900512][ T5471] audit: audit_lost=57307 audit_rate_limit=0 audit_backlog_limit=64 [ 407.610691][T12109] sp0: Synchronizing with TNC [ 407.691140][T12115] FAULT_INJECTION: forcing a failure. [ 407.691140][T12115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.704387][T12115] CPU: 1 UID: 0 PID: 12115 Comm: syz.2.2160 Tainted: G L syzkaller #0 PREEMPT(full) [ 407.704413][T12115] Tainted: [L]=SOFTLOCKUP [ 407.704419][T12115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 407.704429][T12115] Call Trace: [ 407.704435][T12115] [ 407.704441][T12115] dump_stack_lvl+0x100/0x190 [ 407.704474][T12115] should_fail_ex.cold+0x5/0xa [ 407.704499][T12115] _copy_to_user+0x32/0xd0 [ 407.704521][T12115] simple_read_from_buffer+0xcb/0x170 [ 407.704543][T12115] proc_fail_nth_read+0x1af/0x230 [ 407.704570][T12115] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 407.704596][T12115] ? rw_verify_area+0xce/0x6d0 [ 407.704620][T12115] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 407.704645][T12115] vfs_read+0x1e4/0xb30 [ 407.704664][T12115] ? __pfx_vfs_read+0x10/0x10 [ 407.704679][T12115] ? __fget_files+0x215/0x3d0 [ 407.704704][T12115] ? __fget_files+0x21f/0x3d0 [ 407.704731][T12115] ksys_read+0x12a/0x250 [ 407.704747][T12115] ? __pfx_ksys_read+0x10/0x10 [ 407.704770][T12115] do_syscall_64+0x106/0xf80 [ 407.704786][T12115] ? clear_bhb_loop+0x40/0x90 [ 407.704809][T12115] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.704827][T12115] RIP: 0033:0x7ff780f5d04e [ 407.704842][T12115] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 407.704859][T12115] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 407.704876][T12115] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 407.704888][T12115] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 407.704898][T12115] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 407.704908][T12115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.704917][T12115] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 407.704942][T12115] [ 409.157290][T12132] FAULT_INJECTION: forcing a failure. [ 409.157290][T12132] name failslab, interval 1, probability 0, space 0, times 0 [ 409.194554][T12132] CPU: 0 UID: 0 PID: 12132 Comm: syz.4.2157 Tainted: G L syzkaller #0 PREEMPT(full) [ 409.194584][T12132] Tainted: [L]=SOFTLOCKUP [ 409.194590][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 409.194600][T12132] Call Trace: [ 409.194606][T12132] [ 409.194613][T12132] dump_stack_lvl+0x100/0x190 [ 409.194646][T12132] should_fail_ex.cold+0x5/0xa [ 409.194670][T12132] should_failslab+0xc2/0x120 [ 409.194691][T12132] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 409.194716][T12132] ? do_getname+0x35/0x390 [ 409.194745][T12132] do_getname+0x35/0x390 [ 409.194771][T12132] __x64_sys_chdir+0xaa/0x280 [ 409.194790][T12132] ? ksys_write+0x1ac/0x250 [ 409.194806][T12132] ? __pfx___x64_sys_chdir+0x10/0x10 [ 409.194833][T12132] do_syscall_64+0x106/0xf80 [ 409.194850][T12132] ? clear_bhb_loop+0x40/0x90 [ 409.194871][T12132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.194887][T12132] RIP: 0033:0x7f302bd9c819 [ 409.194902][T12132] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 409.194916][T12132] RSP: 002b:00007f302cbd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000050 [ 409.194933][T12132] RAX: ffffffffffffffda RBX: 00007f302c016090 RCX: 00007f302bd9c819 [ 409.194944][T12132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000020000000c3c0 [ 409.194953][T12132] RBP: 00007f302cbd5090 R08: 0000000000000000 R09: 0000000000000000 [ 409.194963][T12132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.194973][T12132] R13: 00007f302c016128 R14: 00007f302c016090 R15: 00007ffcb452b818 [ 409.194997][T12132] [ 410.559283][T12161] Device name cannot be null; rc = [-22] [ 410.635504][ T30] kauditd_printk_skb: 7906 callbacks suppressed [ 410.635520][ T30] audit: type=1400 audit(1775427408.224:371673): avc: denied { read } for pid=12157 comm="syz.0.2174" dev="nsfs" ino=4026532810 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 410.665051][T12163] FAULT_INJECTION: forcing a failure. [ 410.665051][T12163] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 410.690922][T12163] CPU: 0 UID: 0 PID: 12163 Comm: syz.0.2174 Tainted: G L syzkaller #0 PREEMPT(full) [ 410.690944][T12163] Tainted: [L]=SOFTLOCKUP [ 410.690948][T12163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 410.690954][T12163] Call Trace: [ 410.690958][T12163] [ 410.690962][T12163] dump_stack_lvl+0x100/0x190 [ 410.690985][T12163] should_fail_ex.cold+0x5/0xa [ 410.691000][T12163] _copy_from_user+0x2e/0xd0 [ 410.691013][T12163] core_sys_select+0x2d0/0xbb0 [ 410.691027][T12163] ? __pfx_core_sys_select+0x10/0x10 [ 410.691038][T12163] ? find_held_lock+0x2b/0x80 [ 410.691052][T12163] ? get_pid_task+0xfc/0x250 [ 410.691079][T12163] ? __pfx_set_user_sigmask+0x10/0x10 [ 410.691091][T12163] ? __mutex_unlock_slowpath+0x15c/0x790 [ 410.691102][T12163] ? __fget_files+0x215/0x3d0 [ 410.691116][T12163] do_pselect.constprop.0+0x238/0x270 [ 410.691130][T12163] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 410.691143][T12163] ? ksys_write+0x1ac/0x250 [ 410.691155][T12163] __x64_sys_pselect6+0x149/0x1c0 [ 410.691169][T12163] do_syscall_64+0x106/0xf80 [ 410.691179][T12163] ? clear_bhb_loop+0x40/0x90 [ 410.691192][T12163] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 410.691203][T12163] RIP: 0033:0x7effe359c819 [ 410.691212][T12163] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 410.691223][T12163] RSP: 002b:00007effe4409028 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 410.691234][T12163] RAX: ffffffffffffffda RBX: 00007effe3816090 RCX: 00007effe359c819 [ 410.691241][T12163] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000040 [ 410.691247][T12163] RBP: 00007effe4409090 R08: 0000000000000000 R09: 0000000000000000 [ 410.691253][T12163] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.691258][T12163] R13: 00007effe3816128 R14: 00007effe3816090 R15: 00007ffd1042fb88 [ 410.691271][T12163] [ 410.706574][ T30] audit: type=1400 audit(1775427408.164:371666): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 410.767622][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 410.875203][T12167] audit: audit_backlog=65 > audit_backlog_limit=64 [ 410.875222][T12167] audit: audit_lost=57311 audit_rate_limit=0 audit_backlog_limit=64 [ 410.875237][T12167] audit: backlog limit exceeded [ 410.948826][T12164] audit: audit_backlog=65 > audit_backlog_limit=64 [ 410.955502][T12164] audit: audit_lost=57312 audit_rate_limit=0 audit_backlog_limit=64 [ 410.956028][ T5471] audit: audit_lost=57313 audit_rate_limit=0 audit_backlog_limit=64 [ 410.980790][T12164] audit: backlog limit exceeded [ 411.252933][T12175] FAULT_INJECTION: forcing a failure. [ 411.252933][T12175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.299459][T12175] CPU: 0 UID: 0 PID: 12175 Comm: syz.4.2181 Tainted: G L syzkaller #0 PREEMPT(full) [ 411.299492][T12175] Tainted: [L]=SOFTLOCKUP [ 411.299499][T12175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 411.299509][T12175] Call Trace: [ 411.299515][T12175] [ 411.299521][T12175] dump_stack_lvl+0x100/0x190 [ 411.299557][T12175] should_fail_ex.cold+0x5/0xa [ 411.299582][T12175] _copy_to_user+0x32/0xd0 [ 411.299604][T12175] simple_read_from_buffer+0xcb/0x170 [ 411.299625][T12175] proc_fail_nth_read+0x1af/0x230 [ 411.299653][T12175] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 411.299680][T12175] ? rw_verify_area+0xce/0x6d0 [ 411.299705][T12175] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 411.299730][T12175] vfs_read+0x1e4/0xb30 [ 411.299750][T12175] ? __pfx_vfs_read+0x10/0x10 [ 411.299766][T12175] ? __fget_files+0x215/0x3d0 [ 411.299791][T12175] ? __fget_files+0x21f/0x3d0 [ 411.299818][T12175] ksys_read+0x12a/0x250 [ 411.299834][T12175] ? __pfx_ksys_read+0x10/0x10 [ 411.299857][T12175] do_syscall_64+0x106/0xf80 [ 411.299873][T12175] ? clear_bhb_loop+0x40/0x90 [ 411.299897][T12175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 411.299914][T12175] RIP: 0033:0x7f302bd5d04e [ 411.299929][T12175] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 411.299946][T12175] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 411.299964][T12175] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 411.299976][T12175] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000004 [ 411.299986][T12175] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 411.300002][T12175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.300012][T12175] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 411.300036][T12175] [ 411.635936][T12179] sp0: Synchronizing with TNC [ 411.957302][T12191] libceph: resolve '0..' (ret=-3): failed [ 412.099504][T12194] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2187'. [ 412.196885][T12197] FAULT_INJECTION: forcing a failure. [ 412.196885][T12197] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.210507][T12197] CPU: 1 UID: 0 PID: 12197 Comm: syz.0.2188 Tainted: G L syzkaller #0 PREEMPT(full) [ 412.210527][T12197] Tainted: [L]=SOFTLOCKUP [ 412.210530][T12197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 412.210537][T12197] Call Trace: [ 412.210541][T12197] [ 412.210545][T12197] dump_stack_lvl+0x100/0x190 [ 412.210566][T12197] should_fail_ex.cold+0x5/0xa [ 412.210581][T12197] _copy_from_user+0x2e/0xd0 [ 412.210594][T12197] copy_msghdr_from_user+0x9f/0x4f0 [ 412.210609][T12197] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 412.210634][T12197] ___sys_sendmsg+0x106/0x1e0 [ 412.210653][T12197] ? __pfx____sys_sendmsg+0x10/0x10 [ 412.210695][T12197] __sys_sendmsg+0x170/0x220 [ 412.210719][T12197] ? __pfx___sys_sendmsg+0x10/0x10 [ 412.210754][T12197] do_syscall_64+0x106/0xf80 [ 412.210770][T12197] ? clear_bhb_loop+0x40/0x90 [ 412.210791][T12197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.210808][T12197] RIP: 0033:0x7effe359c819 [ 412.210824][T12197] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 412.210840][T12197] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.210852][T12197] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 412.210859][T12197] RDX: 0000000000000800 RSI: 00002000000008c0 RDI: 0000000000000003 [ 412.210866][T12197] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 412.210872][T12197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.210878][T12197] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 412.210891][T12197] [ 412.508975][T12200] FAULT_INJECTION: forcing a failure. [ 412.508975][T12200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.574823][T12200] CPU: 0 UID: 0 PID: 12200 Comm: syz.2.2189 Tainted: G L syzkaller #0 PREEMPT(full) [ 412.574853][T12200] Tainted: [L]=SOFTLOCKUP [ 412.574859][T12200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 412.574869][T12200] Call Trace: [ 412.574875][T12200] [ 412.574882][T12200] dump_stack_lvl+0x100/0x190 [ 412.574915][T12200] should_fail_ex.cold+0x5/0xa [ 412.574941][T12200] _copy_to_user+0x32/0xd0 [ 412.574963][T12200] simple_read_from_buffer+0xcb/0x170 [ 412.574983][T12200] proc_fail_nth_read+0x1af/0x230 [ 412.575009][T12200] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 412.575036][T12200] ? rw_verify_area+0xce/0x6d0 [ 412.575061][T12200] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 412.575084][T12200] vfs_read+0x1e4/0xb30 [ 412.575103][T12200] ? __pfx_vfs_read+0x10/0x10 [ 412.575119][T12200] ? __fget_files+0x215/0x3d0 [ 412.575145][T12200] ? __fget_files+0x21f/0x3d0 [ 412.575169][T12200] ksys_read+0x12a/0x250 [ 412.575184][T12200] ? __pfx_ksys_read+0x10/0x10 [ 412.575203][T12200] do_syscall_64+0x106/0xf80 [ 412.575214][T12200] ? clear_bhb_loop+0x40/0x90 [ 412.575227][T12200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.575243][T12200] RIP: 0033:0x7ff780f5d04e [ 412.575252][T12200] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 412.575262][T12200] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 412.575272][T12200] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 412.575279][T12200] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000004 [ 412.575285][T12200] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 412.575290][T12200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.575296][T12200] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 412.575310][T12200] [ 413.073866][T12218] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2196'. [ 413.100071][T12218] FAULT_INJECTION: forcing a failure. [ 413.100071][T12218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.160564][T12218] CPU: 0 UID: 0 PID: 12218 Comm: syz.3.2196 Tainted: G L syzkaller #0 PREEMPT(full) [ 413.160592][T12218] Tainted: [L]=SOFTLOCKUP [ 413.160598][T12218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 413.160608][T12218] Call Trace: [ 413.160613][T12218] [ 413.160619][T12218] dump_stack_lvl+0x100/0x190 [ 413.160654][T12218] should_fail_ex.cold+0x5/0xa [ 413.160676][T12218] _copy_from_user+0x2e/0xd0 [ 413.160695][T12218] copy_msghdr_from_user+0x9f/0x4f0 [ 413.160715][T12218] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 413.160734][T12218] ___sys_sendmsg+0x106/0x1e0 [ 413.160747][T12218] ? __pfx____sys_sendmsg+0x10/0x10 [ 413.160775][T12218] __sys_sendmsg+0x170/0x220 [ 413.160791][T12218] ? __pfx___sys_sendmsg+0x10/0x10 [ 413.160814][T12218] do_syscall_64+0x106/0xf80 [ 413.160826][T12218] ? clear_bhb_loop+0x40/0x90 [ 413.160839][T12218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 413.160850][T12218] RIP: 0033:0x7f48f999c819 [ 413.160859][T12218] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 413.160870][T12218] RSP: 002b:00007f48fa7bf028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 413.160881][T12218] RAX: ffffffffffffffda RBX: 00007f48f9c15fa0 RCX: 00007f48f999c819 [ 413.160888][T12218] RDX: 0c31fe084736598c RSI: 0000200000000200 RDI: 0000000000000003 [ 413.160894][T12218] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 413.160900][T12218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.160906][T12218] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 413.160919][T12218] [ 413.669044][T12224] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2197'. [ 413.704486][T12224] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2197'. [ 413.960959][T12236] FAULT_INJECTION: forcing a failure. [ 413.960959][T12236] name failslab, interval 1, probability 0, space 0, times 0 [ 413.993489][T12236] CPU: 0 UID: 0 PID: 12236 Comm: syz.0.2204 Tainted: G L syzkaller #0 PREEMPT(full) [ 413.993521][T12236] Tainted: [L]=SOFTLOCKUP [ 413.993527][T12236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 413.993539][T12236] Call Trace: [ 413.993545][T12236] [ 413.993552][T12236] dump_stack_lvl+0x100/0x190 [ 413.993585][T12236] should_fail_ex.cold+0x5/0xa [ 413.993609][T12236] should_failslab+0xc2/0x120 [ 413.993629][T12236] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 413.993657][T12236] ? __alloc_skb+0x140/0x710 [ 413.993685][T12236] __alloc_skb+0x140/0x710 [ 413.993707][T12236] ? __alloc_skb+0x5b7/0x710 [ 413.993730][T12236] ? __pfx___alloc_skb+0x10/0x10 [ 413.993756][T12236] ? find_held_lock+0x2b/0x80 [ 413.993782][T12236] alloc_skb_with_frags+0xe0/0x810 [ 413.993813][T12236] ? kernel_text_address+0x8d/0x100 [ 413.993835][T12236] sock_alloc_send_pskb+0x801/0x980 [ 413.993866][T12236] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 413.993892][T12236] ? avc_has_perm_noaudit+0x145/0x3b0 [ 413.993919][T12236] tun_get_user+0x8f7/0x3e10 [ 413.993949][T12236] ? __pfx_tun_get_user+0x10/0x10 [ 413.993969][T12236] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 413.994004][T12236] ? find_held_lock+0x2b/0x80 [ 413.994026][T12236] ? tun_get+0x191/0x370 [ 413.994040][T12236] ? tun_get+0x191/0x370 [ 413.994060][T12236] tun_chr_write_iter+0xdc/0x200 [ 413.994079][T12236] vfs_write+0x6ac/0x1070 [ 413.994095][T12236] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 413.994114][T12236] ? __pfx_vfs_write+0x10/0x10 [ 413.994127][T12236] ? find_held_lock+0x2b/0x80 [ 413.994161][T12236] ksys_write+0x12a/0x250 [ 413.994176][T12236] ? __pfx_ksys_write+0x10/0x10 [ 413.994196][T12236] do_syscall_64+0x106/0xf80 [ 413.994211][T12236] ? clear_bhb_loop+0x40/0x90 [ 413.994231][T12236] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 413.994248][T12236] RIP: 0033:0x7effe355d04e [ 413.994264][T12236] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 413.994280][T12236] RSP: 002b:00007effe4429fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 413.994297][T12236] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 413.994309][T12236] RDX: 000000000000fdef RSI: 0000200000001200 RDI: 00000000000000c8 [ 413.994320][T12236] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 413.994330][T12236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.994340][T12236] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 413.994364][T12236] [ 414.275392][T12241] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12241 comm=syz.3.2205 [ 416.096844][ T30] kauditd_printk_skb: 8006 callbacks suppressed [ 416.096862][ T30] audit: type=1400 audit(1775427413.454:379160): avc: denied { create } for pid=12258 comm="syz.0.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 416.132889][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 416.160275][ T30] audit: type=1400 audit(1775427413.454:379161): avc: denied { read } for pid=12258 comm="syz.0.2212" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 416.172937][ T5471] audit: audit_lost=57487 audit_rate_limit=0 audit_backlog_limit=64 [ 416.285039][T12253] audit: audit_backlog=65 > audit_backlog_limit=64 [ 416.301933][T12253] audit: audit_lost=57488 audit_rate_limit=0 audit_backlog_limit=64 [ 416.310960][T12253] audit: backlog limit exceeded [ 416.316637][ T30] audit: type=1400 audit(1775427413.724:379162): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 416.410273][ T30] audit: type=1400 audit(1775427413.724:379163): avc: denied { create } for pid=12262 comm="syz.1.