last executing test programs: 9.678612384s ago: executing program 2 (id=3082): listen(0xffffffffffffffff, 0x3) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) fsopen(0x0, 0x1) setsockopt$inet6_int(r3, 0x29, 0x31, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r5 = socket(0x10, 0x803, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r7, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000003840)=@newtfilter={0x38, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r7, {0xc, 0x4}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_DIVISOR={0x8, 0x4, 0x80000000}]}}]}, 0x38}}, 0x20008050) accept(0xffffffffffffffff, &(0x7f0000000240)=@qipcrtr, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 8.384402702s ago: executing program 1 (id=3088): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x23, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0, 0x0, 0x1}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = landlock_create_ruleset(0x0, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r4, 0x1, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bond0\x00'}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x3da, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r5, 0xc02064b2, &(0x7f0000000040)={0x5, 0x6576, 0x9}) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r5, 0x100000000) syz_clone3(&(0x7f0000002340)={0x828080, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, 0x0}, 0x58) prlimit64(0x0, 0xe, 0x0, 0x0) creat(0x0, 0x0) 8.136931776s ago: executing program 0 (id=3092): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0xffff, 0x3}, 0x6) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = openat$fb0(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r4, 0x4601, &(0x7f0000000380)={0x3c0, 0x78, 0x1f, 0x0, 0x7, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x100, 0x0, 0x0, 0x1, 0x1, 0x8, 0x3, 0x1ff, 0x3d, 0x963, 0x3, 0x53, 0x202, 0x1, 0xc}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x26}, 0x28) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42400) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r5, 0xc0605345, &(0x7f0000000140)={0x400, 0x0, {0x0, 0x1, 0xd, 0x0, 0xb}, 0xa}) syz_emit_ethernet(0x85, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0180c24c9e00000086dd60120008004f3a00fe8000000000000000000000000000bbfe800000000000000000000000aa03029078000000006000081000001100fc0100000e000000000000000000000000000000000000000000000000000020bb00000000000000052f0000000000"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x44}, 0x1, 0xffffffea}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x64, &(0x7f00000006c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x3b, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 7.912886011s ago: executing program 2 (id=3094): r0 = socket$inet6(0xa, 0x80002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xcc657405ba8b63ff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x2a, 0xa9}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="dbaa00fea0000000711051000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x790f}, 0x94) landlock_add_rule$LANDLOCK_RULE_NET_PORT(0xffffffffffffffff, 0x2, 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_NET_PORT(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r5 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r5, 0xc0285700, &(0x7f0000000400)={0x1b, "5660359c3245d1c42317afad7d48ed510000000000000100", 0xffffffffffffffff}) ioctl$SYNC_IOC_FILE_INFO(r6, 0xc0383e04, &(0x7f0000000100)={""/32, 0x0, 0x0, 0x1, 0x0, &(0x7f00000001c0)=[{}]}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4005c00) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={0x0, 0xd2c}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000100)={r8, @in={{0x2, 0x4e21, @local}}, 0x6, 0x4d96, 0x3, 0x5, 0x80, 0x80000001, 0x4}, &(0x7f0000000080)=0x9c) 7.314049302s ago: executing program 1 (id=3096): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32], 0x48) r3 = syz_open_procfs(0x0, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x6) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0xf, &(0x7f0000000100)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x8}, {0x4, 0x1, 0xb, 0x9, 0x0, 0x8}}, {{0x6, 0x0, 0xb, 0xa}, {0xf}}, [], {{0x7, 0x1, 0x3, 0x3}, {0x5, 0x0, 0xb, 0x3}, {0x85, 0x0, 0x0, 0x76}}}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r5, &(0x7f0000014980), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)={0xac, 0x0, 0x1, 0x505, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}}}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @private0}]}]}, 0xac}}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=ANY=[@ANYBLOB="c00000000001050500000000000000000a0000003c0002802c00018014000300ff01000000000000000000000000000114000400ff0200000000000000000000000000010c00028005000100000000003c0001800c00028005000100000000002c00018014000300ff02000000020000000000000000000114000400fc00000000000000000000000000000108000740000000012c00068014000500fe800000000000000000000400000031140004"], 0xc0}, 0x1, 0x0, 0x0, 0x4040081}, 0x0) 7.043661625s ago: executing program 0 (id=3097): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) fanotify_init(0x20, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x4) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x10000000000001, 0x0, 0x2, 0x0) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5000002, 0x200000005c831, 0xffffffffffffffff, 0x4000000) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000300)=0x1, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40041, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) openat$sw_sync(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a3843, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0) r4 = socket(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r4) close_range(r0, 0xffffffffffffffff, 0x0) 7.011340444s ago: executing program 2 (id=3098): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0xa0000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f000001fc40)=[@text16={0x10, 0x0}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x2c}, 0x28) kexec_load(0x5, 0x3, &(0x7f0000001080), 0x3e0000) 6.979448683s ago: executing program 3 (id=3099): socket$xdp(0x2c, 0x3, 0x0) openat$comedi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/comedi0\x00', 0x8080, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x6, 0x100000b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80202, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x1, 0x8) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) write$6lowpan_control(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000380), 0x0, 0x0) ioctl$MEDIA_IOC_ENUM_LINKS(r2, 0xc0287c02, &(0x7f0000000100)={0x80000000, 0x0, &(0x7f0000000200)=[{{}, {0x80000000, 0x0}}, {{}, {0x80000000, 0x0}}]}) ioctl$MEDIA_IOC_SETUP_LINK(r2, 0xc0347c03, &(0x7f00000001c0)={{r4, r3, 0x1, [0x0, 0xf7df]}, {r4, r5, 0x4, [0x6]}, 0x1, [0x8, 0x3df]}) r6 = socket$pppl2tp(0x18, 0x1, 0x1) r7 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r6, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r7, {0x2, 0x0, @multicast2}, 0x2, 0x0, 0x0, 0x4}}, 0x2e) r8 = syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r8], 0x40}}, 0x0) prlimit64(0x0, 0x0, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1000001000, 0x49}, 0x0, &(0x7f00000002c0)={0x3ff, 0x8, 0xffffffffffffffff, 0x9, 0x0, 0xf, 0x80000006}, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 6.274224509s ago: executing program 3 (id=3100): socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) syz_open_dev$usbfs(&(0x7f0000000240), 0x75, 0x109301) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffeda}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0xfffffffa, 0x0, 0x1, 0x7d3c, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4}, 0x50) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000003040), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000003140)={&(0x7f0000003080)={0x28, r4, 0xe6e964277ae08d57, 0x70bd2d, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x8040000}, 0x40080) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r4, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x4}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x8004) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, 0x0) read$FUSE(r6, &(0x7f0000004180)={0x2020}, 0x2020) sendmmsg$inet6(r6, &(0x7f0000000680)=[{{&(0x7f00000004c0)={0xa, 0x4e24, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x45}, 0x1c, &(0x7f0000000500), 0x0, &(0x7f0000000540)=[@tclass={{0x14, 0x29, 0x43, 0x5}}, @hopopts={{0x28, 0x29, 0x36, {0x3a, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @jumbo={0xc2, 0x4, 0x40}]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x2, 0x8, 0x0, 0x0, 0x0, [@local, @private2, @loopback, @dev={0xfe, 0x80, '\x00', 0x8}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7}}, @dstopts={{0x60, 0x29, 0x37, {0x95, 0x8, '\x00', [@pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0x7f36}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x8000}, @jumbo={0xc2, 0x4, 0x2}, @ra={0x5, 0x2, 0x5}, @hao={0xc9, 0x10, @mcast2}]}}}], 0x128}}], 0x1, 0x4000800) r7 = socket(0x10, 0x80002, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000100)={0x14, r8, 0x9c3fa077fa966179, 0xfffffffd, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) 5.923938957s ago: executing program 1 (id=3102): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0xa0000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f000001fc40)=[@text16={0x10, 0x0}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x2c}, 0x28) kexec_load(0x5, 0x3, &(0x7f0000001080), 0x3e0000) 5.834270497s ago: executing program 0 (id=3103): getpid() r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x18) bind$inet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) socket$inet6_icmp(0xa, 0x2, 0x3a) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) syz_emit_vhci(&(0x7f0000000540)=ANY=[@ANYBLOB="043e1f0a"], 0x22) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x10010, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000000c0)={0x1, 0x1, 0x1}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x24, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r2, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}}, 0x24}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) close(0xffffffffffffffff) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x7fffffff, 0x0, &(0x7f0000000680)=[{&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000180)=""/92, 0x5c}, {&(0x7f0000000400)=""/231, 0xe7}, {&(0x7f0000000500)=""/249, 0xf9}, {&(0x7f0000000600)=""/79, 0x4f}], &(0x7f0000000200)=[0x3], 0x5}, 0x20) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=@newtfilter={0x24, 0x2a, 0xd27, 0xec0, 0x0, {0x0, 0x0, 0x0, r2, {0xffe0, 0xfff1}, {0x0, 0xffff}, {0xffe0, 0xf}}}, 0x24}}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) 5.350086491s ago: executing program 3 (id=3104): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x20201) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000100)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0), 0x88602, 0x0) ioctl$SNDCTL_DSP_GETODELAY(r4, 0x80045017, 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000001200), 0x0, 0xa2c65) write$snddsp(r5, &(0x7f0000000200)="a38d", 0x2) ioctl$SNDRV_PCM_IOCTL_DRAIN(r5, 0x4144, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r5, 