last executing test programs: 24m19.895477554s ago: executing program 2 (id=115): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$IOCTL_VMCI_CTX_SET_CPT_STATE(0xffffffffffffffff, 0x7b2, &(0x7f0000001680)={&(0x7f0000000680)=[0x100000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7df3, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x70, 0x0, 0xf2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8f1, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fc, 0x0, 0x0, 0xd0f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6d1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe02e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x9, 0xcf, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x4, 0x7, 0x800, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0xa0da, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x413f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4000000, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10006, 0x0, 0x0, 0x0, 0x3f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x22, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x789], 0x1, 0x400}) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0xa}, 0x94) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000180)="420fc7bc4898580000640f01c50f01c566baf80cb864c95782ef66bafc0cec67670f1b0166b8fb008ec046d9c3c442b90a2c81c442812852fcc744240012000000c74424020b000000ff1c24", 0x4c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000240)={[0x5836, 0x5, 0xa, 0xe51, 0x1, 0x5479, 0x1efc, 0x0, 0xffffffffffffffff, 0x32a, 0xfffffffffffffffe, 0xffffffff, 0x0, 0x40000000009, 0x5, 0x6a], 0x2000, 0x808d6}) write$rfkill(0xffffffffffffffff, &(0x7f0000000000)={0x3, 0x2, 0x0, 0x0, 0x1}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x7, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_vhci(0x0, 0x7) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x7, 0x0, 0x0, 0x0, 0x4}, 0x94) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000340), 0x0) fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) r6 = shmget(0x1, 0x4000, 0x200, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r6, 0x0) 24m16.493034366s ago: executing program 2 (id=121): r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) futex_waitv(0x0, 0x0, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8c}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000380)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000001240)={0x50, 0x0, r4, {0x7, 0x2b, 0xfff, 0x83120, 0x3, 0x7, 0x1ff, 0x9, 0x0, 0x0, 0x10, 0x80000000}}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000740)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0xfffffff7}}, 0x30) statx(0xffffffffffffff9c, 0x0, 0x100, 0x800, 0x0) mmap$dsp(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xd, 0x40010, r1, 0x0) read$FUSE(r0, &(0x7f0000006380)={0x2020}, 0x2020) syz_open_dev$dri(0x0, 0x1, 0x0) 24m15.658070584s ago: executing program 2 (id=125): socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002d00)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}}, 0x800) recvmmsg(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001180)=""/4096}, {&(0x7f0000000440)=""/128}], 0x0, &(0x7f00000004c0)=""/193}, 0x7f}, {{&(0x7f00000005c0)=@in, 0x0, &(0x7f0000000700)=[{&(0x7f0000000640)=""/35}, {&(0x7f0000000680)=""/127}], 0x0, &(0x7f0000000740)=""/23}, 0x3}], 0x400000000000054, 0x40012100, 0x0) process_mrelease(0xffffffffffffffff, 0x0) r3 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x8001}, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r3, 0xc0285700, &(0x7f0000000100)={0x1b, "5660359c3245d1c42317afad7d48ed51000000000000000100", 0xffffffffffffffff}) r6 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x141100, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r6, 0xc0285700, &(0x7f0000000140)={0x1000, "340b7832ceefd131b8e6498c25f58fad9987ffe93bbabd18cf501922de974a27", 0xffffffffffffffff}) ioctl$SYNC_IOC_MERGE(r5, 0xc0303e03, &(0x7f00000000c0)={"3c24139ed44aec57f2e2ad238a7b448ed886923c31d4b8affbf514fd00", r7, 0xffffffffffffffff}) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r10 = ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r10, 0xae60) setrlimit(0x9, &(0x7f00000001c0)={0x5, 0xdbc}) close_range(r3, r8, 0x0) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0xfffffffff0000000}) 24m14.31581994s ago: executing program 2 (id=129): sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x9fe, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x4001, 0x0) 24m10.077587643s ago: executing program 2 (id=138): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) fsopen(&(0x7f0000000500)='ramfs\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000280)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x18, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000730000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0xc3100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file1/file0/file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x220) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000300)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r5, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) 24m9.039031137s ago: executing program 2 (id=140): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, r3, 0x5eae78d9c54e9d3f, 0x70bd2a, 0x25dfdc01}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x48804) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000300), 0x343ec0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x51) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r7, &(0x7f0000000500)=ANY=[@ANYBLOB="1500000065ffff048000000800395032303030"], 0x15) r8 = dup(r7) syz_usb_connect$hid(0x2, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r9 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r9, &(0x7f0000019680)=""/102392, 0x18ff8) write$FUSE_BMAP(r8, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@cache_readahead}], [{@euid_lt}], 0x6b}}) truncate(&(0x7f0000000240)='./file0\x00', 0x206b12) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa2f00, 0xa3) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000240)={0x28, 0x3, r5, 0x0, &(0x7f0000000380)="f3", 0x1, 0xfffffffffffffc01}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000200)={0x28, 0x3, r1, 0x0, &(0x7f0000000100)="ac", 0x1, 0x3}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000002c0)={0x28, 0x4, r1, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x13}) 23m53.638145137s ago: executing program 32 (id=140): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, r3, 0x5eae78d9c54e9d3f, 0x70bd2a, 0x25dfdc01}, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x48804) r4 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000300), 0x343ec0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r4, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x51) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r7, &(0x7f0000000500)=ANY=[@ANYBLOB="1500000065ffff048000000800395032303030"], 0x15) r8 = dup(r7) syz_usb_connect$hid(0x2, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r9 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r9, &(0x7f0000019680)=""/102392, 0x18ff8) write$FUSE_BMAP(r8, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@cache_readahead}], [{@euid_lt}], 0x6b}}) truncate(&(0x7f0000000240)='./file0\x00', 0x206b12) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xa2f00, 0xa3) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000240)={0x28, 0x3, r5, 0x0, &(0x7f0000000380)="f3", 0x1, 0xfffffffffffffc01}) ioctl$IOMMU_IOAS_MAP(r0, 0x3b85, &(0x7f0000000200)={0x28, 0x3, r1, 0x0, &(0x7f0000000100)="ac", 0x1, 0x3}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000002c0)={0x28, 0x4, r1, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x13}) 9.535950475s ago: executing program 3 (id=5013): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xf) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280), 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e22, @empty}], 0xffffffffffffff45) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4000) sendmmsg$unix(r3, 0x0, 0x0, 0x4040880) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000100)={0x18, 0x0, {0xfffe, @empty, 'veth1_to_bond\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @local, 'geneve0\x00'}}, 0x1e) close(r6) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000140), 0x8) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[], 0x14}}, 0x0) syz_usb_connect(0x2, 0x9a2, &(0x7f0000000280)=ANY=[@ANYBLOB="12010000d0241710d8050a81b892000000010902900902000000000904"], 0x0) r8 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x80402) pwrite64(r8, 0x0, 0x0, 0x9) sendmsg$nl_route_sched(r2, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x2b1e}, 0x408d4) 7.005542053s ago: executing program 0 (id=5021): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="08000000040000000400"], 0x50) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_bond\x00'}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) socket(0x840000000002, 0x3, 0xff) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0xa) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x83f}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x2a, 0x0, &(0x7f0000000640)) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x5, 0x4}}, 0x10) read$msr(r0, &(0x7f0000006900)=""/102400, 0x19000) capget(0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r3, 0x0, 0x2f, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x4e20, @local}}}, 0x108) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001000370400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="93be24871739ee6dc943106ba4caf9af66"], 0x28}}, 0x4) mmap(&(0x7f00001fd000/0x1000)=nil, 0x1000, 0x2000000, 0x10, r3, 0x0) openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) 6.910241718s ago: executing program 5 (id=5022): close(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x84, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e23, @empty}}, 0xfffc, 0x86}, &(0x7f0000000500)=0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4ee59ce4, 0xfffffffffffffffe, 0xfffffffc}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911", 0x11, 0x0, 0x0, 0x0) bind$can_j1939(r3, &(0x7f0000000000)={0x1d, r2, 0x3ffff, {}, 0xfe}, 0x18) close(r3) 6.850557871s ago: executing program 0 (id=5023): fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/address_bits', 0x0, 0x0) keyctl$clear(0x3, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000300), 0x0, 0x80) ioctl$CEC_ADAP_S_LOG_ADDRS(r2, 0xc05c6104, &(0x7f00000000c0)={"fbffffff", 0x0, 0x5, 0x4, 0xf, 0x0, "000000ff00070000000900", '\x00', "05030400", "e86eade4", ['\x00', "00000012184eb81f43d83ba1", "0c000004dd372a9000"]}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x1, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x85}, 0x0) brk(0x400000ffc000) io_uring_enter(0xffffffffffffffff, 0x567, 0x0, 0x8, 0x0, 0x0) r3 = inotify_init1(0x0) r4 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r4, &(0x7f0000000540)={0xa, 0x4e24, 0x10000, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) r5 = fsopen(&(0x7f00000002c0)='pstore\x00', 0x1) fsconfig$FSCONFIG_SET_BINARY(r5, 0x2, &(0x7f0000000300)='\x00', &(0x7f0000000340)='?', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x2000434) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x0, 0x4, 0x0, 0x59, 0x0, 'syz1\x00', 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc1105518, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x1, 0x8000000000000000, 0x0, 0xfffffffffffffffe, 0xb, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8, 0x0, 0x4, 0x800000, 0x0, 0x101, 0x0, 0xd721, 0x0, 0x4, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x58, 0x4, 0x0, 0x3, 0x4000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000006fd]}) 6.071930116s ago: executing program 3 (id=5025): r0 = syz_open_dev$swradio(&(0x7f0000000340), 0x0, 0x2) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, 0x0) r1 = socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(r3, 0x0, 0x0, 0xfffffe04, 0x1) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x141, 0x0, 0x4}, 0x18) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r4, 0x4b4c, &(0x7f0000000080)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) openat$sequencer2(0xffffff9c, &(0x7f0000000080), 0x143240, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) gettid() setsockopt$MRT6_INIT(r1, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x1, 0x40}, 0xc) setsockopt$MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, {0xa, 0x0, 0x0, @empty}, 0x0, {[0x7]}}, 0x5c) setsockopt$MRT6_FLUSH(r1, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={0x0, 0x2fc}, 0x1, 0x0, 0x0, 0x80}, 0x4008040) 5.658105655s ago: executing program 5 (id=5026): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') 4.911750803s ago: executing program 4 (id=5027): pipe(&(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_vhci(0x0, 0x7) syz_open_dev$cec(0x0, 0x0, 0x0) r3 = openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r6}, 0x38) r7 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r7, 0xc0285700, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000180)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$IPSET_CMD_TEST(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="640000000906010800000000000000000600000505000100070000003c0007801800148014000240fc0000000000000000000000000000011800018014000240ff01000000000000000000000000000105000300070000000900020073"], 0x64}}, 0x4800) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x20000090) ioctl$SW_SYNC_IOC_INC(r3, 0x40045701, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x20, 0x68, 0x5fb9a818fb7378e9, 0xfffffffe, 0x25dfdbff, {}, [@NHA_OIF={0x8, 0x5, r9}]}, 0x20}}, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="380000006800010003001000fdffff7f00000000000000000c00020001000000150000000c000c8006000100d73d000006000300010000008ee97121a7a90882018dd84c66bf094922ae19501eb9017481f897e3dbd1ab4527d7da2df7a4bad51575ba6112fc6dedf735ea7bff39c6c49ebbbe6b51758d08b51e003103ff649bb4c4ba84d0451960739a2b25107de77cedb4eda41e96f23e09b23fd552ae4cb2b2959404186722ae2177cf67d15b278730ef3781357eba295fabb6346b8da17e6847c7532935d3d8954a987b542d03ccd9ba0bf622240e4846f8a44f5e76c3c874"], 0x38}, 0x1, 0x0, 0x0, 0x4008018}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)=@newlink={0x20, 0x10, 0x437, 0x0, 0x0, {0x0, 0x0, 0x0, r9, 0x192}}, 0x20}}, 0x0) mbind(&(0x7f0000381000/0x2000)=nil, 0x2000, 0x8000, 0x0, 0x800008, 0x1) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x1, 0x0, 0x8, 0x2) 4.652480898s ago: executing program 0 (id=5028): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)) rmdir(&(0x7f0000000380)='./file0/../file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001140)='io_uring_task_add\x00', 0xffffffffffffffff, 0x0, 0xd12}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$sock(r3, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)='\x00', 0x1}], 0x1}}, {{0x0, 0x3f, &(0x7f0000000040)=[{&(0x7f00000002c0)="a6", 0x3f}], 0x1}}], 0x2, 0x40448c0) shutdown(r3, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 4.50321544s ago: executing program 1 (id=5029): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)) rmdir(&(0x7f0000000380)='./file0/../file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001140)='io_uring_task_add\x00', 0xffffffffffffffff, 0x0, 0xd12}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$sock(r3, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)='\x00', 0x1}], 0x1}}, {{0x0, 0x3f, &(0x7f0000000040)=[{&(0x7f00000002c0)="a6", 0x3f}], 0x1}}], 0x2, 0x40448c0) shutdown(r3, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 4.128072444s ago: executing program 5 (id=5030): fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/address_bits', 0x0, 0x0) keyctl$clear(0x3, 0xfffffffffffffffd) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000240)='(\\.\x03/\']\\\x81\xac5\x17+.-![&\\^\'$)\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000300), 0x0, 0x80) ioctl$CEC_ADAP_S_LOG_ADDRS(r2, 0xc05c6104, &(0x7f00000000c0)={"fbffffff", 0x0, 0x5, 0x4, 0xf, 0x0, "000000ff00070000000900", '\x00', "05030400", "e86eade4", ['\x00', "00000012184eb81f43d83ba1", "0c000004dd372a9000"]}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x1, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x85}, 0x0) brk(0x400000ffc000) io_uring_enter(0xffffffffffffffff, 0x567, 0x0, 0x8, 0x0, 0x0) r3 = inotify_init1(0x0) r4 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r4, &(0x7f0000000540)={0xa, 0x4e24, 0x10000, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}, 0x1c) r5 = fsopen(&(0x7f00000002c0)='pstore\x00', 0x1) fsconfig$FSCONFIG_SET_BINARY(r5, 0x2, &(0x7f0000000300)='\x00', &(0x7f0000000340)='?', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x2000434) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) r6 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x0, 0x4, 0x0, 0x59, 0x0, 'syz1\x00', 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r6, 0xc1105518, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, 0x1, 0x8000000000000000, 0x0, 0xfffffffffffffffe, 0xb, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8, 0x0, 0x4, 0x800000, 0x0, 0x101, 0x0, 0xd721, 0x0, 0x4, 0x0, 0x0, 0x1, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x58, 0x4, 0x0, 0x3, 0x4000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000006fd]}) 3.846062432s ago: executing program 0 (id=5031): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001140)='io_uring_task_add\x00', 0xffffffffffffffff, 0x0, 0xd12}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$sock(r3, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)='\x00', 0x1}], 0x1}}, {{0x0, 0x3f, &(0x7f0000000040)=[{&(0x7f00000002c0)="a6", 0x3f}], 0x1}}], 0x2, 0x40448c0) shutdown(r3, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 3.7755107s ago: executing program 1 (id=5032): socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) prctl$PR_SCHED_CORE(0x26, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) socket(0x840000000002, 0x3, 0xff) getgroups(0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f0000003040)="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", 0x2000, &(0x7f0000006c40)={&(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x2b, 0x0, 0x50401164, 0x8, 0xff, 0x0, 0x3, 0x0, 0x0, 0x1, 0xfffffffe}}, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x6, {0xfffffffffffffff2}}, &(0x7f0000000200)={0x18, 0x0, 0x4}, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x60, 0x0, 0x8, {{0x10000, 0x5, 0x20000000004, 0x9, 0x5, 0x86d5, 0x6, 0x2}}}, &(0x7f00000005c0)={0x18, 0x0, 0x0, {0x7}}, &(0x7f0000000240)=ANY=[], &(0x7f00000006c0)={0x20, 0x0, 0x5432, {0x0, 