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 416.484523][ T30] audit: type=1400 audit(1775427413.724:379164): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 416.520057][T12271] FAULT_INJECTION: forcing a failure. [ 416.520057][T12271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 416.555689][T12271] CPU: 0 UID: 0 PID: 12271 Comm: syz.0.2215 Tainted: G L syzkaller #0 PREEMPT(full) [ 416.555723][T12271] Tainted: [L]=SOFTLOCKUP [ 416.555730][T12271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 416.555740][T12271] Call Trace: [ 416.555747][T12271] [ 416.555755][T12271] dump_stack_lvl+0x100/0x190 [ 416.555790][T12271] should_fail_ex.cold+0x5/0xa [ 416.555815][T12271] _copy_from_user+0x2e/0xd0 [ 416.555837][T12271] core_sys_select+0x2d0/0xbb0 [ 416.555863][T12271] ? __pfx_core_sys_select+0x10/0x10 [ 416.555882][T12271] ? find_held_lock+0x2b/0x80 [ 416.555905][T12271] ? get_pid_task+0xfc/0x250 [ 416.555944][T12271] ? __pfx_set_user_sigmask+0x10/0x10 [ 416.555969][T12271] ? __mutex_unlock_slowpath+0x15c/0x790 [ 416.555988][T12271] ? __fget_files+0x215/0x3d0 [ 416.556011][T12271] do_pselect.constprop.0+0x238/0x270 [ 416.556034][T12271] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 416.556058][T12271] ? ksys_write+0x1ac/0x250 [ 416.556079][T12271] __x64_sys_pselect6+0x149/0x1c0 [ 416.556104][T12271] do_syscall_64+0x106/0xf80 [ 416.556115][T12271] ? clear_bhb_loop+0x40/0x90 [ 416.556129][T12271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 416.556140][T12271] RIP: 0033:0x7effe359c819 [ 416.556150][T12271] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 416.556160][T12271] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 416.556171][T12271] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 416.556178][T12271] RDX: 0000200000000000 RSI: 0000200000000400 RDI: 0000000000000040 [ 416.556185][T12271] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 416.556191][T12271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.556197][T12271] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 416.556212][T12271] [ 416.895586][T12281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12281 comm=syz.0.2218 [ 417.161793][T12287] FAULT_INJECTION: forcing a failure. [ 417.161793][T12287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 417.210443][T12287] CPU: 1 UID: 0 PID: 12287 Comm: syz.4.2221 Tainted: G L syzkaller #0 PREEMPT(full) [ 417.210475][T12287] Tainted: [L]=SOFTLOCKUP [ 417.210482][T12287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 417.210492][T12287] Call Trace: [ 417.210498][T12287] [ 417.210505][T12287] dump_stack_lvl+0x100/0x190 [ 417.210541][T12287] should_fail_ex.cold+0x5/0xa [ 417.210565][T12287] _copy_to_user+0x32/0xd0 [ 417.210586][T12287] simple_read_from_buffer+0xcb/0x170 [ 417.210607][T12287] proc_fail_nth_read+0x1af/0x230 [ 417.210636][T12287] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 417.210659][T12287] ? rw_verify_area+0xce/0x6d0 [ 417.210685][T12287] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 417.210707][T12287] vfs_read+0x1e4/0xb30 [ 417.210724][T12287] ? __pfx_vfs_read+0x10/0x10 [ 417.210739][T12287] ? __fget_files+0x215/0x3d0 [ 417.210764][T12287] ? __fget_files+0x21f/0x3d0 [ 417.210789][T12287] ksys_read+0x12a/0x250 [ 417.210806][T12287] ? __pfx_ksys_read+0x10/0x10 [ 417.210830][T12287] do_syscall_64+0x106/0xf80 [ 417.210846][T12287] ? clear_bhb_loop+0x40/0x90 [ 417.210867][T12287] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.210885][T12287] RIP: 0033:0x7f302bd5d04e [ 417.210901][T12287] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 417.210918][T12287] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 417.210942][T12287] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 417.210953][T12287] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 417.210964][T12287] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 417.210974][T12287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.210984][T12287] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 417.211008][T12287] [ 418.399273][T12304] FAULT_INJECTION: forcing a failure. [ 418.399273][T12304] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 418.510825][T12304] CPU: 1 UID: 0 PID: 12304 Comm: syz.3.2225 Tainted: G L syzkaller #0 PREEMPT(full) [ 418.510859][T12304] Tainted: [L]=SOFTLOCKUP [ 418.510865][T12304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 418.510875][T12304] Call Trace: [ 418.510880][T12304] [ 418.510887][T12304] dump_stack_lvl+0x100/0x190 [ 418.510920][T12304] should_fail_ex.cold+0x5/0xa [ 418.510945][T12304] _copy_from_user+0x2e/0xd0 [ 418.510964][T12304] core_sys_select+0x2d0/0xbb0 [ 418.510985][T12304] ? __pfx_core_sys_select+0x10/0x10 [ 418.510999][T12304] ? find_held_lock+0x2b/0x80 [ 418.511018][T12304] ? get_pid_task+0xfc/0x250 [ 418.511047][T12304] ? __pfx_set_user_sigmask+0x10/0x10 [ 418.511064][T12304] ? __mutex_unlock_slowpath+0x15c/0x790 [ 418.511082][T12304] ? __fget_files+0x215/0x3d0 [ 418.511103][T12304] do_pselect.constprop.0+0x238/0x270 [ 418.511121][T12304] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 418.511141][T12304] ? ksys_write+0x1ac/0x250 [ 418.511158][T12304] __x64_sys_pselect6+0x149/0x1c0 [ 418.511178][T12304] do_syscall_64+0x106/0xf80 [ 418.511198][T12304] ? clear_bhb_loop+0x40/0x90 [ 418.511218][T12304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.511233][T12304] RIP: 0033:0x7f48f999c819 [ 418.511245][T12304] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 418.511261][T12304] RSP: 002b:00007f48fa79e028 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 418.511276][T12304] RAX: ffffffffffffffda RBX: 00007f48f9c16090 RCX: 00007f48f999c819 [ 418.511288][T12304] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000040 [ 418.511299][T12304] RBP: 00007f48fa79e090 R08: 0000000000000000 R09: 0000000000000000 [ 418.511309][T12304] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000001 [ 418.511318][T12304] R13: 00007f48f9c16128 R14: 00007f48f9c16090 R15: 00007ffd18426d58 [ 418.511339][T12304] [ 419.113427][T12324] netlink: 60 bytes leftover after parsing attributes in process `syz.4.2228'. [ 419.635587][T12335] FAULT_INJECTION: forcing a failure. [ 419.635587][T12335] name failslab, interval 1, probability 0, space 0, times 0 [ 419.664506][T12335] CPU: 1 UID: 0 PID: 12335 Comm: syz.1.2236 Tainted: G L syzkaller #0 PREEMPT(full) [ 419.664536][T12335] Tainted: [L]=SOFTLOCKUP [ 419.664543][T12335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 419.664554][T12335] Call Trace: [ 419.664561][T12335] [ 419.664568][T12335] dump_stack_lvl+0x100/0x190 [ 419.664602][T12335] should_fail_ex.cold+0x5/0xa [ 419.664627][T12335] should_failslab+0xc2/0x120 [ 419.664648][T12335] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 419.664674][T12335] ? do_getname+0x35/0x390 [ 419.664697][T12335] ? find_held_lock+0x2b/0x80 [ 419.664726][T12335] do_getname+0x35/0x390 [ 419.664751][T12335] do_sys_openat2+0xc5/0x1e0 [ 419.664775][T12335] ? __pfx_do_sys_openat2+0x10/0x10 [ 419.664797][T12335] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 419.664821][T12335] ? __fget_files+0x21f/0x3d0 [ 419.664845][T12335] __x64_sys_openat+0x12d/0x210 [ 419.664870][T12335] ? __pfx___x64_sys_openat+0x10/0x10 [ 419.664892][T12335] ? ksys_write+0x1ac/0x250 [ 419.664916][T12335] do_syscall_64+0x106/0xf80 [ 419.664931][T12335] ? clear_bhb_loop+0x40/0x90 [ 419.664953][T12335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 419.664970][T12335] RIP: 0033:0x7f699fd9c819 [ 419.664987][T12335] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 419.665004][T12335] RSP: 002b:00007f69a0cb8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 419.665023][T12335] RAX: ffffffffffffffda RBX: 00007f69a0016090 RCX: 00007f699fd9c819 [ 419.665034][T12335] RDX: 0000000000000000 RSI: 0000200000004280 RDI: ffffffffffffff9c [ 419.665045][T12335] RBP: 00007f69a0cb8090 R08: 0000000000000000 R09: 0000000000000000 [ 419.665055][T12335] R10: 0000000000000040 R11: 0000000000000246 R12: 0000000000000001 [ 419.665065][T12335] R13: 00007f69a0016128 R14: 00007f69a0016090 R15: 00007ffc93682bf8 [ 419.665084][T12335] [ 420.472502][T12354] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12354 comm=syz.4.2240 [ 420.892838][T12369] FAULT_INJECTION: forcing a failure. [ 420.892838][T12369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 420.995142][T12369] CPU: 0 UID: 0 PID: 12369 Comm: syz.0.2243 Tainted: G L syzkaller #0 PREEMPT(full) [ 420.995171][T12369] Tainted: [L]=SOFTLOCKUP [ 420.995176][T12369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 420.995184][T12369] Call Trace: [ 420.995188][T12369] [ 420.995193][T12369] dump_stack_lvl+0x100/0x190 [ 420.995216][T12369] should_fail_ex.cold+0x5/0xa [ 420.995231][T12369] _copy_to_user+0x32/0xd0 [ 420.995245][T12369] simple_read_from_buffer+0xcb/0x170 [ 420.995258][T12369] proc_fail_nth_read+0x1af/0x230 [ 420.995276][T12369] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 420.995293][T12369] ? rw_verify_area+0xce/0x6d0 [ 420.995309][T12369] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 420.995324][T12369] vfs_read+0x1e4/0xb30 [ 420.995335][T12369] ? __pfx_vfs_read+0x10/0x10 [ 420.995345][T12369] ? __fget_files+0x215/0x3d0 [ 420.995360][T12369] ? __fget_files+0x21f/0x3d0 [ 420.995375][T12369] ksys_read+0x12a/0x250 [ 420.995385][T12369] ? __pfx_ksys_read+0x10/0x10 [ 420.995399][T12369] do_syscall_64+0x106/0xf80 [ 420.995409][T12369] ? clear_bhb_loop+0x40/0x90 [ 420.995423][T12369] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.995434][T12369] RIP: 0033:0x7effe355d04e [ 420.995445][T12369] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 420.995455][T12369] RSP: 002b:00007effe43e7fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 420.995466][T12369] RAX: ffffffffffffffda RBX: 00007effe43e86c0 RCX: 00007effe355d04e [ 420.995472][T12369] RDX: 000000000000000f RSI: 00007effe43e80a0 RDI: 0000000000000005 [ 420.995478][T12369] RBP: 00007effe43e8090 R08: 0000000000000000 R09: 0000000000000000 [ 420.995485][T12369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.995491][T12369] R13: 00007effe3816218 R14: 00007effe3816180 R15: 00007ffd1042fb88 [ 420.995505][T12369] [ 421.272445][ T30] kauditd_printk_skb: 4787 callbacks suppressed [ 421.272462][ T30] audit: type=1400 audit(1775427418.852:383774): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 421.313213][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 421.319741][ T5471] audit: audit_lost=57548 audit_rate_limit=0 audit_backlog_limit=64 [ 421.327744][ T5471] audit: backlog limit exceeded [ 421.332699][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 421.339184][ T5471] audit: audit_lost=57549 audit_rate_limit=0 audit_backlog_limit=64 [ 421.347158][ T5471] audit: backlog limit exceeded [ 421.352061][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 421.358551][ T5471] audit: audit_lost=57550 audit_rate_limit=0 audit_backlog_limit=64 [ 421.366533][ T5471] audit: backlog limit exceeded [ 423.280208][T12400] FAULT_INJECTION: forcing a failure. [ 423.280208][T12400] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.660830][ T0] NOHZ tick-stop error: local softirq work is pending, handler #c2!!! [ 423.711359][T12400] CPU: 0 UID: 0 PID: 12400 Comm: syz.1.2254 Tainted: G L syzkaller #0 PREEMPT(full) [ 423.711392][T12400] Tainted: [L]=SOFTLOCKUP [ 423.711398][T12400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 423.711408][T12400] Call Trace: [ 423.711414][T12400] [ 423.711421][T12400] dump_stack_lvl+0x100/0x190 [ 423.711456][T12400] should_fail_ex.cold+0x5/0xa [ 423.711479][T12400] _copy_to_user+0x32/0xd0 [ 423.711501][T12400] simple_read_from_buffer+0xcb/0x170 [ 423.711521][T12400] proc_fail_nth_read+0x1af/0x230 [ 423.711545][T12400] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 423.711571][T12400] ? rw_verify_area+0xce/0x6d0 [ 423.711593][T12400] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 423.711616][T12400] vfs_read+0x1e4/0xb30 [ 423.711635][T12400] ? __pfx_vfs_read+0x10/0x10 [ 423.711651][T12400] ? __fget_files+0x215/0x3d0 [ 423.711677][T12400] ? __fget_files+0x21f/0x3d0 [ 423.711702][T12400] ksys_read+0x12a/0x250 [ 423.711718][T12400] ? __pfx_ksys_read+0x10/0x10 [ 423.711741][T12400] do_syscall_64+0x106/0xf80 [ 423.711758][T12400] ? clear_bhb_loop+0x40/0x90 [ 423.711780][T12400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.711799][T12400] RIP: 0033:0x7f699fd5d04e [ 423.711815][T12400] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 423.711833][T12400] RSP: 002b:00007f69a0cd8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 423.711851][T12400] RAX: ffffffffffffffda RBX: 00007f69a0cd96c0 RCX: 00007f699fd5d04e [ 423.711863][T12400] RDX: 000000000000000f RSI: 00007f69a0cd90a0 RDI: 0000000000000003 [ 423.711873][T12400] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 423.711890][T12400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.711900][T12400] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 423.711923][T12400] [ 424.666104][T12413] dns_resolver: Unsupported content type (152) [ 425.240297][T12424] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12424 comm=syz.3.2266 [ 425.786480][T12434] sp0: Synchronizing with TNC [ 426.280825][ T30] kauditd_printk_skb: 6752 callbacks suppressed [ 426.280841][ T30] audit: type=1400 audit(1775427423.932:389024): avc: denied { prog_load } for pid=12451 comm="syz.3.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 426.309619][ T30] audit: type=1400 audit(1775427423.952:389025): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 426.374343][T12446] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2272'. [ 426.540567][T12457] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12457 comm=syz.0.2277 [ 426.561844][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 426.568398][ T5471] audit: audit_lost=58052 audit_rate_limit=0 audit_backlog_limit=64 [ 426.570444][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 426.586696][ T30] audit: type=1400 audit(1775427423.952:389026): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 426.634178][T12459] audit: audit_backlog=65 > audit_backlog_limit=64 [ 426.639919][T12457] audit: audit_backlog=65 > audit_backlog_limit=64 [ 426.642098][ T5471] audit: backlog limit exceeded [ 426.647416][T12457] audit: audit_lost=58053 audit_rate_limit=0 audit_backlog_limit=64 [ 426.749612][T12461] FAULT_INJECTION: forcing a failure. [ 426.749612][T12461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.762837][T12461] CPU: 1 UID: 0 PID: 12461 Comm: syz.2.2279 Tainted: G L syzkaller #0 PREEMPT(full) [ 426.762856][T12461] Tainted: [L]=SOFTLOCKUP [ 426.762860][T12461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 426.762872][T12461] Call Trace: [ 426.762878][T12461] [ 426.762882][T12461] dump_stack_lvl+0x100/0x190 [ 426.762906][T12461] should_fail_ex.cold+0x5/0xa [ 426.762921][T12461] _copy_to_user+0x32/0xd0 [ 426.762935][T12461] simple_read_from_buffer+0xcb/0x170 [ 426.762949][T12461] proc_fail_nth_read+0x1af/0x230 [ 426.762966][T12461] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 426.762984][T12461] ? rw_verify_area+0xce/0x6d0 [ 426.762999][T12461] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 426.763015][T12461] vfs_read+0x1e4/0xb30 [ 426.763027][T12461] ? __pfx_vfs_read+0x10/0x10 [ 426.763036][T12461] ? __fget_files+0x215/0x3d0 [ 426.763052][T12461] ? __fget_files+0x21f/0x3d0 [ 426.763067][T12461] ksys_read+0x12a/0x250 [ 426.763077][T12461] ? __pfx_ksys_read+0x10/0x10 [ 426.763090][T12461] do_syscall_64+0x106/0xf80 [ 426.763102][T12461] ? clear_bhb_loop+0x40/0x90 [ 426.763117][T12461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.763128][T12461] RIP: 0033:0x7ff780f5d04e [ 426.763138][T12461] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 426.763148][T12461] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 426.763159][T12461] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 426.763166][T12461] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 426.763172][T12461] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 426.763179][T12461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.763185][T12461] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 426.763198][T12461] [ 427.099452][T12463] FAULT_INJECTION: forcing a failure. [ 427.099452][T12463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 427.114066][T12463] CPU: 1 UID: 0 PID: 12463 Comm: syz.1.2281 Tainted: G L syzkaller #0 PREEMPT(full) [ 427.114084][T12463] Tainted: [L]=SOFTLOCKUP [ 427.114088][T12463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 427.114095][T12463] Call Trace: [ 427.114099][T12463] [ 427.114103][T12463] dump_stack_lvl+0x100/0x190 [ 427.114131][T12463] should_fail_ex.cold+0x5/0xa [ 427.114146][T12463] _copy_to_user+0x32/0xd0 [ 427.114160][T12463] simple_read_from_buffer+0xcb/0x170 [ 427.114173][T12463] proc_fail_nth_read+0x1af/0x230 [ 427.114191][T12463] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 427.114208][T12463] ? rw_verify_area+0xce/0x6d0 [ 427.114223][T12463] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 427.114239][T12463] vfs_read+0x1e4/0xb30 [ 427.114250][T12463] ? __pfx_vfs_read+0x10/0x10 [ 427.114260][T12463] ? __fget_files+0x215/0x3d0 [ 427.114274][T12463] ? __fget_files+0x21f/0x3d0 [ 427.114289][T12463] ksys_read+0x12a/0x250 [ 427.114299][T12463] ? __pfx_ksys_read+0x10/0x10 [ 427.114313][T12463] do_syscall_64+0x106/0xf80 [ 427.114323][T12463] ? clear_bhb_loop+0x40/0x90 [ 427.114336][T12463] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.114347][T12463] RIP: 0033:0x7f699fd5d04e [ 427.114358][T12463] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 427.114368][T12463] RSP: 002b:00007f69a0cd8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 427.114379][T12463] RAX: ffffffffffffffda RBX: 00007f69a0cd96c0 RCX: 00007f699fd5d04e [ 427.114386][T12463] RDX: 000000000000000f RSI: 00007f69a0cd90a0 RDI: 0000000000000003 [ 427.114392][T12463] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 427.114399][T12463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.114405][T12463] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 427.114418][T12463] [ 427.512032][T12471] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2280'. [ 427.631972][T12471] hsr_slave_1 (unregistering): left promiscuous mode [ 427.674464][T12475] sp0: Synchronizing with TNC [ 427.964731][T12485] FAULT_INJECTION: forcing a failure. [ 427.964731][T12485] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 428.033714][T12485] CPU: 1 UID: 0 PID: 12485 Comm: syz.2.2287 Tainted: G L syzkaller #0 PREEMPT(full) [ 428.033734][T12485] Tainted: [L]=SOFTLOCKUP [ 428.033738][T12485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 428.033745][T12485] Call Trace: [ 428.033749][T12485] [ 428.033754][T12485] dump_stack_lvl+0x100/0x190 [ 428.033776][T12485] should_fail_ex.cold+0x5/0xa [ 428.033791][T12485] _copy_to_user+0x32/0xd0 [ 428.033805][T12485] simple_read_from_buffer+0xcb/0x170 [ 428.033818][T12485] proc_fail_nth_read+0x1af/0x230 [ 428.033836][T12485] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 428.033852][T12485] ? rw_verify_area+0xce/0x6d0 [ 428.033868][T12485] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 428.033884][T12485] vfs_read+0x1e4/0xb30 [ 428.033896][T12485] ? __pfx_vfs_read+0x10/0x10 [ 428.033905][T12485] ? __fget_files+0x215/0x3d0 [ 428.033920][T12485] ? __fget_files+0x21f/0x3d0 [ 428.033940][T12485] ksys_read+0x12a/0x250 [ 428.033949][T12485] ? __pfx_ksys_read+0x10/0x10 [ 428.033963][T12485] do_syscall_64+0x106/0xf80 [ 428.033973][T12485] ? clear_bhb_loop+0x40/0x90 [ 428.033987][T12485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.033998][T12485] RIP: 0033:0x7ff780f5d04e [ 428.034007][T12485] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 428.034018][T12485] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 428.034030][T12485] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 428.034037][T12485] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 428.034044][T12485] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 428.034050][T12485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.034056][T12485] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 428.034070][T12485] [ 428.477541][T12493] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12493 comm=syz.1.2291 [ 428.503690][T12491] FAULT_INJECTION: forcing a failure. [ 428.503690][T12491] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.524268][T12491] CPU: 1 UID: 0 PID: 12491 Comm: syz.0.2290 Tainted: G L syzkaller #0 PREEMPT(full) [ 428.524289][T12491] Tainted: [L]=SOFTLOCKUP [ 428.524293][T12491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 428.524300][T12491] Call Trace: [ 428.524304][T12491] [ 428.524309][T12491] dump_stack_lvl+0x100/0x190 [ 428.524331][T12491] should_fail_ex.cold+0x5/0xa [ 428.524345][T12491] ? prepare_alloc_pages+0x16d/0x5f0 [ 428.524358][T12491] should_fail_alloc_page+0xeb/0x140 [ 428.524371][T12491] prepare_alloc_pages+0x1f0/0x5f0 [ 428.524386][T12491] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 428.524406][T12491] ? __pfx___might_resched+0x10/0x10 [ 428.524420][T12491] ? find_held_lock+0x2b/0x80 [ 428.524434][T12491] ? process_measurement+0x4c8/0x2350 [ 428.524450][T12491] ? process_measurement+0x4c8/0x2350 [ 428.524466][T12491] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 428.524484][T12491] ? up_write+0x290/0x4f0 [ 428.524501][T12491] ? find_held_lock+0x2b/0x80 [ 428.524514][T12491] ? avc_has_perm_noaudit+0x11e/0x3b0 [ 428.524527][T12491] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 428.524544][T12491] ? policy_nodemask+0xed/0x4f0 [ 428.524556][T12491] alloc_pages_mpol+0x1fb/0x550 [ 428.524568][T12491] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 428.524580][T12491] ? __lock_acquire+0x4a5/0x2630 [ 428.524593][T12491] alloc_pages_noprof+0x136/0x390 [ 428.524605][T12491] pte_alloc_one+0x1c/0x3d0 [ 428.524620][T12491] do_fault+0x88e/0x18e0 [ 428.524635][T12491] __handle_mm_fault+0x1815/0x2b60 [ 428.524652][T12491] ? mt_find+0x45e/0x8e0 [ 428.524664][T12491] ? __pfx___handle_mm_fault+0x10/0x10 [ 428.524677][T12491] ? __pfx_mt_find+0x10/0x10 [ 428.524698][T12491] handle_mm_fault+0x36d/0xa20 [ 428.524715][T12491] __get_user_pages+0xf9c/0x34d0 [ 428.524733][T12491] ? __pfx___get_user_pages+0x10/0x10 [ 428.524748][T12491] populate_vma_page_range+0x267/0x3f0 [ 428.524762][T12491] ? __pfx_populate_vma_page_range+0x10/0x10 [ 428.524775][T12491] ? __pfx_find_vma_intersection+0x10/0x10 [ 428.524787][T12491] ? __pfx_apply_vma_lock_flags+0x10/0x10 [ 428.524805][T12491] __mm_populate+0x107/0x3a0 [ 428.524818][T12491] ? __pfx___mm_populate+0x10/0x10 [ 428.524837][T12491] ? up_write+0x290/0x4f0 [ 428.524850][T12491] do_mlock+0x3f0/0x7f0 [ 428.524866][T12491] ? __fget_files+0x21f/0x3d0 [ 428.524879][T12491] ? __pfx_do_mlock+0x10/0x10 [ 428.524895][T12491] ? fput+0x79/0x100 [ 428.524908][T12491] ? ksys_write+0x1ac/0x250 [ 428.524918][T12491] ? __pfx_ksys_write+0x10/0x10 [ 428.524931][T12491] __x64_sys_mlock+0x59/0x80 [ 428.524947][T12491] do_syscall_64+0x106/0xf80 [ 428.524957][T12491] ? clear_bhb_loop+0x40/0x90 [ 428.524975][T12491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.524991][T12491] RIP: 0033:0x7effe359c819 [ 428.525007][T12491] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 