0xc06c4124, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) r6 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) fchdir(r7) r8 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r8, 0x2007ffb) close(r8) r9 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0xc8a02, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x10, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x39777c09, 0x0, 0x0, 0x0, 0x1}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4483}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}]}, &(0x7f0000000440)='GPL\x00', 0x2, 0x1000, &(0x7f0000001480)=""/4096, 0x100, 0x4, '\x00', 0x0, @fallback=0x24, r9, 0x8, &(0x7f0000000480)={0x4, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000800)=[0xffffffffffffffff]}, 0x94) r10 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$SG_BLKTRACETEARDOWN(r10, 0x1276, 0x20000000) 4.463964441s ago: executing program 2 (id=3105): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) connect$unix(r1, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi1\x00', 0x2180, 0x0) ioctl$COMEDI_DEVCONFIG(r3, 0x40946400, &(0x7f0000000300)={'pcl711\x00', [0x2f00, 0x6, 0xd09a, 0x2, 0x3, 0xfffffffe, 0x20000004, 0x6, 0xffe, 0x9, 0x10, 0x3, 0x4, 0x0, 0xffff, 0x100006, 0x5, 0xa, 0x1000, 0x30000, 0x10000, 0x2, 0x1, 0xe2df, 0x2, 0x80008001, 0x7, 0xb, 0x7, 0x5, 0x470f]}) ioctl$COMEDI_INSN(r3, 0x8028640c, &(0x7f0000000000)={0x4000000, 0xf, &(0x7f0000000080)=[0x3, 0xfff, 0xc, 0xb, 0x660, 0xfffffff9, 0xe0, 0xfffffff7, 0x9, 0xf5, 0xffffffff, 0x2, 0x0, 0x4, 0x6], 0x0, 0x4}) socket$nl_route(0x10, 0x3, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000240)={0x7fffffff, 0x49433553, 0x3, @stepwise={0x0, 0x8, 0x9, 0x7, 0x9e1e, 0x8}}) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$poke(0x1, r4, 0x0, 0x4000000000004) openat$rfkill(0xffffffffffffff9c, 0x0, 0x20801, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80222, 0x0) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000240)="0100000200373a4541062101a59ea940d2cb0b3692f5020000a00000050000000000eb000000a5e5be21c44e328e68f3922af831e4e51bfb30f7788fd57e51bc464355bd646d037ccc16ddb08a7b3a697a793acf37119e61f502d8bbb016f701890700000068d945af468c1c9090c76906b94e0f27761c75e58c82da54d010078660684a4106855bea1ce67fe118aa4acabb5bee7f082d23a16b010c92471eba59152e716af8776ab90ac47a9680aa613a56aa11bfa73af4c4e94b5cfc855f0e910186d7e68ac24f8b125140ac5f7f4819168ce1c25550c6773b410119873dd9827757d96c5e8aa4617cc54c5e67060a9266f416", 0xf4, 0xffffffffffffffff) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000006) 3.918182687s ago: executing program 0 (id=3107): socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = userfaultfd(0x80001) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000004000)={0xf, {"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", 0xfffffffffffffe59}}, 0xfa) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000140)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa04, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x0, 0x2}) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, 0x0, 0x4045) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x0, 0x8, 0x0, 0x3}, 0x0) syz_open_dev$dri(&(0x7f0000000240), 0xd21, 0x4000) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f00000001c0), 0x0, 0x0, 0x2) 3.89888032s ago: executing program 1 (id=3108): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x15) r1 = socket(0xa, 0x3, 0x1003a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r2, 0x0) socket$netlink(0x10, 0x3, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x8}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) capset(&(0x7f00000003c0)={0x19980330, r3}, &(0x7f0000000400)={0x4, 0x14, 0x9, 0x8, 0x2, 0xfffffff7}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x22) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000", @ANYRESDEC=r2, @ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000009900"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c0700000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)={0x34, 0x3c, 0x107, 0x0, 0x0, {0x1, 0x7c}, [@nested={0x4, 0xfc}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x2006, 0x0, 0x0, @ipv4=@remote}]}, @nested={0x8, 0x2, 0x0, 0x1, [@nested={0x4, 0x115}]}, @typed={0x8, 0x9, 0x0, 0x0, @u32=0xc}]}, 0x34}, 0x1, 0x0, 0x0, 0x4c094}, 0x4040) 3.417364227s ago: executing program 3 (id=3109): listen(0xffffffffffffffff, 0x3) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) fsopen(0x0, 0x1) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000003840)=@newtfilter={0x38, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r5, {0xc, 0x4}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_DIVISOR={0x8, 0x4, 0x80000000}]}}]}, 0x38}}, 0x20008050) accept(0xffffffffffffffff, &(0x7f0000000240)=@qipcrtr, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 3.03018707s ago: executing program 4 (id=3110): listen(0xffffffffffffffff, 0x3) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r6, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000003840)=@newtfilter={0x38, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r6, {0xc, 0x4}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_DIVISOR={0x8, 0x4, 0x80000000}]}}]}, 0x38}}, 0x20008050) accept(0xffffffffffffffff, &(0x7f0000000240)=@qipcrtr, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) 2.807749884s ago: executing program 4 (id=3111): prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x103802, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000003, 0x50032, 0xffffffffffffffff, 0x0) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mount(0x0, &(0x7f0000000140)='./cgroup\x00', 0x0, 0x345c14ed3863a686, 0x0) r3 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000200)="480000001400190d7ebdeb75fd0d8c562c84d8c033ed7a80fae0090f000000000000a2bc5603ca00000f7f89000000200000004a2471083ec6811778581acb6c0101ff0000000309", 0x48}], 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xa890) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000500)={0x0, 0x0, @ioapic={0x1cccd2002, 0x5, 0x9, 0x1, 0x0, [{0x6, 0x2, 0x6, '\x00', 0x1}, {0x2, 0x6, 0x3, '\x00', 0xf}, {0x3, 0xc, 0x1}, {0x0, 0x40, 0x5, '\x00', 0x8}, {0xf8, 0x5, 0x4, '\x00', 0xc0}, {0x40, 0x9, 0x10, '\x00', 0x9b}, {0x0, 0xf7, 0x0, '\x00', 0x6}, {0x5, 0x6, 0xe1, '\x00', 0x40}, {0x9, 0x6, 0x5, '\x00', 0x1}, {0x8, 0x7, 0x9d, '\x00', 0x61}, {0x2, 0x9e, 0x3, '\x00', 0x9}, {0x80, 0x9, 0x81, '\x00', 0x7}, {0x5, 0x6, 0x9, '\x00', 0x8c}, {0x3, 0xfa, 0x9, '\x00', 0xf}, {0x76, 0x7, 0x8, '\x00', 0x5}, {0x1, 0x9, 0x1, '\x00', 0xc}, {0x4, 0x8, 0xfb, '\x00', 0x6}, {0x5, 0x2, 0x6, '\x00', 0x9}, {0x1, 0xb, 0xe, '\x00', 0x80}, {0x7, 0x2, 0x2, '\x00', 0x8}, {0x3, 0x9, 0x7, '\x00', 0x10}, {0x7, 0x81, 0x0, '\x00', 0x7}, {0x7, 0x10, 0x7, '\x00', 0x81}, {0xbc, 0x2, 0x5, '\x00', 0x1}]}}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)={0x3c, r5, 0x101, 0x80, 0x80200, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_PRIVACY={0x4}, @chandef_params, @NL80211_ATTR_KEYS={0x1c, 0x51, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11}]}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x200040c0}, 0x48800) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x4c, r5, 0x200, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x9}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x39}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x64}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x7a}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) mkdirat(0xffffffffffffff9c, 0x0, 0x0) 2.73652868s ago: executing program 2 (id=3112): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) clock_adjtime(0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000000300)={@val={0x1c, 0xf5}, @void, @mpls={[{}], @ipv6=@gre_packet={0x4, 0x6, "ace260", 0x44, 0x2f, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00', {[], {{0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x880b, 0x0, 0x2}, {}, {0x0, 0x0, 0x1, 0x1}, {0x8, 0x88be, 0x2, {{0x0, 0x1, 0x23, 0x0, 0x0, 0x1, 0x0, 0x2}, 0x1, {0x3e}}}, {0x8, 0x22eb, 0x3, {{0x2, 0x2, 0x48, 0x1, 0x1, 0x0, 0x1, 0x61}, 0x2, {0xfffffffb, 0xf587, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1}}}, {0x8, 0x6558, 0x2}}}}}}, 0x74) write$tcp_congestion(0xffffffffffffffff, 0x0, 0xee00) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r4 = syz_open_dev$usbfs(0x0, 0x77, 0x101301) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000040), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=0x0, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="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"]) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000001400000018"], 0x44}}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) rename(0x0, &(0x7f0000000100)='./file0\x00') ioctl$FS_IOC_GETFSLABEL(r5, 0x400452c8, &(0x7f0000000100)) 2.549708725s ago: executing program 3 (id=3113): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) fanotify_init(0x20, 0x80000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x4) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x10000000000001, 0x0, 0x2, 0x0) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sched_setattr(0x0, &(0x7f0000000180)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x5000002, 0x200000005c831, 0xffffffffffffffff, 0x4000000) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000300)=0x1, 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x40041, &(0x7f0000000100)={0x2, 0x4e23, @empty}, 0x10) openat$sw_sync(0xffffffffffffff9c, &(0x7f00000001c0), 0x3a3843, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x42, 0x0) r4 = socket(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r4) close_range(r0, 0xffffffffffffffff, 0x0) 2.174045976s ago: executing program 4 (id=3114): syz_open_dev$sndctrl(&(0x7f0000000000), 0x6, 0x0) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002000)=""/102400, 0x19000) r1 = getpid() io_uring_setup(0x30a7, &(0x7f0000000000)={0x0, 0x9dd9, 0x2000, 0x2, 0x373}) r2 = syz_pidfd_open(r1, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r4, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f00000009c0)=""/4078, 0xfee}], 0x1}, 0x0) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000200)="67d8902400aa303e97380e901b1bdbdaf6", 0x11}], 0x1, 0x0, 0x0, 0x40010}, 0x0) open_by_handle_at(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="15000000fe00"], 0x1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4000) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800d1000000fbdbbefb973d065bc3e04400", @ANYRES32=0x0, @ANYBLOB="0180000000000000140012800b0001006261746164760000040002800a0001000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0xd0}, 0x0) 2.143890901s ago: executing program 0 (id=3115): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) socket$inet6_icmp(0xa, 0x2, 0x3a) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000c18000)="beef915d564c90c200"/24, 0x18) close(r3) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r5, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040e04073e2002"], 0x7) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) recvfrom(r6, &(0x7f0000000180)=""/60, 0xfffffffffffffecb, 0x4100, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x1c8, 