last executing test programs: 5.651261017s ago: executing program 3 (id=1373): r0 = socket$kcm(0x10, 0x2, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="06000000040000000800000007"], 0x50) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x4, 0x4, 0xf, 0x7, 0x1000, 0xffffffffffffffff, 0xfffffffc, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000400)={0x0, 'macvlan0\x00', {0x5}}) 4.05275499s ago: executing program 3 (id=1378): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_io_uring_setup(0x4b6, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x0, 0x20e}, &(0x7f0000ff0000), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000340)=[{&(0x7f0000000300)=""/14, 0xe}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r4, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) io_uring_register$IORING_UNREGISTER_BUFFERS(r4, 0x1, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000a40)={{0x2, 0x0, 0x4, 0x5, 'syz0\x00'}, 0x0, [0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffc, 0xffffffffffffff4e, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0, 0x9, 0x0, 0x4000000000000, 0x0, 0xfffffffffffffff7, 0x0, 0x200000000000000, 0xe, 0x0, 0x0, 0x0, 0x2, 0xc5a, 0x2, 0x1, 0x0, 0x85, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff0, 0x1, 0x6, 0x0, 0x0, 0x20000000000, 0x5e, 0x1, 0x100000000000000, 0x0, 0x4, 0x1000000000, 0x3, 0x200000000000, 0x3, 0x200, 0xfffffffffffffffe, 0x0, 0x4000000000000001, 0x3, 0xfffffffffffffffc, 0x4, 0x0, 0x7, 0x0, 0xcb, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x10001, 0xebf, 0x6, 0x0, 0x751, 0x0, 0x0, 0x6b, 0x7, 0xfffffffffffffffd, 0x101, 0xb, 0x0, 0x0, 0x0, 0x0, 0x10008001, 0x3, 0x8, 0x0, 0x0, 0x0, 0xf32, 0x11, 0x2, 0x0, 0x0, 0x8, 0x3, 0x0, 0x4, 0x0, 0x0, 0x3, 0x40008, 0x0, 0x0, 0x2, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffc, 0x0, 0x0, 0x2c80000000000000, 0x0, 0x20000000, 0x1, 0x1553, 0x6]}) 3.831779835s ago: executing program 4 (id=1382): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x1c0000000000000, 0x4, &(0x7f0000006680)) (async) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001480), 0x121142, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) (async) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x80cd}], 0x1, 0x7) (async) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000040)=ANY=[], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x12, r2, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x4, 0x874fd42a7836ef6d, 0x4}) (async) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 3.773130356s ago: executing program 1 (id=1383): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="00082cbd7000fcdbdf25200000000c009900070000005b000000"], 0x20}, 0x1, 0x0, 0x0, 0x40055}, 0x48004) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x1) ioctl$EVIOCGSND(r3, 0x8040451a, 0xfffffffffffffffd) (fail_nth: 1) futex(&(0x7f0000000140)=0x1, 0x8b, 0x1, &(0x7f0000000180), 0x0, 0x2) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x13, 0x0, 0x24) r5 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x67, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000080), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(0x0, 0x18b) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) connect$inet6(r5, &(0x7f0000002140)={0xa, 0x4e25, 0x1, @mcast2, 0x7}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 3.714662311s ago: executing program 4 (id=1384): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) r0 = syz_io_uring_setup(0xa4d, &(0x7f0000000480)={0x0, 0x0, 0x80, 0x1, 0x24f}, &(0x7f00000000c0)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r3 = socket(0x2a, 0x2, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x42, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, {0x2}}) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r4, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES64=r3, @ANYBLOB="00082cbd7000fcdbdf25200000000000cb4b756e04adc815abf63023dd2ccc9b59c60174d2d064bc8c68db506bb44c3dea1041b2aa4318d28ddbc8307e815ad8"], 0x20}, 0x1, 0x0, 0x0, 0x40055}, 0x20004014) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000019680)=""/102392, 0x18ff8) r6 = syz_open_dev$evdev(&(0x7f0000000000), 0x2, 0x1) ioctl$EVIOCGSND(r6, 0x8040451a, 0xfffffffffffffffd) futex(&(0x7f0000000080), 0x0, 0x1, &(0x7f0000000180), 0x0, 0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_DEFER_SETUP(r7, 0x112, 0x13, 0x0, 0x24) r8 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r8, 0x11, 0x67, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r8, 0x6, 0x16, &(0x7f0000000080), 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mkdir(0x0, 0x18b) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) 3.29917548s ago: executing program 1 (id=1385): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0x86, &(0x7f0000000bc0)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6012000800503a00fe8000000000000000000000000000bbfe8000000000000000000000000000aa0302907800000000600208"], 0x0) bind$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) r1 = syz_usb_connect(0x0, 0x24, &(0x7f0000000480)=ANY=[@ANYBLOB="120150029c06c808796d804f15d701020301090212"], &(0x7f0000000440)={0x0, 0x0, 0x5, &(0x7f0000000400)=ANY=[]}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='svcrdma_encode_wseg\x00', r5, 0x0, 0x1}, 0x4d) r6 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) socket$inet6_udp(0xa, 0x2, 0x0) socket(0x10, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect(0x5, 0x24, &(0x7f0000000340)=ANY=[@ANYRESDEC=r1], 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a32000000002c0003800800014000000000180003801400010076657468315f00005f626f6e64000000080002400000000064000000160a0101000b000000000000010000000900020073797a3200"], 0x104}}, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x1) ioctl$KVM_SET_SREGS2(r9, 0x4140aecd, &(0x7f0000000300)={{0x3001, 0xeeef0000, 0xd, 0x7, 0x2, 0x7, 0xc, 0x82, 0x0, 0xd, 0x1f, 0x5}, {0xeeee0000, 0x4000, 0xa, 0xa, 0x7, 0xf5, 0xf7, 0x2, 0x5, 0x6, 0x4, 0x9}, {0xd000, 0xffff1000, 0xa, 0x8, 0x5, 0x2d, 0xc5, 0x7f, 0x7, 0x6, 0x9, 0x80}, {0xeeee8000, 0x3000, 0xa, 0x4, 0x6, 0x2, 0x0, 0x0, 0x5, 0x3, 0x6, 0x6}, {0x8000000, 0x6000, 0x0, 0xbb, 0x7f, 0xad, 0x2, 0xfc, 0x50, 0x24, 0x1, 0xc}, {0x2000, 0x8000000, 0xa, 0x9, 0x7f, 0xf8, 0x5, 0x8, 0x2, 0x25, 0x6, 0x9}, {0x8000000, 0x4, 0x8, 0x0, 0xa, 0x4, 0x2, 0xfc, 0xc6, 0x20, 0x0, 0x81}, {0xeeee0000, 0x4000, 0xb, 0x51, 0x7f, 0x21, 0x2, 0x0, 0x5, 0x8, 0x5, 0x7}, {0xeeee0000, 0x7c}, {0xd000, 0x43}, 0x80000000, 0x0, 0x8080000, 0x500429, 0x9, 0x3900, 0x5000, 0x0, [0x40, 0xd4df, 0x8, 0x6bbb]}) 3.20270258s ago: executing program 4 (id=1386): wait4(0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x2) read$msr(r0, &(0x7f0000019680)=""/102384, 0x18ff0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000002300)=@raw={'raw\x00', 0xc01, 0x3, 0x2298, 0x1100, 0x5002004a, 0x0, 0x0, 0x0, 0x2200, 0x3c8, 0x3c8, 0x2200, 0x3c8, 0x3, 0x0, {[{{@uncond, 0x60, 0x10a0, 0x1100, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x1, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x2, 0x1, 0x7], 0x6, 0x2}, {0x2, [0x0, 0x6, 0x4, 0x9, 0x0, 0x89ce99baffcf6900], 0x1, 0x1}}}}, {{@uncond, 0x0, 0x10a0, 0x1100, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030}, {0x0, 0x0, 0x1, 0x1, './cgroup.net/syz1\x00', 0x2, {0x5}}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@loopback, [0xffffff00, 0xff000000, 0xff, 0xff0000ff], 0x4e22, 0x4c20, 0x4e24, 0x4e23, 0xc9, 0x0, 0x3b, 0x83, 0x25}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x22f8) (fail_nth: 4) 2.653130092s ago: executing program 4 (id=1388): socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) select(0x0, 0x0, &(0x7f0000000080)={0x3}, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x14f980, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0xb, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(r1, 0x0, 0x0, 0xfffffe04, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r3 = fcntl$dupfd(r2, 0x0, r2) write$sndseq(r3, &(0x7f0000000180)=[{0x0, 0x47, 0x0, 0x0, @tick, {0x40, 0xff}, {0x0, 0x9}, @queue={0xee, {0x7, 0xc9a}}}, {0x0, 0x0, 0x0, 0x0, @time={0x367f, 0xfffffffd}, {}, {0x80}, @connect={{0x40, 0x7}, {0x80, 0xf6}}}], 0x38) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f0000000140)) r4 = syz_clone(0x40200400, &(0x7f00000001c0)="b0be33cd32a7a17b877032210b045a867b202f90ee415f3ec017db4f1c207576a8d0dd40391873e46604e32a38936e688aa64773646fe9512b4c485c53bc2887d1b536623f47d36698b8d258a15eebfcf8d17af45cb28f29", 0x58, &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)="467969c1d855e15475b33d097b9ac3bd868f77a94b59e9d4c4f5d5d1973c9d51bcb078a562f2dda5eb1f5ada82ee8c") sched_getattr(r4, &(0x7f0000000480)={0x38}, 0x38, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc1105518, &(0x7f0000000a40)={{0x9, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, [0x18000, 0xfffffffffffffffc, 0x5, 0x2, 0x8000000000000001, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x67, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400020000000, 0x9, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x1c, 0x5, 0x3, 0x2, 0x4000000000002, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x5, 0x7ff, 0x0, 0x4000000, 0xa, 0x0, 0x0, 0x0, 0xac18, 0x0, 0x0, 0x4000000000000, 0x0, 0x2, 0x0, 0x2, 0x0, 0x7fffffffffffffff, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x5, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x1]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x141, 0x0, 0x4}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$SNDCTL_SEQ_NRMIDIS(0xffffffffffffffff, 0xc0045103, 0x0) 2.652906465s ago: executing program 3 (id=1389): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r1) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)={0x3c, r2, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_ID={0x5, 0x2e, 0x7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000040}, 0x20000000) (fail_nth: 4) 2.622218814s ago: executing program 3 (id=1390): socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x23) mount(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000080)='./file1\x00') setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x300, 0x0, 0xb3550aa4ba878396}, 0xfe9f) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$UHID_INPUT(r1, &(0x7f0000002100)={0x8, {"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", 0x1000}}, 0x1006) (fail_nth: 2) 2.021010276s ago: executing program 0 (id=1391): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x1170, 0x1398, 0x238, 0x1170, 0x238, 0x1398, 0x1398, 0x238, 0x1398, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x128, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x1, 0x0, 0xd, 0x5}}, @common=@unspec=@devgroup={{0x38}, {0x1d, 0x0, 0x0, 0x0, 0x3ff}}]}, @unspec=@TRACE={0x20}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [0x0, 0x0, 0xff000000], 'sit0\x00', 'veth1_vlan\x00', {}, {}, 0x84}, 0x0, 0xa8, 0x110}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0xad84, 0x4, 0x2, 'snmp_trap\x00', 'syz0\x00', {0x1}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r2, @ANYBLOB="01000000000000000000170000000c00060001000000010000000c01308014000400976f1044852bca665354bd217b6b9037200001800c0005000400070200000200080001000300000005000200030000000500020008000000240003"], 0x12c}, 0x1, 0x0, 0x0, 0x24004821}, 0x0) 2.009303913s ago: executing program 2 (id=1392): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x1410, 0x1, 0x70bd2c, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x24040076}, 0x2000c054) (fail_nth: 4) 1.885175271s ago: executing program 0 (id=1393): openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, 0x0, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r0, 0x0, 0xd}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@delqdisc={0x24, 0x26, 0x1, 0x60bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0xf, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r4, 0x4b4b, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0xf, 0xfffffe0000000001, 0xfa15, 0x1ff}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/address_bits', 0x0, 0x0) lseek(r6, 0x1, 0x0) 1.651412815s ago: executing program 2 (id=1394): syz_open_dev$sndctrl(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000001c0)=0x1, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'macvtap0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x2c0488c4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket(0x28, 0x5, 0x0) getsockopt(r2, 0x28, 0x271a, 0x0, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) r4 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r4, 0x0, 0xc8, &(0x7f0000003d40), 0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r5, 0xff00, 0x23, &(0x7f0000000000)={@multicast1=0xe0000300, @local}, 0x8) syz_emit_ethernet(0x2a, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0) syz_emit_ethernet(0x36, 0x0, 0x0) 1.651049627s ago: executing program 3 (id=1395): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="880000000314000428bd7000fcdbdf25090002007379cb4cd119e4eee37a0064766d7270fd000000000000000000000900020073797a31000000000800410073697700140033006e6574706369300000000000000000000900020073797a300b00000008004100727865001400330074756e6c3000000000dab74b9a8d5e337a5cacd16e5d6e53f44b5a2fceb6363f35b6a2313f003a25c59102ea072206b5c7ea707cd59db0f1c86901f3ef79f0028ed6399460a767f22c028c4df16bdcc10d3e9f4558fa84de49b200"/217], 0x88}}, 0x1) sendmmsg$inet(r2, &(0x7f0000003cc0)=[{{&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="140000000000000000000000070000009404"], 0x18}}], 0x1, 0x44008004) write$binfmt_misc(r2, &(0x7f0000000300), 0xfdef) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000240)="0f01390ff2f63e0fa10f01c966b80a00000066ba000000000f300f79d80f232d0f01c966b9024d564b0f32350280660f38dfec", 0x33}], 0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8b30, &(0x7f0000000240)={'wlan0\x00'}) ioctl$KVM_CAP_X86_USER_SPACE_MSR(r1, 0x4068aea3, &(0x7f00000002c0)={0xbc, 0x0, 0x7}) r6 = syz_open_dev$vcsu(&(0x7f00000000c0), 0xb, 0x200) lseek(r6, 0x7, 0x2) sendmsg$NFNL_MSG_CTHELPER_NEW(r6, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x1c, 0x0, 0x9, 0x101, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8}]}, 0x1c}}, 0x0) syz_usb_connect(0x1, 0x36, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0, @ANYRES32], &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) r7 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) read(r7, 0x0, 0x0) 1.561842296s ago: executing program 0 (id=1396): r0 = socket$rxrpc(0x21, 0x2, 0xa) quotactl_fd$Q_SYNC(r0, 0xffffffff80000102, 0x0, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f00000001c0)=0x4, 0x4) 1.365217923s ago: executing program 2 (id=1397): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x5) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000200)=0xdb) r1 = io_uring_setup(0x561e, &(0x7f0000000040)={0x0, 0x5f2e, 0x40, 0x2, 0x164}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/23, 0x17}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/71, 0x47}, {&(0x7f0000000240)=""/40, 0x28}, {&(0x7f0000000280)=""/109, 0x6d}, {&(0x7f0000000300)=""/60, 0x3c}], 0x6) 1.335367139s ago: executing program 0 (id=1398): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x18, 0x1410, 0x1, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x24040076}, 0x2000c054) (fail_nth: 4) 1.259615159s ago: executing program 1 (id=1399): r0 = syz_open_dev$dri(&(0x7f0000000440), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000100)=[0x0], 0x1}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={0x0, 0x1}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='#'], 0x24}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x11}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000180)={0x201, 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000040), 0x0, 0x401}) 1.169042602s ago: executing program 0 (id=1400): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000080)="1400000052004f030e789e7ee2ce2fa4ff612d27", 0x14) (fail_nth: 4) 1.16578917s ago: executing program 1 (id=1401): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CAP_X2APIC_API(r1, 0x4068aea3, &(0x7f0000002a80)={0x81, 0x0, 0x3}) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = dup(r2) socket$inet_sctp(0x2, 0x5, 0x84) r4 = userfaultfd(0x1) sched_setaffinity(0x0, 0x0, 0x0) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_WRITEPROTECT(r4, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000800000/0x800000)=nil, 0x802000}, 0x2}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$UFFDIO_CONTINUE(r5, 0xc020aa08, &(0x7f00000000c0)={{&(0x7f0000800000/0x800000)=nil, 0x800000}}) mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000ffd000/0x3000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f000001b700)=""/102392, 0x18ff8) splice(r3, 0x0, r2, 0x0, 0x20000000000002, 0x8) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/pm_test', 0x141a82, 0x0) sendfile(r8, r8, &(0x7f0000000000)=0x7, 0x4) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="4800000010000305000000000000000000cf0000", @ANYRES32=0x0, @ANYBLOB="03000000000000002000128008000100677265001400028008000600ac14142408000700e000000108000a00"], 0x48}}, 0x40001) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000000000000000000009500a00000000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='contention_end\x00', r9}, 0x10) 1.127811049s ago: executing program 2 (id=1402): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() mknod(0x0, 0x10, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000080)=0xdd3) close(r3) 1.104564232s ago: executing program 3 (id=1403): close(0x3) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000327bd7000fedbdf251300000008000100706369303a30303a31302e3000000000080003000000000008000b00d009000006001100070000000800010070636900110002"], 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x48050) socket(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r1, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0xc36e5000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) setsockopt$inet_int(r1, 