428.525020][T12491] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 428.525031][T12491] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 428.525038][T12491] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 0000200000000000 [ 428.525044][T12491] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 428.525051][T12491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.525057][T12491] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 428.525071][T12491] [ 429.249075][T12500] FAULT_INJECTION: forcing a failure. [ 429.249075][T12500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.282542][T12500] CPU: 0 UID: 0 PID: 12500 Comm: syz.2.2293 Tainted: G L syzkaller #0 PREEMPT(full) [ 429.282561][T12500] Tainted: [L]=SOFTLOCKUP [ 429.282566][T12500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 429.282572][T12500] Call Trace: [ 429.282576][T12500] [ 429.282581][T12500] dump_stack_lvl+0x100/0x190 [ 429.282604][T12500] should_fail_ex.cold+0x5/0xa [ 429.282619][T12500] _copy_to_user+0x32/0xd0 [ 429.282633][T12500] simple_read_from_buffer+0xcb/0x170 [ 429.282645][T12500] proc_fail_nth_read+0x1af/0x230 [ 429.282663][T12500] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 429.282679][T12500] ? rw_verify_area+0xce/0x6d0 [ 429.282695][T12500] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 429.282711][T12500] vfs_read+0x1e4/0xb30 [ 429.282722][T12500] ? __pfx_vfs_read+0x10/0x10 [ 429.282731][T12500] ? __fget_files+0x215/0x3d0 [ 429.282746][T12500] ? __fget_files+0x21f/0x3d0 [ 429.282761][T12500] ksys_read+0x12a/0x250 [ 429.282771][T12500] ? __pfx_ksys_read+0x10/0x10 [ 429.282785][T12500] do_syscall_64+0x106/0xf80 [ 429.282795][T12500] ? clear_bhb_loop+0x40/0x90 [ 429.282809][T12500] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.282820][T12500] RIP: 0033:0x7ff780f5d04e [ 429.282830][T12500] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 429.282840][T12500] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 429.282851][T12500] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 429.282858][T12500] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 429.282865][T12500] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 429.282871][T12500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.282877][T12500] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 429.282893][T12500] [ 429.783632][T12511] FAULT_INJECTION: forcing a failure. [ 429.783632][T12511] name failslab, interval 1, probability 0, space 0, times 0 [ 429.804498][T12512] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2295'. [ 429.830828][T12511] CPU: 1 UID: 0 PID: 12511 Comm: syz.0.2297 Tainted: G L syzkaller #0 PREEMPT(full) [ 429.830858][T12511] Tainted: [L]=SOFTLOCKUP [ 429.830864][T12511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 429.830875][T12511] Call Trace: [ 429.830882][T12511] [ 429.830895][T12511] dump_stack_lvl+0x100/0x190 [ 429.830929][T12511] should_fail_ex.cold+0x5/0xa [ 429.830954][T12511] ? tomoyo_realpath_from_path+0xb6/0x690 [ 429.830983][T12511] should_failslab+0xc2/0x120 [ 429.831003][T12511] __kmalloc_noprof+0xe0/0x850 [ 429.831034][T12511] tomoyo_realpath_from_path+0xb6/0x690 [ 429.831068][T12511] tomoyo_path_number_perm+0x23c/0x580 [ 429.831091][T12511] ? tomoyo_path_number_perm+0x22e/0x580 [ 429.831115][T12511] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 429.831163][T12511] ? find_held_lock+0x2b/0x80 [ 429.831186][T12511] ? __fget_files+0x215/0x3d0 [ 429.831204][T12511] ? hook_file_ioctl_common+0x146/0x410 [ 429.831229][T12511] ? __fget_files+0x21f/0x3d0 [ 429.831252][T12511] security_file_ioctl+0xd3/0x230 [ 429.831279][T12511] __x64_sys_ioctl+0xb7/0x210 [ 429.831309][T12511] do_syscall_64+0x106/0xf80 [ 429.831327][T12511] ? clear_bhb_loop+0x40/0x90 [ 429.831349][T12511] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.831367][T12511] RIP: 0033:0x7effe359c819 [ 429.831385][T12511] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 429.831402][T12511] RSP: 002b:00007effe4409028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.831421][T12511] RAX: ffffffffffffffda RBX: 00007effe3816090 RCX: 00007effe359c819 [ 429.831433][T12511] RDX: 0000200000000180 RSI: 0000000080184132 RDI: 0000000000000005 [ 429.831444][T12511] RBP: 00007effe4409090 R08: 0000000000000000 R09: 0000000000000000 [ 429.831456][T12511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.831466][T12511] R13: 00007effe3816128 R14: 00007effe3816090 R15: 00007ffd1042fb88 [ 429.831491][T12511] [ 429.831499][T12511] ERROR: Out of memory at tomoyo_realpath_from_path. [ 430.335438][T12516] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2298'. [ 430.968344][T12529] FAULT_INJECTION: forcing a failure. [ 430.968344][T12529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.012595][T12529] CPU: 0 UID: 0 PID: 12529 Comm: syz.3.2303 Tainted: G L syzkaller #0 PREEMPT(full) [ 431.012613][T12529] Tainted: [L]=SOFTLOCKUP [ 431.012617][T12529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 431.012624][T12529] Call Trace: [ 431.012628][T12529] [ 431.012633][T12529] dump_stack_lvl+0x100/0x190 [ 431.012656][T12529] should_fail_ex.cold+0x5/0xa [ 431.012671][T12529] _copy_to_user+0x32/0xd0 [ 431.012686][T12529] simple_read_from_buffer+0xcb/0x170 [ 431.012699][T12529] proc_fail_nth_read+0x1af/0x230 [ 431.012717][T12529] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 431.012733][T12529] ? rw_verify_area+0xce/0x6d0 [ 431.012749][T12529] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 431.012765][T12529] vfs_read+0x1e4/0xb30 [ 431.012776][T12529] ? __pfx_vfs_read+0x10/0x10 [ 431.012785][T12529] ? __fget_files+0x215/0x3d0 [ 431.012800][T12529] ? __fget_files+0x21f/0x3d0 [ 431.012815][T12529] ksys_read+0x12a/0x250 [ 431.012825][T12529] ? __pfx_ksys_read+0x10/0x10 [ 431.012838][T12529] do_syscall_64+0x106/0xf80 [ 431.012849][T12529] ? clear_bhb_loop+0x40/0x90 [ 431.012863][T12529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 431.012875][T12529] RIP: 0033:0x7f48f995d04e [ 431.012885][T12529] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 431.012896][T12529] RSP: 002b:00007f48fa7befe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 431.012906][T12529] RAX: ffffffffffffffda RBX: 00007f48fa7bf6c0 RCX: 00007f48f995d04e [ 431.012913][T12529] RDX: 000000000000000f RSI: 00007f48fa7bf0a0 RDI: 0000000000000004 [ 431.012919][T12529] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 431.012926][T12529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.012932][T12529] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 431.012945][T12529] [ 431.424226][ T5471] audit_log_start: 5708 callbacks suppressed [ 431.424245][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 431.448050][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 431.454659][ T5471] audit: audit_lost=59099 audit_rate_limit=0 audit_backlog_limit=64 [ 431.463009][T12530] audit: audit_backlog=65 > audit_backlog_limit=64 [ 431.480753][ T30] audit: type=1400 audit(1775427428.642:391602): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 431.488859][ T5471] audit: backlog limit exceeded [ 431.507219][ T5804] audit: audit_lost=59100 audit_rate_limit=0 audit_backlog_limit=64 [ 431.524971][T12530] audit: audit_lost=59101 audit_rate_limit=0 audit_backlog_limit=64 [ 431.536106][ T5803] audit: audit_backlog=65 > audit_backlog_limit=64 [ 431.570035][ T5804] audit: backlog limit exceeded [ 432.259157][T12546] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2307'. [ 433.410249][T12565] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12565 comm=syz.0.2314 [ 434.329212][T12585] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2321'. [ 434.497686][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 434.504179][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 435.202609][T12596] FAULT_INJECTION: forcing a failure. [ 435.202609][T12596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.270746][T12596] CPU: 1 UID: 0 PID: 12596 Comm: syz.3.2325 Tainted: G L syzkaller #0 PREEMPT(full) [ 435.270783][T12596] Tainted: [L]=SOFTLOCKUP [ 435.270790][T12596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 435.270800][T12596] Call Trace: [ 435.270806][T12596] [ 435.270813][T12596] dump_stack_lvl+0x100/0x190 [ 435.270847][T12596] should_fail_ex.cold+0x5/0xa [ 435.270868][T12596] _copy_from_user+0x2e/0xd0 [ 435.270890][T12596] __sys_bpf+0x243/0x4b90 [ 435.270913][T12596] ? __pfx___sys_bpf+0x10/0x10 [ 435.270931][T12596] ? proc_fail_nth_write+0x9f/0x220 [ 435.270955][T12596] ? find_held_lock+0x2b/0x80 [ 435.270983][T12596] ? find_held_lock+0x2b/0x80 [ 435.271004][T12596] ? ksys_write+0x190/0x250 [ 435.271026][T12596] ? __mutex_unlock_slowpath+0x15c/0x790 [ 435.271046][T12596] ? __fget_files+0x215/0x3d0 [ 435.271077][T12596] ? fput+0x79/0x100 [ 435.271098][T12596] ? ksys_write+0x1ac/0x250 [ 435.271114][T12596] ? __pfx_ksys_write+0x10/0x10 [ 435.271135][T12596] __x64_sys_bpf+0x7b/0xc0 [ 435.271155][T12596] ? lockdep_hardirqs_on+0x78/0x100 [ 435.271182][T12596] do_syscall_64+0x106/0xf80 [ 435.271197][T12596] ? clear_bhb_loop+0x40/0x90 [ 435.271219][T12596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.271237][T12596] RIP: 0033:0x7f48f999c819 [ 435.271253][T12596] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 435.271271][T12596] RSP: 002b:00007f48fa7bf028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 435.271289][T12596] RAX: ffffffffffffffda RBX: 00007f48f9c15fa0 RCX: 00007f48f999c819 [ 435.271301][T12596] RDX: 0000000000000094 RSI: 0000200000000380 RDI: 0000000000000005 [ 435.271312][T12596] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 435.271323][T12596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.271333][T12596] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 435.271357][T12596] [ 435.795460][T12601] FAULT_INJECTION: forcing a failure. [ 435.795460][T12601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.825941][T12601] CPU: 1 UID: 0 PID: 12601 Comm: syz.1.2327 Tainted: G L syzkaller #0 PREEMPT(full) [ 435.825972][T12601] Tainted: [L]=SOFTLOCKUP [ 435.825979][T12601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 435.825990][T12601] Call Trace: [ 435.825996][T12601] [ 435.826004][T12601] dump_stack_lvl+0x100/0x190 [ 435.826037][T12601] should_fail_ex.cold+0x5/0xa [ 435.826062][T12601] _copy_from_user+0x2e/0xd0 [ 435.826084][T12601] copy_msghdr_from_user+0x9f/0x4f0 [ 435.826107][T12601] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 435.826133][T12601] ? __lock_acquire+0x4a5/0x2630 [ 435.826156][T12601] ___sys_recvmsg+0xdd/0x1a0 [ 435.826177][T12601] ? __pfx____sys_recvmsg+0x10/0x10 [ 435.826201][T12601] ? find_held_lock+0x2b/0x80 [ 435.826239][T12601] do_recvmmsg+0x301/0x760 [ 435.826263][T12601] ? __pfx_do_recvmmsg+0x10/0x10 [ 435.826282][T12601] ? ksys_write+0x190/0x250 [ 435.826298][T12601] ? ksys_write+0x190/0x250 [ 435.826319][T12601] ? __mutex_unlock_slowpath+0x15c/0x790 [ 435.826345][T12601] ? __fget_files+0x21f/0x3d0 [ 435.826371][T12601] __x64_sys_recvmmsg+0x22a/0x280 [ 435.826399][T12601] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 435.826433][T12601] do_syscall_64+0x106/0xf80 [ 435.826449][T12601] ? clear_bhb_loop+0x40/0x90 [ 435.826471][T12601] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.826490][T12601] RIP: 0033:0x7f699fd9c819 [ 435.826507][T12601] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 435.826524][T12601] RSP: 002b:00007f69a0cd9028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 435.826544][T12601] RAX: ffffffffffffffda RBX: 00007f69a0015fa0 RCX: 00007f699fd9c819 [ 435.826556][T12601] RDX: 0000000000000001 RSI: 0000200000000a00 RDI: 0000000000000003 [ 435.826568][T12601] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 435.826579][T12601] R10: 0000000000000300 R11: 0000000000000246 R12: 0000000000000001 [ 435.826590][T12601] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 435.826616][T12601] [ 436.431772][ T30] kauditd_printk_skb: 7523 callbacks suppressed [ 436.431788][ T30] audit: type=1400 audit(1775427434.072:397514): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 436.488921][ T30] audit: type=1400 audit(1775427434.082:397515): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 436.519380][ T30] audit: type=1400 audit(1775427434.082:397516): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 436.552362][ T30] audit: type=1400 audit(1775427434.082:397517): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 436.564178][ T5471] audit: audit_backlog=66 > audit_backlog_limit=64 [ 436.581113][ T30] audit: type=1400 audit(1775427434.082:397518): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 436.610753][ T5471] audit: audit_lost=59639 audit_rate_limit=0 audit_backlog_limit=64 [ 436.619754][T12603] audit: audit_backlog=65 > audit_backlog_limit=64 [ 436.628593][T12603] audit: audit_lost=59640 audit_rate_limit=0 audit_backlog_limit=64 [ 436.639835][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 436.839491][T12619] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2333'. [ 436.894353][T12619] netlink: 52 bytes leftover after parsing attributes in process `syz.2.2333'. [ 437.775676][T12638] FAULT_INJECTION: forcing a failure. [ 437.775676][T12638] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.841554][T12638] CPU: 0 UID: 0 PID: 12638 Comm: syz.0.2341 Tainted: G L syzkaller #0 PREEMPT(full) [ 437.841587][T12638] Tainted: [L]=SOFTLOCKUP [ 437.841594][T12638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 437.841606][T12638] Call Trace: [ 437.841612][T12638] [ 437.841620][T12638] dump_stack_lvl+0x100/0x190 [ 437.841653][T12638] should_fail_ex.cold+0x5/0xa [ 437.841676][T12638] _copy_to_user+0x32/0xd0 [ 437.841698][T12638] simple_read_from_buffer+0xcb/0x170 [ 437.841718][T12638] proc_fail_nth_read+0x1af/0x230 [ 437.841742][T12638] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 437.841778][T12638] ? rw_verify_area+0xce/0x6d0 [ 437.841800][T12638] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 437.841826][T12638] vfs_read+0x1e4/0xb30 [ 437.841847][T12638] ? __pfx_vfs_read+0x10/0x10 [ 437.841863][T12638] ? __fget_files+0x215/0x3d0 [ 437.841889][T12638] ? __fget_files+0x21f/0x3d0 [ 437.841916][T12638] ksys_read+0x12a/0x250 [ 437.841933][T12638] ? __pfx_ksys_read+0x10/0x10 [ 437.841957][T12638] do_syscall_64+0x106/0xf80 [ 437.841975][T12638] ? clear_bhb_loop+0x40/0x90 [ 437.841998][T12638] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 437.842017][T12638] RIP: 0033:0x7effe355d04e [ 437.842076][T12638] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 437.842094][T12638] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 437.842112][T12638] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 437.842122][T12638] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 437.842132][T12638] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 437.842141][T12638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.842152][T12638] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 437.842176][T12638] [ 438.169171][T12648] FAULT_INJECTION: forcing a failure. [ 438.169171][T12648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.183560][T12648] CPU: 0 UID: 0 PID: 12648 Comm: syz.0.2344 Tainted: G L syzkaller #0 PREEMPT(full) [ 438.183590][T12648] Tainted: [L]=SOFTLOCKUP [ 438.183597][T12648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 438.183608][T12648] Call Trace: [ 438.183614][T12648] [ 438.183621][T12648] dump_stack_lvl+0x100/0x190 [ 438.183657][T12648] should_fail_ex.cold+0x5/0xa [ 438.183683][T12648] _copy_to_user+0x32/0xd0 [ 438.183705][T12648] simple_read_from_buffer+0xcb/0x170 [ 438.183727][T12648] proc_fail_nth_read+0x1af/0x230 [ 438.183754][T12648] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 438.183782][T12648] ? rw_verify_area+0xce/0x6d0 [ 438.183807][T12648] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 438.183830][T12648] vfs_read+0x1e4/0xb30 [ 438.183850][T12648] ? __pfx_vfs_read+0x10/0x10 [ 438.183867][T12648] ? __fget_files+0x215/0x3d0 [ 438.183893][T12648] ? __fget_files+0x21f/0x3d0 [ 438.183919][T12648] ksys_read+0x12a/0x250 [ 438.183936][T12648] ? __pfx_ksys_read+0x10/0x10 [ 438.183960][T12648] do_syscall_64+0x106/0xf80 [ 438.183977][T12648] ? clear_bhb_loop+0x40/0x90 [ 438.184006][T12648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 438.184024][T12648] RIP: 0033:0x7effe355d04e [ 438.184040][T12648] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 438.184057][T12648] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 438.184075][T12648] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 438.184086][T12648] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 438.184096][T12648] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 438.184107][T12648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.184117][T12648] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 438.184142][T12648] [ 438.755960][T12657] IPv6: NLM_F_CREATE should be specified when creating new route [ 439.215029][T12665] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2352'. [ 439.324173][T12669] FAULT_INJECTION: forcing a failure. [ 439.324173][T12669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.350930][T12669] CPU: 0 UID: 0 PID: 12669 Comm: syz.2.2354 Tainted: G L syzkaller #0 PREEMPT(full) [ 439.350950][T12669] Tainted: [L]=SOFTLOCKUP [ 439.350954][T12669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 439.350960][T12669] Call Trace: [ 439.350965][T12669] [ 439.350969][T12669] dump_stack_lvl+0x100/0x190 [ 439.350993][T12669] should_fail_ex.cold+0x5/0xa [ 439.351008][T12669] _copy_to_user+0x32/0xd0 [ 439.351027][T12669] simple_read_from_buffer+0xcb/0x170 [ 439.351040][T12669] proc_fail_nth_read+0x1af/0x230 [ 439.351057][T12669] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 439.351074][T12669] ? rw_verify_area+0xce/0x6d0 [ 439.351090][T12669] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 439.351105][T12669] vfs_read+0x1e4/0xb30 [ 439.351117][T12669] ? __pfx_vfs_read+0x10/0x10 [ 439.351126][T12669] ? __fget_files+0x215/0x3d0 [ 439.351141][T12669] ? __fget_files+0x21f/0x3d0 [ 439.351156][T12669] ksys_read+0x12a/0x250 [ 439.351166][T12669] ? __pfx_ksys_read+0x10/0x10 [ 439.351179][T12669] do_syscall_64+0x106/0xf80 [ 439.351190][T12669] ? clear_bhb_loop+0x40/0x90 [ 439.351203][T12669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 439.351214][T12669] RIP: 0033:0x7ff780f5d04e [ 439.351225][T12669] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 439.351235][T12669] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 439.351246][T12669] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 439.351253][T12669] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 439.351259][T12669] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 439.351266][T12669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 439.351272][T12669] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 439.351285][T12669] [ 440.120177][T12673] FAULT_INJECTION: forcing a failure. [ 440.120177][T12673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.160983][T12673] CPU: 0 UID: 0 PID: 12673 Comm: syz.2.2358 Tainted: G L syzkaller #0 PREEMPT(full) [ 440.161016][T12673] Tainted: [L]=SOFTLOCKUP [ 440.161022][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 440.161032][T12673] Call Trace: [ 440.161039][T12673] [ 440.161045][T12673] dump_stack_lvl+0x100/0x190 [ 440.161078][T12673] should_fail_ex.cold+0x5/0xa [ 440.161122][T12673] _copy_to_user+0x32/0xd0 [ 440.161144][T12673] simple_read_from_buffer+0xcb/0x170 [ 440.161166][T12673] proc_fail_nth_read+0x1af/0x230 [ 440.161194][T12673] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 440.161222][T12673] ? rw_verify_area+0xce/0x6d0 [ 440.161248][T12673] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 440.161273][T12673] vfs_read+0x1e4/0xb30 [ 440.161294][T12673] ? __pfx_vfs_read+0x10/0x10 [ 440.161311][T12673] ? __fget_files+0x215/0x3d0 [ 440.161337][T12673] ? __fget_files+0x21f/0x3d0 [ 440.161363][T12673] ksys_read+0x12a/0x250 [ 440.161380][T12673] ? __pfx_ksys_read+0x10/0x10 [ 440.161404][T12673] do_syscall_64+0x106/0xf80 [ 440.161422][T12673] ? clear_bhb_loop+0x40/0x90 [ 440.161444][T12673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.161463][T12673] RIP: 0033:0x7ff780f5d04e [ 440.161478][T12673] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 440.161496][T12673] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 440.161514][T12673] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 440.161525][T12673] RDX: 000000000000000f RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 440.161536][T12673] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 