0x2, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_NAT_DST={0x78, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @empty}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x3e}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x27}}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x101}, @CTA_TUPLE_ORIG={0x38, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010100}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x27}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @private=0xa010100}}}]}, @CTA_TUPLE_MASTER={0x48, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_PROTOINFO={0x20, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x1c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x7f, 0x5}}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x80}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x7}]}}, @CTA_NAT_SRC={0x40, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x4}, @CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x10}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010101}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}, @CTA_LABELS={0x20, 0x16, 0x1, 0x0, [0x4, 0x401, 0x9, 0x20cba4c0, 0xfff, 0x80, 0x2]}, @CTA_FILTER={0x24, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x10}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x200}, @CTA_FILTER_ORIG_FLAGS={0x8}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x108}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x2}]}, 0x1c8}}, 0x8000) 1.623450366s ago: executing program 4 (id=3116): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0xa0000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f000001fc40)=[@text16={0x10, 0x0}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x2c}, 0x28) kexec_load(0x5, 0x3, &(0x7f0000001080), 0x3e0000) 1.518014683s ago: executing program 1 (id=3117): socket$nl_xfrm(0x10, 0x3, 0x6) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x9, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x11e, 0x1e, 0xffffffffffffffff, 0x0) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './cgroup\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) unshare(0x20000400) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = syz_init_net_socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="0125ecc46800"]) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) getdents(r4, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=0x0], 0x0) 1.327743179s ago: executing program 1 (id=3118): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)}) ioctl$DRM_IOCTL_MODE_GETPLANE(r2, 0xc02064b6, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r2, 0xc02064b9, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0xa0000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, &(0x7f000001fc40)=[@text16={0x10, 0x0}], 0x1, 0x1, 0x0, 0x0) ioctl$KVM_SET_MSRS(r5, 0x4008ae89, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0], 0x48) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x2, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x2c}, 0x28) kexec_load(0x5, 0x3, &(0x7f0000001080), 0x3e0000) 645.395171ms ago: executing program 3 (id=3119): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5bbf91a1e7f99074, &(0x7f0000000000)) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x800, 0x0) getdents64(r4, &(0x7f00000004c0)=""/55, 0x37) r5 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r5, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000001300e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff0000000000000005"], 0x310) setsockopt$inet6_group_source_req(r5, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) r6 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r6, &(0x7f00000000c0)=[{&(0x7f0000000600)=""/128, 0x80}], 0x1, 0x111, 0x0) r7 = socket$inet6(0xa, 0x80001, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct={0x5, 0x0, 0x0, 0xf, 0x0, 0x5}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0xa, 0x5}, 0x28) setsockopt$inet6_MCAST_JOIN_GROUP(r7, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r7, 0x29, 0x2b, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 411.827833ms ago: executing program 2 (id=3120): ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x200) syz_usb_connect(0xf4175eb3f2bfb60d, 0x2d, 0x0, 0x0) r0 = syz_create_resource$binfmt(0x0) openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000280)=@abs={0x0, 0x0, 0x4eb4}, 0x5e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) close(0xffffffffffffffff) r3 = syz_open_dev$vim2m(&(0x7f0000000100), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f00000000c0)={0x1, 0x2, 0x1, 0x0, 0x2}) ioctl$vim2m_VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000240)=@mmap={0x1, 0x2, 0x4, 0x100000, 0x9, {}, {0x2, 0x2, 0x4, 0xc0, 0x0, 0xf0, "18a6fc23"}, 0x1, 0x1, {}, 0x1}) ioctl$vim2m_VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000000)={0x6, 0x1, 0x1, 0x0, 0x3}) ioctl$vim2m_VIDIOC_STREAMOFF(r3, 0x40045612, &(0x7f0000000040)=0x1) ioctl$vim2m_VIDIOC_STREAMOFF(r3, 0x40045612, &(0x7f0000000080)=0x2) ioctl$vim2m_VIDIOC_QBUF(r3, 0xc058560f, &(0x7f0000000180)=@mmap={0x1, 0x1, 0xfffffffffffffe05, 0x8, 0x81, {}, {0x4, 0x8, 0x8, 0x5, 0x29, 0x9, "0adb3fb8"}, 0x5}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) execveat$binfmt(0xffffffffffffff9c, r0, 0x0, 0x0, 0x0) openat$binfmt(0xffffffffffffff9c, r0, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a32000000002800048008000240000000000800014000000005140003"], 0xc8}}, 0x0) close(0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 385.506443ms ago: executing program 0 (id=3121): listen(0xffffffffffffffff, 0x3) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffe, {0x0, 0x0, 0x0, r6, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x4, 0xc00}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000003840)=@newtfilter={0x38, 0x2c, 0xd27, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, r6, {0xc, 0x4}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_DIVISOR={0x8, 0x4, 0x80000000}]}}]}, 0x38}}, 0x20008050) accept(0xffffffffffffffff, &(0x7f0000000240)=@qipcrtr, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) 174.059187ms ago: executing program 4 (id=3122): socket$inet6_sctp(0xa, 0x1, 0x84) socket(0xa, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002840), 0xa0000, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x10000000001, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r1, &(0x7f0000002700)=""/102392, 0x18ff8) r2 = socket$inet(0x2, 0x2, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, 0x0, 0x300) socket$kcm(0x10, 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x60}}, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00'}, 0x10) r4 = socket(0x10, 0x3, 0x0) write(r4, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x1c, 0x3, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x8) r5 = syz_open_dev$video(&(0x7f0000000000), 0x7ff, 0x40400) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f00000001c0)={0x9, 0x3, 0x1, {0xb, 0xfdfffe40, 0x20000009, 0xf}}) 0s ago: executing program 4 (id=3123): r0 = syz_open_dev$loop(0x0, 0x100047ffffa, 0x122c43) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, 0x0, 0x0) getpgrp(0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x800) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0xa, 0x0) socket(0x10, 0x3, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x401}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="14000000110a03002ddf7000ffdbdf2500"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8000) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) r4 = syz_open_dev$video4linux(&(0x7f00000007c0), 0x5, 0x20040) ioctl$VIDIOC_SUBDEV_S_FMT(r4, 0xc0585605, &(0x7f00000000c0)={0x1, 0x0, {0x1, 0x0, 0x101c, 0x4, 0x0, 0x0, 0x5, 0x4}}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x80002, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1a, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) dup(0xffffffffffffffff) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20000) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) kernel console output (not intermixed with test programs): t: backlog limit exceeded [ 642.717067][T13055] audit: audit_lost=29137 audit_rate_limit=0 audit_backlog_limit=64 [ 642.733393][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 642.756119][ T5516] audit: audit_lost=29138 audit_rate_limit=0 audit_backlog_limit=64 [ 642.772061][ T5516] audit: backlog limit exceeded [ 642.935801][T13067] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1727'. [ 644.687668][T13089] capability: warning: `syz.1.1735' uses 32-bit capabilities (legacy support in use) [ 645.863057][T13106] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1739'. [ 648.001474][ T30] kauditd_printk_skb: 4358 callbacks suppressed [ 648.001491][ T30] audit: type=1400 audit(1757450823.490:229046): avc: denied { map_create } for pid=13118 comm="syz.2.1744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.128159][ T30] audit: type=1400 audit(1757450823.490:229047): avc: denied { map_create } for pid=13118 comm="syz.2.1744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.179422][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.202967][T13113] syz.0.1740 (13113): drop_caches: 2 [ 648.241458][ T5516] audit: audit_lost=29573 audit_rate_limit=0 audit_backlog_limit=64 [ 648.333121][ T30] audit: type=1400 audit(1757450823.490:229048): avc: denied { prog_load } for pid=13118 comm="syz.2.1744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 648.361573][ T5516] audit: backlog limit exceeded [ 648.386585][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.470306][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.488235][ T5848] audit: audit_lost=29574 audit_rate_limit=0 audit_backlog_limit=64 [ 648.502733][ T5516] audit: audit_lost=29575 audit_rate_limit=0 audit_backlog_limit=64 [ 650.143954][T13157] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1753'. [ 651.164512][T13174] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1756'. [ 653.023304][ T30] kauditd_printk_skb: 6607 callbacks suppressed [ 653.023318][ T30] audit: type=1400 audit(1757450829.350:231697): avc: denied { read write } for pid=5850 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 653.073646][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.159580][ T5516] audit: audit_lost=30895 audit_rate_limit=0 audit_backlog_limit=64 [ 653.178740][ T5516] audit: backlog limit exceeded [ 653.188967][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.206883][ T5516] audit: audit_lost=30896 audit_rate_limit=0 audit_backlog_limit=64 [ 653.216864][T13196] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.241822][T13198] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.263037][T13196] audit: audit_lost=30897 audit_rate_limit=0 audit_backlog_limit=64 [ 653.263054][ T30] audit: type=1400 audit(1757450829.350:231698): avc: denied { read write } for pid=5856 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 653.651647][T13208] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 653.658181][T13208] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 653.710585][T13208] vhci_hcd vhci_hcd.0: Device attached [ 653.881543][ T9] vhci_hcd: vhci_device speed not set [ 654.087461][ T9] usb 33-1: new full-speed USB device number 3 using vhci_hcd [ 654.595460][T13211] vhci_hcd: connection reset by peer [ 654.609998][ T59] vhci_hcd: stop threads [ 654.614557][ T59] vhci_hcd: release socket [ 654.622289][ T59] vhci_hcd: disconnect device [ 658.196942][ T30] kauditd_printk_skb: 6528 callbacks suppressed [ 658.196958][ T30] audit: type=1400 audit(1757450834.160:235943): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 658.200495][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.234392][ T5516] audit: audit_lost=31659 audit_rate_limit=0 audit_backlog_limit=64 [ 658.243379][ T5516] audit: backlog limit exceeded [ 658.248406][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.256091][ T5516] audit: audit_lost=31660 audit_rate_limit=0 audit_backlog_limit=64 [ 658.258405][ T30] audit: type=1400 audit(1757450834.160:235944): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 658.264810][ T5516] audit: backlog limit exceeded [ 658.295315][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.303163][ T5516] audit: audit_lost=31661 audit_rate_limit=0 audit_backlog_limit=64 [ 659.231662][ T9] vhci_hcd: vhci_device speed not set [ 663.210492][ T30] kauditd_printk_skb: 6616 callbacks suppressed [ 663.210509][ T30] audit: type=1400 audit(1757450839.530:241786): avc: denied { create } for pid=13395 comm="syz.3.1800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 663.264924][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.282359][ T30] audit: type=1400 audit(1757450839.530:241787): avc: denied { create } for pid=13395 comm="syz.3.1800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 663.303919][ T5516] audit: audit_lost=31920 audit_rate_limit=0 audit_backlog_limit=64 [ 663.322048][ T5516] audit: backlog limit exceeded [ 663.337363][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.354329][ T5516] audit: audit_lost=31921 audit_rate_limit=0 audit_backlog_limit=64 [ 663.364303][ T30] audit: type=1400 audit(1757450839.570:241788): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 663.394694][ T5516] audit: backlog limit exceeded [ 663.410236][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.219377][ T30] kauditd_printk_skb: 3614 callbacks suppressed [ 668.219390][ T30] audit: type=1400 audit(1757450844.536:244903): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 668.263759][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.277685][ T5516] audit: audit_lost=32089 audit_rate_limit=0 audit_backlog_limit=64 [ 668.287962][ T5516] audit: backlog limit exceeded [ 668.294164][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.300777][ T5516] audit: audit_lost=32090 audit_rate_limit=0 audit_backlog_limit=64 [ 668.310426][ T5516] audit: backlog limit exceeded [ 668.317373][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.326328][ T30] audit: type=1400 audit(1757450844.536:244904): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 668.349790][ T5516] audit: audit_lost=32091 audit_rate_limit=0 audit_backlog_limit=64 [ 670.497128][T13519] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1823'. [ 673.185303][T13555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13555 comm=syz.2.1833 [ 673.227488][ T30] kauditd_printk_skb: 4554 callbacks suppressed [ 673.227501][ T30] audit: type=1400 audit(1757450849.546:249458): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 673.273376][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.282086][ T5516] audit: audit_lost=32092 audit_rate_limit=0 audit_backlog_limit=64 [ 673.290261][ T30] audit: type=1400 audit(1757450849.586:249459): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 673.316294][ T5516] audit: backlog limit exceeded [ 673.321241][T13558] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.321280][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.341546][T13558] audit: audit_lost=32093 audit_rate_limit=0 audit_backlog_limit=64 [ 673.342016][ T30] audit: type=1400 audit(1757450849.586:249460): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 673.349523][T13558] audit: backlog limit exceeded [ 674.538851][T13573] netlink: 'syz.2.1838': attribute type 14 has an invalid length. [ 677.169038][T13610] ALSA: mixer_oss: invalid OSS volume 'SPEAKE' [ 677.179734][T13613] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1854'. [ 677.229828][T13613] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1854'. [ 678.243327][ T30] kauditd_printk_skb: 6352 callbacks suppressed [ 678.243341][ T30] audit: type=1400 audit(1757450854.572:254569): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 678.288042][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.296182][ T5516] audit: audit_lost=32509 audit_rate_limit=0 audit_backlog_limit=64 [ 678.304532][ T30] audit: type=1400 audit(1757450854.572:254570): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 678.327326][ T5516] audit: backlog limit exceeded [ 678.345929][T13642] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.353081][T13642] audit: audit_lost=32510 audit_rate_limit=0 audit_backlog_limit=64 [ 678.359307][T13632] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.368104][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.368119][ T5516] audit: audit_lost=32511 audit_rate_limit=0 audit_backlog_limit=64 [ 682.002729][T13682] netlink: 'syz.1.1871': attribute type 4 has an invalid length. [ 682.031517][T13682] netlink: 17 bytes leftover after parsing attributes in process `syz.1.1871'. [ 682.155415][T13685] netlink: 'syz.2.1872': attribute type 10 has an invalid length. [ 682.163617][T13685] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1872'. [ 682.219794][T13685] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 682.255247][T13685] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 683.319930][ T30] kauditd_printk_skb: 8409 callbacks suppressed [ 683.319940][ T30] audit: type=1400 audit(1757450859.642:261839): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 683.393445][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 683.399980][ T5516] audit: audit_lost=32892 audit_rate_limit=0 audit_backlog_limit=64 [ 683.428172][ T30] audit: type=1400 audit(1757450859.642:261840): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 683.456762][ T5516] audit: backlog limit exceeded [ 683.472265][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 683.490035][ T5516] audit: audit_lost=32893 audit_rate_limit=0 audit_backlog_limit=64 [ 683.504186][T13713] audit: audit_backlog=65 > audit_backlog_limit=64 [ 683.510837][T13713] audit: audit_lost=32894 audit_rate_limit=0 audit_backlog_limit=64 [ 683.519321][T13713] audit: backlog limit exceeded [ 683.582658][T13715] netlink: 5 bytes leftover after parsing attributes in process `syz.4.1877'. [ 683.603941][T13715] 0ªX¹¦D: renamed from macvtap0 (while UP) [ 683.674003][T13715] 0ªX¹¦D: entered allmulticast mode [ 683.702108][T13715] veth0_macvtap: entered allmulticast mode [ 683.708429][T13715] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 685.444315][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.453590][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 688.327113][T13779] netlink: 'syz.4.1890': attribute type 4 has an invalid length. [ 688.341830][ T30] kauditd_printk_skb: 4218 callbacks suppressed [ 688.341843][ T30] audit: type=1400 audit(1757450864.652:265542): avc: denied { allowed } for pid=13773 comm="syz.4.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 688.388353][T13779] netlink: 'syz.4.1890': attribute type 4 has an invalid length. [ 688.524630][ T30] audit: type=1400 audit(1757450864.652:265543): avc: denied { create } for pid=13773 comm="syz.4.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 688.557263][T13780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=13780 comm=syz.4.1890 [ 688.590680][ T30] audit: type=1400 audit(1757450864.652:265544): avc: denied { allowed } for pid=13773 comm="syz.4.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 688.652133][ T30] audit: type=1400 audit(1757450864.652:265545): avc: denied { prog_load } for pid=13773 comm="syz.4.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 688.682009][ T30] audit: type=1400 audit(1757450864.882:265546): avc: denied { create } for pid=13773 comm="syz.4.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 688.693436][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 688.702250][ T30] audit: type=1400 audit(1757450864.902:265547): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 688.730146][ T30] audit: type=1400 audit(1757450864.902:265548): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 688.752238][ T30] audit: type=1400 audit(1757450864.912:265549): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 688.782024][ T30] audit: type=1400 audit(1757450864.912:265550): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 689.843257][T13798] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 690.043878][ T2913] Bluetooth: hci5: Frame reassembly failed (-84) [ 690.081989][T13803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58721 sclass=netlink_route_socket pid=13803 comm=syz.0.1892 [ 690.948905][T13818] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1901'. [ 692.032128][ T5860] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 693.353765][ T30] kauditd_printk_skb: 6184 callbacks suppressed [ 693.353780][ T30] audit: type=1400 audit(1757450869.682:269603): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 693.439106][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 693.488615][ T5516] audit: audit_lost=33778 audit_rate_limit=0 audit_backlog_limit=64 [ 693.506184][ T5516] audit: backlog limit exceeded [ 693.514698][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 693.527347][ T5516] audit: audit_lost=33779 audit_rate_limit=0 audit_backlog_limit=64 [ 693.527727][ T30] audit: type=1400 audit(1757450869.722:269604): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 693.569787][ T5516] audit: backlog limit exceeded [ 693.587549][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 693.607231][ T5516] audit: audit_lost=33780 audit_rate_limit=0 audit_backlog_limit=64 [ 697.901154][T13984] block nbd0: Attempted send on invalid socket [ 697.907911][T13984] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 698.428143][ T30] kauditd_printk_skb: 4884 callbacks suppressed [ 698.428162][ T30] audit: type=1400 audit(1757450874.752:273594): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 698.492218][ T30] audit: type=1400 audit(1757450874.752:273595): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 698.523539][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.538659][ T5516] audit: audit_lost=34079 audit_rate_limit=0 audit_backlog_limit=64 [ 698.555326][ T5516] audit: backlog limit exceeded [ 698.556175][ T30] audit: type=1400 audit(1757450874.752:273596): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 698.582812][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.590033][ T5516] audit: audit_lost=34080 audit_rate_limit=0 audit_backlog_limit=64 [ 698.598580][T14001] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.598784][ T5516] audit: backlog limit exceeded [ 699.064356][T14013] netlink: 'syz.0.1935': attribute type 1 has an invalid length. [ 699.145178][T14013] 8021q: adding VLAN 0 to HW filter on device bond3 [ 699.224784][T14041] bond3: (slave geneve2): making interface the new active one [ 699.237168][T14041] bond3: (slave geneve2): Enslaving as an active interface with an up link [ 699.979318][T14071] ptrace attach of "./syz-executor exec"[5856] was attempted by "./syz-executor exec"[14071] [ 700.920854][ T5927] libceph: connect (1)[c::]:6789 error -101 [ 700.928300][ T5927] libceph: mon0 (1)[c::]:6789 connect error [ 701.202938][ T5927] libceph: connect (1)[c::]:6789 error -101 [ 701.214528][ T5927] libceph: mon0 (1)[c::]:6789 connect error [ 701.656977][T14082] ceph: No mds server is up or the cluster is laggy [ 702.114288][T14121] netlink: 'syz.4.1952': attribute type 12 has an invalid length. [ 702.217445][T14128] netlink: 'syz.2.1957': attribute type 29 has an invalid length. [ 702.225733][T14128] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1957'. [ 702.497056][T14129] netlink: 'syz.0.1955': attribute type 4 has an invalid length. [ 703.293671][T14122] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1956'. [ 703.384834][T14122] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=14122 comm=syz.1.1956 [ 703.432128][ T30] kauditd_printk_skb: 7145 callbacks suppressed [ 703.432144][ T30] audit: type=1400 audit(1757450879.752:278739): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.588811][ T30] audit: type=1400 audit(1757450879.752:278740): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.635154][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 703.647452][ T30] audit: type=1400 audit(1757450879.752:278741): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.671232][ T30] audit: type=1400 audit(1757450879.752:278742): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.736910][ T30] audit: type=1400 audit(1757450879.752:278743): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.741426][ T5516] audit: audit_lost=34749 audit_rate_limit=0 audit_backlog_limit=64 [ 703.830403][ T30] audit: type=1400 audit(1757450879.762:278744): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.893553][ T30] audit: type=1400 audit(1757450879.762:278745): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 703.918599][ T30] audit: type=1400 audit(1757450879.762:278746): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 704.617848][T14160] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1964'. [ 706.929304][T14198] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1974'. [ 706.938434][T14198] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1974'. [ 707.726083][T14211] netlink: 'syz.0.1975': attribute type 12 has an invalid length. [ 708.532679][ T30] kauditd_printk_skb: 5344 callbacks suppressed [ 708.532697][ T30] audit: type=1400 audit(1757450884.792:284090): avc: denied { prog_load } for pid=14213 comm="syz.3.1977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 708.656009][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.675935][ T5516] audit: audit_lost=34750 audit_rate_limit=0 audit_backlog_limit=64 [ 708.691504][ T30] audit: type=1400 audit(1757450884.882:284091): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 708.714793][ T5516] audit: backlog limit exceeded [ 708.725202][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.734044][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.740724][ T5516] audit: audit_lost=34751 audit_rate_limit=0 audit_backlog_limit=64 [ 708.754076][ T5856] audit: audit_lost=34752 audit_rate_limit=0 audit_backlog_limit=64 [ 708.762422][ T5516] audit: backlog limit exceeded [ 709.240659][T14231] netlink: 72 bytes leftover after parsing attributes in process `syz.2.1982'. [ 711.072938][T14257] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1988'. [ 711.093384][T14257] netlink: 'syz.3.1988': attribute type 10 has an invalid length. [ 711.265134][T14259] ptrace attach of "./syz-executor exec"[5850] was attempted by "./syz-executor exec"[14259] [ 711.315666][T14261] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1988'. [ 711.433418][T14257] 8021q: adding VLAN 0 to HW filter on device bond0 [ 711.450282][T14257] bond0: entered promiscuous mode [ 711.456039][T14257] bond_slave_0: entered promiscuous mode [ 711.503410][T14257] bond_slave_1: entered promiscuous mode [ 711.530105][T14257] team0: Port device bond0 added [ 712.864698][T14291] Bluetooth: received HCILL_WAKE_UP_IND in state 2 [ 712.904400][ T1136] Bluetooth: hci5: Frame reassembly failed (-84) [ 714.005273][ T30] kauditd_printk_skb: 3923 callbacks suppressed [ 714.005290][ T30] audit: type=1400 audit(1757450890.262:287891): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 714.142205][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 714.148722][ T5516] audit: audit_lost=34794 audit_rate_limit=0 audit_backlog_limit=64 [ 714.239750][ T30] audit: type=1400 audit(1757450890.262:287892): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 714.286095][T14308] audit: audit_backlog=65 > audit_backlog_limit=64 [ 714.293127][T14308] audit: audit_lost=34795 audit_rate_limit=0 audit_backlog_limit=64 [ 714.301083][T14308] audit: backlog limit exceeded [ 714.308618][ T5516] audit: backlog limit exceeded [ 714.311958][ T30] audit: type=1400 audit(1757450890.262:287893): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 714.337514][T14308] audit: audit_backlog=65 > audit_backlog_limit=64 [ 714.480169][T14318] netlink: 'syz.2.2002': attribute type 1 has an invalid length. [ 714.750853][T14318] 8021q: adding VLAN 0 to HW filter on device bond5 [ 714.793642][T14328] vlan3: entered allmulticast mode [ 714.798780][T14328] veth1: entered allmulticast mode [ 714.894535][T14328] bond5: (slave vlan3): Opening slave failed [ 714.942094][ T5859] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 718.215606][T14397] ip6erspan0: entered promiscuous mode [ 718.712312][T14406] netlink: 36 bytes leftover after parsing attributes in process `syz.0.2015'. [ 719.090707][ T30] kauditd_printk_skb: 2628 callbacks suppressed [ 719.090723][ T30] audit: type=1400 audit(1757450895.212:290385): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 719.129101][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 719.161334][ T5516] audit: audit_lost=34842 audit_rate_limit=0 audit_backlog_limit=64 [ 719.174685][ T30] audit: type=1400 audit(1757450895.412:290386): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 719.202294][ T5516] audit: backlog limit exceeded [ 719.215819][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 719.232466][ T5516] audit: audit_lost=34843 audit_rate_limit=0 audit_backlog_limit=64 [ 719.244296][ T30] audit: type=1400 audit(1757450895.412:290387): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 719.270156][ T5516] audit: backlog limit exceeded [ 719.286093][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 720.826892][T14428] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 720.833455][T14428] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 721.231213][T14428] vhci_hcd vhci_hcd.0: Device attached [ 721.611511][ T5954] vhci_hcd: vhci_device speed not set [ 721.788176][ T5954] usb 41-1: new full-speed USB device number 3 using vhci_hcd [ 722.527243][T14429] vhci_hcd: connection reset by peer [ 722.537162][ T13] vhci_hcd: stop threads [ 722.556313][ T13] vhci_hcd: release socket [ 722.568206][ T13] vhci_hcd: disconnect device [ 723.292871][T14493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14493 comm=syz.1.2027 [ 724.092642][ T30] kauditd_printk_skb: 5239 callbacks suppressed [ 724.092656][ T30] audit: type=1400 audit(1757450900.422:295274): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 724.172087][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.178648][ T5516] audit: audit_lost=34962 audit_rate_limit=0 audit_backlog_limit=64 [ 724.217114][T14526] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.227910][T14526] audit: audit_lost=34963 audit_rate_limit=0 audit_backlog_limit=64 [ 724.240955][T14526] audit: backlog limit exceeded [ 724.259120][T14526] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.266470][T14526] audit: audit_lost=34964 audit_rate_limit=0 audit_backlog_limit=64 [ 724.277806][T14526] audit: backlog limit exceeded [ 724.324482][T14531] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.941523][ T5954] vhci_hcd: vhci_device speed not set [ 729.112142][ T30] kauditd_printk_skb: 4490 callbacks suppressed [ 729.112158][ T30] audit: type=1400 audit(1757450905.413:298013): avc: denied { read write } for pid=5848 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 729.193059][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.208433][T14600] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.219446][ T5516] audit: audit_lost=35549 audit_rate_limit=0 audit_backlog_limit=64 [ 729.227928][T14600] audit: audit_lost=35550 audit_rate_limit=0 audit_backlog_limit=64 [ 729.234719][T14602] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.247616][ T5850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.255128][ T5516] audit: backlog limit exceeded [ 729.256029][T14602] audit: audit_lost=35551 audit_rate_limit=0 audit_backlog_limit=64 [ 729.270192][ T5850] audit: audit_lost=35552 audit_rate_limit=0 audit_backlog_limit=64 [ 731.390472][T14636] netlink: 'syz.2.2062': attribute type 6 has an invalid length. [ 732.207889][T14645] netlink: 'syz.0.2065': attribute type 10 has an invalid length. [ 732.216170][T14645] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2065'. [ 732.285133][T14645] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 732.529792][T14645] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 734.121426][ T30] kauditd_printk_skb: 4939 callbacks suppressed [ 734.121447][ T30] audit: type=1400 audit(1757450910.423:302605): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 734.312010][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 734.314955][T14673] audit: audit_backlog=65 > audit_backlog_limit=64 [ 734.331998][ T5516] audit: audit_lost=35668 audit_rate_limit=0 audit_backlog_limit=64 [ 734.360331][ T5516] audit: backlog limit exceeded [ 734.372154][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 734.379348][T14674] audit: audit_backlog=65 > audit_backlog_limit=64 [ 734.391905][ T5516] audit: audit_lost=35669 audit_rate_limit=0 audit_backlog_limit=64 [ 734.410046][T14674] audit: audit_lost=35670 audit_rate_limit=0 audit_backlog_limit=64 [ 734.420139][T14674] audit: backlog limit exceeded [ 736.530319][T14713] batadv_slave_1: entered promiscuous mode [ 739.148854][ T30] kauditd_printk_skb: 7002 callbacks suppressed [ 739.148871][ T30] audit: type=1400 audit(1757450915.473:307934): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 739.166294][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 739.207730][T14756] audit: audit_backlog=65 > audit_backlog_limit=64 [ 739.215042][T14756] audit: audit_lost=36229 audit_rate_limit=0 audit_backlog_limit=64 [ 739.322168][ T30] audit: type=1400 audit(1757450915.473:307935): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 739.346280][T14756] audit: backlog limit exceeded [ 739.371980][ T30] audit: type=1400 audit(1757450915.473:307936): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 739.657102][ T30] audit: type=1400 audit(1757450915.473:307937): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 739.682881][ T30] audit: type=1400 audit(1757450915.473:307938): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 739.704317][ T5516] audit: audit_lost=36230 audit_rate_limit=0 audit_backlog_limit=64 [ 741.980604][T14790] ceph: No mds server is up or the cluster is laggy [ 744.159806][ T30] kauditd_printk_skb: 17118 callbacks suppressed [ 744.159824][ T30] audit: type=1400 audit(1757450920.483:312609): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 744.485001][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 744.544277][T14836] audit: audit_backlog=65 > audit_backlog_limit=64 [ 744.612063][ T30] audit: type=1400 audit(1757450920.533:312610): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 744.642839][ T30] audit: type=1400 audit(1757450920.533:312611): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 744.694711][ T5516] audit: audit_lost=40380 audit_rate_limit=0 audit_backlog_limit=64 [ 744.703574][ T5516] audit: backlog limit exceeded [ 744.709263][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 744.715927][ T5516] audit: audit_lost=40381 audit_rate_limit=0 audit_backlog_limit=64 [ 744.760546][ T5516] audit: backlog limit exceeded [ 746.833845][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.842888][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 749.161830][ T30] kauditd_printk_skb: 3860 callbacks suppressed [ 749.161846][ T30] audit: type=1400 audit(1757450925.473:316119): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 749.224352][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 749.242700][ T5516] audit: audit_lost=40500 audit_rate_limit=0 audit_backlog_limit=64 [ 749.422186][ T30] audit: type=1400 audit(1757450925.483:316120): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 749.457176][ T30] audit: type=1400 audit(1757450925.483:316121): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 749.624788][T14904] audit: audit_backlog=65 > audit_backlog_limit=64 [ 749.651295][T14904] audit: audit_lost=40501 audit_rate_limit=0 audit_backlog_limit=64 [ 749.689794][T14911] audit: audit_backlog=65 > audit_backlog_limit=64 [ 749.697326][T14904] audit: backlog limit exceeded [ 749.701645][T14912] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.175264][ T30] kauditd_printk_skb: 4154 callbacks suppressed [ 754.175286][ T30] audit: type=1400 audit(1757450930.493:319536): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 754.266319][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.274050][ T5516] audit: audit_lost=40749 audit_rate_limit=0 audit_backlog_limit=64 [ 754.297705][ T30] audit: type=1400 audit(1757450930.533:319537): avc: denied { read write } for pid=5848 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 754.334245][ T5516] audit: backlog limit exceeded [ 754.349475][T14970] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.360866][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.370798][ T5850] audit: audit_backlog=65 > audit_backlog_limit=64 [ 754.378167][ T5516] audit: audit_lost=40750 audit_rate_limit=0 audit_backlog_limit=64 [ 754.378201][T14970] audit: audit_lost=40751 audit_rate_limit=0 audit_backlog_limit=64 [ 756.558979][T14989] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2155'. [ 757.051317][T15005] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15005 comm=syz.0.2155 [ 758.462242][T15043] netlink: 'syz.0.2164': attribute type 4 has an invalid length. [ 758.471150][T15043] netlink: 17 bytes leftover after parsing attributes in process `syz.0.2164'. [ 759.192030][ T30] kauditd_printk_skb: 3516 callbacks suppressed [ 759.192046][ T30] audit: type=1400 audit(1757450935.523:323011): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 759.377493][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 759.402291][ T5516] audit: audit_lost=40766 audit_rate_limit=0 audit_backlog_limit=64 [ 759.436303][ T30] audit: type=1400 audit(1757450935.523:323012): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 759.461505][ T5516] audit: backlog limit exceeded [ 759.468642][ T30] audit: type=1400 audit(1757450935.523:323013): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 759.475579][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 759.523738][ T5516] audit: audit_lost=40767 audit_rate_limit=0 audit_backlog_limit=64 [ 759.541373][ T5516] audit: backlog limit exceeded [ 759.552821][T15065] audit: audit_backlog=65 > audit_backlog_limit=64 [ 762.072635][T15123] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2177'. [ 762.465512][T15125] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=15125 comm=syz.4.2177 [ 764.203175][ T30] kauditd_printk_skb: 5732 callbacks suppressed [ 764.203187][ T30] audit: type=1400 audit(1757450940.533:327256): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 764.230678][ C0] vkms_vblank_simulate: vblank timer overrun [ 764.244802][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 764.422651][ T5516] audit: audit_lost=41265 audit_rate_limit=0 audit_backlog_limit=64 [ 764.555173][ T5516] audit: backlog limit exceeded [ 764.652274][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 764.658823][ T5516] audit: audit_lost=41266 audit_rate_limit=0 audit_backlog_limit=64 [ 764.675552][ T30] audit: type=1400 audit(1757450940.533:327257): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 764.696744][ C0] vkms_vblank_simulate: vblank timer overrun [ 764.704081][ T5516] audit: backlog limit exceeded [ 764.711574][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 764.732157][ T5516] audit: audit_lost=41267 audit_rate_limit=0 audit_backlog_limit=64 [ 769.382403][ T30] kauditd_printk_skb: 2595 callbacks suppressed [ 769.382414][ T30] audit: type=1400 audit(1757450945.709:329465): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 769.489524][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.496184][ T5516] audit: audit_lost=41397 audit_rate_limit=0 audit_backlog_limit=64 [ 769.517911][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.525124][ T5848] audit: audit_lost=41398 audit_rate_limit=0 audit_backlog_limit=64 [ 769.533443][ T5848] audit: backlog limit exceeded [ 769.539185][ T5516] audit: backlog limit exceeded [ 769.544926][ T30] audit: type=1400 audit(1757450945.739:329466): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 769.641762][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 769.692185][T15219] audit: audit_backlog=65 > audit_backlog_limit=64 [ 773.641189][T15271] trusted_key: encrypted_key: keyword 'new¼°±‹U£_5' not recognized [ 774.424885][ T30] kauditd_printk_skb: 6800 callbacks suppressed [ 774.424902][ T30] audit: type=1400 audit(1757450950.689:334727): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 774.474296][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 774.489653][ T30] audit: type=1400 audit(1757450950.689:334728): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 774.504303][ T5516] audit: audit_lost=41913 audit_rate_limit=0 audit_backlog_limit=64 [ 774.841789][T15295] audit: audit_backlog=65 > audit_backlog_limit=64 [ 774.848629][T15295] audit: audit_lost=41914 audit_rate_limit=0 audit_backlog_limit=64 [ 775.235440][T15295] audit: backlog limit exceeded [ 775.242250][ T5516] audit: backlog limit exceeded [ 775.257435][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 775.267428][ T5516] audit: audit_lost=41915 audit_rate_limit=0 audit_backlog_limit=64 [ 779.572416][ T30] kauditd_printk_skb: 7891 callbacks suppressed [ 779.572429][ T30] audit: type=1400 audit(1757450955.629:341095): avc: denied { create } for pid=15334 comm="syz.4.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 779.623229][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 779.646170][T15367] audit: audit_backlog=65 > audit_backlog_limit=64 [ 779.652752][T15367] audit: audit_lost=42424 audit_rate_limit=0 audit_backlog_limit=64 [ 779.660723][T15367] audit: backlog limit exceeded [ 779.667647][ T5516] audit: audit_lost=42425 audit_rate_limit=0 audit_backlog_limit=64 [ 779.669489][T15367] audit: audit_backlog=65 > audit_backlog_limit=64 [ 779.682401][ T5516] audit: backlog limit exceeded [ 779.682536][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 779.695762][ T30] audit: type=1400 audit(1757450955.879:341096): avc: denied { create } for pid=15347 comm="syz.1.2232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 780.078752][T15367] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2232'. [ 784.582136][ T30] kauditd_printk_skb: 6175 callbacks suppressed [ 784.582152][ T30] audit: type=1400 audit(1757450960.909:346740): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 784.597147][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.612336][T15435] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.623863][ T5516] audit: audit_lost=42604 audit_rate_limit=0 audit_backlog_limit=64 [ 784.625390][T15434] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.638792][T15435] audit: audit_lost=42605 audit_rate_limit=0 audit_backlog_limit=64 [ 784.716248][T15438] audit: audit_backlog=65 > audit_backlog_limit=64 [ 784.722858][T15438] audit: audit_lost=42606 audit_rate_limit=0 audit_backlog_limit=64 [ 784.730867][T15438] audit: backlog limit exceeded [ 784.797964][T15434] audit: audit_lost=42607 audit_rate_limit=0 audit_backlog_limit=64 [ 785.838791][T15460] netlink: 'syz.2.2257': attribute type 10 has an invalid length. [ 785.914085][T15462] netlink: 'syz.2.2257': attribute type 10 has an invalid length. [ 785.988680][T15462] netlink: 2 bytes leftover after parsing attributes in process `syz.2.2257'. [ 786.018089][T15460] bridge0: port 3(team0) entered disabled state [ 786.036871][T15460] team0: left allmulticast mode [ 786.096022][T15460] team_slave_0: left allmulticast mode [ 786.132404][T15460] team_slave_1: left allmulticast mode [ 786.171103][T15460] netdevsim netdevsim2 netdevsim0: left allmulticast mode [ 786.229817][T15460] team0: left promiscuous mode [ 786.248648][T15460] team_slave_0: left promiscuous mode [ 786.376011][T15460] team_slave_1: left promiscuous mode [ 786.393697][T15460] netdevsim netdevsim2 netdevsim0: left promiscuous mode [ 786.442804][T15460] bridge0: port 3(team0) entered disabled state [ 786.477303][T15462] team0: entered promiscuous mode [ 786.484568][T15462] team_slave_0: entered promiscuous mode [ 786.490752][T15462] team_slave_1: entered promiscuous mode [ 786.502166][T15462] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 786.510330][T15462] 8021q: adding VLAN 0 to HW filter on device team0 [ 786.530587][T15462] bridge0: port 3(team0) entered blocking state [ 786.603749][T15462] bridge0: port 3(team0) entered disabled state [ 786.729283][T15462] team0: entered allmulticast mode [ 786.827567][T15462] team_slave_0: entered allmulticast mode [ 786.837228][T15462] team_slave_1: entered allmulticast mode [ 786.845263][T15462] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 788.165108][ T2968] Bluetooth: hci5: Frame reassembly failed (-84) [ 789.642329][ T30] kauditd_printk_skb: 3148 callbacks suppressed [ 789.642342][ T30] audit: type=1400 audit(1757450965.879:349875): avc: denied { read write } for pid=15515 comm="syz.4.2268" name="video0" dev="devtmpfs" ino=930 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 789.682483][ T30] audit: type=1400 audit(1757450965.879:349874): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 789.706838][ T30] audit: type=1400 audit(1757450965.919:349876): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 789.775385][ T30] audit: type=1400 audit(1757450965.929:349877): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 789.802506][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.821437][ T5516] audit: audit_lost=42612 