0x0, 0x19, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) 777.278587ms ago: executing program 1 (id=1404): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000440)={0x10, 0x0, 0x25dfdbfe, 0x1000000}, 0xc) r1 = syz_usb_connect$uac1(0x5, 0x71, &(0x7f0000000180)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x8, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x675, 0x2}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0xa4, 0x2, 0x0, {0x7, 0x25, 0x1, 0x0, 0xcf, 0xfbff}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x1, 0x6, 0x3b, {0x7, 0x25, 0x1, 0x0, 0x0, 0x8}}}}}}}]}}, 0x0) syz_usb_control_io$uac1(r1, &(0x7f0000000900)={0x14, 0x0, &(0x7f00000008c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x425}}}, 0x0) syz_usb_control_io$uac1(r1, &(0x7f0000001540)={0x14, 0x0, &(0x7f00000014c0)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x181381) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, 0x0) clock_gettime(0x9, &(0x7f0000000280)) r3 = syz_open_dev$MSR(&(0x7f0000000240), 0x0, 0x0) read$msr(r3, &(0x7f0000032680)=""/102392, 0x18ff8) syz_io_uring_setup(0x86d, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rt_cache\x00') r5 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r5, 0x4) close_range(r4, r5, 0x0) r6 = fsmount(r0, 0x0, 0x0) write$P9_RLOCK(r6, &(0x7f0000000000)={0x8, 0x35, 0x2}, 0x8) r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r7, 0xc004500a, &(0x7f0000000240)=0x3) ioctl$SNDCTL_DSP_SPEED(r7, 0xc0045002, &(0x7f00000000c0)) read$dsp(r7, &(0x7f00000001c0)=""/95, 0x5f) 755.668573ms ago: executing program 0 (id=1405): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x2) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x8000002000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r3, 0x0, 0xd}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r2}, 0x10) r4 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) readv(r4, &(0x7f0000000080)=[{&(0x7f0000000100)=""/161, 0xa1}], 0x1) syz_usb_connect(0x0, 0x36, 0x0, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0xdb65f00fb9e85ffc, &(0x7f0000000000)={@empty, @dev, @local}, &(0x7f0000000100)=0xc) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) mount(&(0x7f0000000180)=@loop={'/dev/loop', 0x0}, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)='binder\x00', 0x1408009, 0x0) 705.187565ms ago: executing program 4 (id=1406): openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, 0x0, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r0, 0x0, 0xd}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@delqdisc={0x24, 0x26, 0x1, 0x60bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0xf, 0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x4081}, 0x2400c800) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r4, 0x4b4b, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0xf, 0xfffffe0000000001, 0xfa15, 0x1ff}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/address_bits', 0x0, 0x0) lseek(r6, 0x1, 0x0) 585.171762ms ago: executing program 4 (id=1407): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r3, 0x0, 0xf00, 0x0, &(0x7f0000000000), 0x10) 266.556564ms ago: executing program 2 (id=1408): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x1000008, 0x4000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f0000000240), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffc, 0x6, 0x2, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000080)="0000501effd4", 0x0, 0x800004, 0x10030, 0x1, 0x0}) 128.26706ms ago: executing program 2 (id=1409): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000004000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r5}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000240)='net/vlan/vlan0\x00') preadv(r6, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/216, 0xd8}], 0x1, 0xa3, 0xd) r7 = syz_open_dev$sg(&(0x7f00000004c0), 0x0, 0x20c02) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000040)="aefdda9d240303005a90f57f07703aeff0f64eb9ee07962c220a2e11b44e65d76641cb010852f426072a", 0x2a}], 0x1) read(r7, &(0x7f0000001400)=""/4076, 0xfffffeea) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x20040, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x74, 0x0, 0x0) r10 = openat$cgroup_int(r8, &(0x7f00000002c0)='blkio.throttle.write_iops_device\x00', 0x2, 0x0) write$cgroup_subtree(r10, &(0x7f00000000c0)=ANY=[], 0x6a) (fail_nth: 4) 0s ago: executing program 1 (id=1410): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'veth0_to_bridge\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)={0x28, 0x0, 0x5, 0x70bd2b, 0x1dffe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MESH_CONFIG={0xc, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xff}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x4c040) sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x6, 0x44}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, 0x0) socket(0x2, 0x80805, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r4, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$sock(r7, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@mark={{0x14, 0x1, 0x51, 0xfffffffb}}], 0x18}, 0x4044044) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0xe2981) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000f40)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="206b74360c030104bc0100000000000000020000000000000000800000000000"], 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x44, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac}, @NL80211_ATTR_AUTH_TYPE={0x8}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x44}}, 0x0) nanosleep(&(0x7f0000000340)={0x0, 0x2faf080}, &(0x7f0000000380)) syz_80211_inject_frame(&(0x7f00000004c0)=@device_b, &(0x7f0000000500)=ANY=[@ANYBLOB="000802110000002000010000000100010782848b960c1218"], 0x27) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0xac, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {0x0, 0xfff2}, {0xffff, 0xffff}, {0x3}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x7c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1], 0x0, [0x8, 0x6, 0x3a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x401]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x4000000}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8, 0x5, 0x1}, @TCA_TAPRIO_ATTR_TXTIME_DELAY={0x8, 0xb, 0x1}]}}]}, 0xac}}, 0x0) kernel console output (not intermixed with test programs): 0 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.671491][ T7290] RSP: 002b:00007ff4632b3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 137.671508][ T7290] RAX: ffffffffffffffda RBX: 00007ff4625e6090 RCX: 00007ff46238efc9 [ 137.671518][ T7290] RDX: 0000200000000140 RSI: 0000200000000200 RDI: 0000200000000240 [ 137.671528][ T7290] RBP: 00007ff4632b3090 R08: 0000000000000000 R09: 0000000000000000 [ 137.671537][ T7290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.671546][ T7290] R13: 00007ff4625e6128 R14: 00007ff4625e6090 R15: 00007fff91483c58 [ 137.671570][ T7290] [ 138.754777][ T5825] Bluetooth: hci3: connection err: -111 [ 139.135851][ T30] kauditd_printk_skb: 9588 callbacks suppressed [ 139.135864][ T30] audit: type=1400 audit(1761769752.680:26578): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.170720][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 139.171052][ T5808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 139.206496][ T5808] audit: audit_lost=2094 audit_rate_limit=0 audit_backlog_limit=64 [ 139.230098][ T5808] audit: backlog limit exceeded [ 139.237428][ T30] audit: type=1400 audit(1761769752.680:26579): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 139.269965][ T7325] audit: audit_backlog=65 > audit_backlog_limit=64 [ 139.277692][ T7325] audit: audit_lost=2095 audit_rate_limit=0 audit_backlog_limit=64 [ 139.286103][ T7325] audit: backlog limit exceeded [ 139.345392][ T5477] audit: audit_lost=2096 audit_rate_limit=0 audit_backlog_limit=64 [ 139.851397][ T7338] netlink: 8 bytes leftover after parsing attributes in process `syz.3.426'. [ 139.861495][ T7338] netlink: 8 bytes leftover after parsing attributes in process `syz.3.426'. [ 140.758587][ T7353] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5133 sclass=netlink_tcpdiag_socket pid=7353 comm=syz.3.431 [ 142.061975][ T7369] netlink: 'syz.0.435': attribute type 4 has an invalid length. [ 142.519226][ T7376] capability: warning: `syz.3.438' uses 32-bit capabilities (legacy support in use) [ 143.031051][ T7391] FAULT_INJECTION: forcing a failure. [ 143.031051][ T7391] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 143.060674][ T7392] netlink: 8 bytes leftover after parsing attributes in process `syz.1.442'. [ 143.150167][ T7391] CPU: 0 UID: 0 PID: 7391 Comm: syz.2.441 Not tainted syzkaller #0 PREEMPT(full) [ 143.150187][ T7391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 143.150195][ T7391] Call Trace: [ 143.150200][ T7391] [ 143.150206][ T7391] dump_stack_lvl+0x16c/0x1f0 [ 143.150232][ T7391] should_fail_ex+0x512/0x640 [ 143.150252][ T7391] _copy_from_iter+0x29f/0x1720 [ 143.150271][ T7391] ? __alloc_skb+0x200/0x380 [ 143.150288][ T7391] ? __pfx__copy_from_iter+0x10/0x10 [ 143.150307][ T7391] ? netlink_autobind.isra.0+0x158/0x370 [ 143.150334][ T7391] netlink_sendmsg+0x820/0xdd0 [ 143.150357][ T7391] ? __pfx_netlink_sendmsg+0x10/0x10 [ 143.150384][ T7391] ____sys_sendmsg+0xa98/0xc70 [ 143.150406][ T7391] ? copy_msghdr_from_user+0x10a/0x160 [ 143.150424][ T7391] ? __pfx_____sys_sendmsg+0x10/0x10 [ 143.150454][ T7391] ___sys_sendmsg+0x134/0x1d0 [ 143.150473][ T7391] ? __pfx____sys_sendmsg+0x10/0x10 [ 143.150488][ T7391] ? __lock_acquire+0x622/0x1c90 [ 143.150533][ T7391] __sys_sendmsg+0x16d/0x220 [ 143.150551][ T7391] ? __pfx___sys_sendmsg+0x10/0x10 [ 143.150582][ T7391] do_syscall_64+0xcd/0xfa0 [ 143.150603][ T7391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 143.150617][ T7391] RIP: 0033:0x7f624338efc9 [ 143.150629][ T7391] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.150641][ T7391] RSP: 002b:00007f62442bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 143.150655][ T7391] RAX: ffffffffffffffda RBX: 00007f62435e6090 RCX: 00007f624338efc9 [ 143.150665][ T7391] RDX: 0000000001000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 143.150673][ T7391] RBP: 00007f62442bb090 R08: 0000000000000000 R09: 0000000000000000 [ 143.150681][ T7391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.150689][ T7391] R13: 00007f62435e6128 R14: 00007f62435e6090 R15: 00007ffda7ccf918 [ 143.150709][ T7391] [ 143.157003][ T7392] netlink: 8 bytes leftover after parsing attributes in process `syz.1.442'. [ 143.889485][ T7418] netlink: 'syz.0.452': attribute type 4 has an invalid length. [ 144.140606][ T30] kauditd_printk_skb: 6005 callbacks suppressed [ 144.140620][ T30] audit: type=1400 audit(1761769757.860:32581): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.169096][ T30] audit: type=1400 audit(1761769757.860:32582): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.190709][ T30] audit: type=1400 audit(1761769757.860:32583): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.203965][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.218562][ T30] audit: type=1400 audit(1761769757.860:32584): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 144.239891][ T5477] audit: audit_lost=2098 audit_rate_limit=0 audit_backlog_limit=64 [ 144.241351][ T7423] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.251023][ T5477] audit: backlog limit exceeded [ 144.260175][ T7423] audit: audit_lost=2099 audit_rate_limit=0 audit_backlog_limit=64 [ 144.260492][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 144.545829][ T7429] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 144.629635][ T7430] netlink: 'syz.3.456': attribute type 1 has an invalid length. [ 144.767617][ T7436] FAULT_INJECTION: forcing a failure. [ 144.767617][ T7436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 144.777985][ T7425] bond1: (slave geneve2): making interface the new active one [ 144.792512][ T7425] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 144.807517][ T7436] CPU: 0 UID: 0 PID: 7436 Comm: syz.0.459 Not tainted syzkaller #0 PREEMPT(full) [ 144.807537][ T7436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 144.807546][ T7436] Call Trace: [ 144.807551][ T7436] [ 144.807557][ T7436] dump_stack_lvl+0x16c/0x1f0 [ 144.807585][ T7436] should_fail_ex+0x512/0x640 [ 144.807606][ T7436] _copy_to_user+0x32/0xd0 [ 144.807626][ T7436] simple_read_from_buffer+0xcb/0x170 [ 144.807651][ T7436] proc_fail_nth_read+0x197/0x240 [ 144.807671][ T7436] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 144.807691][ T7436] ? rw_verify_area+0xcf/0x6c0 [ 144.807715][ T7436] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 144.807733][ T7436] vfs_read+0x1e4/0xcf0 [ 144.807751][ T7436] ? __pfx___mutex_lock+0x10/0x10 [ 144.807765][ T7436] ? __pfx_vfs_read+0x10/0x10 [ 144.807786][ T7436] ? __fget_files+0x20e/0x3c0 [ 144.807808][ T7436] ksys_read+0x12a/0x250 [ 144.807822][ T7436] ? __pfx_ksys_read+0x10/0x10 [ 144.807837][ T7436] ? fdget+0x187/0x210 [ 144.807855][ T7436] do_syscall_64+0xcd/0xfa0 [ 144.807880][ T7436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 144.807896][ T7436] RIP: 0033:0x7fc25418d9dc [ 144.807908][ T7436] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 144.807922][ T7436] RSP: 002b:00007fc2523f6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 144.807937][ T7436] RAX: ffffffffffffffda RBX: 00007fc2543e5fa0 RCX: 00007fc25418d9dc [ 144.807947][ T7436] RDX: 000000000000000f RSI: 00007fc2523f60a0 RDI: 0000000000000003 [ 144.807956][ T7436] RBP: 00007fc2523f6090 R08: 0000000000000000 R09: 0000000000000000 [ 144.807965][ T7436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 144.807973][ T7436] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 144.807996][ T7436] [ 144.835986][ T5957] netdevsim netdevsim3 netdevsim0: set [1, 1] type 2 family 0 port 20004 - 0 [ 145.456357][ T7458] geneve2: entered promiscuous mode [ 145.503248][ T5957] netdevsim netdevsim3 netdevsim1: set [1, 1] type 2 family 0 port 20004 - 0 [ 145.586737][ T5957] netdevsim netdevsim3 netdevsim2: set [1, 1] type 2 family 0 port 20004 - 0 [ 145.721971][ T5957] netdevsim netdevsim3 netdevsim3: set [1, 1] type 2 family 0 port 20004 - 0 [ 146.730836][ T7481] netlink: 'syz.3.475': attribute type 10 has an invalid length. [ 146.773172][ T7481] team0: Port device dummy0 added [ 146.785733][ T7483] FAULT_INJECTION: forcing a failure. [ 146.785733][ T7483] name failslab, interval 1, probability 0, space 0, times 0 [ 146.814360][ T7483] CPU: 1 UID: 0 PID: 7483 Comm: syz.1.476 Not tainted syzkaller #0 PREEMPT(full) [ 146.814381][ T7483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 146.814389][ T7483] Call Trace: [ 146.814393][ T7483] [ 146.814398][ T7483] dump_stack_lvl+0x16c/0x1f0 [ 146.814417][ T7483] should_fail_ex+0x512/0x640 [ 146.814429][ T7483] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 146.814447][ T7483] should_failslab+0xc2/0x120 [ 146.814459][ T7483] kmem_cache_alloc_noprof+0x75/0x6e0 [ 146.814474][ T7483] ? security_file_alloc+0x34/0x2b0 [ 146.814489][ T7483] ? security_file_alloc+0x34/0x2b0 [ 146.814499][ T7483] security_file_alloc+0x34/0x2b0 [ 146.814512][ T7483] init_file+0x93/0x4c0 [ 146.814525][ T7483] alloc_empty_file+0x73/0x1e0 [ 146.814538][ T7483] path_openat+0xda/0x2cb0 [ 146.814553][ T7483] ? __pfx_path_openat+0x10/0x10 [ 146.814564][ T7483] ? __lock_acquire+0xb8a/0x1c90 [ 146.814581][ T7483] do_filp_open+0x20b/0x470 [ 146.814592][ T7483] ? __pfx_do_filp_open+0x10/0x10 [ 146.814610][ T7483] ? alloc_fd+0x471/0x7d0 [ 146.814623][ T7483] do_sys_openat2+0x11b/0x1d0 [ 146.814636][ T7483] ? __pfx_do_sys_openat2+0x10/0x10 [ 146.814650][ T7483] ? __fget_files+0x20e/0x3c0 [ 146.814662][ T7483] __x64_sys_openat+0x174/0x210 [ 146.814688][ T7483] ? __pfx___x64_sys_openat+0x10/0x10 [ 146.814701][ T7483] ? syscall_user_dispatch+0x78/0x140 [ 146.814717][ T7483] do_syscall_64+0xcd/0xfa0 [ 146.814733][ T7483] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 146.814743][ T7483] RIP: 0033:0x7ff46238efc9 [ 146.814753][ T7483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 146.814766][ T7483] RSP: 002b:00007ff4632d4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 146.814776][ T7483] RAX: ffffffffffffffda RBX: 00007ff4625e5fa0 RCX: 00007ff46238efc9 [ 146.814782][ T7483] RDX: 0000000000000002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 146.814788][ T7483] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 146.814794][ T7483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 146.814799][ T7483] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 146.814812][ T7483] [ 146.831058][ T7481] netlink: 'syz.3.475': attribute type 10 has an invalid length. [ 147.082546][ T7481] team0: Port device dummy0 removed [ 147.099935][ T7481] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 148.166630][ T7512] FAULT_INJECTION: forcing a failure. [ 148.166630][ T7512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 148.263786][ T7512] CPU: 1 UID: 0 PID: 7512 Comm: syz.1.487 Not tainted syzkaller #0 PREEMPT(full) [ 148.263811][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 148.263820][ T7512] Call Trace: [ 148.263825][ T7512] [ 148.263832][ T7512] dump_stack_lvl+0x16c/0x1f0 [ 148.263868][ T7512] should_fail_ex+0x512/0x640 [ 148.263891][ T7512] _copy_from_user+0x2e/0xd0 [ 148.263912][ T7512] kstrtouint_from_user+0xd6/0x1d0 [ 148.263938][ T7512] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 148.263962][ T7512] ? __lock_acquire+0xb8a/0x1c90 [ 148.263998][ T7512] proc_fail_nth_write+0x83/0x220 [ 148.264018][ T7512] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 148.264043][ T7512] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 148.264060][ T7512] vfs_write+0x2a0/0x11d0 [ 148.264079][ T7512] ? __pfx___mutex_lock+0x10/0x10 [ 148.264093][ T7512] ? __pfx_vfs_write+0x10/0x10 [ 148.264114][ T7512] ? __fget_files+0x20e/0x3c0 [ 148.264136][ T7512] ksys_write+0x12a/0x250 [ 148.264151][ T7512] ? __pfx_ksys_write+0x10/0x10 [ 148.264172][ T7512] do_syscall_64+0xcd/0xfa0 [ 148.264198][ T7512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 148.264220][ T7512] RIP: 0033:0x7ff46238da7f [ 148.264233][ T7512] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 148.264247][ T7512] RSP: 002b:00007ff4632d4030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 148.264262][ T7512] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff46238da7f [ 148.264272][ T7512] RDX: 0000000000000001 RSI: 00007ff4632d40a0 RDI: 0000000000000004 [ 148.264281][ T7512] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 148.264290][ T7512] R10: 0000000000000020 R11: 0000000000000293 R12: 0000000000000001 [ 148.264299][ T7512] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 148.264322][ T7512] [ 149.156525][ T30] kauditd_printk_skb: 8381 callbacks suppressed [ 149.156540][ T30] audit: type=1400 audit(1761769762.870:40783): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.240292][ T30] audit: type=1400 audit(1761769762.870:40784): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.262147][ T30] audit: type=1400 audit(1761769762.870:40785): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.284010][ T30] audit: type=1400 audit(1761769762.870:40786): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.307847][ T30] audit: type=1400 audit(1761769762.870:40787): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.308592][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 149.329410][ T30] audit: type=1400 audit(1761769762.870:40788): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.356995][ T30] audit: type=1400 audit(1761769762.870:40789): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 149.441831][ T30] audit: type=1400 audit(1761769762.900:40790): avc: denied { create } for pid=7533 comm="syz.3.