440.161547][T12673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.161557][T12673] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 440.161582][T12673] [ 440.412153][T12680] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12680 comm=syz.1.2360 [ 440.444582][T12680] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12680 comm=syz.1.2360 [ 441.442249][ T30] kauditd_printk_skb: 3843 callbacks suppressed [ 441.442267][ T30] audit: type=1400 audit(1775427439.082:401313): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 441.491474][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 441.507955][ T5471] audit: audit_lost=59657 audit_rate_limit=0 audit_backlog_limit=64 [ 441.530308][ T5471] audit: backlog limit exceeded [ 441.543564][T12709] audit: audit_backlog=65 > audit_backlog_limit=64 [ 441.553601][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 441.565440][ T30] audit: type=1400 audit(1775427439.082:401314): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 441.594252][ T5471] audit: audit_lost=59658 audit_rate_limit=0 audit_backlog_limit=64 [ 441.615272][ T5471] audit: backlog limit exceeded [ 441.624873][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 442.051091][T12716] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=12716 comm=syz.2.2367 [ 444.640485][T12759] FAULT_INJECTION: forcing a failure. [ 444.640485][T12759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 444.695077][T12759] CPU: 0 UID: 0 PID: 12759 Comm: syz.0.2383 Tainted: G L syzkaller #0 PREEMPT(full) [ 444.695106][T12759] Tainted: [L]=SOFTLOCKUP [ 444.695113][T12759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 444.695123][T12759] Call Trace: [ 444.695129][T12759] [ 444.695136][T12759] dump_stack_lvl+0x100/0x190 [ 444.695171][T12759] should_fail_ex.cold+0x5/0xa [ 444.695195][T12759] _copy_to_user+0x32/0xd0 [ 444.695217][T12759] simple_read_from_buffer+0xcb/0x170 [ 444.695239][T12759] proc_fail_nth_read+0x1af/0x230 [ 444.695266][T12759] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 444.695292][T12759] ? rw_verify_area+0xce/0x6d0 [ 444.695318][T12759] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 444.695343][T12759] vfs_read+0x1e4/0xb30 [ 444.695363][T12759] ? __pfx_vfs_read+0x10/0x10 [ 444.695379][T12759] ? __fget_files+0x215/0x3d0 [ 444.695404][T12759] ? __fget_files+0x21f/0x3d0 [ 444.695431][T12759] ksys_read+0x12a/0x250 [ 444.695448][T12759] ? __pfx_ksys_read+0x10/0x10 [ 444.695471][T12759] do_syscall_64+0x106/0xf80 [ 444.695489][T12759] ? clear_bhb_loop+0x40/0x90 [ 444.695511][T12759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 444.695529][T12759] RIP: 0033:0x7effe355d04e [ 444.695544][T12759] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 444.695562][T12759] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 444.695579][T12759] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 444.695591][T12759] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000005 [ 444.695600][T12759] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 444.695611][T12759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.695620][T12759] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 444.695643][T12759] [ 445.623510][T12775] netlink: 'syz.4.2389': attribute type 4 has an invalid length. [ 445.692052][T12775] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2389'. [ 446.450800][ T30] kauditd_printk_skb: 14590 callbacks suppressed [ 446.450817][ T30] audit: type=1400 audit(1775427444.102:404691): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.488614][ T30] audit: type=1400 audit(1775427444.102:404692): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.522778][ T30] audit: type=1400 audit(1775427444.102:404693): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.547686][ T30] audit: type=1400 audit(1775427444.102:404694): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.576821][ T30] audit: type=1400 audit(1775427444.102:404695): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.603356][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 446.609883][ T5471] audit: audit_lost=63398 audit_rate_limit=0 audit_backlog_limit=64 [ 446.634171][ T30] audit: type=1400 audit(1775427444.102:404696): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 446.668818][ T5471] audit: backlog limit exceeded [ 446.668873][ T30] audit: type=1400 audit(1775427444.102:404697): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 448.715209][T12823] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2406'. [ 449.580572][T12836] FAULT_INJECTION: forcing a failure. [ 449.580572][T12836] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 449.630411][T12836] CPU: 1 UID: 0 PID: 12836 Comm: syz.4.2411 Tainted: G L syzkaller #0 PREEMPT(full) [ 449.630441][T12836] Tainted: [L]=SOFTLOCKUP [ 449.630447][T12836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 449.630458][T12836] Call Trace: [ 449.630464][T12836] [ 449.630471][T12836] dump_stack_lvl+0x100/0x190 [ 449.630506][T12836] should_fail_ex.cold+0x5/0xa [ 449.630531][T12836] _copy_to_user+0x32/0xd0 [ 449.630554][T12836] simple_read_from_buffer+0xcb/0x170 [ 449.630577][T12836] proc_fail_nth_read+0x1af/0x230 [ 449.630605][T12836] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 449.630633][T12836] ? rw_verify_area+0xce/0x6d0 [ 449.630656][T12836] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 449.630685][T12836] vfs_read+0x1e4/0xb30 [ 449.630704][T12836] ? __pfx_vfs_read+0x10/0x10 [ 449.630718][T12836] ? __fget_files+0x215/0x3d0 [ 449.630741][T12836] ? __fget_files+0x21f/0x3d0 [ 449.630767][T12836] ksys_read+0x12a/0x250 [ 449.630783][T12836] ? __pfx_ksys_read+0x10/0x10 [ 449.630806][T12836] do_syscall_64+0x106/0xf80 [ 449.630823][T12836] ? clear_bhb_loop+0x40/0x90 [ 449.630846][T12836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.630863][T12836] RIP: 0033:0x7f302bd5d04e [ 449.630878][T12836] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 449.630894][T12836] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 449.630911][T12836] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 449.630922][T12836] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 449.630931][T12836] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 449.630939][T12836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.630947][T12836] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 449.630969][T12836] [ 451.470853][ T30] kauditd_printk_skb: 18833 callbacks suppressed [ 451.470869][ T30] audit: type=1400 audit(1775427449.102:407595): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 451.519479][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 451.551009][ T5471] audit: audit_lost=68711 audit_rate_limit=0 audit_backlog_limit=64 [ 451.559091][ T30] audit: type=1400 audit(1775427449.152:407596): avc: denied { read write } for pid=5803 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 451.584141][ T5471] audit: backlog limit exceeded [ 451.590851][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 451.597477][ T5471] audit: audit_lost=68712 audit_rate_limit=0 audit_backlog_limit=64 [ 451.610874][ T5471] audit: backlog limit exceeded [ 451.618293][ T30] audit: type=1400 audit(1775427449.152:407597): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 451.640179][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 451.707199][T12862] FAULT_INJECTION: forcing a failure. [ 451.707199][T12862] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 451.840722][T12862] CPU: 1 UID: 0 PID: 12862 Comm: syz.3.2420 Tainted: G L syzkaller #0 PREEMPT(full) [ 451.840755][T12862] Tainted: [L]=SOFTLOCKUP [ 451.840762][T12862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 451.840773][T12862] Call Trace: [ 451.840780][T12862] [ 451.840787][T12862] dump_stack_lvl+0x100/0x190 [ 451.840821][T12862] should_fail_ex.cold+0x5/0xa [ 451.840843][T12862] _copy_to_user+0x32/0xd0 [ 451.840863][T12862] simple_read_from_buffer+0xcb/0x170 [ 451.840883][T12862] proc_fail_nth_read+0x1af/0x230 [ 451.840910][T12862] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 451.840937][T12862] ? rw_verify_area+0xce/0x6d0 [ 451.840958][T12862] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 451.840977][T12862] vfs_read+0x1e4/0xb30 [ 451.840992][T12862] ? __pfx_vfs_read+0x10/0x10 [ 451.841004][T12862] ? __fget_files+0x215/0x3d0 [ 451.841024][T12862] ? __fget_files+0x21f/0x3d0 [ 451.841044][T12862] ksys_read+0x12a/0x250 [ 451.841057][T12862] ? __pfx_ksys_read+0x10/0x10 [ 451.841075][T12862] do_syscall_64+0x106/0xf80 [ 451.841089][T12862] ? clear_bhb_loop+0x40/0x90 [ 451.841107][T12862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 451.841121][T12862] RIP: 0033:0x7f48f995d04e [ 451.841134][T12862] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 451.841148][T12862] RSP: 002b:00007f48fa7befe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 451.841163][T12862] RAX: ffffffffffffffda RBX: 00007f48fa7bf6c0 RCX: 00007f48f995d04e [ 451.841172][T12862] RDX: 000000000000000f RSI: 00007f48fa7bf0a0 RDI: 0000000000000005 [ 451.841181][T12862] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 451.841189][T12862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.841197][T12862] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 451.841216][T12862] [ 452.068210][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.077242][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.089821][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.099924][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.109355][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.118593][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.127500][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.137599][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.146547][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.155535][T12867] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2422'. [ 452.201455][T12871] FAULT_INJECTION: forcing a failure. [ 452.201455][T12871] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.259557][T12871] CPU: 0 UID: 0 PID: 12871 Comm: syz.3.2424 Tainted: G L syzkaller #0 PREEMPT(full) [ 452.259577][T12871] Tainted: [L]=SOFTLOCKUP [ 452.259581][T12871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 452.259588][T12871] Call Trace: [ 452.259592][T12871] [ 452.259597][T12871] dump_stack_lvl+0x100/0x190 [ 452.259619][T12871] should_fail_ex.cold+0x5/0xa [ 452.259634][T12871] _copy_to_user+0x32/0xd0 [ 452.259648][T12871] simple_read_from_buffer+0xcb/0x170 [ 452.259661][T12871] proc_fail_nth_read+0x1af/0x230 [ 452.259679][T12871] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 452.259697][T12871] ? rw_verify_area+0xce/0x6d0 [ 452.259713][T12871] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 452.259729][T12871] vfs_read+0x1e4/0xb30 [ 452.259741][T12871] ? __pfx_vfs_read+0x10/0x10 [ 452.259750][T12871] ? __fget_files+0x215/0x3d0 [ 452.259765][T12871] ? __fget_files+0x21f/0x3d0 [ 452.259780][T12871] ksys_read+0x12a/0x250 [ 452.259790][T12871] ? __pfx_ksys_read+0x10/0x10 [ 452.259803][T12871] do_syscall_64+0x106/0xf80 [ 452.259814][T12871] ? clear_bhb_loop+0x40/0x90 [ 452.259828][T12871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 452.259843][T12871] RIP: 0033:0x7f48f995d04e [ 452.259853][T12871] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 452.259863][T12871] RSP: 002b:00007f48fa7befe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 452.259874][T12871] RAX: ffffffffffffffda RBX: 00007f48fa7bf6c0 RCX: 00007f48f995d04e [ 452.259881][T12871] RDX: 000000000000000f RSI: 00007f48fa7bf0a0 RDI: 0000000000000003 [ 452.259887][T12871] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 452.259893][T12871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 452.259899][T12871] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 452.259913][T12871] [ 453.787081][T12906] FAULT_INJECTION: forcing a failure. [ 453.787081][T12906] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 453.826327][T12906] CPU: 1 UID: 0 PID: 12906 Comm: syz.4.2435 Tainted: G L syzkaller #0 PREEMPT(full) [ 453.826358][T12906] Tainted: [L]=SOFTLOCKUP [ 453.826364][T12906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 453.826375][T12906] Call Trace: [ 453.826381][T12906] [ 453.826388][T12906] dump_stack_lvl+0x100/0x190 [ 453.826424][T12906] should_fail_ex.cold+0x5/0xa [ 453.826450][T12906] _copy_to_user+0x32/0xd0 [ 453.826473][T12906] simple_read_from_buffer+0xcb/0x170 [ 453.826495][T12906] proc_fail_nth_read+0x1af/0x230 [ 453.826524][T12906] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 453.826551][T12906] ? rw_verify_area+0xce/0x6d0 [ 453.826578][T12906] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 453.826604][T12906] vfs_read+0x1e4/0xb30 [ 453.826630][T12906] ? __pfx_vfs_read+0x10/0x10 [ 453.826646][T12906] ? __fget_files+0x215/0x3d0 [ 453.826672][T12906] ? __fget_files+0x21f/0x3d0 [ 453.826698][T12906] ksys_read+0x12a/0x250 [ 453.826714][T12906] ? __pfx_ksys_read+0x10/0x10 [ 453.826738][T12906] do_syscall_64+0x106/0xf80 [ 453.826756][T12906] ? clear_bhb_loop+0x40/0x90 [ 453.826780][T12906] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 453.826798][T12906] RIP: 0033:0x7f302bd5d04e [ 453.826813][T12906] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 453.826830][T12906] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 453.826847][T12906] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 453.826859][T12906] RDX: 000000000000000f RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 453.826869][T12906] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 453.826879][T12906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 453.826889][T12906] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 453.826914][T12906] [ 455.850763][T12958] netlink: 'syz.3.2447': attribute type 21 has an invalid length. [ 455.918072][ T13] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 455.918188][T12958] netlink: 'syz.3.2447': attribute type 21 has an invalid length. [ 455.918993][ T13] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 455.919043][ T13] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 455.919073][ T13] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 456.484796][ T30] kauditd_printk_skb: 5303 callbacks suppressed [ 456.484814][ T30] audit: type=1400 audit(1775427454.132:410877): avc: denied { create } for pid=12942 comm="syz.4.2446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 456.485461][ T30] audit: type=1400 audit(1775427454.132:410878): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.485635][ T30] audit: type=1400 audit(1775427454.132:410879): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.485774][ T30] audit: type=1400 audit(1775427454.132:410880): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.485915][ T30] audit: type=1400 audit(1775427454.132:410881): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.486074][ T30] audit: type=1400 audit(1775427454.132:410882): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.486244][ T30] audit: type=1400 audit(1775427454.132:410883): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.486386][ T30] audit: type=1400 audit(1775427454.132:410884): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.486531][ T30] audit: type=1400 audit(1775427454.132:410885): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.486676][ T30] audit: type=1400 audit(1775427454.132:410886): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 456.999880][T12977] netlink: 'syz.3.2452': attribute type 4 has an invalid length. [ 458.584203][T12995] FAULT_INJECTION: forcing a failure. [ 458.584203][T12995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.584225][T12995] CPU: 1 UID: 0 PID: 12995 Comm: syz.1.2459 Tainted: G L syzkaller #0 PREEMPT(full) [ 458.584240][T12995] Tainted: [L]=SOFTLOCKUP [ 458.584244][T12995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 458.584251][T12995] Call Trace: [ 458.584255][T12995] [ 458.584260][T12995] dump_stack_lvl+0x100/0x190 [ 458.584282][T12995] should_fail_ex.cold+0x5/0xa [ 458.584298][T12995] _copy_to_user+0x32/0xd0 [ 458.584311][T12995] simple_read_from_buffer+0xcb/0x170 [ 458.584325][T12995] proc_fail_nth_read+0x1af/0x230 [ 458.584342][T12995] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 458.584359][T12995] ? rw_verify_area+0xce/0x6d0 [ 458.584375][T12995] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 458.584391][T12995] vfs_read+0x1e4/0xb30 [ 458.584402][T12995] ? __pfx_vfs_read+0x10/0x10 [ 458.584412][T12995] ? __fget_files+0x215/0x3d0 [ 458.584426][T12995] ? __fget_files+0x21f/0x3d0 [ 458.584448][T12995] ksys_read+0x12a/0x250 [ 458.584464][T12995] ? __pfx_ksys_read+0x10/0x10 [ 458.584486][T12995] do_syscall_64+0x106/0xf80 [ 458.584503][T12995] ? clear_bhb_loop+0x40/0x90 [ 458.584518][T12995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.584529][T12995] RIP: 0033:0x7f699fd5d04e [ 458.584539][T12995] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 458.584551][T12995] RSP: 002b:00007f69a0cd8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 458.584562][T12995] RAX: ffffffffffffffda RBX: 00007f69a0cd96c0 RCX: 00007f699fd5d04e [ 458.584569][T12995] RDX: 000000000000000f RSI: 00007f69a0cd90a0 RDI: 0000000000000003 [ 458.584575][T12995] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 458.584582][T12995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.584588][T12995] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 458.584602][T12995] [ 458.891387][T12999] netlink: 'syz.1.2460': attribute type 4 has an invalid length. [ 458.891407][T12999] __nla_validate_parse: 90 callbacks suppressed [ 458.891415][T12999] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2460'. [ 459.896529][T13022] FAULT_INJECTION: forcing a failure. [ 459.896529][T13022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.896554][T13022] CPU: 1 UID: 0 PID: 13022 Comm: syz.0.2465 Tainted: G L syzkaller #0 PREEMPT(full) [ 459.896569][T13022] Tainted: [L]=SOFTLOCKUP [ 459.896573][T13022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 459.896580][T13022] Call Trace: [ 459.896584][T13022] [ 459.896588][T13022] dump_stack_lvl+0x100/0x190 [ 459.896613][T13022] should_fail_ex.cold+0x5/0xa [ 459.896628][T13022] _copy_to_user+0x32/0xd0 [ 459.896642][T13022] simple_read_from_buffer+0xcb/0x170 [ 459.896656][T13022] proc_fail_nth_read+0x1af/0x230 [ 459.896674][T13022] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 459.896690][T13022] ? rw_verify_area+0xce/0x6d0 [ 459.896705][T13022] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 459.896721][T13022] vfs_read+0x1e4/0xb30 [ 459.896732][T13022] ? __pfx_vfs_read+0x10/0x10 [ 459.896742][T13022] ? __fget_files+0x215/0x3d0 [ 459.896758][T13022] ? __fget_files+0x21f/0x3d0 [ 459.896773][T13022] ksys_read+0x12a/0x250 [ 459.896783][T13022] ? __pfx_ksys_read+0x10/0x10 [ 459.896802][T13022] do_syscall_64+0x106/0xf80 [ 459.896813][T13022] ? clear_bhb_loop+0x40/0x90 [ 459.896826][T13022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.896838][T13022] RIP: 0033:0x7effe355d04e [ 459.896847][T13022] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 459.896857][T13022] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 459.896868][T13022] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 459.896875][T13022] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000004 [ 459.896881][T13022] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 459.896887][T13022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.896893][T13022] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 459.896907][T13022] [ 460.193940][T13027] FAULT_INJECTION: forcing a failure. [ 460.193940][T13027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.193974][T13027] CPU: 1 UID: 0 PID: 13027 Comm: syz.0.2467 Tainted: G L syzkaller #0 PREEMPT(full) [ 460.193998][T13027] Tainted: [L]=SOFTLOCKUP [ 460.194004][T13027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 460.194014][T13027] Call Trace: [ 460.194020][T13027] [ 460.194027][T13027] dump_stack_lvl+0x100/0x190 [ 460.194060][T13027] should_fail_ex.cold+0x5/0xa [ 460.194085][T13027] _copy_to_user+0x32/0xd0 [ 460.194107][T13027] simple_read_from_buffer+0xcb/0x170 [ 460.194130][T13027] proc_fail_nth_read+0x1af/0x230 [ 460.194156][T13027] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 460.194183][T13027] ? rw_verify_area+0xce/0x6d0 [ 460.194207][T13027] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 460.194229][T13027] vfs_read+0x1e4/0xb30 [ 460.194249][T13027] ? __pfx_vfs_read+0x10/0x10 [ 460.194265][T13027] ? __fget_files+0x215/0x3d0 [ 460.194291][T13027] ? __fget_files+0x21f/0x3d0 [ 460.194316][T13027] ksys_read+0x12a/0x250 [ 460.194332][T13027] ? __pfx_ksys_read+0x10/0x10 [ 460.194355][T13027] do_syscall_64+0x106/0xf80 [ 460.194373][T13027] ? clear_bhb_loop+0x40/0x90 [ 460.194396][T13027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.194414][T13027] RIP: 0033:0x7effe355d04e [ 460.194429][T13027] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 460.194445][T13027] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 460.194463][T13027] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 460.194474][T13027] RDX: 000000000000000f RSI: 00007effe442a0a0 RDI: 0000000000000005 [ 460.194485][T13027] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 460.194499][T13027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.194510][T13027] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 460.194534][T13027] [ 461.255514][T13038] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2472'. [ 461.493747][ T30] kauditd_printk_skb: 5559 callbacks suppressed [ 461.493760][ T30] audit: type=1400 audit(1775427459.132:416173): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493792][ T30] audit: type=1400 audit(1775427459.132:416174): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493831][ T30] audit: type=1400 audit(1775427459.132:416175): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493859][ T30] audit: type=1400 audit(1775427459.132:416176): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493881][ T30] audit: type=1400 audit(1775427459.132:416177): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493902][ T30] audit: type=1400 audit(1775427459.132:416178): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493923][ T30] audit: type=1400 audit(1775427459.132:416179): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.493944][ T30] audit: type=1400 audit(1775427459.132:416180): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.501501][ T30] audit: type=1400 audit(1775427459.152:416181): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 461.501550][ T30] audit: type=1400 audit(1775427459.152:416182): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 463.959454][T13058] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.182919][T13058] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.398780][T13063] netlink: 'syz.2.2479': attribute type 4 has an invalid length. [ 464.406716][T13063] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2479'. [ 464.614535][T13058] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 464.755636][T13058] vlan0: left promiscuous mode [ 464.797188][T13058] macvlan0: left promiscuous mode [ 464.874555][T13058] vlan2: left promiscuous mode [ 464.885559][T13058] bridge0: left promiscuous mode [ 464.898078][T13058] geneve2: left promiscuous mode [ 464.905568][T13058] vlan3: left allmulticast mode [ 464.919912][ T1007] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.932332][ T1007] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.951895][ T1007] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.968189][ T1007] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 464.994555][T13071] netdevsim netdevsim0: Direct firmware load for  failed with error -2 [ 465.786634][T13093] netlink: 'syz.2.2488': attribute type 4 has an invalid length. [ 465.796822][T13093] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2488'. [ 466.032218][T13101] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2492'. [ 466.050302][T13101] netlink: 52 bytes leftover after parsing attributes in process `syz.3.2492'. [ 466.229227][T13105] netlink: 'syz.4.2494': attribute type 4 has an invalid length. [ 466.242995][T13105] netlink: 152 bytes leftover after parsing attributes in process `syz.4.2494'. [ 466.504528][ T30] kauditd_printk_skb: 8549 callbacks suppressed [ 466.504541][ T30] audit: type=1400 audit(1775427464.152:423970): avc: denied { execmem } for pid=13115 comm="syz.0.2499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 466.532164][ T30] audit: type=1400 audit(1775427464.182:423971): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 466.555528][ T30] audit: type=1400 audit(1775427464.182:423972): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 466.577999][ T30] audit: type=1400 audit(1775427464.182:423973): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 466.602849][ T30] audit: type=1400 audit(1775427464.182:423974): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 466.744009][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.231720][ T5803] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.241000][T13119] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.246510][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 467.248125][T13119] audit: audit_lost=69733 audit_rate_limit=0 audit_backlog_limit=64 [ 468.216991][T13146] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 468.246187][T13146] Bluetooth: hci0: Error when powering off device on rfkill (-4) [ 468.277604][T13153] netlink: 'syz.1.2510': attribute type 4 has an invalid length. [ 468.296305][T13146] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 468.305176][T13153] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2510'. [ 468.332842][T13146] Bluetooth: hci1: Error when powering off device on rfkill (-4) [ 468.382571][T13146] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 468.399137][T13146] Bluetooth: hci2: Error when powering off device on rfkill (-4) [ 468.473094][T13146] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 468.504312][T13146] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 468.557283][T13143] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2508'. [ 468.570387][T13164] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2513'. [ 468.580107][T13164] netlink: 52 bytes leftover after parsing attributes in process `syz.4.2513'. [ 468.627857][T13146] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 468.644137][T13146] Bluetooth: hci3: Error when powering off device on rfkill (-4) [ 469.620131][T13192] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13192 comm=syz.1.2518 [ 470.358393][T13217] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2525'. [ 470.505571][T13217] netlink: 52 bytes leftover after parsing attributes in process `syz.0.2525'. [ 471.536611][ T30] kauditd_printk_skb: 2099 callbacks suppressed [ 471.536627][ T30] audit: type=1400 audit(1775427469.152:425752): avc: denied { create } for pid=13246 comm="syz.2.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 471.598531][ T30] audit: type=1400 audit(1775427469.152:425753): avc: denied { map_create } for pid=13246 comm="syz.2.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 471.652486][ T30] audit: type=1400 audit(1775427469.152:425754): avc: denied { mount } for pid=13246 comm="syz.2.2530" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=0 [ 471.755274][ T30] audit: type=1400 audit(1775427469.162:425755): avc: denied { read write } for pid=5801 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 471.877035][ T30] audit: type=1400 audit(1775427469.162:425756): avc: denied { search } for pid=13244 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 471.877214][ T30] audit: type=1400 audit(1775427469.242:425757): avc: denied { create } for pid=13250 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 471.877395][ T30] audit: type=1400 audit(1775427469.272:425758): avc: denied { create } for pid=13250 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 471.877523][ T30] audit: type=1400 audit(1775427469.272:425759): avc: denied { create } for pid=13250 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 471.885382][ T30] audit: type=1400 audit(1775427469.272:425760): avc: denied { create } for pid=13250 comm="syz.2.2531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 471.885539][ T30] audit: type=1400 audit(1775427469.362:425761): avc: denied { search } for pid=13249 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 472.530213][T13256] sp0: Synchronizing with TNC [ 473.413022][T13279] netlink: 'syz.4.2535': attribute type 39 has an invalid length. [ 473.667568][T13286] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2538'. [ 476.532364][T13336] sp0: Synchronizing with TNC [ 476.545650][ T30] kauditd_printk_skb: 8273 callbacks suppressed [ 476.545669][ T30] audit: type=1400 audit(1775427474.182:430351): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 476.631673][ T30] audit: type=1400 audit(1775427474.192:430352): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 476.673251][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 476.787929][T13340] audit: audit_backlog=65 > audit_backlog_limit=64 [ 476.800699][T13340] audit: audit_lost=71070 audit_rate_limit=0 audit_backlog_limit=64 [ 476.816317][ T5471] audit: audit_lost=71071 audit_rate_limit=0 audit_backlog_limit=64 [ 476.816338][T13340] audit: backlog limit exceeded [ 476.831556][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 476.854030][ T5471] audit: backlog limit exceeded [ 476.880849][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 478.178266][T13367] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2564'. [ 478.455632][T13370] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2567'. [ 478.513435][T13370] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2567'. [ 479.063752][T13372] sp0: Synchronizing with TNC [ 479.534972][T13378] FAULT_INJECTION: forcing a failure. [ 479.534972][T13378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 479.639160][T13378] CPU: 1 UID: 0 PID: 13378 Comm: syz.1.2571 Tainted: G L syzkaller #0 PREEMPT(full) [ 479.639191][T13378] Tainted: [L]=SOFTLOCKUP [ 479.639197][T13378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 479.639209][T13378] Call Trace: [ 479.639216][T13378] [ 479.639224][T13378] dump_stack_lvl+0x100/0x190 [ 479.639258][T13378] should_fail_ex.cold+0x5/0xa [ 479.639282][T13378] _copy_from_user+0x2e/0xd0 [ 479.639303][T13378] restore_altstack+0x98/0x170 [ 479.639333][T13378] ? __pfx_restore_altstack+0x10/0x10 [ 479.639363][T13378] ? _raw_spin_unlock_irq+0x23/0x50 [ 479.639398][T13378] ? lockdep_hardirqs_on+0x78/0x100 [ 479.639426][T13378] ? _raw_spin_unlock_irq+0x2e/0x50 [ 479.639453][T13378] __do_sys_rt_sigreturn+0x1ab/0x2c0 [ 479.639479][T13378] ? __pfx___do_sys_rt_sigreturn+0x10/0x10 [ 479.639512][T13378] do_syscall_64+0x106/0xf80 [ 479.639528][T13378] ? clear_bhb_loop+0x40/0x90 [ 479.639550][T13378] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 479.639568][T13378] RIP: 0033:0x7f699fd3db99 [ 479.639584][T13378] Code: 11 06 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 0c 25 [ 479.639600][T13378] RSP: 002b:00007f69a0cd8340 EFLAGS: 00000206 ORIG_RAX: 000000000000000f [ 479.639619][T13378] RAX: ffffffffffffffda RBX: 00007f69a0015fa0 RCX: 00007f699fd3db99 [ 479.639630][T13378] RDX: 00007f69a0cd8340 RSI: 00007f69a0cd8470 RDI: 0000000000000021 [ 479.639641][T13378] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 479.639651][T13378] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 479.639661][T13378] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 479.639685][T13378] [ 480.295050][T13386] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2574'. [ 480.441314][T13386] bridge_slave_1 (unregistering): left allmulticast mode [ 480.543107][T13386] bridge_slave_1 (unregistering): left promiscuous mode [ 480.604091][T13386] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.550895][ T30] kauditd_printk_skb: 5813 callbacks suppressed [ 481.550912][ T30] audit: type=1400 audit(1775427479.192:436138): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 481.635591][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 481.644852][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 481.680653][ T5471] audit: audit_lost=71082 audit_rate_limit=0 audit_backlog_limit=64 [ 481.680782][ T5801] audit: audit_lost=71083 audit_rate_limit=0 audit_backlog_limit=64 [ 481.698070][ T30] audit: type=1400 audit(1775427479.202:436139): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 481.752108][ T5471] audit: backlog limit exceeded [ 481.752123][ T5801] audit: backlog limit exceeded [ 481.789576][ T30] audit: type=1400 audit(1775427479.202:436140): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 481.821810][ T30] audit: type=1400 audit(1775427479.202:436141): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 483.973457][T13442] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2592'. [ 484.258040][T13445] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=13445 comm=syz.1.2595 [ 484.991684][T13460] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2600'. [ 485.026151][T13460] netlink: 52 bytes leftover after parsing attributes in process `syz.1.2600'. [ 486.610692][ T30] kauditd_printk_skb: 11939 callbacks suppressed [ 486.610711][ T30] audit: type=1400 audit(1775427484.212:443443): avc: denied { execmem } for pid=13486 comm="syz.0.2610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 486.674185][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 486.677354][T13489] audit: audit_backlog=65 > audit_backlog_limit=64 [ 486.723095][ T30] audit: type=1400 audit(1775427484.222:443444): avc: denied { read } for pid=13486 comm="syz.0.2610" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 486.750719][ T5471] audit: audit_lost=72630 audit_rate_limit=0 audit_backlog_limit=64 [ 486.769059][ T5471] audit: backlog limit exceeded [ 486.774768][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 486.780919][T13489] audit: audit_lost=72631 audit_rate_limit=0 audit_backlog_limit=64 [ 486.789239][T13489] audit: backlog limit exceeded [ 486.796495][ T5804] audit: audit_backlog=65 > audit_backlog_limit=64 [ 486.891640][T13494] netlink: 'syz.3.2613': attribute type 4 has an invalid length. [ 486.934537][T13494] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2613'. [ 487.862966][T13517] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2620'. [ 488.741482][T13526] libceph: resolve '0..' (ret=-3): failed [ 489.481443][T13541] SELinux: syz.1.2629 (13541) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 489.532965][T13543] sp0: Synchronizing with TNC [ 489.553875][T13543] sp0: Found TNC [ 491.582022][T13570] libceph: resolve '0..' (ret=-3): failed [ 491.766927][ T30] kauditd_printk_skb: 7095 callbacks suppressed [ 491.766940][ T30] audit: type=1400 audit(1775427489.412:450500): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 491.841489][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 491.848039][ T5471] audit: audit_lost=72646 audit_rate_limit=0 audit_backlog_limit=64 [ 491.878430][ T30] audit: type=1400 audit(1775427489.412:450501): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 491.931109][ T5471] audit: backlog limit exceeded [ 491.936259][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 491.980930][T13574] audit: audit_backlog=65 > audit_backlog_limit=64 [ 491.990728][ T5471] audit: audit_lost=72647 audit_rate_limit=0 audit_backlog_limit=64 [ 492.001094][T13574] audit: audit_lost=72648 audit_rate_limit=0 audit_backlog_limit=64 [ 492.001164][ T30] audit: type=1400 audit(1775427489.412:450502): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.223393][T13611] libceph: resolve '0..' (ret=-3): failed [ 495.401475][T13626] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2658'. [ 495.873590][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 495.880105][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 496.233675][T13650] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2667'. [ 496.796405][ T30] kauditd_printk_skb: 7216 callbacks suppressed [ 496.796424][ T30] audit: type=1400 audit(1775427494.242:456163): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 496.799626][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.848135][T13668] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.855078][T13668] audit: audit_lost=73167 audit_rate_limit=0 audit_backlog_limit=64 [ 496.863718][T13668] audit: backlog limit exceeded [ 496.875640][T13668] audit: audit_backlog=65 > audit_backlog_limit=64 [ 496.884395][ T5471] audit: audit_lost=73168 audit_rate_limit=0 audit_backlog_limit=64 [ 496.892613][ T30] audit: type=1400 audit(1775427494.242:456164): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 496.892656][ T30] audit: type=1400 audit(1775427494.242:456165): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 496.892693][ T30] audit: type=1400 audit(1775427494.332:456167): avc: denied { create } for pid=13658 comm="syz.3.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 501.816003][ T30] kauditd_printk_skb: 6448 callbacks suppressed [ 501.816021][ T30] audit: type=1400 audit(1775427499.462:460665): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 501.934605][ T30] audit: type=1400 audit(1775427499.462:460666): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.008215][ T30] audit: type=1400 audit(1775427499.462:460667): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.195559][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.271260][ T5471] audit: audit_lost=73819 audit_rate_limit=0 audit_backlog_limit=64 [ 502.279381][ T5471] audit: backlog limit exceeded [ 502.284476][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 502.320732][ T30] audit: type=1400 audit(1775427499.462:460668): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 502.355139][ T5471] audit: audit_lost=73820 audit_rate_limit=0 audit_backlog_limit=64 [ 502.409578][ T5471] audit: backlog limit exceeded [ 505.310874][ T5815] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 505.673955][T13814] netlink: 'syz.2.2711': attribute type 39 has an invalid length. [ 506.690880][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 506.699795][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 506.708793][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 506.755596][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.154017][ T30] kauditd_printk_skb: 5164 callbacks suppressed [ 507.154033][ T30] audit: type=1400 audit(1775427504.802:465353): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.162598][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.215187][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.217225][T13839] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.228770][T13844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.229114][ T5471] audit: audit_lost=73981 audit_rate_limit=0 audit_backlog_limit=64 [ 507.255735][T13844] audit: audit_lost=73982 audit_rate_limit=0 audit_backlog_limit=64 [ 507.260658][ T5471] audit: backlog limit exceeded [ 507.265838][T13839] audit: audit_lost=73983 audit_rate_limit=0 audit_backlog_limit=64 [ 507.280784][T13843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 507.287016][ T30] audit: type=1400 audit(1775427504.802:465354): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 507.432948][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.482226][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.525069][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.562871][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.592773][T13835] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2717'. [ 507.681669][T13846] team0: Device vlan0 failed to change mtu [ 510.895605][T13926] FAULT_INJECTION: forcing a failure. [ 510.895605][T13926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 510.939258][T13926] CPU: 0 UID: 0 PID: 13926 Comm: syz.4.2751 Tainted: G L syzkaller #0 PREEMPT(full) [ 510.939287][T13926] Tainted: [L]=SOFTLOCKUP [ 510.939294][T13926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 510.939304][T13926] Call Trace: [ 510.939311][T13926] [ 510.939317][T13926] dump_stack_lvl+0x100/0x190 [ 510.939351][T13926] should_fail_ex.cold+0x5/0xa [ 510.939375][T13926] _copy_to_user+0x32/0xd0 [ 510.939401][T13926] proc_pid_cmdline_read+0x52f/0x8c0 [ 510.939428][T13926] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 510.939452][T13926] ? rw_verify_area+0xce/0x6d0 [ 510.939477][T13926] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 510.939500][T13926] vfs_readv+0x5d8/0x8d0 [ 510.939527][T13926] ? __pfx_vfs_readv+0x10/0x10 [ 510.939552][T13926] ? find_held_lock+0x2b/0x80 [ 510.939586][T13926] ? __fget_files+0x21f/0x3d0 [ 510.939613][T13926] ? do_preadv+0x1ac/0x270 [ 510.939635][T13926] do_preadv+0x1ac/0x270 [ 510.939659][T13926] ? __pfx_do_preadv+0x10/0x10 [ 510.939688][T13926] do_syscall_64+0x106/0xf80 [ 510.939703][T13926] ? clear_bhb_loop+0x40/0x90 [ 510.939724][T13926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 510.939742][T13926] RIP: 0033:0x7f302bd9c819 [ 510.939757][T13926] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 