0x6}}, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="6c00000032bd0000000000000500000000000000f7ffffffffffffff0f000000020000002f6465762f6370752f232f6d73720000010000000000000003000000000000000900000000000000880400000000000002000000090000000200000000000000070000000000000004000000000000000300000000000000010000000000000001000000000000800300000006000000660f00000040000069fb0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYBLOB="ae0000000400000000000000020000000000000007000000000000000f000000f7ffffff2f6465762f6370752f232f6d737200000100000000000000030000000000000007ffffffffffffff000000000000002005000000240d00000500000000000000070000000000000009000000000000000100000000000000d845000000000000010000000000000001000000050000007f00000000c000000700", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="4000000077000000000000000300000000000000000000000000008005000000010400008e5e5e5e2a0000000100000000000000030000000000000009000000000000008007000000005254d28d000006000000030000000000000008000000f40a5801925b06ed9fd1e34715ddd100000000040000000000000000000000000000000500", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="0000000003000000000000000100000000000000030000000000000008000000ff00000062726964676530000500000000000000010000000000000003000000000000007f0000000000000005000000050000000500000000000000db0000000000000000000000000000008100000000000000060000000000000000000000000000000700000044000000050000000060000006000000", @ANYRES32=0x0, @ANYRESOCT=0x0, @ANYRESDEC=0x0], &(0x7f00000069c0)={0xa0, 0x0, 0x7ff, {{0x5, 0x2, 0x0, 0x3, 0x0, 0x8, {0x4, 0x4, 0x5, 0xb5, 0x1, 0x6, 0xb7f, 0x1, 0x1, 0x4000, 0x63, 0x0, 0x0, 0x403, 0xe}}, {0x0, 0x18}}}, &(0x7f0000006a80)={0x20, 0x0, 0x0, {0x1003, 0x0, 0x10001, 0xc84}}, &(0x7f0000006b00)={0x130, 0xfffffffffffffff5, 0xf, {0x3, 0x9d, 0x0, '\x00', {0x2, 0x9, 0x9, 0x7, 0x0, 0x0, 0x6000, '\x00', 0x6, 0x9, 0x2, 0x100, {0x2, 0x1e24}, {0x9, 0xfff}, {0x8, 0x40}, {0x5, 0xcadd}, 0x4, 0x7fe, 0xffff, 0x6}}}}) ioctl$sock_SIOCOUTQ(r1, 0x5411, 0x0) setpriority(0x2, 0x0, 0x4) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) fcntl$getown(r3, 0x9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x1c0002, 0x0) write$vga_arbiter(r4, &(0x7f0000000180)=ANY=[@ANYBLOB='t.1\x00'/13], 0xfe8e) symlink(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000000)='./file0\x00') syz_open_procfs$namespace(0x0, 0x0) 3.435441699s ago: executing program 1 (id=5033): syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="070000000900004fa1005e9ee3372866da7f6c00000000000040000000", @ANYRES32, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="4fc100000100"/28], 0x50) socket(0x840000000002, 0x5, 0xfa) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r2, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800", @ANYRES32, @ANYBLOB="0000000000000000009a0e26f02000000000000000000000fc2a83e206fbc3ba78ef871ae92e4011a38baff159db60660000000000000200b7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r3, 0x3b81, &(0x7f0000000200)={0xc, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791090000000000063000004000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) ioctl$IOMMU_IOAS_MAP$PAGES(r3, 0x3b85, &(0x7f0000000040)={0x28, 0x7, r4, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r3, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r4, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r3, 0x3ba0, &(0x7f0000000100)={0x48, 0x7, r5, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x334e8b}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r3, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r5, 0x0, 0x1, 0x0, 0x1, 0xd6fe2, 0x3d3b4e}) ioctl$IOMMU_IOAS_UNMAP$ALL(r3, 0x3b86, &(0x7f0000000240)={0x18, r4}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="62696c746572000000000004000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000026ebd38d8ef4704b0d06453ded41bf1f89ff"], 0x68) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f00000000c0)='test_dummy_e{cryption', &(0x7f0000000040)='vto_da_allos\x00\xe9\x82\xdb ', 0x0) statx(0xffffffffffffffff, 0x0, 0x100, 0x20, 0x0) socket$nl_route(0x10, 0x3, 0x0) 3.395178639s ago: executing program 0 (id=5034): syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="070000000900004fa1005e9ee3372866da7f6c000000", @ANYRES32, @ANYBLOB='\a\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) socket(0x840000000002, 0x5, 0xfa) socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$vim2m_VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800", @ANYRES32, @ANYBLOB="0000000000000000009a0e26f02000000000000000000000fc2a83e206fbc3ba78ef871ae92e4011a38baff159db60660000000000000200b7", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, &(0x7f0000000200)={0xc, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791090000000000063000004000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @flow_dissector}, 0x48) ioctl$IOMMU_IOAS_MAP$PAGES(r2, 0x3b85, &(0x7f0000000040)={0x28, 0x7, r3, 0x0, &(0x7f0000800000/0x800000)=nil, 0x800000}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r2, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r3, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r2, 0x3ba0, &(0x7f0000000100)={0x48, 0x7, r4, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x334e8b}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r2, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r4, 0x0, 0x1, 0x0, 0x1, 0xd6fe2, 0x3d3b4e}) ioctl$IOMMU_IOAS_UNMAP$ALL(r2, 0x3b86, &(0x7f0000000240)={0x18, r3}) 3.382865278s ago: executing program 4 (id=5035): socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x8000}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) prctl$PR_SCHED_CORE(0x26, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) socket(0x840000000002, 0x3, 0xff) getgroups(0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f0000003040)="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", 0x2000, &(0x7f0000006c40)={&(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x2b, 0x0, 0x50401164, 0x8, 0xff, 0x0, 0x3, 0x0, 0x0, 0x1, 0xfffffffe}}, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x6, {0xfffffffffffffff2}}, &(0x7f0000000200)={0x18, 0x0, 0x4}, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x60, 0x0, 0x8, {{0x10000, 0x5, 0x20000000004, 0x9, 0x5, 0x86d5, 0x6, 0x2}}}, &(0x7f00000005c0)={0x18, 0x0, 0x0, {0x7}}, &(0x7f0000000240)=ANY=[], &(0x7f00000006c0)={0x20, 0x0, 0x5432, {0x0, 0x6}}, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYRESHEX, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="6c00000032bd0000000000000500000000000000f7ffffffffffffff0f000000020000002f6465762f6370752f232f6d73720000010000000000000003000000000000000900000000000000880400000000000002000000090000000200000000000000070000000000000004000000000000000300000000000000010000000000000001000000000000800300000006000000660f00000040000069fb0000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYRESOCT, @ANYBLOB="ae0000000400000000000000020000000000000007000000000000000f000000f7ffffff2f6465762f6370752f232f6d737200000100000000000000030000000000000007ffffffffffffff000000000000002005000000240d00000500000000000000070000000000000009000000000000000100000000000000d845000000000000010000000000000001000000050000007f00000000c000000700", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYRESOCT=r1, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="4000000077000000000000000300000000000000000000000000008005000000010400008e5e5e5e2a0000000100000000000000030000000000000009000000000000008007000000005254d28d000006000000030000000000000008000000f40a5801925b06ed9fd1e34715ddd100000000040000000000000000000000000000000500", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="0000000003000000000000000100000000000000030000000000000008000000ff00000062726964676530000500000000000000010000000000000003000000000000007f0000000000000005000000050000000500000000000000db0000000000000000000000000000008100000000000000060000000000000000000000000000000700000044000000050000000060000006000000", @ANYRES32=0x0, @ANYRESOCT=0x0, @ANYRESDEC=0x0], &(0x7f00000069c0)={0xa0, 0x0, 0x7ff, {{0x5, 0x2, 0x0, 0x3, 0x0, 0x8, {0x4, 0x4, 0x5, 0xb5, 0x1, 0x6, 0xb7f, 0x1, 0x1, 0x4000, 0x63, 0x0, 0x0, 0x403, 0xe}}, {0x0, 0x18}}}, &(0x7f0000006a80)={0x20, 0x0, 0x0, {0x1003, 0x0, 0x10001, 0xc84}}, &(0x7f0000006b00)={0x130, 0xfffffffffffffff5, 0xf, {0x3, 0x9d, 0x0, '\x00', {0x2, 0x9, 0x9, 0x7, 0x0, 0x0, 0x6000, '\x00', 0x6, 0x9, 0x2, 0x100, {0x2, 0x1e24}, {0x9, 0xfff}, {0x8, 0x40}, {0x5, 0xcadd}, 0x4, 0x7fe, 0xffff, 0x6}}}}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) setpriority(0x2, 0x0, 0x4) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) fcntl$getown(r2, 0x9) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x1c0002, 0x0) write$vga_arbiter(r3, &(0x7f0000000180)=ANY=[@ANYBLOB='t.1\x00'/13], 0xfe8e) symlink(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000000)='./file0\x00') syz_open_procfs$namespace(0x0, 0x0) 2.977297587s ago: executing program 3 (id=5036): close(0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x84, &(0x7f0000000440)={0x0, @in={{0x2, 0x4e23, @empty}}, 0xfffc, 0x86}, &(0x7f0000000500)=0x90) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vxcan0\x00', 0x0}) r3 = socket$can_j1939(0x1d, 0x2, 0x7) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x0, 0x0, 0x4ee59ce4, 0xfffffffffffffffe, 0xfffffffc}, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0)="3f03fe7f0302140006001e0089e9aaa911", 0x11, 0x0, 0x0, 0x0) bind$can_j1939(r3, &(0x7f0000000000)={0x1d, r2, 0x3ffff, {}, 0xfe}, 0x18) close(r3) 2.966435992s ago: executing program 4 (id=5037): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) socket(0x2a, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) arch_prctl$ARCH_REQ_XCOMP_PERM(0x1023, 0x14) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg(r6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001dc0)=""/4096, 0x1000}, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000033c0)={0x53, 0x0, 0x0, 0xfa, @scatter={0x0, 0x0, &(0x7f0000000a80)}, 0x0, 0x0, 0x0, 0x0, 0x800001, 0x0}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) 2.260134759s ago: executing program 3 (id=5038): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) rmdir(&(0x7f0000000380)='./file0/../file0\x00') socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 2.259659872s ago: executing program 3 (id=5039): r0 = socket$inet_smc(0x2b, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x24) ioctl$KVM_CAP_DIRTY_LOG_RING(r3, 0x4068aea3, &(0x7f0000000680)) openat$audio(0xffffff9c, 0x0, 0x1052c0, 0x0) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x4000000000002fe, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[], 0x74}, 0x1, 0x0, 0x0, 0x400c010}, 0x10) r5 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r6 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r6, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r7, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r6, 0xc06864ce, &(0x7f0000000440)={r8, 0x0, 0x0, 0x0, 0x0, [0x0], [0x7, 0x0, 0x0, 0x80]}) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000140)={0x3ff, 0x7f, 0xb5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000080)={r9, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETFB2(r6, 0xc06864ce, &(0x7f0000000200)={r8, 0x0, 0x0, 0x0, 0x0, [0x0]}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000000300)={0x0, 0x0, r11}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r11, 0xc04064a0, &(0x7f00000004c0)={&(0x7f0000000100), &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xa, 0x2, 0x4}) ioctl$DRM_IOCTL_MODE_ATOMIC(r6, 0xc03864bc, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f0000000040)={r12}) close_range(r0, 0xffffffffffffffff, 0x0) 1.675275896s ago: executing program 4 (id=5040): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r3, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) readv(r4, 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = dup(0xffffffffffffffff) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) write$FUSE_GETXATTR(r5, &(0x7f00000000c0)={0x18}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) write$FUSE_INIT(r5, &(0x7f0000000600)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x3, 0x4200000, 0xf800, 0xfff9, 0xe, 0x800, 0x0, 0x0, 0x8, 0x9}}, 0x50) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache}]}}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{}, &(0x7f00000009c0), &(0x7f0000000a00)='%+9llu \x00'}, 0x20) landlock_restrict_self(0xffffffffffffffff, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, 0x0, 0x0) getsockopt$packet_int(r2, 0x107, 0x18, 0x0, &(0x7f0000000040)) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) close(0x3) socket$inet6(0xa, 0x2, 0x0) 1.543117981s ago: executing program 0 (id=5041): syz_usb_connect(0x3, 0x24, &(0x7f0000000380)=ANY=[@ANYBLOB="12010000ddbd731082057d0085a3000000010902120001000000000904000000976958000ed97770343f38c22fa42de12c4f3f96b5a9d2fa0f005a4956949b997dab706073fe65bdccf6ceb1"], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x4, 0x1000085}, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r0, 0x0, 0x0, 0x20004041, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000003e000701feffffff00000000017c0000040042800c00018006000600800a000020000280"], 0x44}, 0x1, 0x0, 0x0, 0x40040c0}, 0xc000) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}, 0x7}, 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES8=r0], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYRES16=r3, @ANYBLOB="0900000000000000000002000000140001800500020001"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000180)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x2) read$msr(r4, &(0x7f0000019680)=""/102384, 0x18ff0) r5 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r5, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_VFIO_IOAS$SET(r5, 0x3b88, &(0x7f0000000200)={0xc, r6}) ioctl$IOMMU_VFIO_GET_API_VERSION(r5, 0x3b64) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r5, 0x3b72, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000001c000000000000000000fb5652abca3e0195f8139d648f27cbb0a18e447ee82b101dea7f49c43407c21725b074edb6ddffffffff371cf408b6e2f88bd43d23fef0537ad098659a5fd6098ade3cfb64a137885036c883c0de9d4cc2db964f4f9c7f7e30893faa4830ce2258d70ff9548a9dbcf5962c961d19aed55d6897beaf3e348d4ee7fc253ded695c9d441e428f17c5addc9c00ad404fd98c209aa4987653b4c6f56f46b2"]) ioctl$IOMMU_IOAS_UNMAP$ALL(r5, 0x3b86, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x200880, 0x0) io_setup(0x222, &(0x7f0000000180)=0x0) io_submit(r7, 0x1, &(0x7f0000000080)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6417, 0xffffffffffffffff, 0x0, 0x0, 0x6ed}]) 1.385124844s ago: executing program 4 (id=5042): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x80, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020e0000150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120020000200fcffffff0000000006003300000000000000000000000000fe8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122", @ANYRES32=r4, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x700, {0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f00000003c0)={0x4, 0x80100008b}, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, 0x0) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000002080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000200)=0x3, 0x4) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000002700)=""/102392, 0x18ff8) syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) 1.327619839s ago: executing program 4 (id=5043): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0xf) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000280), 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e22, @empty}], 0xffffffffffffff45) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r4, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4000) sendmmsg$unix(r3, 0x0, 0x0, 0x4040880) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000100)={0x18, 0x0, {0xfffe, @empty, 'veth1_to_bond\x00'}}, 0x1e) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @local, 'geneve0\x00'}}, 0x1e) close(r6) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000140), 0x8) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB], 0x14}}, 0x0) syz_usb_connect(0x2, 0x9a2, &(0x7f0000000280)=ANY=[@ANYBLOB="12010000d0241710d8050a81b892000000010902900902000000000904"], 0x0) r8 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x80402) pwrite64(r8, 0x0, 0x0, 0x9) sendmsg$nl_route_sched(r2, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x1, 0x2b1e}, 0x408d4) 1.29403736s ago: executing program 5 (id=5044): syz_emit_ethernet(0x46, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './bus\x00'}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) fchdir(0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f00000001c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000080)=0x20) fchown(r4, 0x0, 0x0) r6 = socket(0x2, 0x80805, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) sendmmsg$inet(r6, &(0x7f0000000900)=[{{&(0x7f0000000080)={0x2, 0x4, @rand_addr=0xac1414bb}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000ac0)="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", 0x541}], 0x1}}], 0x2, 0x0) r7 = fsopen(&(0x7f0000000040)='ntfs3\x00', 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f00000003c0), r0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r4, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r8, @ANYBLOB="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"], 0xb8}, 0x1, 0x0, 0x0, 0x40040}, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) r9 = syz_open_dev$vim2m(&(0x7f0000000000), 0x47b, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r9, 0xc008561c, &(0x7f0000000040)={0xf0f01a, 0x5}) 1.08026935s ago: executing program 5 (id=5045): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001140)='io_uring_task_add\x00', 0xffffffffffffffff, 0x0, 0xd12}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$sock(r3, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000280)='\x00', 0x1}], 0x1}}, {{0x0, 0x3f, &(0x7f0000000040)=[{&(0x7f00000002c0)="a6", 0x3f}], 0x1}}], 0x2, 0x40448c0) shutdown(r3, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 1.011644814s ago: executing program 1 (id=5046): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) rmdir(&(0x7f0000000380)='./file0/../file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000011c0)={&(0x7f0000001140)='io_uring_task_add\x00', 0xffffffffffffffff, 0x0, 0xd12}, 0x18) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x20}, 0xc) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r3, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$sock(r3, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000200)}}, {{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="a6", 