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 149.511116][ T5814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.716822][ T7579] netlink: 8 bytes leftover after parsing attributes in process `syz.1.506'. [ 150.775516][ T7579] netlink: 8 bytes leftover after parsing attributes in process `syz.1.506'. [ 151.349696][ T7591] netlink: 14 bytes leftover after parsing attributes in process `syz.3.508'. [ 151.419250][ T5921] libceph: connect (1)[c::]:6789 error -101 [ 151.426007][ T5921] libceph: mon0 (1)[c::]:6789 connect error [ 151.700402][ T5921] libceph: connect (1)[c::]:6789 error -101 [ 151.706415][ T5921] libceph: mon0 (1)[c::]:6789 connect error [ 152.020163][ T7601] netlink: 24 bytes leftover after parsing attributes in process `syz.0.509'. [ 152.070946][ T7603] netlink: 24 bytes leftover after parsing attributes in process `syz.0.509'. [ 152.221610][ T7593] ceph: No mds server is up or the cluster is laggy [ 152.230503][ T5921] libceph: connect (1)[c::]:6789 error -101 [ 152.236622][ T5921] libceph: mon0 (1)[c::]:6789 connect error [ 152.422406][ T7591] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 152.485061][ T7611] netlink: 16 bytes leftover after parsing attributes in process `syz.2.514'. [ 152.501134][ T7591] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 152.538014][ T7591] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 152.546500][ T7615] netlink: 16 bytes leftover after parsing attributes in process `syz.2.514'. [ 152.588467][ T7591] bond0 (unregistering): Released all slaves [ 154.162084][ T30] kauditd_printk_skb: 4588 callbacks suppressed [ 154.162099][ T30] audit: type=1400 audit(1761769767.890:45291): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 154.194689][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.286777][ T5477] audit: audit_lost=2191 audit_rate_limit=0 audit_backlog_limit=64 [ 154.297214][ T7659] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.303811][ T5477] audit: backlog limit exceeded [ 154.308848][ T7659] audit: audit_lost=2192 audit_rate_limit=0 audit_backlog_limit=64 [ 154.319067][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 154.325673][ T5477] audit: audit_lost=2193 audit_rate_limit=0 audit_backlog_limit=64 [ 154.333886][ T7659] audit: backlog limit exceeded [ 154.338794][ T5477] audit: backlog limit exceeded [ 154.489657][ T7661] vlan2: entered allmulticast mode [ 154.513061][ T7661] vlan1: entered allmulticast mode [ 154.521617][ T7661] veth0_vlan: entered allmulticast mode [ 154.534042][ T7667] FAULT_INJECTION: forcing a failure. [ 154.534042][ T7667] name failslab, interval 1, probability 0, space 0, times 0 [ 154.586420][ T7667] CPU: 1 UID: 0 PID: 7667 Comm: syz.3.531 Not tainted syzkaller #0 PREEMPT(full) [ 154.586442][ T7667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 154.586451][ T7667] Call Trace: [ 154.586456][ T7667] [ 154.586462][ T7667] dump_stack_lvl+0x16c/0x1f0 [ 154.586491][ T7667] should_fail_ex+0x512/0x640 [ 154.586510][ T7667] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 154.586535][ T7667] should_failslab+0xc2/0x120 [ 154.586554][ T7667] kmem_cache_alloc_noprof+0x75/0x6e0 [ 154.586577][ T7667] ? security_file_alloc+0x34/0x2b0 [ 154.586601][ T7667] ? security_file_alloc+0x34/0x2b0 [ 154.586618][ T7667] security_file_alloc+0x34/0x2b0 [ 154.586637][ T7667] init_file+0x93/0x4c0 [ 154.586658][ T7667] alloc_empty_file+0x73/0x1e0 [ 154.586680][ T7667] alloc_file_pseudo+0x13a/0x230 [ 154.586703][ T7667] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 154.586732][ T7667] sock_alloc_file+0x50/0x210 [ 154.586756][ T7667] do_accept+0x240/0x530 [ 154.586773][ T7667] ? do_raw_spin_lock+0x12c/0x2b0 [ 154.586793][ T7667] ? __pfx_do_accept+0x10/0x10 [ 154.586823][ T7667] __sys_accept4+0x100/0x1c0 [ 154.586840][ T7667] ? __pfx___sys_accept4+0x10/0x10 [ 154.586858][ T7667] ? __pfx_ksys_write+0x10/0x10 [ 154.586877][ T7667] __x64_sys_accept4+0x96/0x100 [ 154.586895][ T7667] ? lockdep_hardirqs_on+0x7c/0x110 [ 154.586920][ T7667] do_syscall_64+0xcd/0xfa0 [ 154.586946][ T7667] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 154.586963][ T7667] RIP: 0033:0x7f51f578efc9 [ 154.586977][ T7667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 154.586992][ T7667] RSP: 002b:00007f51f66a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 154.587008][ T7667] RAX: ffffffffffffffda RBX: 00007f51f59e5fa0 RCX: 00007f51f578efc9 [ 154.587018][ T7667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 154.587027][ T7667] RBP: 00007f51f66a1090 R08: 0000000000000000 R09: 0000000000000000 [ 154.587036][ T7667] R10: 0000000000080000 R11: 0000000000000246 R12: 0000000000000001 [ 154.587045][ T7667] R13: 00007f51f59e6038 R14: 00007f51f59e5fa0 R15: 00007ffccd1fc558 [ 154.587065][ T7667] [ 156.738501][ T7719] FAULT_INJECTION: forcing a failure. [ 156.738501][ T7719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.775891][ T7719] CPU: 1 UID: 0 PID: 7719 Comm: syz.1.547 Not tainted syzkaller #0 PREEMPT(full) [ 156.775915][ T7719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 156.775925][ T7719] Call Trace: [ 156.775931][ T7719] [ 156.775938][ T7719] dump_stack_lvl+0x16c/0x1f0 [ 156.775967][ T7719] should_fail_ex+0x512/0x640 [ 156.775989][ T7719] _copy_from_user+0x2e/0xd0 [ 156.776009][ T7719] kstrtouint_from_user+0xd6/0x1d0 [ 156.776033][ T7719] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 156.776057][ T7719] ? __lock_acquire+0xb8a/0x1c90 [ 156.776092][ T7719] proc_fail_nth_write+0x83/0x220 [ 156.776113][ T7719] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 156.776138][ T7719] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 156.776155][ T7719] vfs_write+0x2a0/0x11d0 [ 156.776176][ T7719] ? __pfx___mutex_lock+0x10/0x10 [ 156.776191][ T7719] ? __pfx_vfs_write+0x10/0x10 [ 156.776212][ T7719] ? __fget_files+0x20e/0x3c0 [ 156.776235][ T7719] ksys_write+0x12a/0x250 [ 156.776249][ T7719] ? __pfx_ksys_write+0x10/0x10 [ 156.776271][ T7719] do_syscall_64+0xcd/0xfa0 [ 156.776297][ T7719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 156.776314][ T7719] RIP: 0033:0x7ff46238da7f [ 156.776328][ T7719] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 156.776343][ T7719] RSP: 002b:00007ff4632d4030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 156.776358][ T7719] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff46238da7f [ 156.776369][ T7719] RDX: 0000000000000001 RSI: 00007ff4632d40a0 RDI: 0000000000000004 [ 156.776379][ T7719] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 156.776388][ T7719] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 156.776397][ T7719] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 156.776420][ T7719] [ 157.075388][ T7723] netlink: 52 bytes leftover after parsing attributes in process `syz.1.550'. [ 157.943890][ T7747] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 158.405911][ T7754] netlink: 14 bytes leftover after parsing attributes in process `syz.4.559'. [ 158.490352][ T7750] bond1 (unregistering): Released all slaves [ 158.800842][ T7761] netlink: 8 bytes leftover after parsing attributes in process `syz.3.563'. [ 158.852785][ T7762] netlink: 8 bytes leftover after parsing attributes in process `syz.3.563'. [ 158.949435][ T7754] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.998793][ T7754] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 159.035572][ T7754] bond0 (unregistering): Released all slaves [ 159.170099][ T30] kauditd_printk_skb: 8184 callbacks suppressed [ 159.170114][ T30] audit: type=1400 audit(1761769772.890:51607): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.224523][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.225659][ T30] audit: type=1400 audit(1761769772.890:51608): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.253461][ T30] audit: type=1400 audit(1761769772.890:51609): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.261320][ T5477] audit: audit_lost=2817 audit_rate_limit=0 audit_backlog_limit=64 [ 159.275361][ T30] audit: type=1400 audit(1761769772.890:51610): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.285147][ T7770] audit: audit_backlog=65 > audit_backlog_limit=64 [ 159.304093][ T30] audit: type=1400 audit(1761769772.890:51611): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.331794][ T30] audit: type=1400 audit(1761769772.890:51612): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 159.353681][ T30] audit: type=1400 audit(1761769772.890:51613): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.042811][ T7818] pim6reg1: entered promiscuous mode [ 162.103260][ T7818] pim6reg1: entered allmulticast mode [ 162.357114][ T7833] netlink: 8 bytes leftover after parsing attributes in process `syz.2.583'. [ 162.940742][ T7846] FAULT_INJECTION: forcing a failure. [ 162.940742][ T7846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.965654][ T7846] CPU: 0 UID: 0 PID: 7846 Comm: syz.1.587 Not tainted syzkaller #0 PREEMPT(full) [ 162.965677][ T7846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 162.965687][ T7846] Call Trace: [ 162.965693][ T7846] [ 162.965699][ T7846] dump_stack_lvl+0x16c/0x1f0 [ 162.965730][ T7846] should_fail_ex+0x512/0x640 [ 162.965753][ T7846] _copy_to_user+0x32/0xd0 [ 162.965775][ T7846] simple_read_from_buffer+0xcb/0x170 [ 162.965803][ T7846] proc_fail_nth_read+0x197/0x240 [ 162.965823][ T7846] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 162.965844][ T7846] ? rw_verify_area+0xcf/0x6c0 [ 162.965869][ T7846] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 162.965888][ T7846] vfs_read+0x1e4/0xcf0 [ 162.965908][ T7846] ? __pfx___mutex_lock+0x10/0x10 [ 162.965924][ T7846] ? __pfx_vfs_read+0x10/0x10 [ 162.965946][ T7846] ? __fget_files+0x20e/0x3c0 [ 162.965971][ T7846] ksys_read+0x12a/0x250 [ 162.965986][ T7846] ? __pfx_ksys_read+0x10/0x10 [ 162.966010][ T7846] do_syscall_64+0xcd/0xfa0 [ 162.966038][ T7846] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 162.966055][ T7846] RIP: 0033:0x7ff46238d9dc [ 162.966069][ T7846] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 162.966085][ T7846] RSP: 002b:00007ff4632d4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 162.966101][ T7846] RAX: ffffffffffffffda RBX: 00007ff4625e5fa0 RCX: 00007ff46238d9dc [ 162.966112][ T7846] RDX: 000000000000000f RSI: 00007ff4632d40a0 RDI: 0000000000000005 [ 162.966122][ T7846] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 162.966132][ T7846] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 162.966148][ T7846] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 162.966173][ T7846] [ 164.180260][ T30] kauditd_printk_skb: 9707 callbacks suppressed [ 164.180274][ T30] audit: type=1400 audit(1761769777.910:60235): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 164.229274][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.243659][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.251053][ T5477] audit: audit_lost=3180 audit_rate_limit=0 audit_backlog_limit=64 [ 164.259332][ T5806] audit: audit_lost=3181 audit_rate_limit=0 audit_backlog_limit=64 [ 164.268721][ T5477] audit: backlog limit exceeded [ 164.274608][ T30] audit: type=1400 audit(1761769777.940:60236): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 164.296266][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 164.300100][ T5806] audit: backlog limit exceeded [ 164.307830][ T5477] audit: audit_lost=3182 audit_rate_limit=0 audit_backlog_limit=64 [ 166.064325][ T7892] capability: warning: `syz.1.604' uses deprecated v2 capabilities in a way that may be insecure [ 167.727774][ T7935] ceph: No mds server is up or the cluster is laggy [ 168.379995][ T7957] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 169.298803][ T30] kauditd_printk_skb: 8907 callbacks suppressed [ 169.298819][ T30] audit: type=1400 audit(1761769783.020:67133): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 169.427789][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.429168][ T30] audit: type=1400 audit(1761769783.070:67134): avc: denied { read } for pid=7967 comm="syz.2.627" dev="nsfs" ino=4026532809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 169.455449][ C1] vkms_vblank_simulate: vblank timer overrun [ 169.562413][ T5814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.595739][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.607225][ T5477] audit: audit_lost=3853 audit_rate_limit=0 audit_backlog_limit=64 [ 169.617479][ T5814] audit: audit_lost=3854 audit_rate_limit=0 audit_backlog_limit=64 [ 169.618081][ T5806] audit: audit_lost=3855 audit_rate_limit=0 audit_backlog_limit=64 [ 169.634668][ T5477] audit: backlog limit exceeded [ 169.639919][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.675879][ T7975] FAULT_INJECTION: forcing a failure. [ 169.675879][ T7975] name failslab, interval 1, probability 0, space 0, times 0 [ 169.694305][ T7975] CPU: 0 UID: 0 PID: 7975 Comm: syz.1.630 Not tainted syzkaller #0 PREEMPT(full) [ 169.694321][ T7975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 169.694327][ T7975] Call Trace: [ 169.694331][ T7975] [ 169.694335][ T7975] dump_stack_lvl+0x16c/0x1f0 [ 169.694354][ T7975] should_fail_ex+0x512/0x640 [ 169.694367][ T7975] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 169.694381][ T7975] should_failslab+0xc2/0x120 [ 169.694397][ T7975] kmem_cache_alloc_noprof+0x75/0x6e0 [ 169.694412][ T7975] ? skb_clone+0x190/0x3f0 [ 169.694429][ T7975] ? skb_clone+0x190/0x3f0 [ 169.694440][ T7975] skb_clone+0x190/0x3f0 [ 169.694453][ T7975] netlink_deliver_tap+0xabd/0xd30 [ 169.694470][ T7975] netlink_unicast+0x64c/0x870 [ 169.694487][ T7975] ? __pfx_netlink_unicast+0x10/0x10 [ 169.694506][ T7975] netlink_sendmsg+0x8c8/0xdd0 [ 169.694522][ T7975] ? __pfx_netlink_sendmsg+0x10/0x10 [ 169.694541][ T7975] ____sys_sendmsg+0xa98/0xc70 [ 169.694558][ T7975] ? copy_msghdr_from_user+0x10a/0x160 [ 169.694573][ T7975] ? __pfx_____sys_sendmsg+0x10/0x10 [ 169.694595][ T7975] ___sys_sendmsg+0x134/0x1d0 [ 169.694609][ T7975] ? __pfx____sys_sendmsg+0x10/0x10 [ 169.694621][ T7975] ? __lock_acquire+0x622/0x1c90 [ 169.694666][ T7975] __sys_sendmsg+0x16d/0x220 [ 169.694679][ T7975] ? __pfx___sys_sendmsg+0x10/0x10 [ 169.694701][ T7975] do_syscall_64+0xcd/0xfa0 [ 169.694717][ T7975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 169.694727][ T7975] RIP: 0033:0x7ff46238efc9 [ 169.694735][ T7975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.694745][ T7975] RSP: 002b:00007ff4632d4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 169.694755][ T7975] RAX: ffffffffffffffda RBX: 00007ff4625e5fa0 RCX: 00007ff46238efc9 [ 169.694761][ T7975] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 169.694767][ T7975] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 169.694773][ T7975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.694779][ T7975] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 169.694792][ T7975] [ 169.694927][ T7975] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 170.487713][ T7985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=7985 comm=syz.1.632 [ 170.606036][ T7990] netlink: 'syz.4.635': attribute type 2 has an invalid length. [ 171.273768][ T5825] Bluetooth: hci4: SCO packet for unknown connection handle 1530 [ 171.475689][ T8012] netlink: 8 bytes leftover after parsing attributes in process `syz.0.641'. [ 171.574716][ T8012] netlink: 8 bytes leftover after parsing attributes in process `syz.0.641'. [ 172.111973][ T8031] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 173.827963][ T8066] netlink: 8 bytes leftover after parsing attributes in process `syz.3.663'. [ 173.863196][ T8066] netlink: 8 bytes leftover after parsing attributes in process `syz.3.663'. [ 174.309919][ T30] kauditd_printk_skb: 10502 callbacks suppressed [ 174.309936][ T30] audit: type=1400 audit(1761769787.790:73304): avc: denied { execmem } for pid=8071 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 174.368729][ T30] audit: type=1400 audit(1761769788.070:73305): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.390096][ T30] audit: type=1400 audit(1761769788.070:73306): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.411968][ T30] audit: type=1400 audit(1761769788.070:73307): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.436434][ T30] audit: type=1400 audit(1761769788.070:73308): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.538503][ T30] audit: type=1400 audit(1761769788.070:73309): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 174.562489][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 174.572188][ T5477] audit: audit_lost=5300 audit_rate_limit=0 audit_backlog_limit=64 [ 174.574007][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 174.584837][ T5814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.542082][ T8109] netlink: 36 bytes leftover after parsing attributes in process `syz.3.678'. [ 175.574331][ T8109] netlink: 36 bytes leftover after parsing attributes in process `syz.3.678'. [ 176.079452][ T8122] netlink: 4 bytes leftover after parsing attributes in process `syz.0.682'. [ 176.453273][ T8138] netlink: 32 bytes leftover after parsing attributes in process `syz.2.687'. [ 176.716586][ T8144] netlink: 36 bytes leftover after parsing attributes in process `syz.2.689'. [ 176.726404][ T8144] netlink: 36 bytes leftover after parsing attributes in process `syz.2.689'. [ 177.886789][ T8173] netlink: 36 bytes leftover after parsing attributes in process `syz.2.700'. [ 177.955677][ T8173] netlink: 36 bytes leftover after parsing attributes in process `syz.2.700'. [ 178.306603][ T8190] netlink: 8 bytes leftover after parsing attributes in process `syz.2.706'. [ 179.313054][ T30] kauditd_printk_skb: 11991 callbacks suppressed [ 179.313068][ T30] audit: type=1400 audit(1761769793.040:80886): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 179.385471][ T30] audit: type=1400 audit(1761769793.070:80887): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 179.390688][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 179.412937][ T5820] audit: audit_backlog=65 > audit_backlog_limit=64 [ 179.430921][ T8212] audit: audit_backlog=65 > audit_backlog_limit=64 [ 179.450386][ T5820] audit: audit_lost=6773 audit_rate_limit=0 audit_backlog_limit=64 [ 179.451396][ T8212] audit: audit_lost=6774 audit_rate_limit=0 audit_backlog_limit=64 [ 179.464718][ T8214] audit: audit_backlog=65 > audit_backlog_limit=64 [ 179.466276][ T5477] audit: audit_lost=6775 audit_rate_limit=0 audit_backlog_limit=64 [ 179.473760][ T5820] audit: backlog limit exceeded [ 179.512765][ T8214] netlink: 36 bytes leftover after parsing attributes in process `syz.3.713'. [ 179.525049][ T8214] netlink: 36 bytes leftover after parsing attributes in process `syz.3.713'. [ 179.817986][ T8221] FAULT_INJECTION: forcing a failure. [ 179.817986][ T8221] name failslab, interval 1, probability 0, space 0, times 0 [ 179.880845][ T8221] CPU: 0 UID: 0 PID: 8221 Comm: syz.0.716 Not tainted syzkaller #0 PREEMPT(full) [ 179.880866][ T8221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 179.880875][ T8221] Call Trace: [ 179.880879][ T8221] [ 179.880885][ T8221] dump_stack_lvl+0x16c/0x1f0 [ 179.880915][ T8221] should_fail_ex+0x512/0x640 [ 179.880934][ T8221] ? kmem_cache_alloc_node_noprof+0x65/0x770 [ 179.880959][ T8221] should_failslab+0xc2/0x120 [ 179.880977][ T8221] kmem_cache_alloc_node_noprof+0x78/0x770 [ 179.880999][ T8221] ? __alloc_skb+0x2b2/0x380 [ 179.881028][ T8221] ? __alloc_skb+0x2b2/0x380 [ 179.881042][ T8221] ? __pfx_netlink_insert+0x10/0x10 [ 179.881061][ T8221] __alloc_skb+0x2b2/0x380 [ 179.881078][ T8221] ? __pfx___alloc_skb+0x10/0x10 [ 179.881095][ T8221] ? netlink_autobind.isra.0+0x158/0x370 [ 179.881122][ T8221] netlink_alloc_large_skb+0x69/0x140 [ 179.881144][ T8221] netlink_sendmsg+0x698/0xdd0 [ 179.881171][ T8221] ? __pfx_netlink_sendmsg+0x10/0x10 [ 179.881202][ T8221] ____sys_sendmsg+0xa98/0xc70 [ 179.881228][ T8221] ? copy_msghdr_from_user+0x10a/0x160 [ 179.881246][ T8221] ? __pfx_____sys_sendmsg+0x10/0x10 [ 179.881277][ T8221] ___sys_sendmsg+0x134/0x1d0 [ 179.881299][ T8221] ? __pfx____sys_sendmsg+0x10/0x10 [ 179.881318][ T8221] ? __lock_acquire+0x622/0x1c90 [ 179.881365][ T8221] __sys_sendmsg+0x16d/0x220 [ 179.881385][ T8221] ? __pfx___sys_sendmsg+0x10/0x10 [ 179.881416][ T8221] do_syscall_64+0xcd/0xfa0 [ 179.881438][ T8221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 179.881452][ T8221] RIP: 0033:0x7fc25418efc9 [ 179.881464][ T8221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 179.881478][ T8221] RSP: 002b:00007fc2523f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 179.881494][ T8221] RAX: ffffffffffffffda RBX: 00007fc2543e5fa0 RCX: 00007fc25418efc9 [ 179.881505][ T8221] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000004 [ 179.881515][ T8221] RBP: 00007fc2523f6090 R08: 0000000000000000 R09: 0000000000000000 [ 179.881524][ T8221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 179.881533][ T8221] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 179.881553][ T8221] [ 180.294379][ T8229] netlink: 8 bytes leftover after parsing attributes in process `syz.4.719'. [ 180.294383][ T8230] netlink: 8 bytes leftover after parsing attributes in process `syz.4.719'. [ 180.408811][ T8235] netlink: 8 bytes leftover after parsing attributes in process `syz.0.721'. [ 180.487427][ T5825] Bluetooth: hci0: unexpected event 0x17 length: 19 > 6 [ 180.487500][ T5825] Bluetooth: hci0: unexpected event 0x17 length: 19 > 6 [ 180.532169][ T8243] FAULT_INJECTION: forcing a failure. [ 180.532169][ T8243] name failslab, interval 1, probability 0, space 0, times 0 [ 180.568482][ T8243] CPU: 1 UID: 0 PID: 8243 Comm: syz.4.724 Not tainted syzkaller #0 PREEMPT(full) [ 180.568504][ T8243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 180.568513][ T8243] Call Trace: [ 180.568518][ T8243] [ 180.568522][ T8243] dump_stack_lvl+0x16c/0x1f0 [ 180.568541][ T8243] should_fail_ex+0x512/0x640 [ 180.568554][ T8243] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 180.568574][ T8243] should_failslab+0xc2/0x120 [ 180.568592][ T8243] kmem_cache_alloc_noprof+0x75/0x6e0 [ 180.568615][ T8243] ? getname_flags.part.0+0x4c/0x550 [ 180.568637][ T8243] ? getname_flags.part.0+0x4c/0x550 [ 180.568650][ T8243] ? arch_syscall_is_vdso_sigreturn+0xb6/0x230 [ 180.568666][ T8243] getname_flags.part.0+0x4c/0x550 [ 180.568681][ T8243] getname_flags+0x93/0xf0 [ 180.568690][ T8243] __x64_sys_renameat2+0xc7/0x130 [ 180.568704][ T8243] do_syscall_64+0xcd/0xfa0 [ 180.568720][ T8243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.568730][ T8243] RIP: 0033:0x7f2ae4f8efc9 [ 180.568740][ T8243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.568749][ T8243] RSP: 002b:00007f2ae5e35038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 180.568778][ T8243] RAX: ffffffffffffffda RBX: 00007f2ae51e5fa0 RCX: 00007f2ae4f8efc9 [ 180.568785][ T8243] RDX: ffffffffffffff9c RSI: 0000200000000a00 RDI: ffffffffffffff9c [ 180.568791][ T8243] RBP: 00007f2ae5e35090 R08: 0000000000000002 R09: 0000000000000000 [ 180.568797][ T8243] R10: 0000200000000600 R11: 0000000000000246 R12: 0000000000000001 [ 180.568803][ T8243] R13: 00007f2ae51e6038 R14: 00007f2ae51e5fa0 R15: 00007fff65be95a8 [ 180.568816][ T8243] [ 181.093082][ T8260] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 181.100615][ T8260] IPv6: NLM_F_CREATE should be set when creating new route [ 181.555023][ T8282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8282 comm=syz.0.737 [ 184.330106][ T30] kauditd_printk_skb: 6072 callbacks suppressed [ 184.330121][ T30] audit: type=1400 audit(1761769798.050:85819): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 184.339243][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 184.362282][ T8331] audit: audit_backlog=65 > audit_backlog_limit=64 [ 184.372051][ T5477] audit: audit_lost=7156 audit_rate_limit=0 audit_backlog_limit=64 [ 184.440212][ T8335] audit: audit_backlog=65 > audit_backlog_limit=64 [ 184.446835][ T8335] audit: audit_lost=7157 audit_rate_limit=0 audit_backlog_limit=64 [ 184.473972][ T8331] audit: audit_lost=7158 audit_rate_limit=0 audit_backlog_limit=64 [ 184.477159][ T8338] audit: audit_backlog=65 > audit_backlog_limit=64 [ 184.488842][ T8331] audit: backlog limit exceeded [ 184.489858][ T8337] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.713240][ T5816] Bluetooth: hci2: command 0x0406 tx timeout [ 185.719269][ T5816] Bluetooth: hci3: command 0x0406 tx timeout [ 185.720116][ T5811] Bluetooth: hci0: command 0x0406 tx timeout [ 185.727577][ T5816] Bluetooth: hci4: command 0x0406 tx timeout [ 185.733284][ T5818] Bluetooth: hci1: command 0x0406 tx timeout [ 186.515297][ T8379] __nla_validate_parse: 3 callbacks suppressed [ 186.515313][ T8379] netlink: 8 bytes leftover after parsing attributes in process `syz.2.764'. [ 186.568529][ T8380] netlink: 8 bytes leftover after parsing attributes in process `syz.2.764'. [ 187.337314][ T8387] netlink: 658 bytes leftover after parsing attributes in process `syz.4.766'. [ 187.595764][ T8400] geneve2: entered promiscuous mode [ 187.613807][ T8400] geneve2: entered allmulticast mode [ 188.905453][ T8425] netlink: 8 bytes leftover after parsing attributes in process `syz.2.780'. [ 188.919792][ T8425] netlink: 8 bytes leftover after parsing attributes in process `syz.2.780'. [ 189.211864][ T8435] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 189.340834][ T30] kauditd_printk_skb: 6675 callbacks suppressed [ 189.340850][ T30] audit: type=1400 audit(1761769803.060:92486): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 189.403039][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 189.420196][ T5477] audit: audit_lost=7162 audit_rate_limit=0 audit_backlog_limit=64 [ 189.428161][ T5477] audit: backlog limit exceeded [ 189.429207][ T8439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 189.440244][ T30] audit: type=1400 audit(1761769803.070:92487): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 189.472072][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 189.488986][ T5477] audit: audit_lost=7163 audit_rate_limit=0 audit_backlog_limit=64 [ 189.510151][ T5477] audit: backlog limit exceeded [ 189.517369][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 191.257825][ T8475] macsec1: entered promiscuous mode [ 191.268787][ T8475] mac80211_hwsim hwsim3 wlan1: entered promiscuous mode [ 191.314853][ T8475] mac80211_hwsim hwsim3 wlan1: left promiscuous mode [ 191.363007][ T8478] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8478 comm=syz.2.797 [ 191.504920][ T8486] FAULT_INJECTION: forcing a failure. [ 191.504920][ T8486] name failslab, interval 1, probability 0, space 0, times 0 [ 191.546822][ T8486] CPU: 0 UID: 60928 PID: 8486 Comm: syz.3.800 Not tainted syzkaller #0 PREEMPT(full) [ 191.546846][ T8486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 191.546855][ T8486] Call Trace: [ 191.546861][ T8486] [ 191.546868][ T8486] dump_stack_lvl+0x16c/0x1f0 [ 191.546897][ T8486] should_fail_ex+0x512/0x640 [ 191.546916][ T8486] ? __kmalloc_node_track_caller_noprof+0xcb/0x8a0 [ 191.546938][ T8486] should_failslab+0xc2/0x120 [ 191.546959][ T8486] __kmalloc_node_track_caller_noprof+0xde/0x8a0 [ 191.546978][ T8486] ? simple_xattr_set+0x5b/0x3e0 [ 191.546998][ T8486] ? simple_xattr_alloc+0x46/0xa0 [ 191.547022][ T8486] ? kstrdup+0x53/0x100 [ 191.547035][ T8486] kstrdup+0x53/0x100 [ 191.547051][ T8486] simple_xattr_set+0x5b/0x3e0 [ 191.547074][ T8486] shmem_xattr_handler_set+0x31b/0x3b0 [ 191.547096][ T8486] ? __pfx_shmem_xattr_handler_set+0x10/0x10 [ 191.547115][ T8486] __vfs_setxattr+0x175/0x1e0 [ 191.547133][ T8486] ? __pfx___vfs_setxattr+0x10/0x10 [ 191.547156][ T8486] __vfs_setxattr_noperm+0x127/0x660 [ 191.547178][ T8486] __vfs_setxattr_locked+0x182/0x260 [ 191.547199][ T8486] vfs_setxattr+0x145/0x360 [ 191.547220][ T8486] ? __pfx_vfs_setxattr+0x10/0x10 [ 191.547237][ T8486] ? mnt_get_write_access+0x52/0x2f0 [ 191.547259][ T8486] ? mnt_get_write_access+0x52/0x2f0 [ 191.547285][ T8486] do_setxattr+0x145/0x180 [ 191.547304][ T8486] filename_setxattr+0x16b/0x1d0 [ 191.547322][ T8486] ? __pfx_filename_setxattr+0x10/0x10 [ 191.547340][ T8486] ? getname_flags.part.0+0x1c5/0x550 [ 191.547367][ T8486] path_setxattrat+0x1de/0x2a0 [ 191.547384][ T8486] ? __pfx_path_setxattrat+0x10/0x10 [ 191.547405][ T8486] ? ksys_write+0x190/0x250 [ 191.547441][ T8486] ? fput+0x9b/0xd0 [ 191.547462][ T8486] ? ksys_write+0x1ac/0x250 [ 191.547476][ T8486] ? __pfx_ksys_write+0x10/0x10 [ 191.547496][ T8486] __x64_sys_setxattr+0xc6/0x140 [ 191.547513][ T8486] ? do_syscall_64+0x91/0xfa0 [ 191.547537][ T8486] ? lockdep_hardirqs_on+0x7c/0x110 [ 191.547562][ T8486] do_syscall_64+0xcd/0xfa0 [ 191.547592][ T8486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 191.547609][ T8486] RIP: 0033:0x7f51f578efc9 [ 191.547624][ T8486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.547640][ T8486] RSP: 002b:00007f51f66a1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bc [ 191.547656][ T8486] RAX: ffffffffffffffda RBX: 00007f51f59e5fa0 RCX: 00007f51f578efc9 [ 191.547667][ T8486] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000200000000080 [ 191.547677][ T8486] RBP: 00007f51f66a1090 R08: 0000000000000000 R09: 0000000000000000 [ 191.547687][ T8486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.547696][ T8486] R13: 00007f51f59e6038 R14: 00007f51f59e5fa0 R15: 00007ffccd1fc558 [ 191.547720][ T8486] [ 192.528565][ T979] libceph: connect (1)[b::]:6789 error -101 [ 192.540230][ T979] libceph: mon0 (1)[b::]:6789 connect error [ 192.567203][ T8506] ceph: No mds server is up or the cluster is laggy [ 193.259113][ T8527] netlink: 8 bytes leftover after parsing attributes in process `syz.4.813'. [ 193.288358][ T8527] netlink: 8 bytes leftover after parsing attributes in process `syz.4.813'. [ 193.795354][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.801935][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.355700][ T30] kauditd_printk_skb: 8024 callbacks suppressed [ 194.355716][ T30] audit: type=1400 audit(1761769808.080:100040): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 194.413872][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.420910][ T5477] audit: audit_lost=7322 audit_rate_limit=0 audit_backlog_limit=64 [ 194.428917][ T8558] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.439963][ T8560] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.446640][ T8560] audit: audit_lost=7323 audit_rate_limit=0 audit_backlog_limit=64 [ 194.454796][ T5477] audit: backlog limit exceeded [ 194.460797][ T8558] audit: audit_lost=7324 audit_rate_limit=0 audit_backlog_limit=64 [ 194.460821][ T30] audit: type=1400 audit(1761769808.080:100041): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 194.493762][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 194.506022][ T8558] netlink: 8 bytes leftover after parsing attributes in process `syz.4.827'. [ 195.628641][ T8577] netlink: 'syz.2.832': attribute type 8 has an invalid length. [ 195.900849][ T8583] netlink: 8 bytes leftover after parsing attributes in process `syz.2.834'. [ 195.947235][ T8583] netlink: 8 bytes leftover after parsing attributes in process `syz.2.834'. [ 196.749010][ T8594] netlink: 8 bytes leftover after parsing attributes in process `syz.4.838'. [ 198.034395][ T8625] netlink: 8 bytes leftover after parsing attributes in process `syz.1.851'. [ 198.148802][ T8628] netlink: 8 bytes leftover after parsing attributes in process `syz.4.850'. [ 198.253680][ T8628] netlink: 8 bytes leftover after parsing attributes in process `syz.4.850'. [ 199.363547][ T30] kauditd_printk_skb: 9235 callbacks suppressed [ 199.363562][ T30] audit: type=1400 audit(1761769813.080:108118): avc: denied { read write } for pid=8652 comm="syz.3.859" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 199.382255][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.400548][ T8653] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.410136][ T8653] audit: audit_lost=7711 audit_rate_limit=0 audit_backlog_limit=64 [ 199.434154][ T8653] audit: backlog limit exceeded [ 199.439087][ T5477] audit: audit_lost=7712 audit_rate_limit=0 audit_backlog_limit=64 [ 199.454807][ T8653] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.467681][ T8655] audit: audit_backlog=65 > audit_backlog_limit=64 [ 199.473331][ T30] audit: type=1400 audit(1761769813.090:108119): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 199.476357][ T5477] audit: backlog limit exceeded [ 199.599349][ T8659] netlink: 8 bytes leftover after parsing attributes in process `syz.3.862'. [ 199.627693][ T8659] netlink: 8 bytes leftover after parsing attributes in process `syz.3.862'. [ 199.874054][ T8671] netlink: 8 bytes leftover after parsing attributes in process `syz.4.867'. [ 199.893461][ T8671] netlink: 8 bytes leftover after parsing attributes in process `syz.4.867'. [ 201.295421][ T8697] netlink: 8 bytes leftover after parsing attributes in process `syz.3.874'. [ 201.345283][ T8697] netlink: 8 bytes leftover after parsing attributes in process `syz.3.874'. [ 201.501064][ T8703] netlink: 'syz.0.877': attribute type 4 has an invalid length. [ 201.846487][ T8717] netlink: 8 bytes leftover after parsing attributes in process `syz.0.882'. [ 201.888908][ T8717] netlink: 8 bytes leftover after parsing attributes in process `syz.0.882'. [ 202.676406][ T8733] netlink: 8 bytes leftover after parsing attributes in process `syz.2.888'. [ 202.724456][ T8733] netlink: 8 bytes leftover after parsing attributes in process `syz.2.888'. [ 202.818424][ T8738] netlink: 'syz.1.890': attribute type 4 has an invalid length. [ 203.234131][ T8727] ceph: No mds server is up or the cluster is laggy [ 203.491512][ T8761] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 204.372657][ T30] kauditd_printk_skb: 10527 callbacks suppressed [ 204.372674][ T30] audit: type=1400 audit(1761769818.090:117263): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 204.391112][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 