510.939773][T13926] RSP: 002b:00007f302cbb4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 510.939790][T13926] RAX: ffffffffffffffda RBX: 00007f302c016180 RCX: 00007f302bd9c819 [ 510.939802][T13926] RDX: 0000000000000001 RSI: 0000200000000680 RDI: 0000000000000005 [ 510.939812][T13926] RBP: 00007f302cbb4090 R08: 00000000fffffff9 R09: 0000000000000000 [ 510.939822][T13926] R10: 0000000000000016 R11: 0000000000000246 R12: 0000000000000001 [ 510.939832][T13926] R13: 00007f302c016218 R14: 00007f302c016180 R15: 00007ffcb452b818 [ 510.939855][T13926] [ 511.139194][T13928] netlink: 'syz.3.2753': attribute type 4 has an invalid length. [ 511.939959][T13946] __nla_validate_parse: 42 callbacks suppressed [ 511.939976][T13946] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2760'. [ 512.173253][ T30] kauditd_printk_skb: 9448 callbacks suppressed [ 512.173270][ T30] audit: type=1400 audit(1775427509.822:473323): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 512.196033][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.207911][T13958] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.332764][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.349561][T13958] audit: audit_lost=74477 audit_rate_limit=0 audit_backlog_limit=64 [ 512.362402][T13964] audit: audit_backlog=65 > audit_backlog_limit=64 [ 512.369882][T13964] audit: audit_lost=74478 audit_rate_limit=0 audit_backlog_limit=64 [ 512.378752][T13964] audit: backlog limit exceeded [ 512.385482][ T5801] audit: audit_lost=74479 audit_rate_limit=0 audit_backlog_limit=64 [ 512.396066][T13962] audit: audit_backlog=65 > audit_backlog_limit=64 [ 513.836149][T13989] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2774'. [ 513.870770][T13989] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2774'. [ 513.890194][T13989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30768 sclass=netlink_route_socket pid=13989 comm=syz.2.2774 [ 513.997080][T13993] ip6t_srh: unknown srh match flags 4000 [ 514.905608][T14002] tap0: tun_chr_ioctl cmd 1074025678 [ 514.931313][T14002] tap0: group set to 0 [ 515.087567][T14008] netlink: 'syz.0.2782': attribute type 4 has an invalid length. [ 515.095348][T14008] netlink: 152 bytes leftover after parsing attributes in process `syz.0.2782'. [ 516.201991][T14035] FAULT_INJECTION: forcing a failure. [ 516.201991][T14035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 516.344669][T14035] CPU: 1 UID: 0 PID: 14035 Comm: syz.1.2789 Tainted: G L syzkaller #0 PREEMPT(full) [ 516.344697][T14035] Tainted: [L]=SOFTLOCKUP [ 516.344703][T14035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 516.344712][T14035] Call Trace: [ 516.344718][T14035] [ 516.344725][T14035] dump_stack_lvl+0x100/0x190 [ 516.344761][T14035] should_fail_ex.cold+0x5/0xa [ 516.344783][T14035] _copy_from_user+0x2e/0xd0 [ 516.344805][T14035] memdup_user+0x6b/0xe0 [ 516.344824][T14035] strndup_user+0x78/0xe0 [ 516.344843][T14035] __x64_sys_mount+0x136/0x310 [ 516.344868][T14035] ? __pfx___x64_sys_mount+0x10/0x10 [ 516.344915][T14035] do_syscall_64+0x106/0xf80 [ 516.344933][T14035] ? clear_bhb_loop+0x40/0x90 [ 516.344956][T14035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.344975][T14035] RIP: 0033:0x7f699fd9c819 [ 516.344990][T14035] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 516.345008][T14035] RSP: 002b:00007f69a0cd9028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 516.345027][T14035] RAX: ffffffffffffffda RBX: 00007f69a0015fa0 RCX: 00007f699fd9c819 [ 516.345039][T14035] RDX: 00002000000001c0 RSI: 0000200000000100 RDI: 0000200000000080 [ 516.345050][T14035] RBP: 00007f69a0cd9090 R08: 00002000000000c0 R09: 0000000000000000 [ 516.345061][T14035] R10: 0000000000010003 R11: 0000000000000246 R12: 0000000000000001 [ 516.345071][T14035] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 516.345102][T14035] [ 516.903168][T14045] FAULT_INJECTION: forcing a failure. [ 516.903168][T14045] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 517.150877][T14045] CPU: 0 UID: 0 PID: 14045 Comm: syz.1.2790 Tainted: G L syzkaller #0 PREEMPT(full) [ 517.150907][T14045] Tainted: [L]=SOFTLOCKUP [ 517.150913][T14045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 517.150924][T14045] Call Trace: [ 517.150930][T14045] [ 517.150936][T14045] dump_stack_lvl+0x100/0x190 [ 517.150973][T14045] should_fail_ex.cold+0x5/0xa [ 517.150997][T14045] _copy_from_user+0x2e/0xd0 [ 517.151019][T14045] kstrtouint_from_user+0xd6/0x1d0 [ 517.151044][T14045] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 517.151068][T14045] ? __lock_acquire+0x4a5/0x2630 [ 517.151090][T14045] ? lock_acquire+0x1cf/0x380 [ 517.151118][T14045] proc_fail_nth_write+0x83/0x220 [ 517.151144][T14045] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 517.151175][T14045] vfs_write+0x2aa/0x1070 [ 517.151192][T14045] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 517.151220][T14045] ? __pfx_vfs_write+0x10/0x10 [ 517.151236][T14045] ? __fget_files+0x215/0x3d0 [ 517.151261][T14045] ? __fget_files+0x21f/0x3d0 [ 517.151288][T14045] ksys_write+0x12a/0x250 [ 517.151305][T14045] ? __pfx_ksys_write+0x10/0x10 [ 517.151329][T14045] do_syscall_64+0x106/0xf80 [ 517.151346][T14045] ? clear_bhb_loop+0x40/0x90 [ 517.151367][T14045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.151385][T14045] RIP: 0033:0x7f699fd5d04e [ 517.151401][T14045] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 517.151417][T14045] RSP: 002b:00007f69a0cd8fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 517.151434][T14045] RAX: ffffffffffffffda RBX: 00007f69a0cd96c0 RCX: 00007f699fd5d04e [ 517.151446][T14045] RDX: 0000000000000001 RSI: 00007f69a0cd90a0 RDI: 0000000000000003 [ 517.151456][T14045] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 517.151466][T14045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.151476][T14045] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 517.151501][T14045] [ 517.535312][ T30] kauditd_printk_skb: 7709 callbacks suppressed [ 517.535334][ T30] audit: type=1400 audit(1775427514.802:478954): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.601796][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.650945][ T5471] audit: audit_lost=75173 audit_rate_limit=0 audit_backlog_limit=64 [ 517.651100][T14054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.659114][ T30] audit: type=1400 audit(1775427514.802:478955): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 517.697018][ T5471] audit: backlog limit exceeded [ 517.705686][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.727431][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 517.734343][ T5471] audit: audit_lost=75174 audit_rate_limit=0 audit_backlog_limit=64 [ 517.742687][ T5471] audit: backlog limit exceeded [ 517.807770][T14057] netlink: 'syz.2.2798': attribute type 4 has an invalid length. [ 517.815847][T14057] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2798'. [ 517.838091][T14059] FAULT_INJECTION: forcing a failure. [ 517.838091][T14059] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 517.937777][T14059] CPU: 0 UID: 0 PID: 14059 Comm: syz.0.2796 Tainted: G L syzkaller #0 PREEMPT(full) [ 517.937807][T14059] Tainted: [L]=SOFTLOCKUP [ 517.937813][T14059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 517.937824][T14059] Call Trace: [ 517.937830][T14059] [ 517.937837][T14059] dump_stack_lvl+0x100/0x190 [ 517.937873][T14059] should_fail_ex.cold+0x5/0xa [ 517.937898][T14059] _copy_from_user+0x2e/0xd0 [ 517.937921][T14059] kstrtouint_from_user+0xd6/0x1d0 [ 517.937946][T14059] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 517.937970][T14059] ? __lock_acquire+0x4a5/0x2630 [ 517.937993][T14059] ? lock_acquire+0x1cf/0x380 [ 517.938015][T14059] proc_fail_nth_write+0x83/0x220 [ 517.938042][T14059] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 517.938075][T14059] vfs_write+0x2aa/0x1070 [ 517.938094][T14059] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 517.938122][T14059] ? __pfx_vfs_write+0x10/0x10 [ 517.938138][T14059] ? __fget_files+0x215/0x3d0 [ 517.938163][T14059] ? __fget_files+0x21f/0x3d0 [ 517.938190][T14059] ksys_write+0x12a/0x250 [ 517.938207][T14059] ? __pfx_ksys_write+0x10/0x10 [ 517.938231][T14059] do_syscall_64+0x106/0xf80 [ 517.938248][T14059] ? clear_bhb_loop+0x40/0x90 [ 517.938276][T14059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.938295][T14059] RIP: 0033:0x7effe355d04e [ 517.938311][T14059] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 517.938328][T14059] RSP: 002b:00007effe4408fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 517.938344][T14059] RAX: ffffffffffffffda RBX: 00007effe44096c0 RCX: 00007effe355d04e [ 517.938355][T14059] RDX: 0000000000000001 RSI: 00007effe44090a0 RDI: 0000000000000004 [ 517.938363][T14059] RBP: 00007effe4409090 R08: 0000000000000000 R09: 0000000000000000 [ 517.938371][T14059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.938379][T14059] R13: 00007effe3816128 R14: 00007effe3816090 R15: 00007ffd1042fb88 [ 517.938401][T14059] [ 519.108042][T14070] mmap: syz.2.2801 (14070) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 520.646940][T14089] mkiss: ax0: crc mode is auto. [ 522.543968][ T30] kauditd_printk_skb: 4627 callbacks suppressed [ 522.543984][ T30] audit: type=1400 audit(1775427520.192:483579): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 522.601633][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.628217][ T5471] audit: audit_lost=75177 audit_rate_limit=0 audit_backlog_limit=64 [ 522.641048][ T5801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.661565][ T5471] audit: backlog limit exceeded [ 522.663558][ T30] audit: type=1400 audit(1775427520.192:483580): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 522.695699][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.696698][ T5801] audit: audit_lost=75178 audit_rate_limit=0 audit_backlog_limit=64 [ 522.712785][T14135] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.719468][T14135] audit: audit_lost=75179 audit_rate_limit=0 audit_backlog_limit=64 [ 523.593220][T14153] FAULT_INJECTION: forcing a failure. [ 523.593220][T14153] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.615650][T14153] CPU: 0 UID: 0 PID: 14153 Comm: syz.4.2834 Tainted: G L syzkaller #0 PREEMPT(full) [ 523.615679][T14153] Tainted: [L]=SOFTLOCKUP [ 523.615685][T14153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 523.615696][T14153] Call Trace: [ 523.615703][T14153] [ 523.615712][T14153] dump_stack_lvl+0x100/0x190 [ 523.615748][T14153] should_fail_ex.cold+0x5/0xa [ 523.615773][T14153] _copy_from_user+0x2e/0xd0 [ 523.615795][T14153] kstrtouint_from_user+0xd6/0x1d0 [ 523.615821][T14153] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 523.615845][T14153] ? __lock_acquire+0x4a5/0x2630 [ 523.615867][T14153] ? lock_acquire+0x1cf/0x380 [ 523.615890][T14153] proc_fail_nth_write+0x83/0x220 [ 523.615919][T14153] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 523.615951][T14153] vfs_write+0x2aa/0x1070 [ 523.615971][T14153] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 523.616007][T14153] ? __pfx_vfs_write+0x10/0x10 [ 523.616023][T14153] ? __fget_files+0x215/0x3d0 [ 523.616049][T14153] ? __fget_files+0x21f/0x3d0 [ 523.616076][T14153] ksys_write+0x12a/0x250 [ 523.616092][T14153] ? __pfx_ksys_write+0x10/0x10 [ 523.616118][T14153] do_syscall_64+0x106/0xf80 [ 523.616135][T14153] ? clear_bhb_loop+0x40/0x90 [ 523.616158][T14153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.616176][T14153] RIP: 0033:0x7f302bd5d04e [ 523.616192][T14153] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 523.616209][T14153] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 523.616227][T14153] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 523.616238][T14153] RDX: 0000000000000001 RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 523.616249][T14153] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 523.616259][T14153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.616269][T14153] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 523.616294][T14153] [ 524.127299][T14157] FAULT_INJECTION: forcing a failure. [ 524.127299][T14157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.170811][T14157] CPU: 0 UID: 0 PID: 14157 Comm: syz.4.2837 Tainted: G L syzkaller #0 PREEMPT(full) [ 524.170841][T14157] Tainted: [L]=SOFTLOCKUP [ 524.170847][T14157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 524.170857][T14157] Call Trace: [ 524.170863][T14157] [ 524.170870][T14157] dump_stack_lvl+0x100/0x190 [ 524.170903][T14157] should_fail_ex.cold+0x5/0xa [ 524.170925][T14157] _copy_from_user+0x2e/0xd0 [ 524.170945][T14157] kstrtouint_from_user+0xd6/0x1d0 [ 524.170967][T14157] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 524.170988][T14157] ? __lock_acquire+0x4a5/0x2630 [ 524.171009][T14157] ? lock_acquire+0x1cf/0x380 [ 524.171032][T14157] proc_fail_nth_write+0x83/0x220 [ 524.171064][T14157] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 524.171093][T14157] vfs_write+0x2aa/0x1070 [ 524.171112][T14157] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 524.171138][T14157] ? __pfx_vfs_write+0x10/0x10 [ 524.171154][T14157] ? __fget_files+0x215/0x3d0 [ 524.171180][T14157] ? __fget_files+0x21f/0x3d0 [ 524.171206][T14157] ksys_write+0x12a/0x250 [ 524.171223][T14157] ? __pfx_ksys_write+0x10/0x10 [ 524.171247][T14157] do_syscall_64+0x106/0xf80 [ 524.171263][T14157] ? clear_bhb_loop+0x40/0x90 [ 524.171286][T14157] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.171303][T14157] RIP: 0033:0x7f302bd5d04e [ 524.171319][T14157] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 524.171336][T14157] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 524.171353][T14157] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 524.171365][T14157] RDX: 0000000000000001 RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 524.171377][T14157] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 524.171387][T14157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.171398][T14157] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 524.171422][T14157] [ 524.526831][T14167] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2838'. [ 525.585828][T14182] FAULT_INJECTION: forcing a failure. [ 525.585828][T14182] name failslab, interval 1, probability 0, space 0, times 0 [ 525.621053][T14182] CPU: 1 UID: 0 PID: 14182 Comm: syz.2.2843 Tainted: G L syzkaller #0 PREEMPT(full) [ 525.621083][T14182] Tainted: [L]=SOFTLOCKUP [ 525.621090][T14182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 525.621101][T14182] Call Trace: [ 525.621107][T14182] [ 525.621115][T14182] dump_stack_lvl+0x100/0x190 [ 525.621150][T14182] should_fail_ex.cold+0x5/0xa [ 525.621175][T14182] ? tomoyo_encode2+0xfb/0x3c0 [ 525.621199][T14182] should_failslab+0xc2/0x120 [ 525.621218][T14182] __kmalloc_noprof+0xe0/0x850 [ 525.621250][T14182] ? d_absolute_path+0x136/0x1b0 [ 525.621282][T14182] tomoyo_encode2+0xfb/0x3c0 [ 525.621306][T14182] tomoyo_encode+0x29/0x50 [ 525.621325][T14182] tomoyo_realpath_from_path+0x18c/0x690 [ 525.621350][T14182] tomoyo_path_number_perm+0x23c/0x580 [ 525.621368][T14182] ? tomoyo_path_number_perm+0x22e/0x580 [ 525.621387][T14182] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 525.621424][T14182] ? find_held_lock+0x2b/0x80 [ 525.621442][T14182] ? __fget_files+0x215/0x3d0 [ 525.621457][T14182] ? hook_file_ioctl_common+0x146/0x410 [ 525.621476][T14182] ? __fget_files+0x21f/0x3d0 [ 525.621494][T14182] security_file_ioctl+0xd3/0x230 [ 525.621515][T14182] __x64_sys_ioctl+0xb7/0x210 [ 525.621537][T14182] do_syscall_64+0x106/0xf80 [ 525.621550][T14182] ? clear_bhb_loop+0x40/0x90 [ 525.621567][T14182] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.621582][T14182] RIP: 0033:0x7ff780f9c819 [ 525.621594][T14182] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 525.621609][T14182] RSP: 002b:00007ff781d7f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 525.621623][T14182] RAX: ffffffffffffffda RBX: 00007ff781215fa0 RCX: 00007ff780f9c819 [ 525.621632][T14182] RDX: 00002000000004c0 RSI: 0000000040505330 RDI: 0000000000000003 [ 525.621641][T14182] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 525.621648][T14182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.621657][T14182] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 525.621676][T14182] [ 525.621693][T14182] ERROR: Out of memory at tomoyo_realpath_from_path. [ 526.378528][T14198] FAULT_INJECTION: forcing a failure. [ 526.378528][T14198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 526.406289][T14198] CPU: 1 UID: 0 PID: 14198 Comm: syz.4.2851 Tainted: G L syzkaller #0 PREEMPT(full) [ 526.406318][T14198] Tainted: [L]=SOFTLOCKUP [ 526.406324][T14198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 526.406335][T14198] Call Trace: [ 526.406342][T14198] [ 526.406350][T14198] dump_stack_lvl+0x100/0x190 [ 526.406384][T14198] should_fail_ex.cold+0x5/0xa [ 526.406410][T14198] _copy_from_iter+0x1f4/0x1690 [ 526.406436][T14198] ? alloc_pages_mpol+0x25a/0x550 [ 526.406455][T14198] ? __pfx__copy_from_iter+0x10/0x10 [ 526.406474][T14198] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 526.406503][T14198] copy_page_from_iter+0xde/0x180 [ 526.406527][T14198] tun_build_skb.constprop.0+0x2ea/0x15d0 [ 526.406555][T14198] ? __pfx_tun_build_skb.constprop.0+0x10/0x10 [ 526.406574][T14198] ? unwind_get_return_address+0x59/0xa0 [ 526.406603][T14198] ? find_held_lock+0x2b/0x80 [ 526.406641][T14198] tun_get_user+0x16d0/0x3e10 [ 526.406670][T14198] ? __pfx_tun_get_user+0x10/0x10 [ 526.406691][T14198] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 526.406721][T14198] ? find_held_lock+0x2b/0x80 [ 526.406743][T14198] ? tun_get+0x191/0x370 [ 526.406758][T14198] ? tun_get+0x191/0x370 [ 526.406781][T14198] tun_chr_write_iter+0xdc/0x200 [ 526.406800][T14198] vfs_write+0x6ac/0x1070 [ 526.406817][T14198] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 526.406837][T14198] ? __pfx_vfs_write+0x10/0x10 [ 526.406850][T14198] ? find_held_lock+0x2b/0x80 [ 526.406883][T14198] ksys_write+0x12a/0x250 [ 526.406899][T14198] ? __pfx_ksys_write+0x10/0x10 [ 526.406920][T14198] do_syscall_64+0x106/0xf80 [ 526.406938][T14198] ? clear_bhb_loop+0x40/0x90 [ 526.406960][T14198] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 526.406979][T14198] RIP: 0033:0x7f302bd5d04e [ 526.406994][T14198] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 526.407010][T14198] RSP: 002b:00007f302cbf5fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 526.407028][T14198] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 526.407040][T14198] RDX: 000000000000004c RSI: 0000200000000240 RDI: 00000000000000c8 [ 526.407050][T14198] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 526.407060][T14198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 526.407070][T14198] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 526.407089][T14198] [ 526.904601][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.920716][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.942408][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.951402][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.962412][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.971431][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.980404][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 526.992816][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 527.022603][T14200] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2852'. [ 527.378679][T14221] FAULT_INJECTION: forcing a failure. [ 527.378679][T14221] name failslab, interval 1, probability 0, space 0, times 0 [ 527.417806][T14221] CPU: 1 UID: 0 PID: 14221 Comm: syz.2.2860 Tainted: G L syzkaller #0 PREEMPT(full) [ 527.417835][T14221] Tainted: [L]=SOFTLOCKUP [ 527.417841][T14221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 527.417852][T14221] Call Trace: [ 527.417859][T14221] [ 527.417866][T14221] dump_stack_lvl+0x100/0x190 [ 527.417901][T14221] should_fail_ex.cold+0x5/0xa [ 527.417925][T14221] should_failslab+0xc2/0x120 [ 527.417951][T14221] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 527.417977][T14221] ? __mpol_dup+0x74/0x390 [ 527.418004][T14221] __mpol_dup+0x74/0x390 [ 527.418025][T14221] ? __pfx___mpol_dup+0x10/0x10 [ 527.418048][T14221] ? anon_vma_name+0x5a/0x250 [ 527.418071][T14221] vma_dup_policy+0x42/0xb0 [ 527.418093][T14221] __split_vma+0x35e/0xd90 [ 527.418121][T14221] ? __pfx___split_vma+0x10/0x10 [ 527.418151][T14221] ? is_bpf_text_address+0x8a/0x1a0 [ 527.418186][T14221] vma_modify+0x197d/0x2250 [ 527.418217][T14221] ? __pfx_vma_modify+0x10/0x10 [ 527.418248][T14221] vma_modify_flags+0x257/0x3d0 [ 527.418275][T14221] ? __pfx_vma_modify_flags+0x10/0x10 [ 527.418301][T14221] ? __pfx__kstrtoull+0x10/0x10 [ 527.418345][T14221] mlock_fixup+0x302/0xf00 [ 527.418375][T14221] ? __pfx_mlock_fixup+0x10/0x10 [ 527.418407][T14221] apply_vma_lock_flags+0x256/0x370 [ 527.418435][T14221] ? __pfx_apply_vma_lock_flags+0x10/0x10 [ 527.418461][T14221] ? __pfx___might_resched+0x10/0x10 [ 527.418493][T14221] ? __pfx_down_write_killable+0x10/0x10 [ 527.418522][T14221] do_mlock+0x261/0x7f0 [ 527.418550][T14221] ? __pfx_do_mlock+0x10/0x10 [ 527.418580][T14221] ? xfd_validate_state+0x129/0x190 [ 527.418606][T14221] __x64_sys_mlock2+0xbd/0x100 [ 527.418633][T14221] do_syscall_64+0x106/0xf80 [ 527.418649][T14221] ? clear_bhb_loop+0x40/0x90 [ 527.418672][T14221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.418690][T14221] RIP: 0033:0x7ff780f9c819 [ 527.418707][T14221] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 527.418724][T14221] RSP: 002b:00007ff781d7f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000145 [ 527.418742][T14221] RAX: ffffffffffffffda RBX: 00007ff781215fa0 RCX: 00007ff780f9c819 [ 527.418754][T14221] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 000020000073e000 [ 527.418765][T14221] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 527.418775][T14221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.418786][T14221] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 527.418810][T14221] [ 527.675269][ T30] kauditd_printk_skb: 7777 callbacks suppressed [ 527.675285][ T30] audit: type=1400 audit(1775427525.322:490857): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 528.019082][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 528.032615][T14228] audit: audit_backlog=65 > audit_backlog_limit=64 [ 528.038124][ T30] audit: type=1400 audit(1775427525.332:490858): avc: denied { read write } for pid=5801 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 528.039149][T14228] audit: audit_lost=75347 audit_rate_limit=0 audit_backlog_limit=64 [ 528.039166][T14228] audit: backlog limit exceeded [ 528.076745][ T30] audit: type=1400 audit(1775427525.352:490859): avc: denied { read write } for pid=14201 comm="syz.4.2854" name="video4" dev="devtmpfs" ino=938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 528.091761][T14230] libceph: resolve '0..' (ret=-3): failed [ 528.100892][ T30] audit: type=1400 audit(1775427525.352:490860): avc: denied { create } for pid=14201 comm="syz.4.2854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 528.188777][ T5471] audit: audit_lost=75348 audit_rate_limit=0 audit_backlog_limit=64 [ 528.196351][T14230] audit: audit_backlog=65 > audit_backlog_limit=64 [ 528.402567][T14231] netlink: 'syz.1.2863': attribute type 13 has an invalid length. [ 528.410580][T14231] netlink: 'syz.1.2863': attribute type 17 has an invalid length. [ 528.574803][T14231] 8021q: adding VLAN 0 to HW filter on device .