0x1}], 0x1}}], 0x2, 0x40448c0) shutdown(r3, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 259.321299ms ago: executing program 5 (id=5047): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r3, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x2) readv(r4, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = dup(0xffffffffffffffff) write$FUSE_BMAP(r5, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) write$FUSE_GETXATTR(r5, &(0x7f00000000c0)={0x18}, 0x18) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) write$FUSE_INIT(r5, &(0x7f0000000600)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x3, 0x4200000, 0xf800, 0xfff9, 0xe, 0x800, 0x0, 0x0, 0x8, 0x9}}, 0x50) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@cache_fscache}]}}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a40)={{}, &(0x7f00000009c0), 0x0}, 0x20) landlock_restrict_self(0xffffffffffffffff, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, 0x0, 0x0) getsockopt$packet_int(r2, 0x107, 0x18, 0x0, &(0x7f0000000040)) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd000000000000007208", 0x39}], 0x1) close(0x3) socket$inet6(0xa, 0x2, 0x0) 188.420126ms ago: executing program 3 (id=5048): syz_usb_connect(0x2, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x8e, 0xc6, 0x1e, 0x40, 0x7c9, 0x12, 0xc2f4, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xcb, 0x8e, 0x2f}}]}}]}}, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x4c, &(0x7f0000000000), 0x4) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './cgroup\x00'}, 0x6e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet6(0x10, 0x80000, 0x3) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)=@newqdisc={0xf0fb1c915450e0f1, 0x24, 0xf0b, 0x70bd2d, 0x0, {0x0, 0x0, 0x12, 0x0, {}, {0x9, 0xffff}, {0x2, 0x5}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_TXTIME_DELAY={0x8, 0xb, 0x4}, @TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0xf, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4], 0x0, [0x8, 0x4, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0xfffe, 0x3], [0x0, 0x8]}}]}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x9}, @TCA_INGRESS_BLOCK={0x8}, @qdisc_kind_options=@q_prio={{}, {0x0, 0x2, {0x2, "50dcc843149aafbf97145189da7719b6"}}}]}, 0xac}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000058000000030a0102000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c0004804800018008000100666962003c000280080003400000000c0800014000000002080001400000003008000240000000030800014000000012080003"], 0x122}}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xfffd}, [@IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x11, 0x1, 0x0, 0x98cbdd08856ddb1}, @IPSET_ATTR_BUCKETSIZE={0x5, 0x15, 0x3}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x58}}, 0x80) syz_80211_join_ibss(&(0x7f00000002c0)='wlan0\x00', &(0x7f0000000380)=@random="c12fd58c", 0x4, 0x2) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x822b01) r6 = syz_open_dev$mouse(&(0x7f0000000680), 0x0, 0x14b200) read(r6, 0x0, 0x2) write$char_usb(r6, &(0x7f0000000440)="e20576d8305eda80a9a9bc8f7df2814c2e4967df78c53a907621bc02008c18e67bc5dea3bd5901f34e69b6b31e23c21dbd72fb9cd903c07eb7fb38dabd6ad4ab9c7fcc8b7da9ba1e0000000100000003818a2d3a26", 0x55) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) 187.100794ms ago: executing program 1 (id=5049): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) rmdir(&(0x7f0000000380)='./file0/../file0\x00') socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sched_setscheduler(0x0, 0x2, 0x0) sendto$inet6(r1, &(0x7f0000000180)="1a", 0x34000, 0x0, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) syz_open_dev$vim2m(&(0x7f0000000000), 0x6, 0x2) 0s ago: executing program 1 (id=5050): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, 0x0, 0x0) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x80, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020e0000150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120020000200fcffffff0000000006003300000000000000000000000000fe8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@setneightbl={0x14, 0x43, 0x1, 0xffff7ffe, 0x0, {0xa}}, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c0000001000850600000000ff6122314a000800", @ANYRES32=r4, @ANYBLOB="f5ff0f00252155b21c0012000c000100626f6e64000000000c0002000800010001"], 0x3c}}, 0x40000) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x700, {0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0xc0b0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f00000003c0)={0x4, 0x80100008b}, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000002080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000200)=0x3, 0x4) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f0000002700)=""/102392, 0x18ff8) r6 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) utime(&(0x7f0000000240)='./bus\x00', &(0x7f0000000340)={0x1, 0x100}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f00000005c0)={r7, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) kernel console output (not intermixed with test programs): :dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1211.845224][ T5515] audit: audit_lost=115706 audit_rate_limit=0 audit_backlog_limit=64 [ 1211.867053][ T5515] audit: backlog limit exceeded [ 1211.874276][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1211.880859][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1214.412854][T20986] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3722'. [ 1216.453437][T21022] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3732'. [ 1216.716368][ T30] kauditd_printk_skb: 3275 callbacks suppressed [ 1216.716379][ T30] audit: type=1400 audit(1757152406.927:639572): avc: denied { read write } for pid=21021 comm="syz.4.3732" name="loop9" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1216.762093][ T30] audit: type=1400 audit(1757152406.977:639573): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1216.845581][ T30] audit: type=1400 audit(1757152407.047:639574): avc: denied { execmem } for pid=21027 comm="syz.4.3734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1216.926468][ T30] audit: type=1400 audit(1757152407.057:639575): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1216.977519][ T30] audit: type=1400 audit(1757152407.057:639576): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1217.105780][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1217.189945][ T5515] audit: audit_lost=115719 audit_rate_limit=0 audit_backlog_limit=64 [ 1217.209487][ T5515] audit: backlog limit exceeded [ 1217.218477][ T30] audit: type=1400 audit(1757152407.057:639577): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1217.253647][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1218.216454][T21044] netlink: 28 bytes leftover after parsing attributes in process `syz.4.3738'. [ 1221.382275][T21087] netlink: 'syz.3.3748': attribute type 1 has an invalid length. [ 1221.538080][T21087] bond38: entered promiscuous mode [ 1221.554068][T21087] 8021q: adding VLAN 0 to HW filter on device bond38 [ 1221.813704][ T30] kauditd_printk_skb: 3359 callbacks suppressed [ 1221.813720][ T30] audit: type=1400 audit(1757152411.827:642557): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1221.970700][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1221.991823][T21096] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1221.991865][ T30] audit: type=1400 audit(1757152411.827:642558): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1221.998389][ T5515] audit: audit_lost=115847 audit_rate_limit=0 audit_backlog_limit=64 [ 1222.037258][T21096] audit: audit_lost=115848 audit_rate_limit=0 audit_backlog_limit=64 [ 1222.079521][T21096] audit: backlog limit exceeded [ 1222.180669][ T5515] audit: backlog limit exceeded [ 1222.190843][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1222.191152][T21096] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1222.297286][T21100] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3753'. [ 1222.539492][T21102] serio: Serial port ptm0 [ 1222.693663][T21102] netlink: 9 bytes leftover after parsing attributes in process `syz.3.3754'. [ 1224.620547][T21135] netlink: 'syz.4.3762': attribute type 1 has an invalid length. [ 1224.646616][T21135] bond40: entered promiscuous mode [ 1224.662037][T21135] 8021q: adding VLAN 0 to HW filter on device bond40 [ 1226.822638][ T30] kauditd_printk_skb: 3160 callbacks suppressed [ 1226.822650][ T30] audit: type=1400 audit(1757152417.037:645625): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1227.077428][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1227.203255][T21161] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1227.209917][T21161] audit: audit_lost=115881 audit_rate_limit=0 audit_backlog_limit=64 [ 1227.218823][T21161] audit: backlog limit exceeded [ 1227.228573][T21161] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1227.235169][T21161] audit: audit_lost=115882 audit_rate_limit=0 audit_backlog_limit=64 [ 1227.243265][T21161] audit: backlog limit exceeded [ 1227.252111][T21161] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1227.258653][T21161] audit: audit_lost=115883 audit_rate_limit=0 audit_backlog_limit=64 [ 1228.626129][T21184] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3774'. [ 1228.732921][T21183] netlink: 'syz.4.3773': attribute type 4 has an invalid length. [ 1228.755039][T21183] netlink: 'syz.4.3773': attribute type 4 has an invalid length. [ 1229.608523][T21200] netlink: 'syz.5.3778': attribute type 1 has an invalid length. [ 1229.748961][T21200] bond40: entered promiscuous mode [ 1229.754768][T21200] 8021q: adding VLAN 0 to HW filter on device bond40 [ 1229.854141][T21205] overlayfs: missing 'lowerdir' [ 1231.830020][ T30] kauditd_printk_skb: 4866 callbacks suppressed [ 1231.830030][ T30] audit: type=1400 audit(1757152422.047:650453): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1231.916509][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1231.928451][T21231] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1231.936416][ T5515] audit: audit_lost=115897 audit_rate_limit=0 audit_backlog_limit=64 [ 1231.950619][T21231] audit: audit_lost=115898 audit_rate_limit=0 audit_backlog_limit=64 [ 1231.958777][ T30] audit: type=1400 audit(1757152422.087:650454): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1231.959019][ T30] audit: type=1400 audit(1757152422.087:650455): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1232.004242][ T5515] audit: backlog limit exceeded [ 1232.015907][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1232.030148][T21231] audit: backlog limit exceeded [ 1232.756269][T21235] serio: Serial port ptm0 [ 1234.399104][T21260] netlink: 'syz.5.3791': attribute type 4 has an invalid length. [ 1234.421389][T21260] netlink: 'syz.5.3791': attribute type 4 has an invalid length. [ 1236.840563][ T30] kauditd_printk_skb: 5429 callbacks suppressed [ 1236.840573][ T30] audit: type=1400 audit(1757152427.047:653867): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1236.966242][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1236.988864][ T5515] audit: audit_lost=116572 audit_rate_limit=0 audit_backlog_limit=64 [ 1236.989165][T21287] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1237.039649][T21287] audit: audit_lost=116573 audit_rate_limit=0 audit_backlog_limit=64 [ 1237.060386][T21280] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1237.066905][T21280] audit: audit_lost=116574 audit_rate_limit=0 audit_backlog_limit=64 [ 1237.075024][T21280] audit: backlog limit exceeded [ 1237.084912][T21280] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1237.091488][T21280] audit: audit_lost=116575 audit_rate_limit=0 audit_backlog_limit=64 [ 1238.376074][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.382464][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1239.305858][T21311] netlink: 'syz.5.3804': attribute type 1 has an invalid length. [ 1239.456889][T21311] bond41: entered promiscuous mode [ 1239.490831][T21311] 8021q: adding VLAN 0 to HW filter on device bond41 [ 1239.558780][T21318] netlink: 'syz.3.3806': attribute type 1 has an invalid length. [ 1239.649378][T21318] bond39: entered promiscuous mode [ 1239.665605][T21318] 8021q: adding VLAN 0 to HW filter on device bond39 [ 1240.141328][T21333] overlayfs: missing 'lowerdir' [ 1241.338825][T21343] netlink: 'syz.3.3813': attribute type 4 has an invalid length. [ 1241.965722][ T30] kauditd_printk_skb: 4583 callbacks suppressed [ 1241.965737][ T30] audit: type=1400 audit(1757152431.987:657134): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1242.356406][ T30] audit: type=1400 audit(1757152431.987:657135): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1242.473430][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1242.678080][ T5515] audit: audit_lost=117014 audit_rate_limit=0 audit_backlog_limit=64 [ 1242.693501][ T30] audit: type=1400 audit(1757152431.987:657136): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1242.715543][ T5515] audit: backlog limit exceeded [ 1242.726506][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1242.734723][ T30] audit: type=1400 audit(1757152431.987:657137): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1242.756136][ T5515] audit: audit_lost=117015 audit_rate_limit=0 audit_backlog_limit=64 [ 1242.779558][ T5515] audit: backlog limit exceeded [ 1243.147984][T21359] netlink: 'syz.0.3817': attribute type 1 has an invalid length. [ 1243.463264][T21359] bond42: entered promiscuous mode [ 1243.472391][T21359] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1244.723540][T21384] netlink: 'syz.1.3822': attribute type 1 has an invalid length. [ 1244.804588][T21384] bond32: entered promiscuous mode [ 1244.819856][T21384] 8021q: adding VLAN 0 to HW filter on device bond32 [ 1245.312804][T21389] overlayfs: missing 'lowerdir' [ 1246.271386][T21394] serio: Serial port ptm0 [ 1246.971166][ T30] kauditd_printk_skb: 6240 callbacks suppressed [ 1246.971180][ T30] audit: type=1400 audit(1757152437.194:661605): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.180172][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1247.181801][T21403] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1247.186840][ T30] audit: type=1400 audit(1757152437.224:661606): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.200562][T21406] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1247.214991][ T5515] audit: audit_lost=117607 audit_rate_limit=0 audit_backlog_limit=64 [ 1247.229307][ T5515] audit: backlog limit exceeded [ 1247.244042][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1247.251934][ T5515] audit: audit_lost=117608 audit_rate_limit=0 audit_backlog_limit=64 [ 1247.251975][ T30] audit: type=1400 audit(1757152437.234:661607): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.488011][T21413] netlink: 'syz.1.3830': attribute type 1 has an invalid length. [ 1247.488522][T21414] netlink: 'syz.4.3831': attribute type 4 has an invalid length. [ 1247.740088][T21413] bond33: entered promiscuous mode [ 1247.745615][T21413] 8021q: adding VLAN 0 to HW filter on device bond33 [ 1249.180541][T21447] serio: Serial port ptm0 [ 1249.606311][T21451] overlayfs: missing 'lowerdir' [ 1249.812585][T21455] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3842'. [ 1251.957803][T21482] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3848'. [ 1251.992516][ T30] kauditd_printk_skb: 5014 callbacks suppressed [ 1251.992531][ T30] audit: type=1400 audit(1757152442.179:664346): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.318518][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1252.328410][ T5515] audit: audit_lost=118368 audit_rate_limit=0 audit_backlog_limit=64 [ 1252.352778][ T30] audit: type=1400 audit(1757152442.209:664347): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.376259][ T30] audit: type=1400 audit(1757152442.209:664348): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.482061][ T5515] audit: backlog limit exceeded [ 1252.609973][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1252.610714][ T30] audit: type=1400 audit(1757152442.209:664349): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.644794][ T30] audit: type=1400 audit(1757152442.209:664350): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.666246][ T5515] audit: audit_lost=118369 audit_rate_limit=0 audit_backlog_limit=64 [ 1254.829264][T21502] serio: Serial port ptm0 [ 1255.140360][T21502] netlink: 9 bytes leftover after parsing attributes in process `syz.0.3855'. [ 1255.200374][T21512] overlayfs: missing 'lowerdir' [ 1256.436309][T21526] netlink: 'syz.4.3861': attribute type 1 has an invalid length. [ 1256.604255][T21526] bond41: entered promiscuous mode [ 1256.611827][T21526] 8021q: adding VLAN 0 to HW filter on device bond41 [ 1256.650909][T21532] netlink: 'syz.1.3864': attribute type 1 has an invalid length. [ 1256.850911][T21532] bond34: entered promiscuous mode [ 1256.901811][T21532] 8021q: adding VLAN 0 to HW filter on device bond34 [ 1256.987647][T21542] serio: Serial port ptm0 [ 1257.004285][ T30] kauditd_printk_skb: 2829 callbacks suppressed [ 1257.004302][ T30] audit: type=1400 audit(1757152447.209:667032): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1257.040021][ T30] audit: type=1400 audit(1757152447.219:667033): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1257.071360][ T30] audit: type=1400 audit(1757152447.219:667034): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1257.095720][T21541] netlink: 9 bytes leftover after parsing attributes in process `syz.4.3865'. [ 1257.108228][ T30] audit: type=1400 audit(1757152447.219:667035): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1257.201547][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1257.208068][ T5515] audit: audit_lost=118419 audit_rate_limit=0 audit_backlog_limit=64 [ 1257.302154][T21548] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1257.315883][ T5847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1257.332508][ T5515] audit: backlog limit exceeded [ 1257.338621][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1257.357489][T21550] netlink: 'syz.4.3868': attribute type 1 has an invalid length. [ 1257.365399][T21548] netlink: 'syz.1.3867': attribute type 1 has an invalid length. [ 1257.525094][T21548] bond35: entered promiscuous mode [ 1257.530702][T21548] 8021q: adding VLAN 0 to HW filter on device bond35 [ 1257.597716][T21550] bond42: entered promiscuous mode [ 1257.603143][T21550] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1259.067974][T21584] netlink: 'syz.0.3875': attribute type 1 has an invalid length. [ 1259.103693][T21584] bond43: entered promiscuous mode [ 