204.440880][ T8771] audit: audit_backlog=65 > audit_backlog_limit=64 [ 204.460104][ T8771] audit: audit_lost=8175 audit_rate_limit=0 audit_backlog_limit=64 [ 204.470076][ T5477] audit: audit_lost=8176 audit_rate_limit=0 audit_backlog_limit=64 [ 204.480204][ T30] audit: type=1400 audit(1761769818.100:117264): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 204.488130][ T5477] audit: backlog limit exceeded [ 204.512341][ T8771] audit: backlog limit exceeded [ 204.532716][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 204.557163][ T30] audit: type=1400 audit(1761769818.100:117265): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 204.705378][ T8776] netlink: 8 bytes leftover after parsing attributes in process `syz.3.900'. [ 204.811551][ T8776] netlink: 8 bytes leftover after parsing attributes in process `syz.3.900'. [ 204.846896][ T8780] netlink: 20 bytes leftover after parsing attributes in process `syz.2.902'. [ 204.864574][ T8780] netlink: 20 bytes leftover after parsing attributes in process `syz.2.902'. [ 204.989744][ T8785] netlink: 16 bytes leftover after parsing attributes in process `syz.1.903'. [ 205.872587][ T5824] Bluetooth: hci2: unexpected event 0x14 length: 20 > 6 [ 206.566877][ T8831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=27745 sclass=netlink_route_socket pid=8831 comm=syz.4.920 [ 206.758520][ T8838] FAULT_INJECTION: forcing a failure. [ 206.758520][ T8838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.800684][ T8838] CPU: 0 UID: 0 PID: 8838 Comm: syz.0.924 Not tainted syzkaller #0 PREEMPT(full) [ 206.800708][ T8838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 206.800718][ T8838] Call Trace: [ 206.800723][ T8838] [ 206.800730][ T8838] dump_stack_lvl+0x16c/0x1f0 [ 206.800760][ T8838] should_fail_ex+0x512/0x640 [ 206.800783][ T8838] core_sys_select+0x4c5/0xc20 [ 206.800806][ T8838] ? __pfx_core_sys_select+0x10/0x10 [ 206.800846][ T8838] ? set_user_sigmask+0x21b/0x2b0 [ 206.800865][ T8838] ? __pfx_set_user_sigmask+0x10/0x10 [ 206.800890][ T8838] do_pselect.constprop.0+0x19f/0x1e0 [ 206.800908][ T8838] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 206.800934][ T8838] __x64_sys_pselect6+0x182/0x240 [ 206.800952][ T8838] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 206.800976][ T8838] do_syscall_64+0xcd/0xfa0 [ 206.801002][ T8838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 206.801025][ T8838] RIP: 0033:0x7fc25418efc9 [ 206.801039][ T8838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.801055][ T8838] RSP: 002b:00007fc2523f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 206.801072][ T8838] RAX: ffffffffffffffda RBX: 00007fc2543e5fa0 RCX: 00007fc25418efc9 [ 206.801083][ T8838] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000040 [ 206.801093][ T8838] RBP: 00007fc2523f6090 R08: 0000200000000600 R09: 0000000000000000 [ 206.801103][ T8838] R10: 00002000000005c0 R11: 0000000000000246 R12: 0000000000000001 [ 206.801112][ T8838] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 206.801136][ T8838] [ 208.137853][ T8886] ceph: No mds server is up or the cluster is laggy [ 208.328605][ T8901] netlink: 8 bytes leftover after parsing attributes in process `syz.2.945'. [ 208.365052][ T8901] vlan3: entered allmulticast mode [ 208.379706][ T8901] hsr0: entered allmulticast mode [ 208.384905][ T8901] hsr_slave_0: entered allmulticast mode [ 208.392946][ T8901] hsr_slave_1: entered allmulticast mode [ 208.650682][ T8901] netlink: 8 bytes leftover after parsing attributes in process `syz.2.945'. [ 209.051491][ T8919] netlink: 8 bytes leftover after parsing attributes in process `syz.4.951'. [ 209.079856][ T8919] netlink: 8 bytes leftover after parsing attributes in process `syz.4.951'. [ 209.380187][ T30] kauditd_printk_skb: 11422 callbacks suppressed [ 209.380203][ T30] audit: type=1400 audit(1761769823.110:127360): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 209.393893][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.415007][ T5477] audit: audit_lost=8620 audit_rate_limit=0 audit_backlog_limit=64 [ 209.423116][ T5477] audit: backlog limit exceeded [ 209.428167][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.435250][ T5477] audit: audit_lost=8621 audit_rate_limit=0 audit_backlog_limit=64 [ 209.443390][ T5477] audit: backlog limit exceeded [ 209.447411][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.448903][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 209.464403][ T5806] audit: audit_lost=8622 audit_rate_limit=0 audit_backlog_limit=64 [ 209.912054][ T8930] binfmt_misc: register: failed to install interpreter file ./file0 [ 211.395526][ T8961] netlink: 8 bytes leftover after parsing attributes in process `syz.3.966'. [ 211.406413][ T8961] netlink: 8 bytes leftover after parsing attributes in process `syz.3.966'. [ 211.895721][ T8968] netlink: 5 bytes leftover after parsing attributes in process `syz.2.969'. [ 211.920915][ T8968] 0ªX¹¦D: renamed from macvtap0 (while UP) [ 211.948304][ T8968] 0ªX¹¦D: entered allmulticast mode [ 211.953695][ T5824] Bluetooth: hci0: unexpected event for opcode 0x204e [ 211.961002][ T8968] veth0_macvtap: entered allmulticast mode [ 211.990583][ T8968] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 212.924428][ T8994] netlink: 28 bytes leftover after parsing attributes in process `syz.0.977'. [ 213.242212][ T9001] netlink: 8 bytes leftover after parsing attributes in process `syz.2.979'. [ 213.273696][ T9001] netlink: 8 bytes leftover after parsing attributes in process `syz.2.979'. [ 213.948099][ T9016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1553 sclass=netlink_route_socket pid=9016 comm=syz.0.984 [ 213.971472][ T9016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9016 comm=syz.0.984 [ 214.541664][ T30] kauditd_printk_skb: 13749 callbacks suppressed [ 214.541682][ T30] audit: type=1400 audit(1761769828.090:137150): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.570205][ T30] audit: type=1400 audit(1761769828.190:137151): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.591806][ T30] audit: type=1400 audit(1761769828.190:137152): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.682447][ T30] audit: type=1400 audit(1761769828.190:137153): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.711928][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 214.718642][ T5477] audit: audit_lost=9943 audit_rate_limit=0 audit_backlog_limit=64 [ 214.721879][ T9021] audit: audit_backlog=65 > audit_backlog_limit=64 [ 214.728380][ T5477] audit: backlog limit exceeded [ 214.739852][ T30] audit: type=1400 audit(1761769828.190:137154): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 214.745683][ T9021] audit: audit_lost=9944 audit_rate_limit=0 audit_backlog_limit=64 [ 215.399735][ T9042] netlink: 9 bytes leftover after parsing attributes in process `syz.0.995'. [ 215.451253][ T9049] netlink: 5 bytes leftover after parsing attributes in process `syz.0.995'. [ 215.461721][ T9046] netlink: 32 bytes leftover after parsing attributes in process `syz.2.996'. [ 215.484519][ T9042] gretap0: entered promiscuous mode [ 215.552736][ T9051] FAULT_INJECTION: forcing a failure. [ 215.552736][ T9051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.566902][ T9049] 0ªî{X¹¦: renamed from gretap0 [ 215.600182][ T9051] CPU: 1 UID: 0 PID: 9051 Comm: syz.2.996 Not tainted syzkaller #0 PREEMPT(full) [ 215.600206][ T9051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 215.600215][ T9051] Call Trace: [ 215.600219][ T9051] [ 215.600224][ T9051] dump_stack_lvl+0x16c/0x1f0 [ 215.600242][ T9051] should_fail_ex+0x512/0x640 [ 215.600257][ T9051] _copy_from_user+0x2e/0xd0 [ 215.600271][ T9051] copy_msghdr_from_user+0x98/0x160 [ 215.600286][ T9051] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 215.600305][ T9051] ___sys_sendmsg+0xfe/0x1d0 [ 215.600318][ T9051] ? __pfx____sys_sendmsg+0x10/0x10 [ 215.600330][ T9051] ? __lock_acquire+0x622/0x1c90 [ 215.600361][ T9051] __sys_sendmsg+0x16d/0x220 [ 215.600374][ T9051] ? __pfx___sys_sendmsg+0x10/0x10 [ 215.600395][ T9051] do_syscall_64+0xcd/0xfa0 [ 215.600411][ T9051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 215.600422][ T9051] RIP: 0033:0x7f624338efc9 [ 215.600430][ T9051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.600440][ T9051] RSP: 002b:00007f62442bb038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 215.600451][ T9051] RAX: ffffffffffffffda RBX: 00007f62435e6090 RCX: 00007f624338efc9 [ 215.600457][ T9051] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 215.600463][ T9051] RBP: 00007f62442bb090 R08: 0000000000000000 R09: 0000000000000000 [ 215.600469][ T9051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.600475][ T9051] R13: 00007f62435e6128 R14: 00007f62435e6090 R15: 00007ffda7ccf918 [ 215.600488][ T9051] [ 215.771538][ T9049] 0ªî{X¹¦: left promiscuous mode [ 215.776552][ T9049] 0ªî{X¹¦: entered allmulticast mode [ 215.788336][ T9049] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 215.998060][ T9061] netlink: 8 bytes leftover after parsing attributes in process `syz.3.999'. [ 217.330781][ T9089] __nla_validate_parse: 1 callbacks suppressed [ 217.330797][ T9089] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1011'. [ 217.387583][ T9090] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1011'. [ 217.398718][ T9090] 8021q: VLANs not supported on ip6tnl0 [ 218.205804][ T9105] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1018'. [ 218.873042][ T9116] FAULT_INJECTION: forcing a failure. [ 218.873042][ T9116] name failslab, interval 1, probability 0, space 0, times 0 [ 218.960346][ T9116] CPU: 1 UID: 0 PID: 9116 Comm: syz.1.1021 Not tainted syzkaller #0 PREEMPT(full) [ 218.960370][ T9116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 218.960380][ T9116] Call Trace: [ 218.960386][ T9116] [ 218.960392][ T9116] dump_stack_lvl+0x16c/0x1f0 [ 218.960422][ T9116] should_fail_ex+0x512/0x640 [ 218.960441][ T9116] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 218.960468][ T9116] should_failslab+0xc2/0x120 [ 218.960488][ T9116] kmem_cache_alloc_noprof+0x75/0x6e0 [ 218.960512][ T9116] ? prepare_creds+0x2c/0x7d0 [ 218.960535][ T9116] ? prepare_creds+0x2c/0x7d0 [ 218.960554][ T9116] prepare_creds+0x2c/0x7d0 [ 218.960572][ T9116] lookup_user_key+0x978/0x1300 [ 218.960594][ T9116] ? __pfx_lookup_user_key+0x10/0x10 [ 218.960618][ T9116] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 218.960647][ T9116] __do_sys_add_key+0x25b/0x470 [ 218.960673][ T9116] ? __pfx___do_sys_add_key+0x10/0x10 [ 218.960694][ T9116] ? ksys_write+0x1ac/0x250 [ 218.960718][ T9116] do_syscall_64+0xcd/0xfa0 [ 218.960745][ T9116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 218.960762][ T9116] RIP: 0033:0x7ff46238efc9 [ 218.960775][ T9116] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.960791][ T9116] RSP: 002b:00007ff4632b3038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 218.960807][ T9116] RAX: ffffffffffffffda RBX: 00007ff4625e6090 RCX: 00007ff46238efc9 [ 218.960818][ T9116] RDX: 0000200000000300 RSI: 0000000000000000 RDI: 0000200000000340 [ 218.960828][ T9116] RBP: 00007ff4632b3090 R08: fffffffffffffffe R09: 0000000000000000 [ 218.960839][ T9116] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 218.960849][ T9116] R13: 00007ff4625e6128 R14: 00007ff4625e6090 R15: 00007fff91483c58 [ 218.960873][ T9116] [ 219.420621][ T9128] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1026'. [ 219.556230][ T9134] FAULT_INJECTION: forcing a failure. [ 219.556230][ T9134] name failslab, interval 1, probability 0, space 0, times 0 [ 219.562838][ T5477] audit_log_start: 10219 callbacks suppressed [ 219.562849][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.570759][ T30] audit: type=1400 audit(1761769833.250:146863): avc: denied { read } for pid=9121 comm="syz.3.1024" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 219.604734][ T9134] CPU: 0 UID: 0 PID: 9134 Comm: syz.1.1026 Not tainted syzkaller #0 PREEMPT(full) [ 219.604756][ T9134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 219.604766][ T9134] Call Trace: [ 219.604772][ T9134] [ 219.604779][ T9134] dump_stack_lvl+0x16c/0x1f0 [ 219.604810][ T9134] should_fail_ex+0x512/0x640 [ 219.604828][ T9134] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 219.604853][ T9134] should_failslab+0xc2/0x120 [ 219.604873][ T9134] kmem_cache_alloc_noprof+0x75/0x6e0 [ 219.604899][ T9134] ? skb_clone+0x190/0x3f0 [ 219.604927][ T9134] ? skb_clone+0x190/0x3f0 [ 219.604947][ T9134] skb_clone+0x190/0x3f0 [ 219.604970][ T9134] netlink_deliver_tap+0xabd/0xd30 [ 219.605000][ T9134] netlink_unicast+0x64c/0x870 [ 219.605028][ T9134] ? __pfx_netlink_unicast+0x10/0x10 [ 219.605069][ T9134] netlink_sendmsg+0x8c8/0xdd0 [ 219.605099][ T9134] ? __pfx_netlink_sendmsg+0x10/0x10 [ 219.605136][ T9134] ____sys_sendmsg+0xa98/0xc70 [ 219.605165][ T9134] ? copy_msghdr_from_user+0x10a/0x160 [ 219.605187][ T9134] ? __pfx_____sys_sendmsg+0x10/0x10 [ 219.605229][ T9134] ___sys_sendmsg+0x134/0x1d0 [ 219.605252][ T9134] ? __pfx____sys_sendmsg+0x10/0x10 [ 219.605272][ T9134] ? __lock_acquire+0x622/0x1c90 [ 219.605329][ T9134] __sys_sendmsg+0x16d/0x220 [ 219.605350][ T9134] ? __pfx___sys_sendmsg+0x10/0x10 [ 219.605386][ T9134] do_syscall_64+0xcd/0xfa0 [ 219.605411][ T9134] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 219.605427][ T9134] RIP: 0033:0x7ff46238efc9 [ 219.605441][ T9134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.605456][ T9134] RSP: 002b:00007ff463292038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.605472][ T9134] RAX: ffffffffffffffda RBX: 00007ff4625e6180 RCX: 00007ff46238efc9 [ 219.605483][ T9134] RDX: 0000000000004804 RSI: 0000200000000300 RDI: 0000000000000003 [ 219.605493][ T9134] RBP: 00007ff463292090 R08: 0000000000000000 R09: 0000000000000000 [ 219.605502][ T9134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.605511][ T9134] R13: 00007ff4625e6218 R14: 00007ff4625e6180 R15: 00007fff91483c58 [ 219.605534][ T9134] [ 219.824771][ T5477] audit: audit_lost=10115 audit_rate_limit=0 audit_backlog_limit=64 [ 219.832789][ T5477] audit: backlog limit exceeded [ 219.837833][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.844334][ T5477] audit: audit_lost=10116 audit_rate_limit=0 audit_backlog_limit=64 [ 219.852323][ T5477] audit: backlog limit exceeded [ 219.857200][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.863705][ T5477] audit: audit_lost=10117 audit_rate_limit=0 audit_backlog_limit=64 [ 219.871704][ T5477] audit: backlog limit exceeded [ 223.730805][ T9205] xt_policy: output policy not valid in PREROUTING and INPUT [ 224.033448][ T9213] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 224.969092][ T30] kauditd_printk_skb: 5796 callbacks suppressed [ 224.969108][ T30] audit: type=1400 audit(1761769837.970:152636): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.080675][ T30] audit: type=1400 audit(1761769837.990:152637): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.330157][ T30] audit: type=1400 audit(1761769837.990:152638): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.363590][ T30] audit: type=1400 audit(1761769837.990:152639): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.386056][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.427368][ T30] audit: type=1400 audit(1761769837.990:152640): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.436404][ T5477] audit: audit_lost=10126 audit_rate_limit=0 audit_backlog_limit=64 [ 225.473585][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.517770][ T5806] audit: audit_lost=10127 audit_rate_limit=0 audit_backlog_limit=64 [ 225.525884][ T30] audit: type=1400 audit(1761769837.990:152641): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.704438][ T9232] FAULT_INJECTION: forcing a failure. [ 225.704438][ T9232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.754257][ T9232] CPU: 1 UID: 0 PID: 9232 Comm: syz.1.1057 Not tainted syzkaller #0 PREEMPT(full) [ 225.754282][ T9232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 225.754292][ T9232] Call Trace: [ 225.754298][ T9232] [ 225.754304][ T9232] dump_stack_lvl+0x16c/0x1f0 [ 225.754334][ T9232] should_fail_ex+0x512/0x640 [ 225.754358][ T9232] _copy_from_user+0x2e/0xd0 [ 225.754380][ T9232] kstrtouint_from_user+0xd6/0x1d0 [ 225.754405][ T9232] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 225.754429][ T9232] ? __lock_acquire+0xb8a/0x1c90 [ 225.754466][ T9232] proc_fail_nth_write+0x83/0x220 [ 225.754488][ T9232] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 225.754514][ T9232] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 225.754531][ T9232] vfs_write+0x2a0/0x11d0 [ 225.754550][ T9232] ? __pfx___mutex_lock+0x10/0x10 [ 225.754564][ T9232] ? __pfx_vfs_write+0x10/0x10 [ 225.754595][ T9232] ? __fget_files+0x20e/0x3c0 [ 225.754619][ T9232] ksys_write+0x12a/0x250 [ 225.754630][ T9232] ? __pfx_ksys_write+0x10/0x10 [ 225.754644][ T9232] do_syscall_64+0xcd/0xfa0 [ 225.754660][ T9232] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 225.754670][ T9232] RIP: 0033:0x7ff46238da7f [ 225.754679][ T9232] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 225.754689][ T9232] RSP: 002b:00007ff4632d4030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 225.754699][ T9232] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff46238da7f [ 225.754706][ T9232] RDX: 0000000000000001 RSI: 00007ff4632d40a0 RDI: 0000000000000005 [ 225.754712][ T9232] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 225.754718][ T9232] R10: 0000000000000805 R11: 0000000000000293 R12: 0000000000000001 [ 225.754724][ T9232] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 225.754737][ T9232] [ 227.397250][ T9272] FAULT_INJECTION: forcing a failure. [ 227.397250][ T9272] name failslab, interval 1, probability 0, space 0, times 0 [ 227.475431][ T9272] CPU: 1 UID: 0 PID: 9272 Comm: syz.2.1070 Not tainted syzkaller #0 PREEMPT(full) [ 227.475453][ T9272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 