` [ 528.587002][T14231] 8021q: adding VLAN 0 to HW filter on device team0 [ 528.621886][T14231] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 528.713933][T14237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 528.782175][T14238] mac80211_hwsim hwsim7 wlan0: entered promiscuous mode [ 528.889600][T14238] bond0: (slave wlan0): Opening slave failed [ 529.105480][T14250] FAULT_INJECTION: forcing a failure. [ 529.105480][T14250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 529.161203][T14250] CPU: 1 UID: 0 PID: 14250 Comm: syz.0.2870 Tainted: G L syzkaller #0 PREEMPT(full) [ 529.161223][T14250] Tainted: [L]=SOFTLOCKUP [ 529.161227][T14250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 529.161234][T14250] Call Trace: [ 529.161238][T14250] [ 529.161243][T14250] dump_stack_lvl+0x100/0x190 [ 529.161266][T14250] should_fail_ex.cold+0x5/0xa [ 529.161281][T14250] _copy_from_user+0x2e/0xd0 [ 529.161294][T14250] kstrtouint_from_user+0xd6/0x1d0 [ 529.161310][T14250] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 529.161324][T14250] ? __lock_acquire+0x4a5/0x2630 [ 529.161337][T14250] ? lock_acquire+0x1cf/0x380 [ 529.161350][T14250] proc_fail_nth_write+0x83/0x220 [ 529.161367][T14250] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 529.161386][T14250] vfs_write+0x2aa/0x1070 [ 529.161397][T14250] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 529.161414][T14250] ? __pfx_vfs_write+0x10/0x10 [ 529.161424][T14250] ? __fget_files+0x215/0x3d0 [ 529.161439][T14250] ? __fget_files+0x21f/0x3d0 [ 529.161454][T14250] ksys_write+0x12a/0x250 [ 529.161464][T14250] ? __pfx_ksys_write+0x10/0x10 [ 529.161478][T14250] do_syscall_64+0x106/0xf80 [ 529.161489][T14250] ? clear_bhb_loop+0x40/0x90 [ 529.161502][T14250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 529.161513][T14250] RIP: 0033:0x7effe355d04e [ 529.161522][T14250] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 529.161533][T14250] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 529.161544][T14250] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 529.161551][T14250] RDX: 0000000000000001 RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 529.161558][T14250] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 529.161564][T14250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.161570][T14250] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 529.161584][T14250] [ 530.625148][T14280] __nla_validate_parse: 89 callbacks suppressed [ 530.625166][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 530.640675][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 530.649605][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 530.677178][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 530.753335][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 530.986305][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 531.017291][T14289] FAULT_INJECTION: forcing a failure. [ 531.017291][T14289] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 531.038895][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 531.064243][T14289] CPU: 1 UID: 0 PID: 14289 Comm: syz.2.2882 Tainted: G L syzkaller #0 PREEMPT(full) [ 531.064270][T14289] Tainted: [L]=SOFTLOCKUP [ 531.064276][T14289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 531.064286][T14289] Call Trace: [ 531.064292][T14289] [ 531.064298][T14289] dump_stack_lvl+0x100/0x190 [ 531.064334][T14289] should_fail_ex.cold+0x5/0xa [ 531.064356][T14289] _copy_from_user+0x2e/0xd0 [ 531.064375][T14289] kstrtouint_from_user+0xd6/0x1d0 [ 531.064401][T14289] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 531.064424][T14289] ? __lock_acquire+0x4a5/0x2630 [ 531.064452][T14289] ? lock_acquire+0x1cf/0x380 [ 531.064474][T14289] proc_fail_nth_write+0x83/0x220 [ 531.064501][T14289] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 531.064533][T14289] vfs_write+0x2aa/0x1070 [ 531.064552][T14289] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 531.064580][T14289] ? __pfx_vfs_write+0x10/0x10 [ 531.064596][T14289] ? __fget_files+0x215/0x3d0 [ 531.064622][T14289] ? __fget_files+0x21f/0x3d0 [ 531.064647][T14289] ksys_write+0x12a/0x250 [ 531.064663][T14289] ? __pfx_ksys_write+0x10/0x10 [ 531.064686][T14289] do_syscall_64+0x106/0xf80 [ 531.064703][T14289] ? clear_bhb_loop+0x40/0x90 [ 531.064726][T14289] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.064744][T14289] RIP: 0033:0x7ff780f5d04e [ 531.064788][T14289] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 531.064805][T14289] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 531.064821][T14289] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 531.064831][T14289] RDX: 0000000000000001 RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 531.064840][T14289] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 531.064850][T14289] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.064860][T14289] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 531.064884][T14289] [ 531.067119][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 531.291009][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 531.310528][T14280] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2880'. [ 531.437835][T14297] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 531.604660][T14305] FAULT_INJECTION: forcing a failure. [ 531.604660][T14305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 531.670736][T14305] CPU: 1 UID: 0 PID: 14305 Comm: syz.2.2888 Tainted: G L syzkaller #0 PREEMPT(full) [ 531.670766][T14305] Tainted: [L]=SOFTLOCKUP [ 531.670772][T14305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 531.670784][T14305] Call Trace: [ 531.670791][T14305] [ 531.670798][T14305] dump_stack_lvl+0x100/0x190 [ 531.670837][T14305] should_fail_ex.cold+0x5/0xa [ 531.670862][T14305] _copy_from_user+0x2e/0xd0 [ 531.670884][T14305] kstrtouint_from_user+0xd6/0x1d0 [ 531.670909][T14305] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 531.670932][T14305] ? __lock_acquire+0x4a5/0x2630 [ 531.670954][T14305] ? lock_acquire+0x1cf/0x380 [ 531.670978][T14305] proc_fail_nth_write+0x83/0x220 [ 531.671007][T14305] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 531.671040][T14305] vfs_write+0x2aa/0x1070 [ 531.671060][T14305] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 531.671088][T14305] ? __pfx_vfs_write+0x10/0x10 [ 531.671105][T14305] ? __fget_files+0x215/0x3d0 [ 531.671130][T14305] ? __fget_files+0x21f/0x3d0 [ 531.671163][T14305] ksys_write+0x12a/0x250 [ 531.671182][T14305] ? __pfx_ksys_write+0x10/0x10 [ 531.671206][T14305] do_syscall_64+0x106/0xf80 [ 531.671224][T14305] ? clear_bhb_loop+0x40/0x90 [ 531.671247][T14305] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 531.671265][T14305] RIP: 0033:0x7ff780f5d04e [ 531.671281][T14305] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 531.671298][T14305] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 531.671315][T14305] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 531.671327][T14305] RDX: 0000000000000001 RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 531.671337][T14305] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 531.671348][T14305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.671359][T14305] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 531.671383][T14305] [ 532.134769][T14315] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 532.262914][T14315] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 532.468773][T14327] FAULT_INJECTION: forcing a failure. [ 532.468773][T14327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.505930][T14327] CPU: 1 UID: 0 PID: 14327 Comm: syz.3.2894 Tainted: G L syzkaller #0 PREEMPT(full) [ 532.505956][T14327] Tainted: [L]=SOFTLOCKUP [ 532.505962][T14327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 532.505971][T14327] Call Trace: [ 532.505978][T14327] [ 532.505985][T14327] dump_stack_lvl+0x100/0x190 [ 532.506016][T14327] should_fail_ex.cold+0x5/0xa [ 532.506041][T14327] _copy_from_user+0x2e/0xd0 [ 532.506061][T14327] kstrtouint_from_user+0xd6/0x1d0 [ 532.506086][T14327] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 532.506106][T14327] ? __lock_acquire+0x4a5/0x2630 [ 532.506134][T14327] ? lock_acquire+0x1cf/0x380 [ 532.506157][T14327] proc_fail_nth_write+0x83/0x220 [ 532.506183][T14327] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 532.506212][T14327] vfs_write+0x2aa/0x1070 [ 532.506235][T14327] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 532.506262][T14327] ? __pfx_vfs_write+0x10/0x10 [ 532.506279][T14327] ? __fget_files+0x215/0x3d0 [ 532.506304][T14327] ? __fget_files+0x21f/0x3d0 [ 532.506330][T14327] ksys_write+0x12a/0x250 [ 532.506346][T14327] ? __pfx_ksys_write+0x10/0x10 [ 532.506370][T14327] do_syscall_64+0x106/0xf80 [ 532.506388][T14327] ? clear_bhb_loop+0x40/0x90 [ 532.506408][T14327] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 532.506425][T14327] RIP: 0033:0x7f48f995d04e [ 532.506441][T14327] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 532.506457][T14327] RSP: 002b:00007f48fa7befe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 532.506475][T14327] RAX: ffffffffffffffda RBX: 00007f48fa7bf6c0 RCX: 00007f48f995d04e [ 532.506486][T14327] RDX: 0000000000000001 RSI: 00007f48fa7bf0a0 RDI: 0000000000000003 [ 532.506496][T14327] RBP: 00007f48fa7bf090 R08: 0000000000000000 R09: 0000000000000000 [ 532.506506][T14327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 532.506515][T14327] R13: 00007f48f9c16038 R14: 00007f48f9c15fa0 R15: 00007ffd18426d58 [ 532.506537][T14327] [ 532.734814][ T30] kauditd_printk_skb: 7047 callbacks suppressed [ 532.734832][ T30] audit: type=1400 audit(1775427530.382:495580): avc: denied { read } for pid=14328 comm="syz.2.2897" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 532.736321][ T30] audit: type=1400 audit(1775427530.382:495581): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 533.011432][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 533.016500][T14332] audit: audit_backlog=65 > audit_backlog_limit=64 [ 533.029909][ T5471] audit: audit_lost=76125 audit_rate_limit=0 audit_backlog_limit=64 [ 533.031605][T14333] audit: audit_backlog=65 > audit_backlog_limit=64 [ 533.051022][T14332] audit: audit_lost=76126 audit_rate_limit=0 audit_backlog_limit=64 [ 533.059242][T14333] audit: audit_lost=76127 audit_rate_limit=0 audit_backlog_limit=64 [ 533.062390][ T5471] audit: backlog limit exceeded [ 533.071404][T14333] audit: backlog limit exceeded [ 533.118194][T14332] sp0: Synchronizing with TNC [ 534.392647][ T146] netdevsim netdevsim3 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.404766][ T146] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.475724][ T146] netdevsim netdevsim3 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.486945][ T146] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.578953][ T146] netdevsim netdevsim3 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.597834][ T146] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.688765][ T146] netdevsim netdevsim3 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 534.713935][ T146] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 534.890016][ T146] bridge_slave_1: left allmulticast mode [ 534.898178][ T146] bridge_slave_1: left promiscuous mode [ 534.906916][ T146] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.918586][ T146] bridge_slave_0: left promiscuous mode [ 534.925460][ T146] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.263986][ T146] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 535.282245][ T146] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 535.302798][ T146] .` (unregistering): Released all slaves [ 535.321413][ T146] bond0 (unregistering): Released all slaves [ 535.636637][ T146] hsr_slave_0: left promiscuous mode [ 535.645092][ T146] hsr_slave_1: left promiscuous mode [ 535.652577][ T146] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 535.664146][ T146] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 535.675999][ T146] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 535.685066][ T146] batman_adv: batadv0: Removing interface: vlan3 [ 535.701195][ T146] veth1_macvtap: left promiscuous mode [ 535.707318][ T146] veth0_macvtap: left promiscuous mode [ 535.713602][ T146] veth1_vlan: left promiscuous mode [ 535.719298][ T146] veth0_vlan: left promiscuous mode [ 535.979712][ T146] team0 (unregistering): Port device team_slave_1 removed [ 535.996212][ T146] team0 (unregistering): Port device team_slave_0 removed [ 537.470699][ T5806] Bluetooth: hci3: Opcode 0x1003 failed: -110 [ 537.740854][ T30] kauditd_printk_skb: 19176 callbacks suppressed [ 537.740873][ T30] audit: type=1400 audit(1775427535.392:514751): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.768914][ T30] audit: type=1400 audit(1775427535.392:514752): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.790576][ T30] audit: type=1400 audit(1775427535.392:514753): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.811993][ T30] audit: type=1400 audit(1775427535.392:514754): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.833713][ T30] audit: type=1400 audit(1775427535.392:514755): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.855403][ T30] audit: type=1400 audit(1775427535.392:514756): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.872016][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 537.877266][ T30] audit: type=1400 audit(1775427535.392:514757): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 537.883607][ T5471] audit: audit_lost=76130 audit_rate_limit=0 audit_backlog_limit=64 [ 537.904604][ T30] audit: type=1400 audit(1775427535.392:514758): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 538.164206][T14397] __nla_validate_parse: 55 callbacks suppressed [ 538.164226][T14397] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2919'. [ 539.014998][T14400] FAULT_INJECTION: forcing a failure. [ 539.014998][T14400] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.032868][T14402] FAULT_INJECTION: forcing a failure. [ 539.032868][T14402] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.049674][T14400] CPU: 0 UID: 0 PID: 14400 Comm: syz.0.2922 Tainted: G L syzkaller #0 PREEMPT(full) [ 539.049703][T14400] Tainted: [L]=SOFTLOCKUP [ 539.049710][T14400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 539.049720][T14400] Call Trace: [ 539.049726][T14400] [ 539.049732][T14400] dump_stack_lvl+0x100/0x190 [ 539.049768][T14400] should_fail_ex.cold+0x5/0xa [ 539.049791][T14400] strncpy_from_user+0x3b/0x2d0 [ 539.049814][T14400] do_getname+0x78/0x390 [ 539.049846][T14400] __x64_sys_linkat+0xd1/0x150 [ 539.049871][T14400] do_syscall_64+0x106/0xf80 [ 539.049888][T14400] ? clear_bhb_loop+0x40/0x90 [ 539.049910][T14400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 539.049927][T14400] RIP: 0033:0x7effe359c819 [ 539.049942][T14400] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 539.049958][T14400] RSP: 002b:00007effe442a028 EFLAGS: 00000246 ORIG_RAX: 0000000000000109 [ 539.049977][T14400] RAX: ffffffffffffffda RBX: 00007effe3815fa0 RCX: 00007effe359c819 [ 539.049989][T14400] RDX: 0000000000000004 RSI: 0000200000000100 RDI: 0000000000000004 [ 539.050001][T14400] RBP: 00007effe442a090 R08: 0000000000001000 R09: 0000000000000000 [ 539.050012][T14400] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 539.050022][T14400] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 539.050047][T14400] [ 539.196237][T14402] CPU: 0 UID: 0 PID: 14402 Comm: syz.2.2923 Tainted: G L syzkaller #0 PREEMPT(full) [ 539.196267][T14402] Tainted: [L]=SOFTLOCKUP [ 539.196274][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 539.196285][T14402] Call Trace: [ 539.196291][T14402] [ 539.196298][T14402] dump_stack_lvl+0x100/0x190 [ 539.196327][T14402] should_fail_ex.cold+0x5/0xa [ 539.196343][T14402] _copy_from_user+0x2e/0xd0 [ 539.196357][T14402] kstrtouint_from_user+0xd6/0x1d0 [ 539.196373][T14402] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 539.196388][T14402] ? __lock_acquire+0x4a5/0x2630 [ 539.196400][T14402] ? lock_acquire+0x1cf/0x380 [ 539.196413][T14402] proc_fail_nth_write+0x83/0x220 [ 539.196431][T14402] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 539.196450][T14402] vfs_write+0x2aa/0x1070 [ 539.196461][T14402] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 539.196479][T14402] ? __pfx_vfs_write+0x10/0x10 [ 539.196488][T14402] ? __fget_files+0x215/0x3d0 [ 539.196503][T14402] ? __fget_files+0x21f/0x3d0 [ 539.196519][T14402] ksys_write+0x12a/0x250 [ 539.196529][T14402] ? __pfx_ksys_write+0x10/0x10 [ 539.196543][T14402] do_syscall_64+0x106/0xf80 [ 539.196554][T14402] ? clear_bhb_loop+0x40/0x90 [ 539.196567][T14402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 539.196578][T14402] RIP: 0033:0x7ff780f5d04e [ 539.196588][T14402] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 539.196599][T14402] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 539.196611][T14402] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 539.196618][T14402] RDX: 0000000000000001 RSI: 00007ff781d7f0a0 RDI: 0000000000000004 [ 539.196624][T14402] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 539.196630][T14402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.196636][T14402] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 539.196649][T14402] [ 541.627813][T14419] FAULT_INJECTION: forcing a failure. [ 541.627813][T14419] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.641835][T14419] CPU: 0 UID: 0 PID: 14419 Comm: syz.0.2928 Tainted: G L syzkaller #0 PREEMPT(full) [ 541.641866][T14419] Tainted: [L]=SOFTLOCKUP [ 541.641872][T14419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 541.641883][T14419] Call Trace: [ 541.641890][T14419] [ 