1259.110699][T21584] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1260.293764][T21602] serio: Serial port ptm0 [ 1262.023395][ T30] kauditd_printk_skb: 6204 callbacks suppressed [ 1262.023408][ T30] audit: type=1400 audit(1757152451.969:673027): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1262.137906][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1262.146065][ T5515] audit: audit_lost=118492 audit_rate_limit=0 audit_backlog_limit=64 [ 1262.156909][ T5515] audit: backlog limit exceeded [ 1262.163679][ T30] audit: type=1400 audit(1757152452.219:673028): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1262.187821][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1262.195186][ T5515] audit: audit_lost=118493 audit_rate_limit=0 audit_backlog_limit=64 [ 1262.205568][ T5515] audit: backlog limit exceeded [ 1262.211027][ T30] audit: type=1400 audit(1757152452.219:673029): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1262.240804][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1263.178150][T21637] serio: Serial port ptm0 [ 1263.512021][T21637] netlink: 9 bytes leftover after parsing attributes in process `syz.1.3890'. [ 1267.141453][ T30] kauditd_printk_skb: 8444 callbacks suppressed [ 1267.141468][ T30] audit: type=1400 audit(1757152457.359:676264): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1267.197796][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1267.212000][ T5515] audit: audit_lost=120231 audit_rate_limit=0 audit_backlog_limit=64 [ 1267.237690][ T5515] audit: backlog limit exceeded [ 1267.249630][T21684] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1267.256207][T21684] audit: audit_lost=120232 audit_rate_limit=0 audit_backlog_limit=64 [ 1267.264422][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1267.264696][ T30] audit: type=1400 audit(1757152457.399:676265): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1267.303544][ T5515] audit: audit_lost=120233 audit_rate_limit=0 audit_backlog_limit=64 [ 1267.312057][T21684] audit: backlog limit exceeded [ 1268.214030][T21709] netlink: 'syz.5.3909': attribute type 1 has an invalid length. [ 1268.752368][T21720] netlink: 'syz.3.3912': attribute type 1 has an invalid length. [ 1268.837338][T21720] bond40: entered promiscuous mode [ 1268.857435][T21720] 8021q: adding VLAN 0 to HW filter on device bond40 [ 1271.165677][T21753] netlink: 'syz.4.3920': attribute type 1 has an invalid length. [ 1271.460322][T21762] netlink: 'syz.1.3921': attribute type 1 has an invalid length. [ 1271.500963][T21753] bond43: entered promiscuous mode [ 1271.527281][T21753] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1272.231978][ T30] kauditd_printk_skb: 7391 callbacks suppressed [ 1272.231991][ T30] audit: type=1400 audit(1757152462.269:680356): avc: denied { create } for pid=21766 comm="syz.1.3923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1272.291408][ T30] audit: type=1326 audit(1757152462.389:680357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21766 comm="syz.1.3923" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb1d678ebe9 code=0x7ffc0000 [ 1272.366842][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1272.397639][T21775] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1272.404293][T21775] audit: audit_lost=121334 audit_rate_limit=0 audit_backlog_limit=64 [ 1272.420644][T21775] audit: backlog limit exceeded [ 1272.431655][T21775] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1272.438528][T21775] audit: audit_lost=121335 audit_rate_limit=0 audit_backlog_limit=64 [ 1272.448084][T21775] audit: backlog limit exceeded [ 1272.509563][ T5515] audit: audit_lost=121336 audit_rate_limit=0 audit_backlog_limit=64 [ 1273.198233][T21780] serio: Serial port ptm0 [ 1276.458877][T21830] netlink: 'syz.3.3939': attribute type 4 has an invalid length. [ 1277.454754][ T30] kauditd_printk_skb: 5464 callbacks suppressed [ 1277.454770][ T30] audit: type=1400 audit(1757152467.669:684150): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1277.499201][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1277.539706][ T5515] audit: audit_lost=121894 audit_rate_limit=0 audit_backlog_limit=64 [ 1277.590217][ T5515] audit: backlog limit exceeded [ 1277.617739][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1277.676043][ T5515] audit: audit_lost=121895 audit_rate_limit=0 audit_backlog_limit=64 [ 1277.714930][ T30] audit: type=1400 audit(1757152467.669:684151): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1277.722909][ T5515] audit: backlog limit exceeded [ 1277.875607][ T30] audit: type=1400 audit(1757152467.669:684152): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1277.897298][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1282.473522][ T30] kauditd_printk_skb: 14506 callbacks suppressed [ 1282.473537][ T30] audit: type=1400 audit(1757152472.149:687235): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1282.558127][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1282.578913][ T5515] audit: audit_lost=125704 audit_rate_limit=0 audit_backlog_limit=64 [ 1282.690837][ T5515] audit: backlog limit exceeded [ 1282.695786][ T30] audit: type=1400 audit(1757152472.689:687237): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1282.728481][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1282.737064][T21886] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1282.753763][ T5515] audit: audit_lost=125705 audit_rate_limit=0 audit_backlog_limit=64 [ 1282.782891][T21886] audit: audit_lost=125706 audit_rate_limit=0 audit_backlog_limit=64 [ 1282.823001][T21887] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1283.132993][T21892] netlink: 'syz.0.3955': attribute type 1 has an invalid length. [ 1283.161539][T21892] bond44: entered promiscuous mode [ 1283.167105][T21892] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1286.474484][T21935] netlink: 'syz.0.3965': attribute type 4 has an invalid length. [ 1286.535333][T21936] netlink: 'syz.0.3965': attribute type 4 has an invalid length. [ 1287.430815][T21941] netlink: 'syz.4.3968': attribute type 1 has an invalid length. [ 1287.491721][ T30] kauditd_printk_skb: 5302 callbacks suppressed [ 1287.491736][ T30] audit: type=1400 audit(1757152477.699:692074): avc: denied { read write } for pid=5844 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1287.522814][ T30] audit: type=1400 audit(1757152477.719:692075): avc: denied { mounton } for pid=21938 comm="syz.3.3966" path="/824/file0" dev="tmpfs" ino=4583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1287.547905][ T30] audit: type=1400 audit(1757152477.719:692076): avc: denied { prog_load } for pid=21938 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1287.560245][T21941] bond44: entered promiscuous mode [ 1287.567629][ T30] audit: type=1400 audit(1757152477.719:692077): avc: denied { create } for pid=21938 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1287.599443][ T30] audit: type=1400 audit(1757152477.719:692078): avc: denied { create } for pid=21938 comm="syz.3.3966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1287.606424][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1287.632799][T21947] serio: Serial port ptm0 [ 1287.658778][ T30] audit: type=1400 audit(1757152477.719:692079): avc: denied { read write } for pid=21938 comm="syz.3.3966" name="video6" dev="devtmpfs" ino=938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1287.684405][T21941] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1287.686244][ T30] audit: type=1400 audit(1757152477.749:692080): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1287.719982][ T30] audit: type=1400 audit(1757152477.749:692081): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1287.739853][ T5515] audit: audit_lost=125862 audit_rate_limit=0 audit_backlog_limit=64 [ 1288.281145][T21968] serio: Serial port ptm0 [ 1289.383877][T21986] netlink: 'syz.4.3979': attribute type 1 has an invalid length. [ 1289.442066][T21986] bond45: entered promiscuous mode [ 1289.447677][T21986] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1289.678688][T21993] netlink: 'syz.4.3981': attribute type 1 has an invalid length. [ 1289.744067][T21993] bond46: entered promiscuous mode [ 1289.764314][T21993] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1290.436639][T22012] netlink: 'syz.4.3985': attribute type 4 has an invalid length. [ 1290.459916][T22012] netlink: 'syz.4.3985': attribute type 4 has an invalid length. [ 1292.026545][T22027] netlink: 'syz.5.3990': attribute type 1 has an invalid length. [ 1292.198266][T22027] bond42: entered promiscuous mode [ 1292.205595][T22027] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1292.499681][ T30] kauditd_printk_skb: 7672 callbacks suppressed [ 1292.499696][ T30] audit: type=1400 audit(1757152482.719:695790): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1292.551992][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1292.568663][ T5515] audit: audit_lost=127184 audit_rate_limit=0 audit_backlog_limit=64 [ 1292.581572][ T5515] audit: backlog limit exceeded [ 1292.587364][T22033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1292.597628][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1292.604414][T22033] audit: audit_lost=127185 audit_rate_limit=0 audit_backlog_limit=64 [ 1292.614137][T22031] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1292.615493][ T5515] audit: audit_lost=127186 audit_rate_limit=0 audit_backlog_limit=64 [ 1292.628833][T22031] audit: audit_lost=127187 audit_rate_limit=0 audit_backlog_limit=64 [ 1292.702229][T22037] netlink: 'syz.5.3993': attribute type 1 has an invalid length. [ 1292.744604][T22037] bond43: entered promiscuous mode [ 1292.754780][T22036] serio: Serial port ptm0 [ 1292.811440][T22037] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1293.056503][T22050] netlink: 'syz.4.3995': attribute type 1 has an invalid length. [ 1293.160404][T22050] bond47: entered promiscuous mode [ 1293.166291][T22050] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1293.312009][T22055] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3997'. [ 1296.501206][T22095] netlink: 'syz.1.4009': attribute type 1 has an invalid length. [ 1296.668930][T22095] bond36: entered promiscuous mode [ 1296.693562][T22103] netlink: 'syz.3.4011': attribute type 1 has an invalid length. [ 1296.709995][T22095] 8021q: adding VLAN 0 to HW filter on device bond36 [ 1296.882274][T22103] bond41: entered promiscuous mode [ 1296.888254][T22103] 8021q: adding VLAN 0 to HW filter on device bond41 [ 1297.509530][ T30] kauditd_printk_skb: 6277 callbacks suppressed [ 1297.509541][ T30] audit: type=1400 audit(1757152487.729:700490): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.597761][ T30] audit: type=1400 audit(1757152487.779:700491): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.909069][ T30] audit: type=1400 audit(1757152487.779:700492): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.913238][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1297.930511][ T30] audit: type=1400 audit(1757152487.779:700493): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.930551][ T30] audit: type=1400 audit(1757152487.779:700494): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.930587][ T30] audit: type=1400 audit(1757152487.779:700495): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.930621][ T30] audit: type=1400 audit(1757152487.779:700496): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.930656][ T30] audit: type=1400 audit(1757152487.779:700497): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1297.930690][ T30] audit: type=1400 audit(1757152487.779:700498): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1298.521569][T22122] netlink: 'syz.0.4015': attribute type 1 has an invalid length. [ 1298.701034][T22122] bond45: entered promiscuous mode [ 1298.749465][T22122] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1299.702266][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.708600][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1300.275005][T22154] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4022'. [ 1300.929690][T22164] netlink: 'syz.4.4025': attribute type 1 has an invalid length. [ 1301.037798][T22164] bond48: entered promiscuous mode [ 1301.055541][T22164] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1301.809910][T22178] netlink: 'syz.1.4029': attribute type 1 has an invalid length. [ 1301.903139][T22178] bond37: entered promiscuous mode [ 1301.908705][T22178] 8021q: adding VLAN 0 to HW filter on device bond37 [ 1302.473191][T22199] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4034'. [ 1302.681539][ T30] kauditd_printk_skb: 5111 callbacks suppressed [ 1302.681554][ T30] audit: type=1400 audit(1757152492.889:704450): avc: denied { bpf } for pid=22191 comm="syz.1.4033" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1302.971363][ T30] audit: type=1400 audit(1757152492.889:704451): avc: denied { create } for pid=22191 comm="syz.1.4033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1303.020712][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1303.064523][ T6810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1303.089665][ T30] audit: type=1400 audit(1757152492.889:704452): avc: denied { create } for pid=22191 comm="syz.1.4033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1303.236295][ T6810] audit: audit_lost=128100 audit_rate_limit=0 audit_backlog_limit=64 [ 1303.260524][ T6810] audit: backlog limit exceeded [ 1303.267758][ T5515] audit: audit_lost=128101 audit_rate_limit=0 audit_backlog_limit=64 [ 1303.269413][ T30] audit: type=1400 audit(1757152492.899:704453): avc: denied { create } for pid=22191 comm="syz.1.4033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1303.363557][ T5515] audit: backlog limit exceeded [ 1307.703430][ T30] kauditd_printk_skb: 2500 callbacks suppressed [ 1307.703445][ T30] audit: type=1400 audit(1757152497.919:706543): avc: denied { read write } for pid=5847 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1307.762359][T22256] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4045'. [ 1307.789152][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1307.817810][ T6810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1307.829523][ T5515] audit: audit_lost=128239 audit_rate_limit=0 audit_backlog_limit=64 [ 1307.877105][ T6810] audit: audit_lost=128240 audit_rate_limit=0 audit_backlog_limit=64 [ 1307.877119][ T5515] audit: backlog limit exceeded [ 1307.877242][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1307.908099][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1307.917221][ T5844] audit: audit_lost=128241 audit_rate_limit=0 audit_backlog_limit=64 [ 1307.933547][ T5515] audit: audit_lost=128242 audit_rate_limit=0 audit_backlog_limit=64 [ 1308.130169][T22265] netlink: 'syz.5.4047': attribute type 1 has an invalid length. [ 1308.177647][T22265] bond44: entered promiscuous mode [ 1308.183433][T22265] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1312.829458][ T30] kauditd_printk_skb: 2677 callbacks suppressed [ 1312.829476][ T30] audit: type=1326 audit(1757152502.969:709218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22315 comm="syz.1.4060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb1d678ebe9 code=0x7ffc0000 [ 1312.901601][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1312.909270][T22327] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1312.915921][ T5515] audit: audit_lost=128243 audit_rate_limit=0 audit_backlog_limit=64 [ 1313.005431][T22327] audit: audit_lost=128244 audit_rate_limit=0 audit_backlog_limit=64 [ 1313.010263][ T5515] audit: backlog limit exceeded [ 1313.013758][ T6810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1313.022117][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1313.025104][T22327] audit: backlog limit exceeded [ 1313.039538][ T30] audit: type=1326 audit(1757152502.979:709219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22315 comm="syz.1.4060" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7fb1d678ebe9 code=0x7ffc0000 [ 1317.876384][ T30] kauditd_printk_skb: 5266 callbacks suppressed [ 1317.876399][ T30] audit: type=1400 audit(1757152508.009:713600): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.000880][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.001884][ T30] audit: type=1400 audit(1757152508.009:713601): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.037982][ T30] audit: type=1400 audit(1757152508.009:713602): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.059584][ T30] audit: type=1400 audit(1757152508.009:713603): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.080942][ T30] audit: type=1400 audit(1757152508.009:713604): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.102759][ T30] audit: type=1400 audit(1757152508.009:713605): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.135009][ T5515] audit: audit_lost=128541 audit_rate_limit=0 audit_backlog_limit=64 [ 1318.147626][ T5515] audit: backlog limit exceeded [ 1318.154132][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.801614][T22418] netlink: 'syz.0.4084': attribute type 1 has an invalid length. [ 1319.369008][T22418] bond46: entered promiscuous mode [ 1319.379451][T22418] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1319.754672][T22432] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4087'. [ 1323.039762][ T30] kauditd_printk_skb: 3500 callbacks suppressed [ 1323.039776][ T30] audit: type=1400 audit(1757152513.259:715952): avc: denied { create } for pid=22471 comm="syz.5.4096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1323.840668][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.869491][ T5515] audit: audit_lost=128927 audit_rate_limit=0 audit_backlog_limit=64 [ 1323.881375][ T30] audit: type=1400 audit(1757152513.259:715953): avc: denied { create } for pid=22471 comm="syz.5.4096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1323.922422][ T5515] audit: backlog limit exceeded [ 1323.948318][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.969626][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.980694][ T30] audit: type=1400 audit(1757152513.259:715954): avc: denied { create } for pid=22471 comm="syz.5.4096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 1324.038647][ T30] audit: type=1400 audit(1757152513.299:715955): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1324.067933][ T30] audit: type=1400 audit(1757152513.299:715956): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1328.084123][ T30] kauditd_printk_skb: 3307 callbacks suppressed [ 1328.084137][ T30] audit: type=1400 audit(1757152518.119:718263): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1328.194895][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.212986][ T30] audit: type=1400 audit(1757152518.299:718268): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1328.258375][ T5515] audit: audit_lost=129261 audit_rate_limit=0 audit_backlog_limit=64 [ 1328.277079][ T5515] audit: backlog limit exceeded [ 1328.279299][ T30] audit: type=1400 audit(1757152518.299:718269): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1328.286871][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.517967][ T5515] audit: audit_lost=129262 audit_rate_limit=0 audit_backlog_limit=64 [ 1328.537014][ T5515] audit: backlog limit exceeded [ 1328.555939][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1331.073401][T22581] netlink: 'syz.1.4123': attribute type 1 has an invalid length. [ 1331.138237][T22581] bond38: entered promiscuous mode [ 1331.149316][T22581] 8021q: adding VLAN 0 to HW filter on device bond38 [ 1333.095054][ T30] kauditd_printk_skb: 3271 callbacks suppressed [ 1333.095071][ T30] audit: type=1400 audit(1757152523.039:720537): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1333.180783][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.259769][ T30] audit: type=1400 audit(1757152523.039:720538): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1333.452748][ T5515] audit: audit_lost=129598 audit_rate_limit=0 audit_backlog_limit=64 [ 1333.483736][ T30] audit: type=1400 audit(1757152523.039:720539): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1333.538092][ T30] audit: type=1400 audit(1757152523.039:720540): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1333.573302][ T5515] audit: backlog limit exceeded [ 1333.619905][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.632386][ T5515] audit: audit_lost=129599 audit_rate_limit=0 audit_backlog_limit=64 [ 1333.634274][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1334.891535][T22643] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4138'. [ 1335.041259][T22646] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4139'. [ 1336.353287][T22667] netlink: 'syz.0.4145': attribute type 1 has an invalid length. [ 1336.382961][T22667] bond47: entered promiscuous mode [ 1336.437651][T22667] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1336.899370][T22681] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4149'. [ 1338.194087][ T30] kauditd_printk_skb: 2780 callbacks suppressed [ 1338.194097][ T30] audit: type=1400 audit(1757152528.409:722730): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1338.604732][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.619373][ T5515] audit: audit_lost=129797 audit_rate_limit=0 audit_backlog_limit=64 [ 1338.630561][ T5515] audit: backlog limit exceeded [ 1338.727660][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.730126][T22702] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.740818][ T30] audit: type=1400 audit(1757152528.439:722731): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1338.740910][ T5515] audit: audit_lost=129798 audit_rate_limit=0 audit_backlog_limit=64 [ 1338.800530][T22702] audit: audit_lost=129799 audit_rate_limit=0 audit_backlog_limit=64 [ 1338.821377][T22703] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1340.546391][T22731] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4160'. [ 1340.711002][T22739] netlink: 'syz.1.4159': attribute type 4 has an invalid length. [ 1340.862171][T22741] netlink: 'syz.1.4159': attribute type 4 has an invalid length. [ 1343.199591][ T30] kauditd_printk_skb: 3915 callbacks suppressed [ 1343.199606][ T30] audit: type=1400 audit(1757152533.419:726190): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1343.313183][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.357426][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.375924][ T5843] audit: audit_lost=129952 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.394853][ T5843] audit: backlog limit exceeded [ 1343.422618][ T30] audit: type=1400 audit(1757152533.459:726191): avc: denied { mounton } for pid=22765 comm="syz.1.4171" path="/834/bus" dev="tmpfs" ino=4628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1343.468828][T22770] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.504975][ T30] audit: type=1400 audit(1757152533.459:726192): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1343.526317][T22770] audit: audit_lost=129953 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.538094][ T5515] audit: audit_lost=129954 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.696660][T22780] netlink: 'syz.5.4175': attribute type 1 has an invalid length. [ 1343.816132][T22780] bond45: entered promiscuous mode [ 1343.824755][T22780] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1345.001673][T22798] serio: Serial port ptm0 [ 1345.074597][T22798] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4181'. [ 1346.888866][T22829] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4189'. [ 1348.969020][ T30] kauditd_printk_skb: 7860 callbacks suppressed [ 1348.969036][ T30] audit: type=1400 audit(1757152538.409:730220): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.978331][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1348.997028][T22855] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1349.014306][T22856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1349.028301][T22856] audit: audit_lost=131232 audit_rate_limit=0 audit_backlog_limit=64 [ 1349.037762][T22856] audit: backlog limit exceeded [ 1349.111880][T22855] audit: audit_lost=131233 audit_rate_limit=0 audit_backlog_limit=64 [ 1349.185507][T22856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1349.208042][T22856] audit: audit_lost=131234 audit_rate_limit=0 audit_backlog_limit=64 [ 1349.216382][T22856] audit: backlog limit exceeded [ 1353.454278][T22906] netlink: 'syz.0.4209': attribute type 1 has an invalid length. [ 1353.634118][T22906] bond48: entered promiscuous mode [ 1353.721742][T22906] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1353.981291][ T30] kauditd_printk_skb: 3711 callbacks suppressed [ 1353.981307][ T30] audit: type=1400 audit(1757152544.199:733674): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1354.024829][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1354.095072][T22914] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1354.101625][T22914] audit: audit_lost=131321 audit_rate_limit=0 audit_backlog_limit=64 [ 1354.109718][T22914] audit: backlog limit exceeded [ 1354.117957][T22914] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1354.124491][T22914] audit: audit_lost=131322 audit_rate_limit=0 audit_backlog_limit=64 [ 1354.132572][T22914] audit: backlog limit exceeded [ 1354.139355][T22914] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1354.145853][T22914] audit: audit_lost=131323 audit_rate_limit=0 audit_backlog_limit=64 [ 1359.153449][ T30] kauditd_printk_skb: 5473 callbacks suppressed [ 1359.153463][ T30] audit: type=1400 audit(1757152549.369:738470): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1359.816516][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1359.837553][ T5515] audit: audit_lost=131550 audit_rate_limit=0 audit_backlog_limit=64 [ 1359.895980][ T5515] audit: backlog limit exceeded [ 1359.926527][ T5847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1359.933671][ T5847] audit: audit_lost=131551 audit_rate_limit=0 audit_backlog_limit=64 [ 1359.942012][ T5847] audit: backlog limit exceeded [ 1360.006341][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1360.014512][ T30] audit: type=1400 audit(1757152549.369:738471): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1360.035794][ T5515] audit: audit_lost=131552 audit_rate_limit=0 audit_backlog_limit=64 [ 1360.195128][T22995] netlink: 'syz.0.4232': attribute type 1 has an invalid length. [ 1360.235026][T22995] bond49: entered promiscuous mode [ 1360.303879][T22995] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1361.141949][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.148410][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1362.587797][T23035] netlink: 'syz.5.4242': attribute type 1 has an invalid length. [ 1362.790671][T23035] bond46: entered promiscuous mode [ 1362.796843][T23035] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1364.247064][ T30] kauditd_printk_skb: 4857 callbacks suppressed [ 1364.247079][ T30] audit: type=1400 audit(1757152554.459:742752): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1364.391880][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1364.402489][T23056] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1364.409061][ T30] audit: type=1400 audit(1757152554.499:742753): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1364.429371][ T5515] audit: audit_lost=131745 audit_rate_limit=0 audit_backlog_limit=64 [ 1364.638460][T23059] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1364.647524][T23059] audit: audit_lost=131746 audit_rate_limit=0 audit_backlog_limit=64 [ 1364.660953][T23056] audit: audit_lost=131747 audit_rate_limit=0 audit_backlog_limit=64 [ 1364.660957][ T30] audit: type=1400 audit(1757152554.499:742754): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1364.660995][ T30] audit: type=1400 audit(1757152554.499:742755): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.607392][T23113] netlink: 'syz.4.4261': attribute type 4 has an invalid length. [ 1368.690257][T23114] netlink: 'syz.4.4261': attribute type 4 has an invalid length. [ 1369.251014][ T30] kauditd_printk_skb: 3968 callbacks suppressed [ 1369.251028][ T30] audit: type=1400 audit(1757152559.469:744897): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1369.317393][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1369.324834][ T5515] audit: audit_lost=132356 audit_rate_limit=0 audit_backlog_limit=64 [ 1369.334888][ T5515] audit: backlog limit exceeded [ 1369.340032][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1369.435658][ T5515] audit: audit_lost=132357 audit_rate_limit=0 audit_backlog_limit=64 [ 1369.454114][ T5515] audit: backlog limit exceeded [ 1369.466123][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1369.481679][ T30] audit: type=1400 audit(1757152559.469:744898): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1369.513247][ T5515] audit: audit_lost=132358 audit_rate_limit=0 audit_backlog_limit=64 [ 1369.823839][T23121] netlink: 'syz.3.4264': attribute type 1 has an invalid length. [ 1369.880589][T23121] bond42: entered promiscuous mode [ 1369.886673][T23121] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1370.088115][T23132] netlink: 'syz.3.4269': attribute type 1 has an invalid length. [ 1370.123557][T23132] bond43: entered promiscuous mode [ 1370.134577][T23132] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1370.216681][T23137] netlink: 'syz.1.4271': attribute type 1 has an invalid length. [ 1370.519698][T23137] bond39: entered promiscuous mode [ 1370.528339][T23137] 8021q: adding VLAN 0 to HW filter on device bond39 [ 1370.672922][T23154] netlink: 'syz.1.4274': attribute type 1 has an invalid length. [ 1370.765409][T23154] bond40: entered promiscuous mode [ 1370.771298][T23154] 8021q: adding VLAN 0 to HW filter on device bond40 [ 1371.522944][T23173] netlink: 'syz.3.4280': attribute type 1 has an invalid length. [ 1371.748572][T23173] bond44: entered promiscuous mode [ 1371.755371][T23173] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1373.072841][T23185] netlink: 'syz.3.4282': attribute type 1 has an invalid length. [ 1373.182898][T23185] bond45: entered promiscuous mode [ 1373.222623][T23185] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1374.261484][ T30] kauditd_printk_skb: 4424 callbacks suppressed [ 1374.261501][ T30] audit: type=1400 audit(1757152564.479:748779): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1374.315380][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1374.326273][ T5515] audit: audit_lost=132540 audit_rate_limit=0 audit_backlog_limit=64 [ 1374.334555][ T30] audit: type=1400 audit(1757152564.499:748780): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1374.368709][ T5515] audit: backlog limit exceeded [ 1374.376420][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1374.559416][ T5515] audit: audit_lost=132541 audit_rate_limit=0 audit_backlog_limit=64 [ 1374.567481][ T5515] audit: backlog limit exceeded [ 1374.572538][ T30] audit: type=1400 audit(1757152564.499:748781): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1374.872214][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1375.122264][T23219] netlink: 'syz.4.4291': attribute type 1 has an invalid length. [ 1375.198005][T23219] bond49: entered promiscuous mode [ 1375.203800][T23219] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1379.270915][ T30] kauditd_printk_skb: 4501 callbacks suppressed [ 1379.270925][ T30] audit: type=1400 audit(1757152569.489:752363): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1379.316008][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1379.323123][ T30] audit: type=1400 audit(1757152569.519:752364): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1379.344975][ T5515] audit: audit_lost=132849 audit_rate_limit=0 audit_backlog_limit=64 [ 1379.354020][T23270] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1379.360722][T23270] audit: audit_lost=132850 audit_rate_limit=0 audit_backlog_limit=64 [ 1379.368816][T23270] audit: backlog limit exceeded [ 1379.373960][ T5515] audit: backlog limit exceeded [ 1379.381926][T23270] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1379.390329][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1379.731720][T23279] netlink: 'syz.5.4305': attribute type 4 has an invalid length. [ 1379.748063][T23279] netlink: 'syz.5.4305': attribute type 4 has an invalid length. [ 1380.565159][T23290] netlink: 'syz.4.4310': attribute type 1 has an invalid length. [ 1380.577926][T23292] netlink: 'syz.5.4311': attribute type 1 has an invalid length. [ 1380.601246][T23292] bond47: entered promiscuous mode [ 1380.606502][T23292] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1380.809870][T23290] bond50: entered promiscuous mode [ 1380.815332][T23290] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1382.017464][T23315] netlink: 'syz.0.4318': attribute type 1 has an invalid length. [ 1382.104683][T23315] bond50: entered promiscuous mode [ 1382.114401][T23315] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1383.306073][T23333] netlink: 'syz.4.4322': attribute type 1 has an invalid length. [ 1383.325851][T23333] bond51: entered promiscuous mode [ 1383.355819][T23333] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1384.345791][ T30] kauditd_printk_skb: 5020 callbacks suppressed [ 1384.345816][ T30] audit: type=1400 audit(1757152574.539:756892): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1384.620842][ T30] audit: type=1400 audit(1757152574.539:756893): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1384.661542][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1384.671787][ T5515] audit: audit_lost=133016 audit_rate_limit=0 audit_backlog_limit=64 [ 1384.683766][ T5515] audit: backlog limit exceeded [ 1384.693428][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1384.704871][ T5515] audit: audit_lost=133017 audit_rate_limit=0 audit_backlog_limit=64 [ 1384.879419][ T30] audit: type=1400 audit(1757152574.539:756894): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1384.905996][ T30] audit: type=1400 audit(1757152574.539:756895): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1384.913425][ T5515] audit: backlog limit exceeded [ 1387.745015][T23387] netlink: 'syz.4.4335': attribute type 1 has an invalid length. [ 1387.852162][T23387] bond52: entered promiscuous mode [ 1387.862329][T23387] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1388.063673][T23392] serio: Serial port ptm0 [ 1389.360843][ T30] kauditd_printk_skb: 6062 callbacks suppressed [ 1389.360858][ T30] audit: type=1400 audit(1757152579.539:759862): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1389.462309][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1389.469388][ T5515] audit: audit_lost=134050 audit_rate_limit=0 audit_backlog_limit=64 [ 1389.479440][T23412] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1389.489480][T23412] audit: audit_lost=134051 audit_rate_limit=0 audit_backlog_limit=64 [ 1389.497680][T23412] audit: backlog limit exceeded [ 1389.536031][ T5515] audit: backlog limit exceeded [ 1389.549434][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1389.568264][ T30] audit: type=1400 audit(1757152579.539:759863): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1389.738861][ T5515] audit: audit_lost=134052 audit_rate_limit=0 audit_backlog_limit=64 [ 1391.139977][T23444] netlink: 'syz.0.4351': attribute type 1 has an invalid length. [ 1391.412714][T23444] bond51: entered promiscuous mode [ 1391.418055][T23444] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1394.376033][ T30] kauditd_printk_skb: 3615 callbacks suppressed [ 1394.376043][ T30] audit: type=1400 audit(1757152584.589:763223): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1394.444705][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1394.466640][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1394.479408][ T5843] audit: audit_lost=134138 audit_rate_limit=0 audit_backlog_limit=64 [ 1394.483329][ T5515] audit: audit_lost=134139 audit_rate_limit=0 audit_backlog_limit=64 [ 1394.487467][ T5843] audit: backlog limit exceeded [ 1394.538469][ T30] audit: type=1400 audit(1757152584.629:763224): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1394.567664][ T5515] audit: backlog limit exceeded [ 1394.578696][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1394.609364][ T5515] audit: audit_lost=134140 audit_rate_limit=0 audit_backlog_limit=64 [ 1394.943069][T23494] netlink: 'syz.0.4365': attribute type 1 has an invalid length. [ 1395.132584][T23494] bond52: entered promiscuous mode [ 1395.138072][T23494] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1399.187267][T23546] netlink: 'syz.4.4376': attribute type 1 has an invalid length. [ 1399.244737][T23546] bond53: entered promiscuous mode [ 1399.305127][T23546] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1399.379685][ T30] kauditd_printk_skb: 2843 callbacks suppressed [ 1399.379700][ T30] audit: type=1400 audit(1757152589.599:766067): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1399.405446][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1399.429788][ T5515] audit: audit_lost=134141 audit_rate_limit=0 audit_backlog_limit=64 [ 1399.450133][T23546] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1399.456698][T23546] audit: audit_lost=134142 audit_rate_limit=0 audit_backlog_limit=64 [ 1399.464852][ T5515] audit: backlog limit exceeded [ 