227.475463][ T9272] Call Trace: [ 227.475469][ T9272] [ 227.475476][ T9272] dump_stack_lvl+0x16c/0x1f0 [ 227.475506][ T9272] should_fail_ex+0x512/0x640 [ 227.475525][ T9272] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 227.475552][ T9272] should_failslab+0xc2/0x120 [ 227.475571][ T9272] kmem_cache_alloc_noprof+0x75/0x6e0 [ 227.475595][ T9272] ? security_file_alloc+0x34/0x2b0 [ 227.475620][ T9272] ? security_file_alloc+0x34/0x2b0 [ 227.475639][ T9272] security_file_alloc+0x34/0x2b0 [ 227.475659][ T9272] init_file+0x93/0x4c0 [ 227.475679][ T9272] alloc_empty_file+0x73/0x1e0 [ 227.475701][ T9272] path_openat+0xda/0x2cb0 [ 227.475726][ T9272] ? __pfx_path_openat+0x10/0x10 [ 227.475745][ T9272] ? __lock_acquire+0xb8a/0x1c90 [ 227.475775][ T9272] do_filp_open+0x20b/0x470 [ 227.475792][ T9272] ? __pfx_do_filp_open+0x10/0x10 [ 227.475827][ T9272] ? alloc_fd+0x471/0x7d0 [ 227.475850][ T9272] do_sys_openat2+0x11b/0x1d0 [ 227.475871][ T9272] ? __pfx_do_sys_openat2+0x10/0x10 [ 227.475894][ T9272] ? __fget_files+0x20e/0x3c0 [ 227.475911][ T9272] __x64_sys_openat+0x174/0x210 [ 227.475924][ T9272] ? __pfx___x64_sys_openat+0x10/0x10 [ 227.475937][ T9272] ? ksys_write+0x1ac/0x250 [ 227.475956][ T9272] do_syscall_64+0xcd/0xfa0 [ 227.475972][ T9272] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 227.475983][ T9272] RIP: 0033:0x7f624338efc9 [ 227.475991][ T9272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.476001][ T9272] RSP: 002b:00007f62442dc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 227.476011][ T9272] RAX: ffffffffffffffda RBX: 00007f62435e5fa0 RCX: 00007f624338efc9 [ 227.476018][ T9272] RDX: 0000000000002000 RSI: 0000200000000300 RDI: ffffffffffffff9c [ 227.476024][ T9272] RBP: 00007f62442dc090 R08: 0000000000000000 R09: 0000000000000000 [ 227.476030][ T9272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.476036][ T9272] R13: 00007f62435e6038 R14: 00007f62435e5fa0 R15: 00007ffda7ccf918 [ 227.476049][ T9272] [ 227.697348][ T9274] netlink: 'syz.4.1072': attribute type 26 has an invalid length. [ 227.919000][ T9287] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1073'. [ 228.006219][ T9287] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1073'. [ 228.209891][ T9292] FAULT_INJECTION: forcing a failure. [ 228.209891][ T9292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 228.243004][ T9292] CPU: 1 UID: 0 PID: 9292 Comm: syz.3.1078 Not tainted syzkaller #0 PREEMPT(full) [ 228.243029][ T9292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 228.243039][ T9292] Call Trace: [ 228.243044][ T9292] [ 228.243051][ T9292] dump_stack_lvl+0x16c/0x1f0 [ 228.243083][ T9292] should_fail_ex+0x512/0x640 [ 228.243108][ T9292] _copy_from_user+0x2e/0xd0 [ 228.243130][ T9292] kstrtouint_from_user+0xd6/0x1d0 [ 228.243157][ T9292] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 228.243182][ T9292] ? __lock_acquire+0xb8a/0x1c90 [ 228.243222][ T9292] proc_fail_nth_write+0x83/0x220 [ 228.243243][ T9292] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 228.243270][ T9292] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 228.243289][ T9292] vfs_write+0x2a0/0x11d0 [ 228.243310][ T9292] ? __pfx___mutex_lock+0x10/0x10 [ 228.243327][ T9292] ? __pfx_vfs_write+0x10/0x10 [ 228.243351][ T9292] ? __fget_files+0x20e/0x3c0 [ 228.243377][ T9292] ksys_write+0x12a/0x250 [ 228.243393][ T9292] ? __pfx_ksys_write+0x10/0x10 [ 228.243417][ T9292] do_syscall_64+0xcd/0xfa0 [ 228.243445][ T9292] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 228.243463][ T9292] RIP: 0033:0x7f51f578da7f [ 228.243477][ T9292] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 228.243493][ T9292] RSP: 002b:00007f51f66a1030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 228.243510][ T9292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f51f578da7f [ 228.243520][ T9292] RDX: 0000000000000001 RSI: 00007f51f66a10a0 RDI: 0000000000000003 [ 228.243530][ T9292] RBP: 00007f51f66a1090 R08: 0000000000000000 R09: 0000000000000000 [ 228.243540][ T9292] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 228.243554][ T9292] R13: 00007f51f59e6038 R14: 00007f51f59e5fa0 R15: 00007ffccd1fc558 [ 228.243579][ T9292] [ 228.517098][ T9295] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 228.659780][ T9298] FAULT_INJECTION: forcing a failure. [ 228.659780][ T9298] name failslab, interval 1, probability 0, space 0, times 0 [ 228.673428][ T9298] CPU: 1 UID: 0 PID: 9298 Comm: syz.0.1071 Not tainted syzkaller #0 PREEMPT(full) [ 228.673453][ T9298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 228.673463][ T9298] Call Trace: [ 228.673469][ T9298] [ 228.673476][ T9298] dump_stack_lvl+0x16c/0x1f0 [ 228.673507][ T9298] should_fail_ex+0x512/0x640 [ 228.673527][ T9298] ? kmem_cache_alloc_lru_noprof+0x66/0x6e0 [ 228.673560][ T9298] should_failslab+0xc2/0x120 [ 228.673580][ T9298] kmem_cache_alloc_lru_noprof+0x79/0x6e0 [ 228.673607][ T9298] ? proc_alloc_inode+0x25/0x200 [ 228.673635][ T9298] ? __pfx_proc_alloc_inode+0x10/0x10 [ 228.673657][ T9298] ? proc_alloc_inode+0x25/0x200 [ 228.673678][ T9298] proc_alloc_inode+0x25/0x200 [ 228.673699][ T9298] alloc_inode+0x64/0x240 [ 228.673723][ T9298] new_inode+0x22/0x1c0 [ 228.673749][ T9298] proc_pid_make_inode+0x22/0x160 [ 228.673774][ T9298] proc_fdinfo_instantiate+0x57/0x240 [ 228.673795][ T9298] proc_fill_cache+0x361/0x470 [ 228.673818][ T9298] ? __pfx_proc_fdinfo_instantiate+0x10/0x10 [ 228.673839][ T9298] ? __pfx_proc_fill_cache+0x10/0x10 [ 228.673861][ T9298] ? __pfx_vsnprintf+0x10/0x10 [ 228.673892][ T9298] ? snprintf+0xc7/0x100 [ 228.673921][ T9298] ? _raw_spin_unlock+0x28/0x50 [ 228.673943][ T9298] ? fget_task_next+0x2b0/0x580 [ 228.673971][ T9298] proc_readfd_common+0x1ef/0x5f0 [ 228.673991][ T9298] ? __pfx_proc_fdinfo_instantiate+0x10/0x10 [ 228.674012][ T9298] ? __pfx_proc_readfd_common+0x10/0x10 [ 228.674032][ T9298] ? down_read_killable+0x220/0x4b0 [ 228.674051][ T9298] ? __pfx_down_read_killable+0x10/0x10 [ 228.674069][ T9298] ? finish_inode_if_needed+0x1650/0x45d0 [ 228.674095][ T9298] iterate_dir+0x296/0xaf0 [ 228.674125][ T9298] __x64_sys_getdents64+0x13c/0x2c0 [ 228.674152][ T9298] ? __pfx___x64_sys_getdents64+0x10/0x10 [ 228.674179][ T9298] ? __pfx_filldir64+0x10/0x10 [ 228.674212][ T9298] do_syscall_64+0xcd/0xfa0 [ 228.674239][ T9298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 228.674257][ T9298] RIP: 0033:0x7fc25418efc9 [ 228.674272][ T9298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.674288][ T9298] RSP: 002b:00007fc2523b4038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 228.674305][ T9298] RAX: ffffffffffffffda RBX: 00007fc2543e6180 RCX: 00007fc25418efc9 [ 228.674317][ T9298] RDX: 0000000000001002 RSI: 0000200000002f40 RDI: 0000000000000005 [ 228.674327][ T9298] RBP: 00007fc2523b4090 R08: 0000000000000000 R09: 0000000000000000 [ 228.674337][ T9298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 228.674351][ T9298] R13: 00007fc2543e6218 R14: 00007fc2543e6180 R15: 00007ffe6656ec68 [ 228.674376][ T9298] [ 229.970125][ T30] kauditd_printk_skb: 6211 callbacks suppressed [ 229.970140][ T30] audit: type=1400 audit(1761769843.690:157978): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.088186][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.098343][ T9322] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.105165][ T9322] audit: audit_lost=10419 audit_rate_limit=0 audit_backlog_limit=64 [ 230.113446][ T5477] audit: audit_lost=10420 audit_rate_limit=0 audit_backlog_limit=64 [ 230.115217][ T30] audit: type=1400 audit(1761769843.730:157979): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.121635][ T5477] audit: backlog limit exceeded [ 230.147750][ T9322] audit: backlog limit exceeded [ 230.199172][ T9322] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.211402][ T30] audit: type=1400 audit(1761769843.730:157980): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 234.797280][ T9407] FAULT_INJECTION: forcing a failure. [ 234.797280][ T9407] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.840367][ T9407] CPU: 1 UID: 0 PID: 9407 Comm: syz.2.1113 Not tainted syzkaller #0 PREEMPT(full) [ 234.840385][ T9407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 234.840391][ T9407] Call Trace: [ 234.840395][ T9407] [ 234.840400][ T9407] dump_stack_lvl+0x16c/0x1f0 [ 234.840419][ T9407] should_fail_ex+0x512/0x640 [ 234.840434][ T9407] _copy_from_user+0x2e/0xd0 [ 234.840447][ T9407] kstrtouint_from_user+0xd6/0x1d0 [ 234.840463][ T9407] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 234.840478][ T9407] ? __lock_acquire+0xb8a/0x1c90 [ 234.840500][ T9407] proc_fail_nth_write+0x83/0x220 [ 234.840513][ T9407] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 234.840527][ T9407] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 234.840538][ T9407] vfs_write+0x2a0/0x11d0 [ 234.840550][ T9407] ? __pfx___mutex_lock+0x10/0x10 [ 234.840565][ T9407] ? __pfx_vfs_write+0x10/0x10 [ 234.840587][ T9407] ? __fget_files+0x20e/0x3c0 [ 234.840604][ T9407] ksys_write+0x12a/0x250 [ 234.840613][ T9407] ? __pfx_ksys_write+0x10/0x10 [ 234.840626][ T9407] do_syscall_64+0xcd/0xfa0 [ 234.840642][ T9407] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.840653][ T9407] RIP: 0033:0x7f624338da7f [ 234.840663][ T9407] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 234.840673][ T9407] RSP: 002b:00007f62442bb030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 234.840683][ T9407] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f624338da7f [ 234.840689][ T9407] RDX: 0000000000000001 RSI: 00007f62442bb0a0 RDI: 0000000000000007 [ 234.840695][ T9407] RBP: 00007f62442bb090 R08: 0000000000000000 R09: 0000000000000000 [ 234.840702][ T9407] R10: 0000000000000102 R11: 0000000000000293 R12: 0000000000000001 [ 234.840707][ T9407] R13: 00007f62435e6128 R14: 00007f62435e6090 R15: 00007ffda7ccf918 [ 234.840721][ T9407] [ 235.035388][ T30] kauditd_printk_skb: 10706 callbacks suppressed [ 235.035400][ T30] audit: type=1400 audit(1761769848.770:163156): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.303042][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 235.309729][ T5477] audit: audit_lost=12265 audit_rate_limit=0 audit_backlog_limit=64 [ 235.347617][ T9411] audit: audit_backlog=65 > audit_backlog_limit=64 [ 235.360048][ T30] audit: type=1400 audit(1761769848.770:163157): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.422119][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 235.428662][ T5805] audit: audit_lost=12266 audit_rate_limit=0 audit_backlog_limit=64 [ 235.481448][ T5477] audit: backlog limit exceeded [ 235.520132][ T9411] audit: audit_lost=12267 audit_rate_limit=0 audit_backlog_limit=64 [ 235.528187][ T9411] audit: backlog limit exceeded [ 238.115056][ T9455] netlink: 'syz.3.1125': attribute type 13 has an invalid length. [ 238.126250][ T9455] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 238.173591][ T9455] gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 238.184489][ T9455] gretap1: entered promiscuous mode [ 238.189709][ T9455] gretap1: entered allmulticast mode [ 239.347222][ T9482] FAULT_INJECTION: forcing a failure. [ 239.347222][ T9482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.360425][ T9482] CPU: 0 UID: 0 PID: 9482 Comm: syz.0.1132 Not tainted syzkaller #0 PREEMPT(full) [ 239.360439][ T9482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 239.360445][ T9482] Call Trace: [ 239.360449][ T9482] [ 239.360453][ T9482] dump_stack_lvl+0x16c/0x1f0 [ 239.360472][ T9482] should_fail_ex+0x512/0x640 [ 239.360486][ T9482] _copy_to_user+0x32/0xd0 [ 239.360501][ T9482] simple_read_from_buffer+0xcb/0x170 [ 239.360518][ T9482] proc_fail_nth_read+0x197/0x240 [ 239.360531][ T9482] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 239.360543][ T9482] ? rw_verify_area+0xcf/0x6c0 [ 239.360561][ T9482] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 239.360573][ T9482] vfs_read+0x1e4/0xcf0 [ 239.360584][ T9482] ? __pfx___mutex_lock+0x10/0x10 [ 239.360593][ T9482] ? __pfx_vfs_read+0x10/0x10 [ 239.360606][ T9482] ? __fget_files+0x20e/0x3c0 [ 239.360620][ T9482] ksys_read+0x12a/0x250 [ 239.360629][ T9482] ? __pfx_ksys_read+0x10/0x10 [ 239.360642][ T9482] do_syscall_64+0xcd/0xfa0 [ 239.360658][ T9482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.360669][ T9482] RIP: 0033:0x7fc25418d9dc [ 239.360678][ T9482] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 239.360688][ T9482] RSP: 002b:00007fc2523d5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 239.360698][ T9482] RAX: ffffffffffffffda RBX: 00007fc2543e6090 RCX: 00007fc25418d9dc [ 239.360705][ T9482] RDX: 000000000000000f RSI: 00007fc2523d50a0 RDI: 0000000000000006 [ 239.360710][ T9482] RBP: 00007fc2523d5090 R08: 0000000000000000 R09: 0000000000000000 [ 239.360716][ T9482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.360722][ T9482] R13: 00007fc2543e6128 R14: 00007fc2543e6090 R15: 00007ffe6656ec68 [ 239.360736][ T9482] [ 240.152286][ T30] kauditd_printk_skb: 5714 callbacks suppressed [ 240.152305][ T30] audit: type=1400 audit(1761769853.660:167077): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.198699][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.236579][ T5477] audit: audit_lost=12864 audit_rate_limit=0 audit_backlog_limit=64 [ 240.267829][ T5808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.355703][ T5808] audit: audit_lost=12865 audit_rate_limit=0 audit_backlog_limit=64 [ 240.375103][ T5808] audit: backlog limit exceeded [ 240.380221][ T30] audit: type=1400 audit(1761769853.890:167084): avc: denied { create } for pid=9496 comm="syz.4.1140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 240.411428][ T5477] audit: backlog limit exceeded [ 240.420754][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.434501][ T5477] audit: audit_lost=12866 audit_rate_limit=0 audit_backlog_limit=64 [ 240.510328][ T5819] Bluetooth: hci4: command 0x0406 tx timeout [ 242.217191][ T9541] syz_tun: entered promiscuous mode [ 242.222646][ T9541] macsec1: entered allmulticast mode [ 242.227910][ T9541] syz_tun: entered allmulticast mode [ 242.239926][ T9541] syz_tun: left allmulticast mode [ 242.290156][ T9541] syz_tun: left promiscuous mode [ 242.684966][ T9557] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 242.895992][ T9563] block device autoloading is deprecated and will be removed. [ 243.535834][ T9574] netlink: 'syz.4.1165': attribute type 33 has an invalid length. [ 243.685115][ T9574] netlink: 152 bytes leftover after parsing attributes in process `syz.4.1165'. [ 244.108682][ T9580] FAULT_INJECTION: forcing a failure. [ 244.108682][ T9580] name failslab, interval 1, probability 0, space 0, times 0 [ 244.129083][ T9575] trusted_key: encrypted_key: insufficient parameters specified [ 244.150106][ T9580] CPU: 1 UID: 0 PID: 9580 Comm: syz.0.1167 Not tainted syzkaller #0 PREEMPT(full) [ 244.150124][ T9580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 244.150131][ T9580] Call Trace: [ 244.150135][ T9580] [ 244.150140][ T9580] dump_stack_lvl+0x16c/0x1f0 [ 244.150159][ T9580] should_fail_ex+0x512/0x640 [ 244.150171][ T9580] ? kmem_cache_alloc_lru_noprof+0x66/0x6e0 [ 244.150189][ T9580] should_failslab+0xc2/0x120 [ 244.150201][ T9580] kmem_cache_alloc_lru_noprof+0x79/0x6e0 [ 244.150217][ T9580] ? sock_alloc_inode+0x25/0x1c0 [ 244.150234][ T9580] ? __pfx_sock_alloc_inode+0x10/0x10 [ 244.150248][ T9580] ? sock_alloc_inode+0x25/0x1c0 [ 244.150262][ T9580] sock_alloc_inode+0x25/0x1c0 [ 244.150276][ T9580] alloc_inode+0x64/0x240 [ 244.150291][ T9580] sock_alloc+0x40/0x280 [ 244.150305][ T9580] do_accept+0xf7/0x530 [ 244.150316][ T9580] ? do_raw_spin_lock+0x12c/0x2b0 [ 244.150329][ T9580] ? __pfx_do_accept+0x10/0x10 [ 244.150348][ T9580] __sys_accept4+0x100/0x1c0 [ 244.150359][ T9580] ? __pfx___sys_accept4+0x10/0x10 [ 244.150369][ T9580] ? ksys_write+0x1ac/0x250 [ 244.150378][ T9580] ? __pfx_ksys_write+0x10/0x10 [ 244.150390][ T9580] __x64_sys_accept+0x74/0xb0 [ 244.150400][ T9580] ? lockdep_hardirqs_on+0x7c/0x110 [ 244.150415][ T9580] do_syscall_64+0xcd/0xfa0 [ 244.150431][ T9580] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 244.150441][ T9580] RIP: 0033:0x7fc25418efc9 [ 244.150451][ T9580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 244.150461][ T9580] RSP: 002b:00007fc2523f6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 244.150471][ T9580] RAX: ffffffffffffffda RBX: 00007fc2543e5fa0 RCX: 00007fc25418efc9 [ 244.150477][ T9580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 244.150483][ T9580] RBP: 00007fc2523f6090 R08: 0000000000000000 R09: 0000000000000000 [ 244.150489][ T9580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.150495][ T9580] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 244.150508][ T9580] [ 245.162083][ T30] kauditd_printk_skb: 7210 callbacks suppressed [ 245.162094][ T30] audit: type=1400 audit(1761769858.890:174129): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.256119][ T30] audit: type=1400 audit(1761769858.890:174130): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.257400][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.285644][ T30] audit: type=1400 audit(1761769858.890:174131): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.338983][ T9601] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.373565][ T30] audit: type=1400 audit(1761769858.890:174132): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.407068][ T9601] audit: audit_lost=12922 audit_rate_limit=0 audit_backlog_limit=64 [ 245.415970][ T9603] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.422677][ T9603] audit: audit_lost=12923 audit_rate_limit=0 audit_backlog_limit=64 [ 245.445976][ T9603] audit: backlog limit exceeded [ 246.627506][ T9624] netlink: 'syz.4.1182': attribute type 4 has an invalid length. [ 246.635876][ T9624] netlink: 'syz.4.1182': attribute type 4 has an invalid length. [ 247.222073][ T9641] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1187'. [ 247.279583][ T9643] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1187'. [ 250.170083][ T30] kauditd_printk_skb: 8434 callbacks suppressed [ 250.170098][ T30] audit: type=1400 audit(1761769863.890:182006): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.181183][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.214351][ T5477] audit: audit_lost=13111 audit_rate_limit=0 audit_backlog_limit=64 [ 250.222668][ T5477] audit: backlog limit exceeded [ 250.224647][ T30] audit: type=1400 audit(1761769863.900:182007): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.230530][ T9692] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.255516][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.262311][ T5477] audit: audit_lost=13112 audit_rate_limit=0 audit_backlog_limit=64 [ 250.266093][ T30] audit: type=1400 audit(1761769863.900:182008): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.271645][ T5477] audit: backlog limit exceeded [ 251.139610][ T9712] xt_connbytes: Forcing CT accounting to be enabled [ 252.061069][ T9734] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 255.227425][ T30] kauditd_printk_skb: 13912 callbacks suppressed [ 255.227440][ T30] audit: type=1400 audit(1761769868.880:195811): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.236963][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.276248][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.282618][ T30] audit: type=1400 audit(1761769868.940:195812): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.346476][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.353286][ T5805] audit: audit_lost=13150 audit_rate_limit=0 audit_backlog_limit=64 [ 255.361527][ T5805] audit: backlog limit exceeded [ 255.372846][ T30] audit: type=1400 audit(1761769868.940:195813): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.394915][ T30] audit: type=1400 audit(1761769868.940:195814): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.416725][ T30] audit: type=1400 audit(1761769868.940:195815): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.438660][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.464815][ T5477] audit: audit_lost=13151 audit_rate_limit=0 audit_backlog_limit=64 [ 257.703399][ T9845] FAULT_INJECTION: forcing a failure. [ 257.703399][ T9845] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.739418][ T9845] CPU: 0 UID: 0 PID: 9845 Comm: syz.2.1255 Not tainted syzkaller #0 PREEMPT(full) [ 257.739441][ T9845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 257.739447][ T9845] Call Trace: [ 257.739451][ T9845] [ 257.739456][ T9845] dump_stack_lvl+0x16c/0x1f0 [ 257.739475][ T9845] should_fail_ex+0x512/0x640 [ 257.739490][ T9845] _copy_from_user+0x2e/0xd0 [ 257.739504][ T9845] kstrtouint_from_user+0xd6/0x1d0 [ 257.739520][ T9845] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 257.739535][ T9845] ? __lock_acquire+0xb8a/0x1c90 [ 257.739561][ T9845] proc_fail_nth_write+0x83/0x220 [ 257.739574][ T9845] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 257.739589][ T9845] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 257.739600][ T9845] vfs_write+0x2a0/0x11d0 [ 257.739612][ T9845] ? __pfx___mutex_lock+0x10/0x10 [ 257.739621][ T9845] ? __pfx_vfs_write+0x10/0x10 [ 257.739634][ T9845] ? __fget_files+0x20e/0x3c0 [ 257.739649][ T9845] ksys_write+0x12a/0x250 [ 257.739658][ T9845] ? __pfx_ksys_write+0x10/0x10 [ 257.739671][ T9845] do_syscall_64+0xcd/0xfa0 [ 257.739692][ T9845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 257.739702][ T9845] RIP: 0033:0x7f624338da7f [ 257.739712][ T9845] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 257.739722][ T9845] RSP: 002b:00007f62442dc030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 257.739732][ T9845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f624338da7f [ 257.739739][ T9845] RDX: 0000000000000001 RSI: 00007f62442dc0a0 RDI: 0000000000000003 [ 257.739745][ T9845] RBP: 00007f62442dc090 R08: 0000000000000000 R09: 0000000000000000 [ 257.739751][ T9845] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 257.739757][ T9845] R13: 00007f62435e6038 R14: 00007f62435e5fa0 R15: 00007ffda7ccf918 [ 257.739770][ T9845] [ 258.042821][ T9841] vlan0: entered promiscuous mode [ 258.218518][ T9849] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(6) [ 258.225200][ T9849] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 258.256829][ T9849] vhci_hcd vhci_hcd.0: Device attached [ 258.490116][ T979] usb 37-1: new low-speed USB device number 2 using vhci_hcd [ 260.233125][ T30] kauditd_printk_skb: 8472 callbacks suppressed [ 260.233136][ T30] audit: type=1400 audit(1761769873.960:202988): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.457485][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.483717][ T30] audit: type=1400 audit(1761769873.960:202989): avc: denied { read write } for pid=5805 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 260.559786][ T30] audit: type=1400 audit(1761769873.990:202990): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.585237][ T5477] audit: audit_lost=13585 audit_rate_limit=0 audit_backlog_limit=64 [ 260.628558][ T30] audit: type=1400 audit(1761769873.990:202991): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.717387][ T30] audit: type=1400 audit(1761769873.990:202992): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.771575][ T5477] audit: backlog limit exceeded [ 260.800033][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.846615][ T30] audit: type=1400 audit(1761769873.990:202993): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.132882][ T9901] macvtap1: entered promiscuous mode [ 261.138353][ T9901] macvtap1: entered allmulticast mode [ 261.150157][ T9901] veth1_vlan: entered allmulticast mode [ 262.084570][ T9850] vhci_hcd: connection reset by peer [ 262.128930][ T9921] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1277'. [ 262.158188][ T2900] vhci_hcd: stop threads [ 262.263520][ T2900] vhci_hcd: release socket [ 262.279174][ T2900] vhci_hcd: disconnect device [ 262.358775][ T9921] netlink: 132 bytes leftover after parsing attributes in process `syz.3.1277'. [ 263.680113][ T979] vhci_hcd: vhci_device speed not set [ 265.248590][ T30] kauditd_printk_skb: 7275 callbacks suppressed [ 265.248605][ T30] audit: type=1400 audit(1761769878.950:208338): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.311719][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.318331][ T5477] audit: audit_lost=14230 audit_rate_limit=0 audit_backlog_limit=64 [ 265.329896][ T5477] audit: backlog limit exceeded [ 265.335001][ T30] audit: type=1400 audit(1761769878.950:208339): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.422058][ T9991] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.428724][ T9991] audit: audit_lost=14231 audit_rate_limit=0 audit_backlog_limit=64 [ 265.443670][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.450503][ T9991] audit: backlog limit exceeded [ 265.465353][ T9991] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.990551][ T9997] FAULT_INJECTION: forcing a failure. [ 265.990551][ T9997] name failslab, interval 1, probability 0, space 0, times 0 [ 266.016827][ T9997] CPU: 1 UID: 0 PID: 9997 Comm: syz.0.1299 Not tainted syzkaller #0 PREEMPT(full) [ 266.016843][ T9997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 266.016849][ T9997] Call Trace: [ 266.016853][ T9997] [ 266.016857][ T9997] dump_stack_lvl+0x16c/0x1f0 [ 266.016876][ T9997] should_fail_ex+0x512/0x640 [ 266.016889][ T9997] ? kmem_cache_alloc_lru_noprof+0x66/0x6e0 [ 266.016907][ T9997] should_failslab+0xc2/0x120 [ 266.016919][ T9997] kmem_cache_alloc_lru_noprof+0x79/0x6e0 [ 266.016939][ T9997] ? stack_trace_save+0x8e/0xc0 [ 266.016954][ T9997] ? __d_alloc+0x32/0xae0 [ 266.016968][ T9997] ? __d_alloc+0x32/0xae0 [ 266.016978][ T9997] __d_alloc+0x32/0xae0 [ 266.016990][ T9997] d_alloc_parallel+0x111/0x1510 [ 266.017009][ T9997] ? find_held_lock+0x2b/0x80 [ 266.017022][ T9997] ? __pfx_d_alloc_parallel+0x10/0x10 [ 266.017038][ T9997] ? __d_lookup+0x266/0x4a0 [ 266.017056][ T9997] lookup_open.isra.0+0x665/0x1580 [ 266.017074][ T9997] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 266.017097][ T9997] ? mnt_get_write_access+0x1e9/0x2f0 [ 266.017113][ T9997] path_openat+0x893/0x2cb0 [ 266.017127][ T9997] ? __pfx_path_openat+0x10/0x10 [ 266.017138][ T9997] ? __lock_acquire+0xb8a/0x1c90 [ 266.017155][ T9997] do_filp_open+0x20b/0x470 [ 266.017166][ T9997] ? __pfx_do_filp_open+0x10/0x10 [ 266.017185][ T9997] ? alloc_fd+0x471/0x7d0 [ 266.017199][ T9997] do_sys_openat2+0x11b/0x1d0 [ 266.017212][ T9997] ? __pfx_do_sys_openat2+0x10/0x10 [ 266.017227][ T9997] ? __fget_files+0x20e/0x3c0 [ 266.017239][ T9997] __x64_sys_openat+0x174/0x210 [ 266.017252][ T9997] ? __pfx___x64_sys_openat+0x10/0x10 [ 266.017265][ T9997] ? ksys_write+0x1ac/0x250 [ 266.017279][ T9997] do_syscall_64+0xcd/0xfa0 [ 266.017298][ T9997] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 266.017308][ T9997] RIP: 0033:0x7fc25418d810 [ 266.017317][ T9997] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 266.017327][ T9997] RSP: 002b:00007fc2523f5b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 266.017337][ T9997] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fc25418d810 [ 266.017344][ T9997] RDX: 0000000000000002 RSI: 00007fc2523f5c10 RDI: 00000000ffffff9c [ 266.017350][ T9997] RBP: 00007fc2523f5c10 R08: 0000000000000000 R09: 00007fc2523f5987 [ 266.017356][ T9997] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 266.017362][ T9997] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 266.017375][ T9997] [ 269.249066][T10057] FAULT_INJECTION: forcing a failure. [ 269.249066][T10057] name failslab, interval 1, probability 0, space 0, times 0 [ 269.267566][T10057] CPU: 1 UID: 0 PID: 10057 Comm: syz.1.1320 Not tainted syzkaller #0 PREEMPT(full) [ 269.267594][T10057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 269.267604][T10057] Call Trace: [ 269.267610][T10057] [ 269.267617][T10057] dump_stack_lvl+0x16c/0x1f0 [ 269.267646][T10057] should_fail_ex+0x512/0x640 [ 269.267666][T10057] ? kmem_cache_alloc_lru_noprof+0x66/0x6e0 [ 269.267693][T10057] should_failslab+0xc2/0x120 [ 269.267712][T10057] kmem_cache_alloc_lru_noprof+0x79/0x6e0 [ 269.267737][T10057] ? __d_alloc+0x32/0xae0 [ 269.267761][T10057] ? __d_alloc+0x32/0xae0 [ 269.267778][T10057] __d_alloc+0x32/0xae0 [ 269.267800][T10057] d_alloc_parallel+0x111/0x1510 [ 269.267829][T10057] ? look_up_lock_class+0x59/0x150 [ 269.267855][T10057] ? register_lock_class+0x41/0x4c0 [ 269.267873][T10057] ? __pfx_d_alloc_parallel+0x10/0x10 [ 269.267900][T10057] ? lockdep_init_map_type+0x5c/0x280 [ 269.267918][T10057] ? lockdep_init_map_type+0x5c/0x280 [ 269.267939][T10057] __lookup_slow+0x193/0x460 [ 269.267963][T10057] ? __pfx___lookup_slow+0x10/0x10 [ 269.268006][T10057] ? lookup_fast+0x156/0x610 [ 269.268036][T10057] walk_component+0x353/0x5b0 [ 269.268063][T10057] path_lookupat+0x142/0x6d0 [ 269.268078][T10057] ? kasan_save_stack+0x33/0x60 [ 269.268097][T10057] filename_lookup+0x224/0x5f0 [ 269.268115][T10057] ? __pfx_filename_lookup+0x10/0x10 [ 269.268161][T10057] do_linkat+0x14c/0x5a0 [ 269.268184][T10057] ? __pfx_do_linkat+0x10/0x10 [ 269.268202][T10057] ? strncpy_from_user+0x203/0x2e0 [ 269.268224][T10057] ? getname_flags.part.0+0x1c5/0x550 [ 269.268252][T10057] __x64_sys_link+0x7d/0xa0 [ 269.268272][T10057] do_syscall_64+0xcd/0xfa0 [ 269.268299][T10057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.268316][T10057] RIP: 0033:0x7ff46238efc9 [ 269.268330][T10057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.268347][T10057] RSP: 002b:00007ff4632d4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000056 [ 269.268363][T10057] RAX: ffffffffffffffda RBX: 00007ff4625e5fa0 RCX: 00007ff46238efc9 [ 269.268374][T10057] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000200000000280 [ 269.268385][T10057] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 269.268395][T10057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.268404][T10057] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 269.268429][T10057] [ 269.564757][T10058] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1319'. [ 269.583759][T10058] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1319'. [ 270.249775][T10077] netlink: 'syz.3.1323': attribute type 20 has an invalid length. [ 270.258200][T10077] IPv6: NLM_F_CREATE should be specified when creating new route [ 270.266365][T10077] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 270.273628][T10077] IPv6: NLM_F_CREATE should be set when creating new route [ 270.353150][ T30] kauditd_printk_skb: 9024 callbacks suppressed [ 270.353162][ T30] audit: type=1400 audit(1761769883.910:215038): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.392712][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.392731][T10073] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.399272][ T5477] audit: audit_lost=15008 audit_rate_limit=0 audit_backlog_limit=64 [ 270.433600][ T5808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.440379][T10073] audit: audit_lost=15009 audit_rate_limit=0 audit_backlog_limit=64 [ 270.454569][ T30] audit: type=1400 audit(1761769883.910:215039): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.455475][ T5477] audit: backlog limit exceeded [ 270.481946][ T5808] audit: audit_lost=15010 audit_rate_limit=0 audit_backlog_limit=64 [ 270.490259][T10073] audit: backlog limit exceeded [ 271.259077][T10104] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 271.286672][T10104] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 271.462983][T10104] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 271.636660][T10104] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 272.445073][T10121] netlink: 'syz.1.1339': attribute type 20 has an invalid length. [ 272.452982][T10121] IPv6: NLM_F_CREATE should be specified when creating new route [ 272.460886][T10121] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 272.468068][T10121] IPv6: NLM_F_CREATE should be set when creating new route [ 274.648116][T10173] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1353'. [ 275.362522][ T30] kauditd_printk_skb: 5642 callbacks suppressed [ 275.362553][ T30] audit: type=1400 audit(1761769889.090:220069): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.459463][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.483069][ T30] audit: type=1400 audit(1761769889.090:220070): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.507688][ T30] audit: type=1400 audit(1761769889.090:220071): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.530803][ T30] audit: type=1400 audit(1761769889.090:220072): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.552195][ T30] audit: type=1400 audit(1761769889.090:220073): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.576822][ T5477] audit: audit_lost=15215 audit_rate_limit=0 audit_backlog_limit=64 [ 275.580243][ T30] audit: type=1400 audit(1761769889.090:220074): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.606082][ T30] audit: type=1400 audit(1761769889.090:220075): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.656563][ T30] audit: type=1400 audit(1761769889.090:220076): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 279.418840][T10245] tap0: tun_chr_ioctl cmd 1074025678 [ 279.441511][T10245] tap0: group set to 0 [ 279.650929][T10259] FAULT_INJECTION: forcing a failure. [ 279.650929][T10259] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.711088][T10259] CPU: 1 UID: 0 PID: 10259 Comm: syz.1.1383 Not tainted syzkaller #0 PREEMPT(full) [ 279.711112][T10259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 279.711121][T10259] Call Trace: [ 279.711127][T10259] [ 279.711137][T10259] dump_stack_lvl+0x16c/0x1f0 [ 279.711166][T10259] should_fail_ex+0x512/0x640 [ 279.711189][T10259] _copy_to_user+0x32/0xd0 [ 279.711213][T10259] simple_read_from_buffer+0xcb/0x170 [ 279.711241][T10259] proc_fail_nth_read+0x197/0x240 [ 279.711261][T10259] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 279.711281][T10259] ? rw_verify_area+0xcf/0x6c0 [ 279.711303][T10259] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 279.711321][T10259] vfs_read+0x1e4/0xcf0 [ 279.711338][T10259] ? __pfx___mutex_lock+0x10/0x10 [ 279.711354][T10259] ? __pfx_vfs_read+0x10/0x10 [ 279.711376][T10259] ? __fget_files+0x20e/0x3c0 [ 279.711400][T10259] ksys_read+0x12a/0x250 [ 279.711413][T10259] ? __pfx_ksys_read+0x10/0x10 [ 279.711428][T10259] ? 