audit_rate_limit=0 audit_backlog_limit=64 [ 789.836862][ T30] audit: type=1400 audit(1757450965.929:349878): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 789.892951][ T5516] audit: backlog limit exceeded [ 789.922019][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.937172][ T30] audit: type=1400 audit(1757450965.939:349879): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 790.116709][ T5859] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 791.078383][T15542] veth1: left promiscuous mode [ 791.115918][T15542] gretap1: left promiscuous mode [ 791.166012][T15542] vlan2: left promiscuous mode [ 791.254647][T15542] bridge0: left promiscuous mode [ 791.404516][T15542] bridge2: left promiscuous mode [ 791.576929][T15542] batadv0: left promiscuous mode [ 791.588899][T15542] geneve2: left promiscuous mode [ 791.599951][T15542] bridge4: left promiscuous mode [ 793.486120][T15591] ptrace attach of "./syz-executor exec"[5848] was attempted by "./syz-executor exec"[15591] [ 793.989118][T15595] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2284'. [ 793.998291][T15595] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2284'. [ 794.669842][ T30] kauditd_printk_skb: 7378 callbacks suppressed [ 794.669861][ T30] audit: type=1400 audit(1757450970.989:353386): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 794.819026][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 794.827011][T15608] audit: audit_backlog=65 > audit_backlog_limit=64 [ 794.835896][ T5516] audit: audit_lost=43904 audit_rate_limit=0 audit_backlog_limit=64 [ 794.852470][T15606] audit: audit_backlog=65 > audit_backlog_limit=64 [ 794.860443][T15606] audit: audit_lost=43905 audit_rate_limit=0 audit_backlog_limit=64 [ 794.860520][T15608] audit: audit_lost=43906 audit_rate_limit=0 audit_backlog_limit=64 [ 794.879628][T15606] audit: backlog limit exceeded [ 794.889693][ T30] audit: type=1400 audit(1757450970.989:353387): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 794.904539][T15606] audit: audit_backlog=65 > audit_backlog_limit=64 [ 795.391485][ T5860] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 795.824891][T15626] netlink: 'syz.3.2291': attribute type 1 has an invalid length. [ 796.124080][T15626] 8021q: adding VLAN 0 to HW filter on device bond3 [ 796.219851][T15630] vlan2: entered allmulticast mode [ 796.313506][T15630] veth1: entered allmulticast mode [ 796.327852][T15630] bond3: (slave vlan2): Opening slave failed [ 797.098581][T15687] netlink: 'syz.0.2295': attribute type 12 has an invalid length. [ 798.779957][T15705] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 798.787167][T15705] Bluetooth: hci0: Error when powering off device on rfkill (-4) [ 798.864785][T15705] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 798.884407][T15705] Bluetooth: hci2: Error when powering off device on rfkill (-4) [ 799.607433][T15705] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 799.618015][T15705] Bluetooth: hci3: Error when powering off device on rfkill (-4) [ 799.706203][ T30] kauditd_printk_skb: 6172 callbacks suppressed [ 799.706214][ T30] audit: type=1400 audit(1757450976.029:357783): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.825884][T15705] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 799.835643][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 799.847574][ T30] audit: type=1400 audit(1757450976.029:357784): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.869436][ T30] audit: type=1400 audit(1757450976.029:357785): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.892453][ T30] audit: type=1400 audit(1757450976.029:357786): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.914287][ T30] audit: type=1400 audit(1757450976.029:357787): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.952824][ T30] audit: type=1400 audit(1757450976.029:357788): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 799.982021][T15705] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 800.006765][ T5516] audit: audit_lost=44499 audit_rate_limit=0 audit_backlog_limit=64 [ 800.033007][ T30] audit: type=1400 audit(1757450976.029:357789): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 800.064562][ T5516] audit: backlog limit exceeded [ 800.793981][T15771] mmap: syz.1.2308 (15771): VmData 37601280 exceed data ulimit 9868. Update limits or use boot option ignore_rlimit_data. [ 801.388951][T15780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15780 comm=syz.2.2311 [ 804.713236][ T30] kauditd_printk_skb: 9422 callbacks suppressed [ 804.713252][ T30] audit: type=1400 audit(1757450981.029:361476): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 804.752573][ T30] audit: type=1400 audit(1757450981.039:361477): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 804.763301][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 804.798179][T15842] audit: audit_backlog=65 > audit_backlog_limit=64 [ 804.872083][ T5516] audit: audit_lost=46412 audit_rate_limit=0 audit_backlog_limit=64 [ 804.884474][ T30] audit: type=1400 audit(1757450981.039:361478): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 804.907777][ T30] audit: type=1400 audit(1757450981.039:361479): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 804.911949][ T5516] audit: backlog limit exceeded [ 804.933454][T15844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 804.933986][T15842] audit: audit_lost=46413 audit_rate_limit=0 audit_backlog_limit=64 [ 805.431804][T15851] netlink: 9 bytes leftover after parsing attributes in process `syz.2.2325'. [ 805.481238][T15851] gretap0: entered promiscuous mode [ 805.493152][T15851] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2325'. [ 805.652785][T15851] 0ªî{X¹¦: renamed from gretap0 [ 806.077966][T15851] 0ªî{X¹¦: left promiscuous mode [ 806.181911][T15851] 0ªî{X¹¦: entered allmulticast mode [ 806.245351][T15851] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 807.091159][T15876] syz.3.2328 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 807.582092][T15907] netlink: 'syz.2.2330': attribute type 1 has an invalid length. [ 807.701134][T15907] 8021q: adding VLAN 0 to HW filter on device bond6 [ 807.764523][T15906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15906 comm=syz.2.2330 [ 807.883615][T15910] bond6: (slave veth5): Enslaving as an active interface with a down link [ 808.288431][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.295232][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.447550][T15962] bond3: entered promiscuous mode [ 808.452847][T15962] bond3: entered allmulticast mode [ 808.459512][T15962] 8021q: adding VLAN 0 to HW filter on device bond3 [ 810.028410][ T30] kauditd_printk_skb: 3388 callbacks suppressed [ 810.028426][ T30] audit: type=1400 audit(1757450986.019:364298): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 810.088014][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 810.099602][ T30] audit: type=1400 audit(1757450986.349:364299): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 810.119936][T16035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 810.129319][ T5516] audit: audit_lost=46604 audit_rate_limit=0 audit_backlog_limit=64 [ 810.129914][T16035] audit: audit_lost=46605 audit_rate_limit=0 audit_backlog_limit=64 [ 810.162927][T16035] audit: backlog limit exceeded [ 810.175441][ T5516] audit: backlog limit exceeded [ 810.212061][ T30] audit: type=1400 audit(1757450986.349:364300): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 810.212838][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 813.047279][T16096] macsec0: entered promiscuous mode [ 813.059344][T16096] macsec0: entered allmulticast mode [ 813.072709][T16096] veth1_macvtap: entered allmulticast mode [ 815.031543][ T30] kauditd_printk_skb: 5731 callbacks suppressed [ 815.031559][ T30] audit: type=1400 audit(1757450991.349:368791): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.059003][ C0] vkms_vblank_simulate: vblank timer overrun [ 815.124368][ T30] audit: type=1400 audit(1757450991.349:368792): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.146484][ T30] audit: type=1400 audit(1757450991.389:368793): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.168256][ T30] audit: type=1400 audit(1757450991.389:368794): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.172335][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 815.189914][ T30] audit: type=1400 audit(1757450991.389:368795): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.189954][ T30] audit: type=1400 audit(1757450991.399:368796): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.189990][ T30] audit: type=1400 audit(1757450991.399:368797): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.190026][ T30] audit: type=1400 audit(1757450991.399:368798): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 815.190060][ T30] audit: type=1400 audit(1757450991.399:368799): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 818.219256][T16175] sp0: Synchronizing with TNC [ 820.042082][ T30] kauditd_printk_skb: 4179 callbacks suppressed [ 820.042098][ T30] audit: type=1400 audit(1757450996.359:372401): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 820.058581][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 820.096711][T16215] audit: audit_backlog=65 > audit_backlog_limit=64 [ 820.103953][T16215] audit: audit_lost=47213 audit_rate_limit=0 audit_backlog_limit=64 [ 820.112675][T16215] audit: backlog limit exceeded [ 820.122115][T16215] netlink: 'syz.0.2382': attribute type 1 has an invalid length. [ 820.168722][ T5516] audit: audit_lost=47214 audit_rate_limit=0 audit_backlog_limit=64 [ 820.175018][ T30] audit: type=1400 audit(1757450996.369:372402): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 820.198643][ T30] audit: type=1400 audit(1757450996.369:372403): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 820.204299][T16218] audit: audit_backlog=65 > audit_backlog_limit=64 [ 820.220066][ T30] audit: type=1400 audit(1757450996.369:372404): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 820.282591][T16215] 8021q: adding VLAN 0 to HW filter on device bond4 [ 820.329140][T16219] vlan3: entered allmulticast mode [ 820.334515][T16219] veth1: entered allmulticast mode [ 820.448704][T16219] bond4: (slave vlan3): making interface the new active one [ 820.457574][T16219] bond4: (slave vlan3): Enslaving as an active interface with an up link [ 823.987693][T16304] trusted_key: encrypted_key: key user:syz not found [ 825.051784][ T30] kauditd_printk_skb: 8055 callbacks suppressed [ 825.051798][ T30] audit: type=1400 audit(1757451001.369:378315): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 825.162664][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 825.175730][ T5516] audit: audit_lost=47930 audit_rate_limit=0 audit_backlog_limit=64 [ 825.176373][T16313] audit: audit_backlog=65 > audit_backlog_limit=64 [ 825.187321][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 825.198063][T16315] audit: audit_backlog=65 > audit_backlog_limit=64 [ 825.198480][T16313] audit: audit_lost=47931 audit_rate_limit=0 audit_backlog_limit=64 [ 825.205010][ T30] audit: type=1400 audit(1757451001.369:378316): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 825.205057][ T30] audit: type=1400 audit(1757451001.369:378317): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 