1399.481677][ T30] audit: type=1400 audit(1757152589.599:766068): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1399.616367][T23546] audit: backlog limit exceeded [ 1399.641394][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1399.668860][T23554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1404.421276][ T5515] audit_log_start: 10911 callbacks suppressed [ 1404.421292][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1404.456704][ T5515] audit: audit_lost=136412 audit_rate_limit=0 audit_backlog_limit=64 [ 1404.456711][ T30] audit: type=1400 audit(1757152594.609:770175): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1404.456752][ T30] audit: type=1400 audit(1757152594.609:770176): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1404.568073][T23613] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1404.574867][T23613] audit: audit_lost=136413 audit_rate_limit=0 audit_backlog_limit=64 [ 1404.609106][ T5515] audit: backlog limit exceeded [ 1404.617459][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1404.649209][T23613] audit: backlog limit exceeded [ 1404.654359][ T5515] audit: audit_lost=136414 audit_rate_limit=0 audit_backlog_limit=64 [ 1409.436390][ T30] kauditd_printk_skb: 4566 callbacks suppressed [ 1409.436401][ T30] audit: type=1400 audit(1757152599.649:774029): avc: denied { read write } for pid=5847 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1409.629755][ T30] audit: type=1400 audit(1757152599.589:774028): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1409.698448][ T30] audit: type=1400 audit(1757152599.649:774030): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1409.724134][T23672] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1409.730966][T23672] audit: audit_lost=136653 audit_rate_limit=0 audit_backlog_limit=64 [ 1409.739087][T23672] audit: backlog limit exceeded [ 1409.749389][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1409.751720][T23672] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1409.765048][T23674] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1409.773355][T23674] audit: audit_lost=136654 audit_rate_limit=0 audit_backlog_limit=64 [ 1411.367903][T23697] netlink: 'syz.3.4410': attribute type 1 has an invalid length. [ 1411.450687][T23697] bond46: entered promiscuous mode [ 1411.572704][T23697] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1414.441677][ T30] kauditd_printk_skb: 5177 callbacks suppressed [ 1414.441693][ T30] audit: type=1400 audit(1757152604.659:778234): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1414.583044][ T30] audit: type=1400 audit(1757152604.659:778235): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1414.613547][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1414.757908][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1414.767842][ T5515] audit: audit_lost=136980 audit_rate_limit=0 audit_backlog_limit=64 [ 1414.775981][ T5843] audit: audit_lost=136981 audit_rate_limit=0 audit_backlog_limit=64 [ 1414.789366][ T5515] audit: backlog limit exceeded [ 1414.806739][T23741] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1414.813384][ T5843] audit: backlog limit exceeded [ 1414.818344][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1417.378381][T23778] serio: Serial port ptm0 [ 1417.570358][T23778] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4433'. [ 1419.688014][ T30] kauditd_printk_skb: 2896 callbacks suppressed [ 1419.688028][ T30] audit: type=1400 audit(1757152609.679:780762): avc: denied { read } for pid=23813 comm="syz.1.4440" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1419.818209][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1419.841999][ T30] audit: type=1400 audit(1757152609.689:780763): avc: denied { prog_load } for pid=23813 comm="syz.1.4440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1419.866710][ T5515] audit: audit_lost=137106 audit_rate_limit=0 audit_backlog_limit=64 [ 1419.887289][ T5515] audit: backlog limit exceeded [ 1419.897885][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1419.906158][T23820] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1419.914096][ T30] audit: type=1400 audit(1757152609.689:780764): avc: denied { read } for pid=23813 comm="syz.1.4440" dev="nsfs" ino=4026532904 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1419.937321][ T5515] audit: audit_lost=137107 audit_rate_limit=0 audit_backlog_limit=64 [ 1419.947823][T23820] audit: audit_lost=137108 audit_rate_limit=0 audit_backlog_limit=64 [ 1421.710517][T23845] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4447'. [ 1422.719114][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.725562][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.703995][ T30] kauditd_printk_skb: 5744 callbacks suppressed [ 1424.704009][ T30] audit: type=1400 audit(1757152614.899:784284): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1424.767777][ T30] audit: type=1400 audit(1757152614.919:784285): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1425.043814][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1425.051929][T23869] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1425.058543][T23869] audit: audit_lost=137850 audit_rate_limit=0 audit_backlog_limit=64 [ 1425.066757][T23869] audit: backlog limit exceeded [ 1425.095173][ T5843] audit: audit_lost=137851 audit_rate_limit=0 audit_backlog_limit=64 [ 1425.104758][ T5515] audit: audit_backlog=66 > audit_backlog_limit=64 [ 1425.132992][ T5515] audit: audit_lost=137852 audit_rate_limit=0 audit_backlog_limit=64 [ 1425.141128][ T30] audit: type=1400 audit(1757152614.919:784286): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1426.567574][T23883] netlink: 'syz.5.4457': attribute type 1 has an invalid length. [ 1426.630731][T23883] bond48: entered promiscuous mode [ 1426.649693][T23883] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1428.896676][T23921] netlink: 'syz.4.4467': attribute type 1 has an invalid length. [ 1429.180320][T23921] bond54: entered promiscuous mode [ 1429.198242][T23921] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1429.712032][ T30] kauditd_printk_skb: 3839 callbacks suppressed [ 1429.712043][ T30] audit: type=1400 audit(1757152619.919:787644): avc: denied { create } for pid=23928 comm="syz.1.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1429.786341][ T30] audit: type=1400 audit(1757152619.919:787645): avc: denied { mount } for pid=23928 comm="syz.1.4468" name="/" dev="pstore" ino=4103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=0 [ 1430.097137][ T30] audit: type=1400 audit(1757152619.999:787646): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1430.125309][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1430.142601][ T5515] audit: audit_lost=138013 audit_rate_limit=0 audit_backlog_limit=64 [ 1430.170353][ T5515] audit: backlog limit exceeded [ 1430.170993][ T6810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1430.502703][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1430.509348][ T6810] audit: audit_lost=138014 audit_rate_limit=0 audit_backlog_limit=64 [ 1430.517461][ T30] audit: type=1400 audit(1757152619.999:787647): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1434.458729][T23996] netlink: 'syz.3.4483': attribute type 1 has an invalid length. [ 1434.554691][T23996] bond47: entered promiscuous mode [ 1434.733732][ T30] kauditd_printk_skb: 12238 callbacks suppressed [ 1434.733745][ T30] audit: type=1326 audit(1757152624.749:790196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23990 comm="syz.4.4482" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f275b98ebe9 code=0x7ffc0000 [ 1434.766501][T23996] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1434.778847][T23994] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1434.786966][T23994] audit: audit_lost=141245 audit_rate_limit=0 audit_backlog_limit=64 [ 1434.795326][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1434.803334][T23994] audit: backlog limit exceeded [ 1434.808247][ T5515] audit: audit_lost=141246 audit_rate_limit=0 audit_backlog_limit=64 [ 1434.847411][ T5515] audit: backlog limit exceeded [ 1434.852914][T23996] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1434.862577][ T30] audit: type=1400 audit(1757152624.749:790197): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1434.902392][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1435.152019][T24006] netlink: 'syz.3.4485': attribute type 1 has an invalid length. [ 1435.193340][T24006] bond48: entered promiscuous mode [ 1435.207158][T24006] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1436.085233][T24028] netlink: 'syz.5.4489': attribute type 4 has an invalid length. [ 1437.709579][T24046] netlink: 'syz.3.4495': attribute type 1 has an invalid length. [ 1437.858176][T24046] bond49: entered promiscuous mode [ 1437.908714][T24046] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1439.740133][ T30] kauditd_printk_skb: 4267 callbacks suppressed [ 1439.740143][ T30] audit: type=1400 audit(1757152629.949:793876): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1439.809900][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1439.816599][ T5515] audit: audit_lost=141444 audit_rate_limit=0 audit_backlog_limit=64 [ 1439.828461][T24085] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1439.835086][T24085] audit: audit_lost=141445 audit_rate_limit=0 audit_backlog_limit=64 [ 1439.844982][T24085] audit: backlog limit exceeded [ 1439.850648][ T30] audit: type=1400 audit(1757152629.989:793877): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1439.893383][ T5515] audit: backlog limit exceeded [ 1439.909823][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1439.933283][ T5515] audit: audit_lost=141446 audit_rate_limit=0 audit_backlog_limit=64 [ 1441.842200][T24107] netlink: 'syz.0.4510': attribute type 4 has an invalid length. [ 1444.765893][ T30] kauditd_printk_skb: 3857 callbacks suppressed [ 1444.765911][ T30] audit: type=1400 audit(1757152634.929:797719): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1444.852788][ T30] audit: type=1400 audit(1757152634.979:797720): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1444.988193][ T30] audit: type=1400 audit(1757152634.979:797721): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1445.000857][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1445.065627][ T30] audit: type=1400 audit(1757152634.979:797722): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1445.263752][ T30] audit: type=1400 audit(1757152634.979:797723): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1445.289774][ T5515] audit: audit_lost=141452 audit_rate_limit=0 audit_backlog_limit=64 [ 1445.307374][ T5515] audit: backlog limit exceeded [ 1445.314682][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1445.328261][T24147] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1446.190660][T24167] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4522'. [ 1449.833199][ T30] kauditd_printk_skb: 3577 callbacks suppressed [ 1449.864677][ T30] audit: type=1400 audit(1757152639.989:800850): avc: denied { create } for pid=24215 comm="syz.5.4537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1449.926215][ T30] audit: type=1400 audit(1757152639.989:800851): avc: denied { create } for pid=24215 comm="syz.5.4537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1450.234344][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1450.247819][ T30] audit: type=1400 audit(1757152639.989:800852): avc: denied { create } for pid=24215 comm="syz.5.4537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1450.277204][ T5515] audit: audit_lost=141604 audit_rate_limit=0 audit_backlog_limit=64 [ 1450.324776][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1450.347273][ T5843] audit: audit_lost=141605 audit_rate_limit=0 audit_backlog_limit=64 [ 1450.356691][ T30] audit: type=1400 audit(1757152640.059:800853): avc: denied { create } for pid=24221 comm="syz.3.4538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1450.357243][ T5515] audit: backlog limit exceeded [ 1450.413362][ T5843] audit: backlog limit exceeded [ 1450.606717][T24235] serio: Serial port ptm0 [ 1450.665270][T24235] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4541'. [ 1451.010081][T24239] netlink: 'syz.0.4543': attribute type 1 has an invalid length. [ 1451.160722][T24239] bond53: entered promiscuous mode [ 1451.184835][T24239] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1452.006907][T24262] netlink: 9 bytes leftover after parsing attributes in process `syz.0.4549'. [ 1454.842077][ T30] kauditd_printk_skb: 4858 callbacks suppressed [ 1454.842093][ T30] audit: type=1400 audit(1757152645.049:803885): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1455.043567][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1455.061867][ T30] audit: type=1400 audit(1757152645.059:803886): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1455.089484][ T5515] audit: audit_lost=142215 audit_rate_limit=0 audit_backlog_limit=64 [ 1455.112135][ T5515] audit: backlog limit exceeded [ 1455.132402][T24312] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1455.140115][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1455.180690][T24312] audit: audit_lost=142216 audit_rate_limit=0 audit_backlog_limit=64 [ 1455.194324][ T5515] audit: audit_lost=142217 audit_rate_limit=0 audit_backlog_limit=64 [ 1455.203319][ T30] audit: type=1400 audit(1757152645.059:803887): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1456.518763][T24330] netlink: 9 bytes leftover after parsing attributes in process `syz.3.4571'. [ 1459.849368][ T30] kauditd_printk_skb: 8226 callbacks suppressed [ 1459.849385][ T30] audit: type=1400 audit(1757152650.069:807132): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1459.903282][T24370] netlink: 'syz.0.4581': attribute type 1 has an invalid length. [ 1459.916789][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1459.923778][T24372] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1459.948999][ T5515] audit: audit_lost=143878 audit_rate_limit=0 audit_backlog_limit=64 [ 1459.961230][ T30] audit: type=1400 audit(1757152650.089:807133): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1459.984297][ T5515] audit: backlog limit exceeded [ 1459.992830][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1459.994643][T24370] bond54: entered promiscuous mode [ 1460.002797][ T5515] audit: audit_lost=143879 audit_rate_limit=0 audit_backlog_limit=64 [ 1460.008253][T24372] audit: audit_lost=143880 audit_rate_limit=0 audit_backlog_limit=64 [ 1460.012859][ T30] audit: type=1400 audit(1757152650.089:807134): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1460.097867][T24370] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1460.283471][T24379] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4582'. [ 1460.346811][T24382] netlink: 'syz.0.4583': attribute type 1 has an invalid length. [ 1460.373341][T24382] bond55: entered promiscuous mode [ 1460.378735][T24382] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1460.872010][T24396] netlink: 'syz.0.4587': attribute type 1 has an invalid length. [ 1461.378781][T24396] bond56: entered promiscuous mode [ 1461.493123][T24396] 8021q: adding VLAN 0 to HW filter on device bond56 [ 1462.500128][T24421] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4592'. [ 1464.879522][ T30] kauditd_printk_skb: 4738 callbacks suppressed [ 1464.879537][ T30] audit: type=1400 audit(1757152655.069:809816): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1464.978545][ T30] audit: type=1400 audit(1757152655.099:809817): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1465.008766][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1465.032246][ T5515] audit: audit_lost=144566 audit_rate_limit=0 audit_backlog_limit=64 [ 1465.065806][ T30] audit: type=1400 audit(1757152655.099:809818): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1465.120800][ T30] audit: type=1400 audit(1757152655.099:809819): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1465.157777][ T5515] audit: backlog limit exceeded [ 1465.207496][ T30] audit: type=1400 audit(1757152655.099:809820): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1465.211128][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1465.262587][ T30] audit: type=1400 audit(1757152655.099:809821): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1467.140237][T24471] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4605'. [ 1467.894213][T24480] netlink: 9 bytes leftover after parsing attributes in process `syz.0.4608'. [ 1468.149455][T24491] netlink: 9 bytes leftover after parsing attributes in process `syz.0.4612'. [ 1469.891110][ T30] kauditd_printk_skb: 4405 callbacks suppressed [ 1469.891124][ T30] audit: type=1400 audit(1757152660.109:812962): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1469.952454][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1469.962450][T24511] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1469.973375][T24513] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1469.981602][ T5515] audit: audit_lost=144989 audit_rate_limit=0 audit_backlog_limit=64 [ 1469.990747][ T5843] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1469.997363][ T5843] audit: audit_lost=144990 audit_rate_limit=0 audit_backlog_limit=64 [ 1469.999432][T24511] audit: audit_lost=144991 audit_rate_limit=0 audit_backlog_limit=64 [ 1470.005553][ T30] audit: type=1400 audit(1757152660.109:812963): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1470.015945][T24513] audit: audit_lost=144992 audit_rate_limit=0 audit_backlog_limit=64 [ 1470.089127][T24516] netlink: 'syz.4.4619': attribute type 1 has an invalid length. [ 1470.123442][T24516] bond55: entered promiscuous mode [ 1470.128861][T24516] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1470.528681][T24533] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4623'. [ 1470.673456][T24531] serio: Serial port ptm0 [ 1470.772473][T24531] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4622'. [ 1474.101892][T24589] netlink: 'syz.3.4637': attribute type 1 has an invalid length. [ 1474.187325][T24589] bond50: entered promiscuous mode [ 1474.221521][T24589] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1474.940994][ T30] kauditd_printk_skb: 6216 callbacks suppressed [ 1474.941005][ T30] audit: type=1400 audit(1757152665.099:816086): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1475.269008][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1475.279038][T24621] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1475.288798][T24620] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1475.299383][ T30] audit: type=1400 