0xffffffff81000000 [ 279.711441][T10259] ? fdget+0x187/0x210 [ 279.711460][T10259] do_syscall_64+0xcd/0xfa0 [ 279.711486][T10259] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.711504][T10259] RIP: 0033:0x7ff46238d9dc [ 279.711517][T10259] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 279.711531][T10259] RSP: 002b:00007ff4632d4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 279.711548][T10259] RAX: ffffffffffffffda RBX: 00007ff4625e5fa0 RCX: 00007ff46238d9dc [ 279.711558][T10259] RDX: 000000000000000f RSI: 00007ff4632d40a0 RDI: 0000000000000003 [ 279.711568][T10259] RBP: 00007ff4632d4090 R08: 0000000000000000 R09: 0000000000000000 [ 279.711577][T10259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.711586][T10259] R13: 00007ff4625e6038 R14: 00007ff4625e5fa0 R15: 00007fff91483c58 [ 279.711610][T10259] [ 280.266401][T10271] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 280.303503][T10274] FAULT_INJECTION: forcing a failure. [ 280.303503][T10274] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 280.353637][T10274] CPU: 1 UID: 0 PID: 10274 Comm: syz.4.1386 Not tainted syzkaller #0 PREEMPT(full) [ 280.353660][T10274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 280.353669][T10274] Call Trace: [ 280.353674][T10274] [ 280.353680][T10274] dump_stack_lvl+0x16c/0x1f0 [ 280.353709][T10274] should_fail_ex+0x512/0x640 [ 280.353731][T10274] _copy_from_user+0x2e/0xd0 [ 280.353753][T10274] copy_from_sockptr_offset+0x15c/0x1b0 [ 280.353774][T10274] ? __pfx_copy_from_sockptr_offset+0x10/0x10 [ 280.353799][T10274] do_ipt_set_ctl+0x544/0xae0 [ 280.353817][T10274] ? nf_sockopt_find.constprop.0+0x222/0x290 [ 280.353846][T10274] ? __pfx_do_ipt_set_ctl+0x10/0x10 [ 280.353859][T10274] ? lockdep_hardirqs_on+0x7c/0x110 [ 280.353874][T10274] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 280.353901][T10274] ? nf_sockopt_find.constprop.0+0x222/0x290 [ 280.353918][T10274] nf_setsockopt+0x8d/0xf0 [ 280.353935][T10274] ip_setsockopt+0xcb/0xf0 [ 280.353948][T10274] tcp_setsockopt+0xa7/0x100 [ 280.353961][T10274] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 280.353978][T10274] do_sock_setsockopt+0xf3/0x1d0 [ 280.353994][T10274] __sys_setsockopt+0x1a0/0x230 [ 280.354008][T10274] __x64_sys_setsockopt+0xbd/0x160 [ 280.354020][T10274] ? do_syscall_64+0x91/0xfa0 [ 280.354035][T10274] ? lockdep_hardirqs_on+0x7c/0x110 [ 280.354049][T10274] do_syscall_64+0xcd/0xfa0 [ 280.354064][T10274] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.354075][T10274] RIP: 0033:0x7f2ae4f8efc9 [ 280.354084][T10274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.354094][T10274] RSP: 002b:00007f2ae5e35038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 280.354105][T10274] RAX: ffffffffffffffda RBX: 00007f2ae51e5fa0 RCX: 00007f2ae4f8efc9 [ 280.354112][T10274] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000003 [ 280.354118][T10274] RBP: 00007f2ae5e35090 R08: 00000000000022f8 R09: 0000000000000000 [ 280.354124][T10274] R10: 0000200000002300 R11: 0000000000000246 R12: 0000000000000001 [ 280.354130][T10274] R13: 00007f2ae51e6038 R14: 00007f2ae51e5fa0 R15: 00007fff65be95a8 [ 280.354143][T10274] [ 280.370199][ T30] kauditd_printk_skb: 9925 callbacks suppressed [ 280.370212][ T30] audit: type=1400 audit(1761769894.100:228465): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.461347][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.464414][ T30] audit: type=1400 audit(1761769894.180:228466): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.469079][ T5477] audit: audit_lost=15728 audit_rate_limit=0 audit_backlog_limit=64 [ 280.469092][ T5477] audit: backlog limit exceeded [ 280.479600][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.486292][ T30] audit: type=1400 audit(1761769894.180:228467): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.510046][ T5477] audit: audit_lost=15729 audit_rate_limit=0 audit_backlog_limit=64 [ 280.529122][ T30] audit: type=1400 audit(1761769894.180:228468): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.739869][T10276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.419024][T10280] FAULT_INJECTION: forcing a failure. [ 281.419024][T10280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.471567][T10280] CPU: 0 UID: 0 PID: 10280 Comm: syz.3.1390 Not tainted syzkaller #0 PREEMPT(full) [ 281.471590][T10280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 281.471600][T10280] Call Trace: [ 281.471606][T10280] [ 281.471613][T10280] dump_stack_lvl+0x16c/0x1f0 [ 281.471644][T10280] should_fail_ex+0x512/0x640 [ 281.471664][T10280] ? page_copy_sane+0xcd/0x2d0 [ 281.471686][T10280] copy_folio_from_iter_atomic+0x36f/0x1ac0 [ 281.471715][T10280] ? simple_xattr_get+0x179/0x1d0 [ 281.471739][T10280] ? __pfx_copy_folio_from_iter_atomic+0x10/0x10 [ 281.471761][T10280] ? shmem_write_begin+0x176/0x300 [ 281.471789][T10280] ? __pfx_shmem_write_begin+0x10/0x10 [ 281.471812][T10280] ? timestamp_truncate+0x21e/0x2d0 [ 281.471833][T10280] ? balance_dirty_pages_ratelimited_flags+0x92/0x1260 [ 281.471859][T10280] generic_perform_write+0x221/0x900 [ 281.471889][T10280] ? __pfx_generic_perform_write+0x10/0x10 [ 281.471914][T10280] ? inode_needs_update_time.part.0+0x191/0x270 [ 281.471941][T10280] shmem_file_write_iter+0x10e/0x140 [ 281.471962][T10280] vfs_write+0x7d3/0x11d0 [ 281.471980][T10280] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 281.472004][T10280] ? __pfx___mutex_lock+0x10/0x10 [ 281.472021][T10280] ? __pfx_vfs_write+0x10/0x10 [ 281.472053][T10280] ksys_write+0x12a/0x250 [ 281.472069][T10280] ? __pfx_ksys_write+0x10/0x10 [ 281.472093][T10280] do_syscall_64+0xcd/0xfa0 [ 281.472120][T10280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.472138][T10280] RIP: 0033:0x7f51f578efc9 [ 281.472152][T10280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 281.472168][T10280] RSP: 002b:00007f51f66a1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 281.472184][T10280] RAX: ffffffffffffffda RBX: 00007f51f59e5fa0 RCX: 00007f51f578efc9 [ 281.472196][T10280] RDX: 0000000000001006 RSI: 0000200000002100 RDI: 0000000000000004 [ 281.472206][T10280] RBP: 00007f51f66a1090 R08: 0000000000000000 R09: 0000000000000000 [ 281.472215][T10280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.472225][T10280] R13: 00007f51f59e6038 R14: 00007f51f59e5fa0 R15: 00007ffccd1fc558 [ 281.472250][T10280] [ 282.129759][T10298] mkiss: ax0: crc mode is auto. [ 282.251109][T10305] FAULT_INJECTION: forcing a failure. [ 282.251109][T10305] name failslab, interval 1, probability 0, space 0, times 0 [ 282.302637][T10305] CPU: 1 UID: 0 PID: 10305 Comm: syz.0.1400 Not tainted syzkaller #0 PREEMPT(full) [ 282.302661][T10305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.302671][T10305] Call Trace: [ 282.302677][T10305] [ 282.302684][T10305] dump_stack_lvl+0x16c/0x1f0 [ 282.302714][T10305] should_fail_ex+0x512/0x640 [ 282.302738][T10305] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 282.302763][T10305] should_failslab+0xc2/0x120 [ 282.302784][T10305] kmem_cache_alloc_noprof+0x75/0x6e0 [ 282.302809][T10305] ? skb_clone+0x190/0x3f0 [ 282.302836][T10305] ? skb_clone+0x190/0x3f0 [ 282.302856][T10305] skb_clone+0x190/0x3f0 [ 282.302879][T10305] netlink_deliver_tap+0xabd/0xd30 [ 282.302910][T10305] netlink_unicast+0x64c/0x870 [ 282.302939][T10305] ? __pfx_netlink_unicast+0x10/0x10 [ 282.302972][T10305] netlink_sendmsg+0x8c8/0xdd0 [ 282.302999][T10305] ? __pfx_netlink_sendmsg+0x10/0x10 [ 282.303030][T10305] sock_write_iter+0x566/0x610 [ 282.303056][T10305] ? __pfx_sock_write_iter+0x10/0x10 [ 282.303089][T10305] ? bpf_lsm_file_permission+0x9/0x10 [ 282.303106][T10305] ? security_file_permission+0x71/0x210 [ 282.303124][T10305] ? rw_verify_area+0xcf/0x6c0 [ 282.303151][T10305] vfs_write+0x7d3/0x11d0 [ 282.303168][T10305] ? __pfx_sock_write_iter+0x10/0x10 [ 282.303198][T10305] ? __pfx_vfs_write+0x10/0x10 [ 282.303211][T10305] ? find_held_lock+0x2b/0x80 [ 282.303252][T10305] ksys_write+0x1f8/0x250 [ 282.303268][T10305] ? __pfx_ksys_write+0x10/0x10 [ 282.303292][T10305] do_syscall_64+0xcd/0xfa0 [ 282.303320][T10305] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.303337][T10305] RIP: 0033:0x7fc25418efc9 [ 282.303352][T10305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.303369][T10305] RSP: 002b:00007fc2523f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 282.303385][T10305] RAX: ffffffffffffffda RBX: 00007fc2543e5fa0 RCX: 00007fc25418efc9 [ 282.303396][T10305] RDX: 0000000000000014 RSI: 0000200000000080 RDI: 0000000000000003 [ 282.303406][T10305] RBP: 00007fc2523f6090 R08: 0000000000000000 R09: 0000000000000000 [ 282.303416][T10305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.303425][T10305] R13: 00007fc2543e6038 R14: 00007fc2543e5fa0 R15: 00007ffe6656ec68 [ 282.303446][T10305] [ 283.460555][T10332] [ 283.462898][T10332] ====================================================== [ 283.469888][T10332] WARNING: possible circular locking dependency detected [ 283.476881][T10332] syzkaller #0 Not tainted [ 283.481287][T10332] ------------------------------------------------------ [ 283.488275][T10332] syz.2.1409/10332 is trying to acquire lock: [ 283.494311][T10332] ffffffff8e531fa8 (pcpu_alloc_mutex){+.+.}-{4:4}, at: pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.503858][T10332] [ 283.503858][T10332] but task is already holding lock: [ 283.511195][T10332] ffff8880263f1e18 (&q->q_usage_counter(io)#17){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x15/0x20 [ 283.522394][T10332] [ 283.522394][T10332] which lock already depends on the new lock. [ 283.522394][T10332] [ 283.532768][T10332] [ 283.532768][T10332] the existing dependency chain (in reverse order) is: [ 283.541765][T10332] [ 283.541765][T10332] -> #2 (&q->q_usage_counter(io)#17){++++}-{0:0}: [ 283.550339][T10332] blk_alloc_queue+0x619/0x760 [ 283.555609][T10332] blk_mq_alloc_queue+0x172/0x280 [ 283.561137][T10332] __blk_mq_alloc_disk+0x29/0x120 [ 283.566662][T10332] loop_add+0x490/0xb70 [ 283.571317][T10332] loop_init+0x164/0x270 [ 283.576058][T10332] do_one_initcall+0x123/0x6e0 [ 283.581325][T10332] kernel_init_freeable+0x5c8/0x920 [ 283.587022][T10332] kernel_init+0x1c/0x2b0 [ 283.591846][T10332] ret_from_fork+0x675/0x7d0 [ 283.596932][T10332] ret_from_fork_asm+0x1a/0x30 [ 283.602199][T10332] [ 283.602199][T10332] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 283.609379][T10332] fs_reclaim_acquire+0x102/0x150 [ 283.614903][T10332] prepare_alloc_pages+0x162/0x610 [ 283.620513][T10332] __alloc_frozen_pages_noprof+0x18b/0x2470 [ 283.626910][T10332] __alloc_pages_noprof+0xb/0x1b0 [ 283.632435][T10332] pcpu_populate_chunk+0x110/0xb00 [ 283.638046][T10332] pcpu_alloc_noprof+0x86a/0x14c0 [ 283.643570][T10332] xt_percpu_counter_alloc+0x13e/0x1b0 [ 283.649525][T10332] find_check_entry.constprop.0+0xbc/0x9b0 [ 283.655831][T10332] translate_table+0xc98/0x1720 [ 283.661177][T10332] ipt_register_table+0x102/0x430 [ 283.666697][T10332] iptable_security_table_init+0x40/0x60 [ 283.672827][T10332] xt_find_table_lock+0x2e4/0x520 [ 283.678346][T10332] xt_request_find_table_lock+0x28/0xf0 [ 283.684389][T10332] get_info+0x19c/0x7c0 [ 283.689039][T10332] do_ipt_get_ctl+0x169/0xaa0 [ 283.694213][T10332] nf_getsockopt+0x7c/0xe0 [ 283.699129][T10332] ip_getsockopt+0x18c/0x1e0 [ 283.704215][T10332] tcp_getsockopt+0xa1/0x100 [ 283.709306][T10332] do_sock_getsockopt+0x34d/0x440 [ 283.714831][T10332] __sys_getsockopt+0x12f/0x260 [ 283.720180][T10332] __x64_sys_getsockopt+0xbd/0x160 [ 283.725789][T10332] do_syscall_64+0xcd/0xfa0 [ 283.730793][T10332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.737182][T10332] [ 283.737182][T10332] -> #0 (pcpu_alloc_mutex){+.+.}-{4:4}: [ 283.744881][T10332] __lock_acquire+0x126f/0x1c90 [ 283.750232][T10332] lock_acquire+0x179/0x350 [ 283.755228][T10332] __mutex_lock+0x193/0x1060 [ 283.760311][T10332] pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.765837][T10332] __percpu_counter_init_many+0x42/0x3b0 [ 283.771966][T10332] blkg_rwstat_init+0x2c/0xd0 [ 283.777143][T10332] throtl_pd_alloc+0xf1/0xa50 [ 283.782318][T10332] blkcg_activate_policy+0x7e6/0xf00 [ 283.788103][T10332] blk_throtl_init+0x3bb/0x710 [ 283.793366][T10332] tg_set_conf.constprop.0+0x3ca/0x560 [ 283.799319][T10332] cgroup_file_write+0x1ef/0x790 [ 283.804758][T10332] kernfs_fop_write_iter+0x3af/0x570 [ 283.810540][T10332] vfs_write+0x7d3/0x11d0 [ 283.815372][T10332] ksys_write+0x12a/0x250 [ 283.820215][T10332] do_syscall_64+0xcd/0xfa0 [ 283.825234][T10332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.831632][T10332] [ 283.831632][T10332] other info that might help us debug this: [ 283.831632][T10332] [ 283.841836][T10332] Chain exists of: [ 283.841836][T10332] pcpu_alloc_mutex --> fs_reclaim --> &q->q_usage_counter(io)#17 [ 283.841836][T10332] [ 283.855457][T10332] Possible unsafe locking scenario: [ 283.855457][T10332] [ 283.862878][T10332] CPU0 CPU1 [ 283.868218][T10332] ---- ---- [ 283.873555][T10332] lock(&q->q_usage_counter(io)#17); [ 283.878911][T10332] lock(fs_reclaim); [ 283.885383][T10332] lock(&q->q_usage_counter(io)#17); [ 283.893253][T10332] lock(pcpu_alloc_mutex); [ 283.897732][T10332] [ 283.897732][T10332] *** DEADLOCK *** [ 283.897732][T10332] [ 283.905846][T10332] 7 locks held by syz.2.1409/10332: [ 283.911014][T10332] #0: ffff888030f469b8 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x2a2/0x370 [ 283.920059][T10332] #1: ffff88807b45a420 (sb_writers#11){.+.+}-{0:0}, at: ksys_write+0x12a/0x250 [ 283.929084][T10332] #2: ffff88807ba4cc88 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x28f/0x570 [ 283.938797][T10332] #3: ffff88807ec885a8 (kn->active#64){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x2ff/0x570 [ 283.948783][T10332] #4: ffff8880263f2020 (&q->rq_qos_mutex){+.+.}-{4:4}, at: blkg_conf_open_bdev+0x2a7/0x410 [ 283.958848][T10332] #5: ffff8880263f1e18 (&q->q_usage_counter(io)#17){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x15/0x20 [ 283.970489][T10332] #6: ffff8880263f1e50 (&q->q_usage_counter(queue)){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x15/0x20 [ 283.982122][T10332] [ 283.982122][T10332] stack backtrace: [ 283.987984][T10332] CPU: 1 UID: 0 PID: 10332 Comm: syz.2.1409 Not tainted syzkaller #0 PREEMPT(full) [ 283.988000][T10332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.988009][T10332] Call Trace: [ 283.988014][T10332] [ 283.988019][T10332] dump_stack_lvl+0x116/0x1f0 [ 283.988039][T10332] print_circular_bug+0x275/0x350 [ 283.988061][T10332] check_noncircular+0x14c/0x170 [ 283.988082][T10332] __lock_acquire+0x126f/0x1c90 [ 283.988105][T10332] lock_acquire+0x179/0x350 [ 283.988116][T10332] ? pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.988135][T10332] ? __pfx___might_resched+0x10/0x10 [ 283.988152][T10332] ? _raw_spin_unlock_irqrestore+0x31/0x80 [ 283.988171][T10332] ? pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.988189][T10332] __mutex_lock+0x193/0x1060 [ 283.988200][T10332] ? pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.988219][T10332] ? kasan_save_stack+0x42/0x60 [ 283.988231][T10332] ? kasan_save_stack+0x33/0x60 [ 283.988243][T10332] ? kasan_save_track+0x14/0x30 [ 283.988255][T10332] ? __pfx___mutex_lock+0x10/0x10 [ 283.988265][T10332] ? cgroup_file_write+0x1ef/0x790 [ 283.988284][T10332] ? kernfs_fop_write_iter+0x3af/0x570 [ 283.988296][T10332] ? vfs_write+0x7d3/0x11d0 [ 283.988307][T10332] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.988324][T10332] ? pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.988342][T10332] pcpu_alloc_noprof+0xb4c/0x14c0 [ 283.988363][T10332] __percpu_counter_init_many+0x42/0x3b0 [ 283.988380][T10332] blkg_rwstat_init+0x2c/0xd0 [ 283.988398][T10332] throtl_pd_alloc+0xf1/0xa50 [ 283.988416][T10332] ? __pfx_throtl_pd_alloc+0x10/0x10 [ 283.988434][T10332] blkcg_activate_policy+0x7e6/0xf00 [ 283.988453][T10332] blk_throtl_init+0x3bb/0x710 [ 283.988473][T10332] tg_set_conf.constprop.0+0x3ca/0x560 [ 283.988486][T10332] ? __pfx_tg_set_conf.constprop.0+0x10/0x10 [ 283.988499][T10332] ? kernfs_root+0xee/0x2a0 [ 283.988516][T10332] ? kernfs_root+0xf8/0x2a0 [ 283.988533][T10332] cgroup_file_write+0x1ef/0x790 [ 283.988554][T10332] ? __pfx_tg_set_conf_uint+0x10/0x10 [ 283.988566][T10332] ? __pfx_cgroup_file_write+0x10/0x10 [ 283.988586][T10332] kernfs_fop_write_iter+0x3af/0x570 [ 283.988598][T10332] ? __pfx_cgroup_file_write+0x10/0x10 [ 283.988617][T10332] vfs_write+0x7d3/0x11d0 [ 283.988629][T10332] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 283.988642][T10332] ? __pfx___mutex_lock+0x10/0x10 [ 283.988653][T10332] ? __pfx_vfs_write+0x10/0x10 [ 283.988669][T10332] ksys_write+0x12a/0x250 [ 283.988681][T10332] ? __pfx_ksys_write+0x10/0x10 [ 283.988694][T10332] do_syscall_64+0xcd/0xfa0 [ 283.988714][T10332] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.988726][T10332] RIP: 0033:0x7f624338efc9 [ 283.988737][T10332] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.988750][T10332] RSP: 002b:00007f62442bb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 283.988762][T10332] RAX: ffffffffffffffda RBX: 00007f62435e6090 RCX: 00007f624338efc9 [ 283.988771][T10332] RDX: 000000000000006a RSI: 00002000000000c0 RDI: 0000000000000007 [ 283.988778][T10332] RBP: 00007f62442bb090 R08: 0000000000000000 R09: 0000000000000000 [ 283.988786][T10332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.988793][T10332] R13: 00007f62435e6128 R14: 00007f62435e6090 R15: 00007ffda7ccf918 [ 283.988806][T10332] [ 285.380243][ T30] kauditd_printk_skb: 14200 callbacks suppressed [ 285.380258][ T30] audit: type=1400 audit(1761769899.110:240698): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.386826][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.409013][ T30] audit: type=1400 audit(1761769899.110:240699): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.414825][ T5477] audit: audit_lost=16387 audit_rate_limit=0 audit_backlog_limit=64 [ 285.435832][ T30] audit: type=1400 audit(1761769899.110:240700): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.443965][ T5477] audit: backlog limit exceeded [ 285.465012][ T30] audit: type=1400 audit(1761769899.110:240701): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.470411][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.498212][ T5477] audit: audit_lost=16388 audit_rate_limit=0 audit_backlog_limit=64 [ 285.506341][ T5477] audit: backlog limit exceeded [ 285.718389][T10315] ceph: No mds server is up or the cluster is laggy [ 290.390061][ T30] kauditd_printk_skb: 50394 callbacks suppressed [ 290.390076][ T30] audit: type=1400 audit(1761769904.110:289896): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.396740][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.417784][ T30] audit: type=1400 audit(1761769904.120:289897): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.424348][ T5477] audit: audit_lost=16789 audit_rate_limit=0 audit_backlog_limit=64 [ 290.453884][ T5477] audit: backlog limit exceeded [ 290.458822][ T30] audit: type=1400 audit(1761769904.120:289898): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.459091][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.480353][ T30] audit: type=1400 audit(1761769904.120:289899): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.488624][ T5477] audit: audit_lost=16790 audit_rate_limit=0 audit_backlog_limit=64 [ 290.507980][ T30] audit: type=1400 audit(1761769904.120:289900): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0