541.641900][T14419] dump_stack_lvl+0x100/0x190 [ 541.641937][T14419] should_fail_ex.cold+0x5/0xa [ 541.641962][T14419] _copy_from_user+0x2e/0xd0 [ 541.641983][T14419] kstrtouint_from_user+0xd6/0x1d0 [ 541.642008][T14419] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 541.642033][T14419] ? __lock_acquire+0x4a5/0x2630 [ 541.642054][T14419] ? lock_acquire+0x1cf/0x380 [ 541.642077][T14419] proc_fail_nth_write+0x83/0x220 [ 541.642110][T14419] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 541.642143][T14419] vfs_write+0x2aa/0x1070 [ 541.642161][T14419] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 541.642188][T14419] ? __pfx_vfs_write+0x10/0x10 [ 541.642204][T14419] ? __fget_files+0x215/0x3d0 [ 541.642229][T14419] ? __fget_files+0x21f/0x3d0 [ 541.642256][T14419] ksys_write+0x12a/0x250 [ 541.642273][T14419] ? __pfx_ksys_write+0x10/0x10 [ 541.642298][T14419] do_syscall_64+0x106/0xf80 [ 541.642315][T14419] ? clear_bhb_loop+0x40/0x90 [ 541.642337][T14419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 541.642355][T14419] RIP: 0033:0x7effe355d04e [ 541.642369][T14419] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 541.642385][T14419] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 541.642401][T14419] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 541.642412][T14419] RDX: 0000000000000001 RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 541.642421][T14419] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 541.642431][T14419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.642441][T14419] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 541.642464][T14419] [ 542.762913][T14426] FAULT_INJECTION: forcing a failure. [ 542.762913][T14426] name failslab, interval 1, probability 0, space 0, times 0 [ 542.766513][ T30] kauditd_printk_skb: 23461 callbacks suppressed [ 542.766528][ T30] audit: type=1400 audit(1775427540.412:537382): avc: denied { mounton } for pid=14425 comm="syz.1.2933" path="/585/file1" dev="tmpfs" ino=3141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 542.783294][T14426] CPU: 1 UID: 0 PID: 14426 Comm: syz.1.2933 Tainted: G L syzkaller #0 PREEMPT(full) [ 542.783319][T14426] Tainted: [L]=SOFTLOCKUP [ 542.783324][T14426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 542.783333][T14426] Call Trace: [ 542.783338][T14426] [ 542.783345][T14426] dump_stack_lvl+0x100/0x190 [ 542.783376][T14426] should_fail_ex.cold+0x5/0xa [ 542.783397][T14426] ? tomoyo_encode2+0xfb/0x3c0 [ 542.783420][T14426] should_failslab+0xc2/0x120 [ 542.783438][T14426] __kmalloc_noprof+0xe0/0x850 [ 542.783461][T14426] ? d_absolute_path+0x136/0x1b0 [ 542.783488][T14426] tomoyo_encode2+0xfb/0x3c0 [ 542.783514][T14426] tomoyo_encode+0x29/0x50 [ 542.783535][T14426] tomoyo_realpath_from_path+0x18c/0x690 [ 542.783563][T14426] tomoyo_path_number_perm+0x23c/0x580 [ 542.783583][T14426] ? tomoyo_path_number_perm+0x22e/0x580 [ 542.783605][T14426] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 542.783646][T14426] ? find_held_lock+0x2b/0x80 [ 542.783666][T14426] ? __fget_files+0x215/0x3d0 [ 542.783682][T14426] ? hook_file_ioctl_common+0x146/0x410 [ 542.783704][T14426] ? __fget_files+0x21f/0x3d0 [ 542.783724][T14426] security_file_ioctl+0xd3/0x230 [ 542.783747][T14426] __x64_sys_ioctl+0xb7/0x210 [ 542.783771][T14426] do_syscall_64+0x106/0xf80 [ 542.783786][T14426] ? clear_bhb_loop+0x40/0x90 [ 542.783806][T14426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.783821][T14426] RIP: 0033:0x7f699fd9c819 [ 542.783841][T14426] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 542.783856][T14426] RSP: 002b:00007f69a0cd9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 542.783872][T14426] RAX: ffffffffffffffda RBX: 00007f69a0015fa0 RCX: 00007f699fd9c819 [ 542.783883][T14426] RDX: 0000000000000000 RSI: 0000000040049366 RDI: 0000000000000003 [ 542.783892][T14426] RBP: 00007f69a0cd9090 R08: 0000000000000000 R09: 0000000000000000 [ 542.783901][T14426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.783910][T14426] R13: 00007f69a0016038 R14: 00007f69a0015fa0 R15: 00007ffc93682bf8 [ 542.783932][T14426] [ 542.783948][T14426] ERROR: Out of memory at tomoyo_realpath_from_path. [ 542.818904][ T30] audit: type=1400 audit(1775427540.412:537383): avc: denied { mounton } for pid=14425 comm="syz.1.2933" path="/585/file1/file0" dev="tmpfs" ino=3142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 542.822210][T14432] FAULT_INJECTION: forcing a failure. [ 542.822210][T14432] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 542.831600][ T30] audit: type=1400 audit(1775427540.432:537384): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.834257][T14432] CPU: 1 UID: 0 PID: 14432 Comm: syz.4.2935 Tainted: G L syzkaller #0 PREEMPT(full) [ 542.834281][T14432] Tainted: [L]=SOFTLOCKUP [ 542.834286][T14432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 542.834295][T14432] Call Trace: [ 542.834301][T14432] [ 542.834306][T14432] dump_stack_lvl+0x100/0x190 [ 542.834336][T14432] should_fail_ex.cold+0x5/0xa [ 542.834357][T14432] _copy_from_user+0x2e/0xd0 [ 542.834377][T14432] kstrtouint_from_user+0xd6/0x1d0 [ 542.834398][T14432] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 542.834418][T14432] ? __lock_acquire+0x4a5/0x2630 [ 542.834437][T14432] ? lock_acquire+0x1cf/0x380 [ 542.834457][T14432] proc_fail_nth_write+0x83/0x220 [ 542.834480][T14432] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 542.834507][T14432] vfs_write+0x2aa/0x1070 [ 542.834523][T14432] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 542.834547][T14432] ? __pfx_vfs_write+0x10/0x10 [ 542.834561][T14432] ? __fget_files+0x215/0x3d0 [ 542.834583][T14432] ? __fget_files+0x21f/0x3d0 [ 542.834606][T14432] ksys_write+0x12a/0x250 [ 542.834621][T14432] ? __pfx_ksys_write+0x10/0x10 [ 542.834642][T14432] do_syscall_64+0x106/0xf80 [ 542.834657][T14432] ? clear_bhb_loop+0x40/0x90 [ 542.834676][T14432] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.834692][T14432] RIP: 0033:0x7f302bd5d04e [ 542.834706][T14432] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 542.834721][T14432] RSP: 002b:00007f302cbf5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 542.834737][T14432] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 542.834747][T14432] RDX: 0000000000000001 RSI: 00007f302cbf60a0 RDI: 0000000000000003 [ 542.834756][T14432] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 542.834765][T14432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.834774][T14432] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 542.834795][T14432] [ 542.911246][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 542.915555][ T30] audit: type=1400 audit(1775427540.432:537385): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.918841][ T5471] audit: audit_lost=76410 audit_rate_limit=0 audit_backlog_limit=64 [ 542.923657][ T30] audit: type=1400 audit(1775427540.432:537386): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.928471][ T5471] audit: backlog limit exceeded [ 542.933298][ T30] audit: type=1400 audit(1775427540.432:537387): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 542.941350][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 542.945419][T14433] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2932'. [ 543.382412][T14433] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2932'. [ 544.191318][T14439] ALSA: mixer_oss: invalid OSS volume 'lags:' [ 544.197437][T14439] ALSA: mixer_oss: invalid OSS volume 'mnt_id:' [ 544.220705][T14439] ALSA: mixer_oss: invalid OSS volume 'ino:' [ 544.228454][T14439] ALSA: mixer_oss: invalid OSS volume '' [ 546.270707][ T5815] Bluetooth: hci3: Opcode 0x1003 failed: -110 [ 547.376321][T14466] FAULT_INJECTION: forcing a failure. [ 547.376321][T14466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.394580][T14466] CPU: 0 UID: 0 PID: 14466 Comm: syz.0.2943 Tainted: G L syzkaller #0 PREEMPT(full) [ 547.394610][T14466] Tainted: [L]=SOFTLOCKUP [ 547.394616][T14466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 547.394627][T14466] Call Trace: [ 547.394633][T14466] [ 547.394640][T14466] dump_stack_lvl+0x100/0x190 [ 547.394673][T14466] should_fail_ex.cold+0x5/0xa [ 547.394695][T14466] _copy_from_user+0x2e/0xd0 [ 547.394715][T14466] kstrtouint_from_user+0xd6/0x1d0 [ 547.394738][T14466] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 547.394758][T14466] ? __lock_acquire+0x4a5/0x2630 [ 547.394778][T14466] ? lock_acquire+0x1cf/0x380 [ 547.394798][T14466] proc_fail_nth_write+0x83/0x220 [ 547.394822][T14466] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 547.394851][T14466] vfs_write+0x2aa/0x1070 [ 547.394868][T14466] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 547.394893][T14466] ? __pfx_vfs_write+0x10/0x10 [ 547.394908][T14466] ? __fget_files+0x215/0x3d0 [ 547.394932][T14466] ? __fget_files+0x21f/0x3d0 [ 547.394958][T14466] ksys_write+0x12a/0x250 [ 547.394974][T14466] ? __pfx_ksys_write+0x10/0x10 [ 547.395003][T14466] do_syscall_64+0x106/0xf80 [ 547.395019][T14466] ? clear_bhb_loop+0x40/0x90 [ 547.395042][T14466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.395060][T14466] RIP: 0033:0x7effe355d04e [ 547.395076][T14466] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 547.395094][T14466] RSP: 002b:00007effe4429fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 547.395112][T14466] RAX: ffffffffffffffda RBX: 00007effe442a6c0 RCX: 00007effe355d04e [ 547.395124][T14466] RDX: 0000000000000001 RSI: 00007effe442a0a0 RDI: 0000000000000003 [ 547.395135][T14466] RBP: 00007effe442a090 R08: 0000000000000000 R09: 0000000000000000 [ 547.395145][T14466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.395154][T14466] R13: 00007effe3816038 R14: 00007effe3815fa0 R15: 00007ffd1042fb88 [ 547.395177][T14466] [ 547.398689][T14465] FAULT_INJECTION: forcing a failure. [ 547.398689][T14465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 547.614303][T14465] CPU: 1 UID: 0 PID: 14465 Comm: syz.4.2946 Tainted: G L syzkaller #0 PREEMPT(full) [ 547.614334][T14465] Tainted: [L]=SOFTLOCKUP [ 547.614341][T14465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 547.614352][T14465] Call Trace: [ 547.614359][T14465] [ 547.614366][T14465] dump_stack_lvl+0x100/0x190 [ 547.614401][T14465] should_fail_ex.cold+0x5/0xa [ 547.614426][T14465] _copy_from_iter+0x1f4/0x1690 [ 547.614452][T14465] ? alloc_pages_mpol+0x25a/0x550 [ 547.614472][T14465] ? __pfx__copy_from_iter+0x10/0x10 [ 547.614493][T14465] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 547.614522][T14465] copy_page_from_iter+0xde/0x180 [ 547.614545][T14465] tun_build_skb.constprop.0+0x2ea/0x15d0 [ 547.614573][T14465] ? __pfx_tun_build_skb.constprop.0+0x10/0x10 [ 547.614592][T14465] ? unwind_get_return_address+0x59/0xa0 [ 547.614622][T14465] ? find_held_lock+0x2b/0x80 [ 547.614661][T14465] tun_get_user+0x16d0/0x3e10 [ 547.614690][T14465] ? __pfx_tun_get_user+0x10/0x10 [ 547.614711][T14465] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 547.614748][T14465] ? find_held_lock+0x2b/0x80 [ 547.614771][T14465] ? tun_get+0x191/0x370 [ 547.614786][T14465] ? tun_get+0x191/0x370 [ 547.614810][T14465] tun_chr_write_iter+0xdc/0x200 [ 547.614830][T14465] vfs_write+0x6ac/0x1070 [ 547.614849][T14465] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 547.614870][T14465] ? __pfx_vfs_write+0x10/0x10 [ 547.614886][T14465] ? find_held_lock+0x2b/0x80 [ 547.614924][T14465] ksys_write+0x12a/0x250 [ 547.614942][T14465] ? __pfx_ksys_write+0x10/0x10 [ 547.614966][T14465] do_syscall_64+0x106/0xf80 [ 547.614981][T14465] ? clear_bhb_loop+0x40/0x90 [ 547.615003][T14465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.615022][T14465] RIP: 0033:0x7f302bd5d04e [ 547.615037][T14465] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 547.615054][T14465] RSP: 002b:00007f302cbf5fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 547.615073][T14465] RAX: ffffffffffffffda RBX: 00007f302cbf66c0 RCX: 00007f302bd5d04e [ 547.615085][T14465] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 00000000000000c8 [ 547.615096][T14465] RBP: 00007f302cbf6090 R08: 0000000000000000 R09: 0000000000000000 [ 547.615107][T14465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.615117][T14465] R13: 00007f302c016038 R14: 00007f302c015fa0 R15: 00007ffcb452b818 [ 547.615140][T14465] [ 547.862334][ T30] kauditd_printk_skb: 21627 callbacks suppressed [ 547.862351][ T30] audit: type=1400 audit(1775427545.512:559007): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.889994][ T30] audit: type=1400 audit(1775427545.512:559008): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.911389][ T30] audit: type=1400 audit(1775427545.512:559009): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.934541][ T30] audit: type=1400 audit(1775427545.512:559010): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.955939][ T30] audit: type=1400 audit(1775427545.512:559011): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 547.977430][ T30] audit: type=1400 audit(1775427545.512:559012): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 548.063822][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 548.065175][ T30] audit: type=1400 audit(1775427545.512:559013): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 548.070571][ T5471] audit: audit_lost=76414 audit_rate_limit=0 audit_backlog_limit=64 [ 548.099550][ T5471] audit: backlog limit exceeded [ 552.873362][ T30] kauditd_printk_skb: 26759 callbacks suppressed [ 552.873380][ T30] audit: type=1400 audit(1775427550.472:585572): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 552.913962][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 552.914962][T14503] audit: audit_backlog=65 > audit_backlog_limit=64 [ 552.929049][T14503] audit: audit_lost=76482 audit_rate_limit=0 audit_backlog_limit=64 [ 552.937263][ T5471] audit: audit_lost=76483 audit_rate_limit=0 audit_backlog_limit=64 [ 552.941883][ T30] audit: type=1400 audit(1775427550.472:585573): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 552.970643][T14509] audit: audit_backlog=65 > audit_backlog_limit=64 [ 552.972343][T14510] audit: audit_backlog=65 > audit_backlog_limit=64 [ 552.977181][T14509] audit: audit_lost=76484 audit_rate_limit=0 audit_backlog_limit=64 [ 552.977200][T14509] audit: backlog limit exceeded [ 553.083367][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.133552][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.495038][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.504143][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.513222][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.522283][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.531346][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.540284][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.549405][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 553.558489][T14514] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2960'. [ 555.014866][T14524] xt_addrtype: both incoming and outgoing interface limitation cannot be selected [ 555.024848][T14525] FAULT_INJECTION: forcing a failure. [ 555.024848][T14525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.049734][T14525] CPU: 1 UID: 0 PID: 14525 Comm: syz.2.2963 Tainted: G L syzkaller #0 PREEMPT(full) [ 555.049764][T14525] Tainted: [L]=SOFTLOCKUP [ 555.049771][T14525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 555.049782][T14525] Call Trace: [ 555.049788][T14525] [ 555.049796][T14525] dump_stack_lvl+0x100/0x190 [ 555.049832][T14525] should_fail_ex.cold+0x5/0xa [ 555.049857][T14525] _copy_from_user+0x2e/0xd0 [ 555.049883][T14525] kstrtouint_from_user+0xd6/0x1d0 [ 555.049908][T14525] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 555.049933][T14525] ? __lock_acquire+0x4a5/0x2630 [ 555.049963][T14525] ? lock_acquire+0x1cf/0x380 [ 555.049986][T14525] proc_fail_nth_write+0x83/0x220 [ 555.050014][T14525] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 555.050051][T14525] vfs_write+0x2aa/0x1070 [ 555.050070][T14525] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 555.050099][T14525] ? __pfx_vfs_write+0x10/0x10 [ 555.050115][T14525] ? __fget_files+0x215/0x3d0 [ 555.050142][T14525] ? __fget_files+0x21f/0x3d0 [ 555.050168][T14525] ksys_write+0x12a/0x250 [ 555.050194][T14525] ? __pfx_ksys_write+0x10/0x10 [ 555.050223][T14525] do_syscall_64+0x106/0xf80 [ 555.050240][T14525] ? clear_bhb_loop+0x40/0x90 [ 555.050263][T14525] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 555.050284][T14525] RIP: 0033:0x7ff780f5d04e [ 555.050300][T14525] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 555.050317][T14525] RSP: 002b:00007ff781d7efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 555.050335][T14525] RAX: ffffffffffffffda RBX: 00007ff781d7f6c0 RCX: 00007ff780f5d04e [ 555.050347][T14525] RDX: 0000000000000001 RSI: 00007ff781d7f0a0 RDI: 0000000000000003 [ 555.050358][T14525] RBP: 00007ff781d7f090 R08: 0000000000000000 R09: 0000000000000000 [ 555.050368][T14525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 555.050383][T14525] R13: 00007ff781216038 R14: 00007ff781215fa0 R15: 00007ffdc1a3d1a8 [ 555.050408][T14525] [ 556.186878][ T146] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 556.393554][ T146] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 556.457482][ T146] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 556.539519][ T146] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 556.986223][ T146] bond0 (unregistering): (slave bridge1): Releasing backup interface [ 556.996070][ T146] bridge1 (unregistering): left allmulticast mode [ 557.045686][ T146] .` (unregistering): Released all slaves [ 557.062854][ T146] bond0 (unregistering): Released all slaves [ 557.289098][ T146] hsr_slave_0: left promiscuous mode [ 557.295859][ T146] hsr_slave_1: left promiscuous mode [ 557.308521][ T146] veth1_macvtap: left promiscuous mode [ 557.317414][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 557.321220][ T146] veth0_macvtap: left promiscuous mode [ 557.324981][ T1295] ieee802154 phy1 wpan1: encryption failed: -22 [ 557.880693][ T30] kauditd_printk_skb: 25709 callbacks suppressed [ 557.880710][ T30] audit: type=1400 audit(1775427555.522:606275): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.891747][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 557.914829][ T5471] audit: audit_lost=78154 audit_rate_limit=0 audit_backlog_limit=64 [ 557.923219][ T30] audit: type=1400 audit(1775427555.532:606276): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.924390][ T5471] audit: backlog limit exceeded [ 557.944664][ T30] audit: type=1400 audit(1775427555.532:606277): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.949750][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 557.971443][ T30] audit: type=1400 audit(1775427555.532:606278): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 557.977713][ T5471] audit: audit_lost=78155 audit_rate_limit=0 audit_backlog_limit=64 [ 557.998522][ T30] audit: type=1400 audit(1775427555.532:606279): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 558.053214][ T146] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.130517][ T146] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.217915][ T146] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.282570][ T146] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.824665][ T146] .` (unregistering): Released all slaves [ 559.053661][ T146] hsr_slave_0: left promiscuous mode [ 559.065481][ T146] veth1_macvtap: left promiscuous mode [ 559.071562][ T146] veth0_macvtap: left promiscuous mode [ 559.077843][ T146] veth1_vlan: left promiscuous mode [ 559.086600][ T146] veth0_vlan: left promiscuous mode [ 562.890744][ T30] kauditd_printk_skb: 32083 callbacks suppressed [ 562.890761][ T30] audit: type=1400 audit(1775427560.542:636769): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.900808][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 562.919057][ T30] audit: type=1400 audit(1775427560.542:636770): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.925012][ T5471] audit: audit_lost=78687 audit_rate_limit=0 audit_backlog_limit=64 [ 562.946205][ T30] audit: type=1400 audit(1775427560.542:636771): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.954137][ T5471] audit: backlog limit exceeded [ 562.980412][ T30] audit: type=1400 audit(1775427560.542:636772): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 562.981444][ T5471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 563.008224][ T30] audit: type=1400 audit(1775427560.542:636773): avc: denied { read } for pid=5471 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 563.008396][ T5471] audit: audit_lost=78688 audit_rate_limit=0 audit_backlog_limit=64