audit(1757152665.149:816087): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1475.320684][ T5515] audit: audit_lost=146023 audit_rate_limit=0 audit_backlog_limit=64 [ 1475.328749][ T5515] audit: backlog limit exceeded [ 1475.333655][T24621] audit: audit_lost=146024 audit_rate_limit=0 audit_backlog_limit=64 [ 1475.343544][T24622] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1475.350135][T24622] audit: audit_lost=146025 audit_rate_limit=0 audit_backlog_limit=64 [ 1475.437269][T24620] netlink: 'syz.0.4644': attribute type 1 has an invalid length. [ 1475.872841][T24620] bond57: entered promiscuous mode [ 1476.017861][T24620] 8021q: adding VLAN 0 to HW filter on device bond57 [ 1476.144830][T24630] netlink: 'syz.0.4647': attribute type 1 has an invalid length. [ 1476.265153][T24630] bond58: entered promiscuous mode [ 1476.271015][T24630] 8021q: adding VLAN 0 to HW filter on device bond58 [ 1476.487779][T24635] serio: Serial port ptm0 [ 1479.990294][ T30] kauditd_printk_skb: 5210 callbacks suppressed [ 1479.990313][ T30] audit: type=1400 audit(1757152670.189:819527): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1480.231225][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1480.244227][ T30] audit: type=1400 audit(1757152670.189:819528): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1480.388470][ T5515] audit: audit_lost=146616 audit_rate_limit=0 audit_backlog_limit=64 [ 1480.394727][T24692] netlink: 'syz.4.4661': attribute type 1 has an invalid length. [ 1480.457446][ T5515] audit: backlog limit exceeded [ 1480.469428][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1480.488461][ T5515] audit: audit_lost=146617 audit_rate_limit=0 audit_backlog_limit=64 [ 1480.523726][ T5515] audit: backlog limit exceeded [ 1480.530859][ T30] audit: type=1400 audit(1757152670.189:819529): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1480.571968][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1480.579915][T24692] bond56: entered promiscuous mode [ 1480.596585][T24692] 8021q: adding VLAN 0 to HW filter on device bond56 [ 1482.014408][T24716] netlink: 'syz.3.4666': attribute type 1 has an invalid length. [ 1482.134399][T24716] bond51: entered promiscuous mode [ 1482.159541][T24716] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1483.916624][T24744] netlink: 'syz.1.4674': attribute type 1 has an invalid length. [ 1484.011372][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.017738][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.250344][T24744] bond41: entered promiscuous mode [ 1484.274102][T24744] 8021q: adding VLAN 0 to HW filter on device bond41 [ 1485.009754][ T30] kauditd_printk_skb: 7229 callbacks suppressed [ 1485.009769][ T30] audit: type=1400 audit(1757152675.229:824162): avc: denied { read write } for pid=5844 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1485.151717][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1485.162550][ T5515] audit: audit_lost=147484 audit_rate_limit=0 audit_backlog_limit=64 [ 1485.170830][ T5515] audit: backlog limit exceeded [ 1485.183838][T24761] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1485.190489][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1485.196459][T24761] audit: audit_lost=147485 audit_rate_limit=0 audit_backlog_limit=64 [ 1485.197109][ T5515] audit: audit_lost=147486 audit_rate_limit=0 audit_backlog_limit=64 [ 1485.225663][T24761] audit: backlog limit exceeded [ 1485.237928][ T5847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1486.039848][T24769] netlink: 'syz.4.4682': attribute type 1 has an invalid length. [ 1486.094723][T24769] bond57: entered promiscuous mode [ 1486.100911][T24769] 8021q: adding VLAN 0 to HW filter on device bond57 [ 1488.540684][T24805] netlink: 'syz.1.4689': attribute type 1 has an invalid length. [ 1488.718512][T24805] bond42: entered promiscuous mode [ 1488.745186][T24805] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1489.110095][T24818] netlink: 'syz.0.4692': attribute type 1 has an invalid length. [ 1489.541720][T24818] bond59: entered promiscuous mode [ 1489.547544][T24818] 8021q: adding VLAN 0 to HW filter on device bond59 [ 1489.877304][T24837] netlink: 'syz.0.4697': attribute type 1 has an invalid length. [ 1489.923398][T24837] bond60: entered promiscuous mode [ 1489.951470][T24837] 8021q: adding VLAN 0 to HW filter on device bond60 [ 1490.024711][ T30] kauditd_printk_skb: 3791 callbacks suppressed [ 1490.024729][ T30] audit: type=1400 audit(1757152680.229:827666): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1490.245031][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1490.262011][ T5515] audit: audit_lost=147583 audit_rate_limit=0 audit_backlog_limit=64 [ 1490.274182][T24837] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1490.280948][ T5515] audit: backlog limit exceeded [ 1490.286113][T24842] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1490.292856][T24842] audit: audit_lost=147584 audit_rate_limit=0 audit_backlog_limit=64 [ 1490.305335][T24837] audit: audit_lost=147585 audit_rate_limit=0 audit_backlog_limit=64 [ 1490.305823][ T30] audit: type=1400 audit(1757152680.229:827667): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1490.358643][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1495.125452][ T30] kauditd_printk_skb: 3248 callbacks suppressed [ 1495.125466][ T30] audit: type=1400 audit(1757152685.339:830450): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1495.163196][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1495.170085][ T5515] audit: audit_lost=147741 audit_rate_limit=0 audit_backlog_limit=64 [ 1495.178179][ T5515] audit: backlog limit exceeded [ 1495.189835][ T30] audit: type=1400 audit(1757152685.339:830451): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1495.212005][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1495.222295][ T5515] audit: audit_lost=147742 audit_rate_limit=0 audit_backlog_limit=64 [ 1495.230442][ T5515] audit: backlog limit exceeded [ 1495.231478][T24896] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1495.243111][T24896] audit: audit_lost=147743 audit_rate_limit=0 audit_backlog_limit=64 [ 1499.670263][T24952] serio: Serial port ptm0 [ 1499.727797][T24952] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4728'. [ 1499.819550][T24960] netlink: 'syz.0.4731': attribute type 1 has an invalid length. [ 1499.898194][T24960] bond61: entered promiscuous mode [ 1499.907377][T24960] 8021q: adding VLAN 0 to HW filter on device bond61 [ 1499.918078][T24962] netlink: 'syz.3.4732': attribute type 1 has an invalid length. [ 1500.036163][T24962] bond52: entered promiscuous mode [ 1500.076666][T24962] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1500.105197][T24971] netlink: 'syz.4.4734': attribute type 1 has an invalid length. [ 1500.129408][ T30] kauditd_printk_skb: 4859 callbacks suppressed [ 1500.129421][ T30] audit: type=1400 audit(1757152690.349:835154): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.138722][T24971] bond58: entered promiscuous mode [ 1500.157203][ T30] audit: type=1400 audit(1757152690.349:835155): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.157243][ T30] audit: type=1400 audit(1757152690.349:835156): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.210483][ T30] audit: type=1400 audit(1757152690.349:835157): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.222217][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1500.234016][ T30] audit: type=1400 audit(1757152690.349:835158): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.240403][T24962] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1500.261896][ T30] audit: type=1400 audit(1757152690.349:835159): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.266609][T24962] audit: audit_lost=147796 audit_rate_limit=0 audit_backlog_limit=64 [ 1500.289917][ T30] audit: type=1400 audit(1757152690.349:835160): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1500.373265][T24971] 8021q: adding VLAN 0 to HW filter on device bond58 [ 1500.733253][T24980] netlink: 'syz.3.4736': attribute type 1 has an invalid length. [ 1500.826283][T24980] bond53: entered promiscuous mode [ 1500.919713][T24980] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1501.342951][T24987] netlink: 'syz.3.4738': attribute type 1 has an invalid length. [ 1501.427077][T24987] bond54: entered promiscuous mode [ 1501.432915][T24987] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1503.453701][T25020] netlink: 'syz.4.4747': attribute type 4 has an invalid length. [ 1503.949836][T25032] serio: Serial port ptm0 [ 1504.008554][T25032] netlink: 9 bytes leftover after parsing attributes in process `syz.5.4750'. [ 1504.718788][T25037] serio: Serial port ptm0 [ 1504.778524][T25037] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4751'. [ 1504.993183][T25046] netlink: 'syz.0.4755': attribute type 1 has an invalid length. [ 1505.787166][T25046] bond62: entered promiscuous mode [ 1505.799558][ T30] kauditd_printk_skb: 4517 callbacks suppressed [ 1505.799570][ T30] audit: type=1400 audit(1757152696.019:838946): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1505.846905][T25046] 8021q: adding VLAN 0 to HW filter on device bond62 [ 1505.853753][ T30] audit: type=1400 audit(1757152696.059:838947): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1505.881306][T25057] serio: Serial port ptm0 [ 1505.892722][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1505.901711][ T5515] audit: audit_lost=148041 audit_rate_limit=0 audit_backlog_limit=64 [ 1505.931044][ T30] audit: type=1400 audit(1757152696.059:838948): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1505.931101][ T5515] audit: backlog limit exceeded [ 1505.962672][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1505.971448][ T5515] audit: audit_lost=148042 audit_rate_limit=0 audit_backlog_limit=64 [ 1505.982993][T25048] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1505.990970][ T5515] audit: backlog limit exceeded [ 1506.731657][T25077] serio: Serial port ptm0 [ 1506.848434][T25077] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4762'. [ 1508.387159][T25107] netlink: 'syz.3.4771': attribute type 4 has an invalid length. [ 1510.821672][ T30] kauditd_printk_skb: 20581 callbacks suppressed [ 1510.821686][ T30] audit: type=1400 audit(1757152701.039:842797): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1510.867621][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1511.050017][T25134] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1511.108540][T25134] audit: audit_lost=153621 audit_rate_limit=0 audit_backlog_limit=64 [ 1511.109425][T25135] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1511.147737][ T5515] audit: audit_lost=153622 audit_rate_limit=0 audit_backlog_limit=64 [ 1511.271599][T25134] audit: backlog limit exceeded [ 1511.271644][T25135] audit: audit_lost=153623 audit_rate_limit=0 audit_backlog_limit=64 [ 1511.309275][ T5515] audit: backlog limit exceeded [ 1511.314178][ T30] audit: type=1400 audit(1757152701.039:842798): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1511.674427][T25138] serio: Serial port ptm0 [ 1511.932198][T25150] netlink: 'syz.5.4784': attribute type 1 has an invalid length. [ 1512.057666][T25150] bond49: entered promiscuous mode [ 1512.144653][T25150] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1513.819366][T25185] serio: Serial port ptm0 [ 1514.669092][T25208] netlink: 'syz.4.4797': attribute type 1 has an invalid length. [ 1514.698877][T25208] bond59: entered promiscuous mode [ 1514.704278][T25208] 8021q: adding VLAN 0 to HW filter on device bond59 [ 1515.838490][ T30] kauditd_printk_skb: 3474 callbacks suppressed [ 1515.838511][ T30] audit: type=1400 audit(1757152706.049:845801): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1515.942576][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1515.954137][T25222] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1515.963933][ T5515] audit: audit_lost=153781 audit_rate_limit=0 audit_backlog_limit=64 [ 1516.004677][T25222] audit: audit_lost=153782 audit_rate_limit=0 audit_backlog_limit=64 [ 1516.021458][ T30] audit: type=1400 audit(1757152706.099:845802): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1516.044304][ T5515] audit: backlog limit exceeded [ 1516.051557][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1516.058405][T25222] audit: backlog limit exceeded [ 1516.062856][T25223] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1517.701468][T25238] netlink: 'syz.0.4804': attribute type 1 has an invalid length. [ 1517.818053][T25238] bond63: entered promiscuous mode [ 1517.914668][T25238] 8021q: adding VLAN 0 to HW filter on device bond63 [ 1518.169718][T25255] netlink: 'syz.1.4805': attribute type 4 has an invalid length. [ 1519.479984][T25266] netlink: 'syz.5.4809': attribute type 1 has an invalid length. [ 1519.526366][T25266] bond50: entered promiscuous mode [ 1519.605219][T25266] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1519.768027][T25275] netlink: 'syz.4.4812': attribute type 1 has an invalid length. [ 1519.833087][T25275] bond60: entered promiscuous mode [ 1519.842867][T25275] 8021q: adding VLAN 0 to HW filter on device bond60 [ 1521.039787][ T30] kauditd_printk_skb: 6159 callbacks suppressed [ 1521.039804][ T30] audit: type=1400 audit(1757152710.759:849102): avc: denied { map_create } for pid=25286 comm="syz.5.4814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1521.073223][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1521.081311][ T5515] audit: audit_lost=154737 audit_rate_limit=0 audit_backlog_limit=64 [ 1521.093422][ T5515] audit: backlog limit exceeded [ 1521.111963][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1521.125173][ T5515] audit: audit_lost=154738 audit_rate_limit=0 audit_backlog_limit=64 [ 1521.181053][T25301] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1521.269286][ T30] audit: type=1400 audit(1757152710.759:849103): avc: denied { create } for pid=25286 comm="syz.5.4814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1521.298814][ T5515] audit: backlog limit exceeded [ 1521.304596][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1522.116861][T25309] netlink: 'syz.3.4818': attribute type 1 has an invalid length. [ 1522.224102][T25309] bond55: entered promiscuous mode [ 1522.290095][T25309] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1523.477618][T25328] netlink: 'syz.1.4823': attribute type 1 has an invalid length. [ 1523.529713][T25328] bond43: entered promiscuous mode [ 1523.538341][T25328] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1526.205897][ T30] kauditd_printk_skb: 2846 callbacks suppressed [ 1526.205912][ T30] audit: type=1400 audit(1757152716.419:851802): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.304690][ T30] audit: type=1400 audit(1757152716.509:851803): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.326330][ T30] audit: type=1400 audit(1757152716.509:851804): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.333869][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1526.347644][ T30] audit: type=1400 audit(1757152716.509:851805): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.347681][ T30] audit: type=1400 audit(1757152716.509:851806): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.347717][ T30] audit: type=1400 audit(1757152716.509:851807): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.347872][ T30] audit: type=1400 audit(1757152716.509:851808): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.347909][ T30] audit: type=1400 audit(1757152716.509:851809): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1526.347944][ T30] audit: type=1400 audit(1757152716.509:851810): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1527.651186][T25381] netlink: 'syz.3.4836': attribute type 1 has an invalid length. [ 1527.724346][T25381] bond56: entered promiscuous mode [ 1527.834270][T25381] 8021q: adding VLAN 0 to HW filter on device bond56 [ 1530.524747][T25414] serio: Serial port ptm0 [ 1530.584500][T25415] serio: Serial port ptm1 [ 1530.662435][T25415] netlink: 9 bytes leftover after parsing attributes in process `syz.4.4846'. [ 1530.765059][T25413] netlink: 9 bytes leftover after parsing attributes in process `syz.5.4845'. [ 1531.306326][ T30] kauditd_printk_skb: 6266 callbacks suppressed [ 1531.306344][ T30] audit: type=1400 audit(1757152721.499:855838): avc: denied { bpf } for pid=25423 comm="syz.0.4849" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1531.368348][ T30] audit: type=1400 audit(1757152721.509:855839): avc: denied { create } for pid=25423 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1531.603981][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1531.604100][ T30] audit: type=1400 audit(1757152721.509:855840): avc: denied { create } for pid=25423 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1531.681391][ T30] audit: type=1400 audit(1757152721.509:855841): avc: denied { create } for pid=25423 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1531.703863][ T5515] audit: audit_lost=155536 audit_rate_limit=0 audit_backlog_limit=64 [ 1531.773784][ T5515] audit: backlog limit exceeded [ 1531.798859][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1531.807909][ T5515] audit: audit_lost=155537 audit_rate_limit=0 audit_backlog_limit=64 [ 1531.825522][ T5515] audit: backlog limit exceeded [ 1533.738475][T25455] netlink: 'syz.0.4856': attribute type 1 has an invalid length. [ 1533.777559][T25455] bond64: entered promiscuous mode [ 1533.812672][T25455] 8021q: adding VLAN 0 to HW filter on device bond64 [ 1535.900235][T25490] netlink: 'syz.0.4864': attribute type 1 has an invalid length. [ 1535.974727][T25490] bond65: entered promiscuous mode [ 1535.989571][T25490] 8021q: adding VLAN 0 to HW filter on device bond65 [ 1536.310244][ T30] kauditd_printk_skb: 4423 callbacks suppressed [ 1536.310254][ T30] audit: type=1400 audit(1757152726.529:859862): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1536.409821][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1536.462490][ T5515] audit: audit_lost=155672 audit_rate_limit=0 audit_backlog_limit=64 [ 1536.476918][ T6810] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1536.480282][T25500] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1536.500665][T25499] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1536.519327][ T30] audit: type=1400 audit(1757152726.569:859863): avc: denied { read write } for pid=5847 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1536.550339][T25499] audit: audit_lost=155673 audit_rate_limit=0 audit_backlog_limit=64 [ 1536.561694][T25500] audit: audit_lost=155674 audit_rate_limit=0 audit_backlog_limit=64 [ 1536.568551][ T5515] audit: backlog limit exceeded [ 1539.217479][T25536] serio: Serial port ptm0 [ 1539.381654][T25536] netlink: 9 bytes leftover after parsing attributes in process `syz.5.4874'. [ 1539.702148][T25543] netlink: 'syz.5.4876': attribute type 1 has an invalid length. [ 1539.819510][T25543] bond51: entered promiscuous mode [ 1539.825175][T25543] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1541.457900][ T30] kauditd_printk_skb: 3726 callbacks suppressed [ 1541.457917][ T30] audit: type=1400 audit(1757152731.529:862938): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1541.469337][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1541.493996][ T5515] audit: audit_lost=155892 audit_rate_limit=0 audit_backlog_limit=64 [ 1541.554699][ T5515] audit: backlog limit exceeded [ 1541.586078][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1541.619568][ T30] audit: type=1400 audit(1757152731.659:862939): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1541.680831][ T5515] audit: audit_lost=155893 audit_rate_limit=0 audit_backlog_limit=64 [ 1541.703953][ T30] audit: type=1400 audit(1757152731.659:862940): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1541.761520][ T5515] audit: backlog limit exceeded [ 1541.795811][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1545.459670][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.466102][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 1546.466188][ T30] kauditd_printk_skb: 3963 callbacks suppressed [ 1546.466198][ T30] audit: type=1400 audit(1757152736.659:866903): avc: denied { create } for pid=25629 comm="syz.4.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1546.550770][ T30] audit: type=1400 audit(1757152736.769:866904): avc: denied { read write } for pid=6810 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1546.597757][ T30] audit: type=1400 audit(1757152736.659:866902): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.619378][ T30] audit: type=1400 audit(1757152736.809:866905): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.641694][ T30] audit: type=1400 audit(1757152736.809:866906): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.663363][ T30] audit: type=1400 audit(1757152736.809:866907): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.741206][ T30] audit: type=1400 audit(1757152736.809:866908): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.786644][ T30] audit: type=1400 audit(1757152736.809:866909): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1546.818135][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1546.843570][ T5515] audit: audit_lost=155895 audit_rate_limit=0 audit_backlog_limit=64 [ 1547.835302][T25643] netlink: 'syz.3.4902': attribute type 1 has an invalid length. [ 1548.047215][T25643] bond57: entered promiscuous mode [ 1548.053759][T25643] 8021q: adding VLAN 0 to HW filter on device bond57 [ 1548.513504][T25660] serio: Serial port ptm0 [ 1548.567817][T25660] netlink: 9 bytes leftover after parsing attributes in process `syz.0.4906'. [ 1551.481050][ T30] kauditd_printk_skb: 2881 callbacks suppressed [ 1551.481065][ T30] audit: type=1400 audit(1757152741.699:869457): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1551.563191][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1551.582713][T25698] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1551.582732][ T30] audit: type=1400 audit(1757152741.699:869458): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1551.619301][ T5515] audit: audit_lost=156007 audit_rate_limit=0 audit_backlog_limit=64 [ 1551.633345][T25702] netlink: 'syz.3.4917': attribute type 1 has an invalid length. [ 1551.659318][ T5515] audit: backlog limit exceeded [ 1551.669270][T25698] audit: audit_lost=156008 audit_rate_limit=0 audit_backlog_limit=64 [ 1551.687714][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1551.729960][ T5515] audit: audit_lost=156009 audit_rate_limit=0 audit_backlog_limit=64 [ 1551.753758][T25706] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1552.023464][T25702] bond58: entered promiscuous mode [ 1552.059985][T25702] 8021q: adding VLAN 0 to HW filter on device bond58 [ 1556.503618][ T30] kauditd_printk_skb: 3577 callbacks suppressed [ 1556.503635][ T30] audit: type=1326 audit(1757152746.689:872993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25765 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f492df8ebe9 code=0x7ffc0000 [ 1556.577524][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1556.584743][T25774] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1556.601510][T25774] audit: audit_lost=156024 audit_rate_limit=0 audit_backlog_limit=64 [ 1556.635965][T25774] audit: backlog limit exceeded [ 1556.645731][T25776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1556.652386][ T30] audit: type=1326 audit(1757152746.689:872994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25765 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7f492df8ebe9 code=0x7ffc0000 [ 1556.652434][ T30] audit: type=1326 audit(1757152746.689:872995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25765 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f492df8ebe9 code=0x7ffc0000 [ 1556.652470][ T30] audit: type=1326 audit(1757152746.689:872996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25765 comm="syz.3.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f492df8d550 code=0x7ffc0000 [ 1556.731978][T25776] audit: audit_lost=156025 audit_rate_limit=0 audit_backlog_limit=64 [ 1559.438521][T25811] serio: Serial port ptm0 [ 1559.531145][T25811] netlink: 9 bytes leftover after parsing attributes in process `syz.1.4943'. [ 1561.514184][ T30] kauditd_printk_skb: 6861 callbacks suppressed [ 1561.514200][ T30] audit: type=1400 audit(1757152751.729:877440): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.598202][ T30] audit: type=1400 audit(1757152751.729:877441): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.743660][ T30] audit: type=1400 audit(1757152751.729:877442): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.776233][ T30] audit: type=1400 audit(1757152751.729:877443): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.797825][ T30] audit: type=1400 audit(1757152751.739:877444): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.819391][ T30] audit: type=1400 audit(1757152751.739:877445): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.840879][ T30] audit: type=1400 audit(1757152751.739:877446): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1561.843545][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1561.862821][ T30] audit: type=1400 audit(1757152751.769:877447): avc: denied { read write } for pid=5847 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1561.956773][ T30] audit: type=1400 audit(1757152751.779:877448): avc: denied { create } for pid=25834 comm="syz.3.4950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1562.488056][T25854] netlink: 'syz.5.4953': attribute type 4 has an invalid length. [ 1564.877342][T25879] netlink: 'syz.4.4961': attribute type 1 has an invalid length. [ 1565.047717][T25879] bond61: entered promiscuous mode [ 1565.053478][T25879] 8021q: adding VLAN 0 to HW filter on device bond61 [ 1566.535728][ T30] kauditd_printk_skb: 3276 callbacks suppressed [ 1566.535744][ T30] audit: type=1400 audit(1757152756.689:880327): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1566.606163][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1566.618818][ T5515] audit: audit_lost=156965 audit_rate_limit=0 audit_backlog_limit=64 [ 1566.629096][ T30] audit: type=1400 audit(1757152756.689:880328): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1566.657393][ T5515] audit: backlog limit exceeded [ 1566.684292][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1566.693987][ T5515] audit: audit_lost=156966 audit_rate_limit=0 audit_backlog_limit=64 [ 1566.707741][ T30] audit: type=1400 audit(1757152756.689:880329): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1566.731741][ T5515] audit: backlog limit exceeded [ 1566.742109][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1568.877448][T25934] serio: Serial port ptm0 [ 1568.958083][T25933] netlink: 9 bytes leftover after parsing attributes in process `syz.0.4974'. [ 1571.569988][ T30] kauditd_printk_skb: 4295 callbacks suppressed [ 1571.570002][ T30] audit: type=1400 audit(1757152761.789:884038): avc: denied { create } for pid=25967 comm="syz.5.4983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1571.644567][ T30] audit: type=1400 audit(1757152761.819:884039): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1571.677631][T25977] netlink: 'syz.3.4985': attribute type 1 has an invalid length. [ 1571.722651][ T30] audit: type=1400 audit(1757152761.829:884040): avc: denied { create } for pid=25980 comm="syz.0.4986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1571.797812][ T30] audit: type=1400 audit(1757152761.839:884041): avc: denied { read write } for pid=5844 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1571.816358][T25977] bond59: entered promiscuous mode [ 1571.833925][ T30] audit: type=1400 audit(1757152761.859:884042): avc: denied { create } for pid=25982 comm="syz.1.4987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1571.860373][ T30] audit: type=1400 audit(1757152761.889:884043): avc: denied { create } for pid=25974 comm="syz.3.4985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1571.895577][T25977] 8021q: adding VLAN 0 to HW filter on device bond59 [ 1572.137867][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1572.144810][ T5515] audit: audit_lost=157163 audit_rate_limit=0 audit_backlog_limit=64 [ 1572.164761][ T5515] audit: backlog limit exceeded [ 1572.170297][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1573.464322][T26007] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4991'. [ 1574.579639][T26021] netlink: 'syz.3.4995': attribute type 1 has an invalid length. [ 1574.710696][T26021] bond60: entered promiscuous mode [ 1574.813723][T26021] 8021q: adding VLAN 0 to HW filter on device bond60 [ 1576.676174][ T30] kauditd_printk_skb: 5958 callbacks suppressed [ 1576.676186][ T30] audit: type=1400 audit(1757152766.889:887792): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1576.749693][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1576.756421][ T5515] audit: audit_lost=157901 audit_rate_limit=0 audit_backlog_limit=64 [ 1576.764727][ T30] audit: type=1400 audit(1757152766.889:887793): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1576.819471][ T5515] audit: backlog limit exceeded [ 1576.824709][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1576.879241][ T5515] audit: audit_lost=157902 audit_rate_limit=0 audit_backlog_limit=64 [ 1576.889246][ T30] audit: type=1400 audit(1757152766.889:887794): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1576.922977][ T5515] audit: backlog limit exceeded [ 1576.928104][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1577.370457][T26058] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5003'. [ 1578.353536][T26079] netlink: 'syz.0.5007': attribute type 1 has an invalid length. [ 1578.455280][T26079] bond66: entered promiscuous mode [ 1578.466358][T26079] 8021q: adding VLAN 0 to HW filter on device bond66 [ 1579.356784][T26086] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5009'. [ 1580.410374][T26101] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5012'. [ 1580.891660][T26106] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5015'. [ 1581.679265][ T30] kauditd_printk_skb: 6117 callbacks suppressed [ 1581.679284][ T30] audit: type=1400 audit(1757152771.859:891465): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1581.753332][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1581.791313][ T5515] audit: audit_lost=158719 audit_rate_limit=0 audit_backlog_limit=64 [ 1581.927707][ T5515] audit: backlog limit exceeded [ 1581.935509][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1581.942670][ T5515] audit: audit_lost=158720 audit_rate_limit=0 audit_backlog_limit=64 [ 1581.950835][ T5515] audit: backlog limit exceeded [ 1581.953430][T26127] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1581.957721][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1581.995238][ T5515] audit: audit_lost=158721 audit_rate_limit=0 audit_backlog_limit=64 [ 1583.065292][T26132] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5021'. [ 1586.690707][ T30] kauditd_printk_skb: 4773 callbacks suppressed [ 1586.690717][ T30] audit: type=1400 audit(1757152776.909:895807): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1586.820379][T26190] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1586.930375][T26191] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1586.939900][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1586.946388][ T5515] audit: audit_lost=158866 audit_rate_limit=0 audit_backlog_limit=64 [ 1586.960487][T26191] audit: audit_lost=158867 audit_rate_limit=0 audit_backlog_limit=64 [ 1586.968801][T26190] audit: audit_lost=158868 audit_rate_limit=0 audit_backlog_limit=64 [ 1586.976905][T26190] audit: backlog limit exceeded [ 1586.990976][T26185] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1586.997573][T26185] audit: audit_lost=158869 audit_rate_limit=0 audit_backlog_limit=64 [ 1588.519962][T26210] netlink: 9 bytes leftover after parsing attributes in process `syz.4.5040'. [ 1588.630128][T26212] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5042'. [ 1589.969495][T26236] netlink: 'syz.1.5050': attribute type 1 has an invalid length. [ 1590.005592][T26236] bond44: entered promiscuous mode [ 1590.064034][T26236] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1590.142591][T26238] serio: Serial port ptm0 [ 1590.166707][ T6211] BUG: MAX_LOCKDEP_KEYS too low! [ 1590.171635][ T6211] turning off the locking correctness validator. [ 1590.177929][ T6211] CPU: 1 UID: 0 PID: 6211 Comm: kworker/u8:10 Not tainted syzkaller #0 PREEMPT(full) [ 1590.177943][ T6211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1590.177950][ T6211] Workqueue: events_unbound linkwatch_event [ 1590.177970][ T6211] Call Trace: [ 1590.177974][ T6211] [ 1590.177978][ T6211] dump_stack_lvl+0x116/0x1f0 [ 1590.177992][ T6211] register_lock_class+0x419/0x4c0 [ 1590.178004][ T6211] __lock_acquire+0x9f/0x1ce0 [ 1590.178021][ T6211] lock_acquire+0x179/0x350 [ 1590.178036][ T6211] ? dev_reset_queue+0xa9/0x1d0 [ 1590.178050][ T6211] _raw_spin_lock_bh+0x33/0x40 [ 1590.178061][ T6211] ? dev_reset_queue+0xa9/0x1d0 [ 1590.178071][ T6211] dev_reset_queue+0xa9/0x1d0 [ 1590.178082][ T6211] dev_deactivate_many+0x4e5/0xd50 [ 1590.178095][ T6211] ? __pfx_dev_deactivate_many+0x10/0x10 [ 1590.178107][ T6211] ? ref_tracker_free+0x311/0x830 [ 1590.178122][ T6211] ? __pfx_ref_tracker_free+0x10/0x10 [ 1590.178137][ T6211] dev_deactivate+0xf8/0x1c0 [ 1590.178148][ T6211] ? __pfx_dev_deactivate+0x10/0x10 [ 1590.178160][ T6211] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1590.178173][ T6211] linkwatch_do_dev+0x11e/0x160 [ 1590.178189][ T6211] __linkwatch_run_queue+0x2a7/0x8a0 [ 1590.178205][ T6211] ? __pfx___linkwatch_run_queue+0x10/0x10 [ 1590.178222][ T6211] linkwatch_event+0x8f/0xc0 [ 1590.178237][ T6211] ? __pfx_linkwatch_event+0x10/0x10 [ 1590.178253][ T6211] ? rcu_is_watching+0x12/0xc0 [ 1590.178266][ T6211] process_one_work+0x9cc/0x1b70 [ 1590.178279][ T6211] ? __pfx_process_one_work+0x10/0x10 [ 1590.178292][ T6211] ? assign_work+0x1a0/0x250 [ 1590.178302][ T6211] worker_thread+0x6c8/0xf10 [ 1590.178314][ T6211] ? __kthread_parkme+0x19e/0x250 [ 1590.178329][ T6211] ? __pfx_worker_thread+0x10/0x10 [ 1590.178340][ T6211] kthread+0x3c2/0x780 [ 1590.178350][ T6211] ? __pfx_kthread+0x10/0x10 [ 1590.178360][ T6211] ? rcu_is_watching+0x12/0xc0 [ 1590.178372][ T6211] ? __pfx_kthread+0x10/0x10 [ 1590.178383][ T6211] ret_from_fork+0x5d4/0x6f0 [ 1590.178393][ T6211] ? __pfx_kthread+0x10/0x10 [ 1590.178403][ T6211] ret_from_fork_asm+0x1a/0x30 [ 1590.178418][ T6211] [ 1590.422394][T26230] netlink: 9 bytes leftover after parsing attributes in process `syz.5.5047'. [ 1591.700222][ T30] kauditd_printk_skb: 12914 callbacks suppressed [ 1591.700237][ T30] audit: type=1400 audit(1757152781.909:908719): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1591.712426][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1591.728238][ T30] audit: type=1400 audit(1757152781.919:908720): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1591.764507][ T30] audit: type=1400 audit(1757152781.919:908721): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1591.769211][ T5515] audit: audit_lost=158870 audit_rate_limit=0 audit_backlog_limit=64 [ 1591.795995][ T5515] audit: backlog limit exceeded [ 1591.797884][ T30] audit: type=1400 audit(1757152781.919:908722): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1591.822857][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1591.824196][ T30] audit: type=1400 audit(1757152781.919:908723): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1591.851100][ T30] audit: type=1400 audit(1757152781.919:908724): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.710091][ T30] kauditd_printk_skb: 50881 callbacks suppressed [ 1596.710106][ T30] audit: type=1400 audit(1757152786.929:958992): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.724983][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1596.737624][ T30] audit: type=1400 audit(1757152786.929:958993): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.737653][ T30] audit: type=1400 audit(1757152786.929:958994): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.737683][ T30] audit: type=1400 audit(1757152786.929:958995): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.737711][ T30] audit: type=1400 audit(1757152786.929:958996): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.737737][ T30] audit: type=1400 audit(1757152786.929:958997): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.744474][ T5515] audit: audit_lost=159076 audit_rate_limit=0 audit_backlog_limit=64 [ 1596.765735][ T30] audit: type=1400 audit(1757152786.929:958998): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1596.851086][ T5515] audit: backlog limit exceeded VM DIAGNOSIS: Warning: Permanently added '10.128.0.97' (ED25519) to the list of known hosts. root@10.128.0.97: Permission denied (publickey,password,keyboard-interactive). failed to run ["ssh" "-p" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "IdentitiesOnly=yes" "-o" "BatchMode=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "root@10.128.0.97" "cat" "/proc/lockdep_stats" "/proc/lockdep" "/proc/lockdep_chains"]: exit status 255 Warning: Permanently added '10.128.0.97' (ED25519) to the list of known hosts. root@10.128.0.97: Permission denied (publickey,password,keyboard-interactive).