825.205092][ T30] audit: type=1400 audit(1757451001.419:378318): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 825.950050][T16327] Bluetooth: received HCILL_WAKE_UP_IND in state 2 [ 825.993681][T16271] Bluetooth: hci5: Frame reassembly failed (-84) [ 828.031926][ T5859] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 830.062208][ T30] kauditd_printk_skb: 3710 callbacks suppressed [ 830.062230][ T30] audit: type=1400 audit(1757451006.249:381363): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 830.243800][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.259129][ T30] audit: type=1400 audit(1757451006.249:381364): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 830.304137][ T5516] audit: audit_lost=48154 audit_rate_limit=0 audit_backlog_limit=64 [ 830.372241][ T5516] audit: backlog limit exceeded [ 830.399782][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.403316][ T30] audit: type=1400 audit(1757451006.249:381365): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 830.575684][T16397] audit: audit_backlog=65 > audit_backlog_limit=64 [ 830.591914][T16397] audit: audit_lost=48155 audit_rate_limit=0 audit_backlog_limit=64 [ 830.626591][T16397] audit: backlog limit exceeded [ 830.739106][T16397] netlink: 'syz.1.2419': attribute type 21 has an invalid length. [ 830.760606][T16397] netlink: 128 bytes leftover after parsing attributes in process `syz.1.2419'. [ 830.797344][T16399] batadv0: entered promiscuous mode [ 830.804951][T16399] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 830.812517][T16397] netlink: 'syz.1.2419': attribute type 4 has an invalid length. [ 830.826828][T16397] netlink: 3 bytes leftover after parsing attributes in process `syz.1.2419'. [ 833.569050][T16430] block nbd0: Attempted send on invalid socket [ 833.575647][T16430] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 835.230311][ T30] kauditd_printk_skb: 3836 callbacks suppressed [ 835.230331][ T30] audit: type=1400 audit(1757451011.549:384540): avc: denied { read write } for pid=5850 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 835.296881][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 835.303777][ T5516] audit: audit_lost=48377 audit_rate_limit=0 audit_backlog_limit=64 [ 835.379371][ T30] audit: type=1400 audit(1757451011.599:384541): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 835.389594][ T5516] audit: backlog limit exceeded [ 835.463508][T16456] audit: audit_backlog=65 > audit_backlog_limit=64 [ 835.480415][T16456] audit: audit_lost=48378 audit_rate_limit=0 audit_backlog_limit=64 [ 835.561935][T16453] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 835.568461][T16453] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 835.887152][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 835.895306][ T5516] audit: audit_lost=48379 audit_rate_limit=0 audit_backlog_limit=64 [ 835.904486][ T5516] audit: backlog limit exceeded [ 835.965433][T16453] vhci_hcd vhci_hcd.0: Device attached [ 836.141511][ T5954] vhci_hcd: vhci_device speed not set [ 836.201436][ T5954] usb 41-1: new full-speed USB device number 4 using vhci_hcd [ 836.865958][T16455] vhci_hcd: connection reset by peer [ 836.893408][ T13] vhci_hcd: stop threads [ 836.897699][ T13] vhci_hcd: release socket [ 837.140877][ T13] vhci_hcd: disconnect device [ 840.232574][ T5516] audit_log_start: 5297 callbacks suppressed [ 840.232593][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 840.245291][ T30] audit: type=1400 audit(1757451016.529:387820): avc: denied { create } for pid=16535 comm="syz.0.2452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 840.245337][ T30] audit: type=1400 audit(1757451016.529:387819): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245381][ T30] audit: type=1400 audit(1757451016.529:387821): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245418][ T30] audit: type=1400 audit(1757451016.529:387822): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245457][ T30] audit: type=1400 audit(1757451016.529:387823): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245493][ T30] audit: type=1400 audit(1757451016.529:387824): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245528][ T30] audit: type=1400 audit(1757451016.539:387825): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245563][ T30] audit: type=1400 audit(1757451016.539:387826): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.245599][ T30] audit: type=1400 audit(1757451016.539:387827): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 840.541492][T16542] trusted_key: encrypted_key: keyword 'new¼°±‹U£_5' not recognized [ 841.371580][ T5954] vhci_hcd: vhci_device speed not set [ 845.113125][T16627] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2474'. [ 845.260877][ T30] kauditd_printk_skb: 6150 callbacks suppressed [ 845.260895][ T30] audit: type=1400 audit(1757451021.579:393898): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 845.518329][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 845.546207][ T5516] audit: audit_lost=49080 audit_rate_limit=0 audit_backlog_limit=64 [ 845.551444][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 845.567433][ T5516] audit: backlog limit exceeded [ 845.571129][ T5848] audit: audit_lost=49081 audit_rate_limit=0 audit_backlog_limit=64 [ 845.584165][ T30] audit: type=1400 audit(1757451021.579:393899): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 845.589054][ T5848] audit: backlog limit exceeded [ 845.610740][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 845.625440][ T5516] audit: audit_lost=49082 audit_rate_limit=0 audit_backlog_limit=64 [ 846.474317][T16655] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 846.480860][T16655] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 846.556632][T16655] vhci_hcd vhci_hcd.0: Device attached [ 846.731537][ T9] vhci_hcd: vhci_device speed not set [ 846.851380][ T9] usb 41-1: new full-speed USB device number 5 using vhci_hcd [ 850.262113][ T30] kauditd_printk_skb: 4414 callbacks suppressed [ 850.262128][ T30] audit: type=1400 audit(1757451026.589:397404): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 850.298627][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 850.315696][ T30] audit: type=1400 audit(1757451026.589:397405): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 850.315985][ T5516] audit: audit_lost=49386 audit_rate_limit=0 audit_backlog_limit=64 [ 850.341750][ T30] audit: type=1400 audit(1757451026.589:397406): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 850.369621][ T30] audit: type=1400 audit(1757451026.589:397407): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 850.391033][ T5516] audit: backlog limit exceeded [ 850.391960][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 850.398053][ T30] audit: type=1400 audit(1757451026.589:397408): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 850.421849][ T5516] audit: audit_lost=49387 audit_rate_limit=0 audit_backlog_limit=64 [ 855.285727][ T30] kauditd_printk_skb: 6874 callbacks suppressed [ 855.285743][ T30] audit: type=1400 audit(1757451031.609:401903): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 855.481183][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 855.507430][ T5516] audit: audit_lost=50181 audit_rate_limit=0 audit_backlog_limit=64 [ 855.545024][ T5516] audit: backlog limit exceeded [ 855.550834][T16820] audit: audit_backlog=65 > audit_backlog_limit=64 [ 855.571495][ T30] audit: type=1400 audit(1757451031.639:401904): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 855.616954][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 855.628027][T16820] audit: audit_lost=50182 audit_rate_limit=0 audit_backlog_limit=64 [ 855.653221][ T5516] audit: audit_lost=50183 audit_rate_limit=0 audit_backlog_limit=64 [ 855.660520][ T30] audit: type=1400 audit(1757451031.639:401905): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 857.848179][T16858] syz_tun: entered promiscuous mode [ 857.876386][T16858] batadv_slave_0: entered promiscuous mode [ 857.886525][T16858] batadv_slave_0: left promiscuous mode [ 858.014630][T16858] syz_tun: left promiscuous mode [ 860.369881][ T30] kauditd_printk_skb: 5867 callbacks suppressed [ 860.369930][ T30] audit: type=1400 audit(1757451036.689:406655): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 860.378316][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.449276][ T30] audit: type=1400 audit(1757451036.689:406656): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 860.509441][ T5516] audit: audit_lost=50556 audit_rate_limit=0 audit_backlog_limit=64 [ 860.534978][ T5516] audit: backlog limit exceeded [ 860.573133][ T30] audit: type=1400 audit(1757451036.689:406657): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 860.631201][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.638049][ T5516] audit: audit_lost=50557 audit_rate_limit=0 audit_backlog_limit=64 [ 860.660368][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 860.672935][T16957] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.394928][ T30] kauditd_printk_skb: 7005 callbacks suppressed [ 865.394948][ T30] audit: type=1400 audit(1757451041.659:410490): avc: denied { read } for pid=17023 comm="syz.0.2570" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 865.532384][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.681115][T17033] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.698273][ T5516] audit: audit_lost=51616 audit_rate_limit=0 audit_backlog_limit=64 [ 865.736348][T17033] audit: audit_lost=51617 audit_rate_limit=0 audit_backlog_limit=64 [ 865.760186][ T30] audit: type=1400 audit(1757451041.719:410491): avc: denied { read } for pid=17031 comm="syz.4.2572" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 865.783682][ T30] audit: type=1400 audit(1757451041.749:410492): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 865.816379][ T5516] audit: backlog limit exceeded [ 865.822888][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 865.824237][T17033] audit: backlog limit exceeded [ 866.535027][T17049] netlink: 'syz.1.2578': attribute type 4 has an invalid length. [ 869.714669][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.724810][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 870.440305][T17116] ceph: No mds server is up or the cluster is laggy [ 870.482266][ T30] kauditd_printk_skb: 4046 callbacks suppressed [ 870.482286][ T30] audit: type=1400 audit(1757451046.789:414285): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.529713][ T30] audit: type=1400 audit(1757451046.789:414286): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.550925][ C1] vkms_vblank_simulate: vblank timer overrun [ 870.556012][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 870.572745][ T30] audit: type=1400 audit(1757451046.789:414287): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.595830][ T30] audit: type=1400 audit(1757451046.789:414288): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.617010][ C1] vkms_vblank_simulate: vblank timer overrun [ 870.629327][ T30] audit: type=1400 audit(1757451046.789:414289): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.650552][ C1] vkms_vblank_simulate: vblank timer overrun [ 870.661904][ T30] audit: type=1400 audit(1757451046.789:414290): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 870.683103][ C1] vkms_vblank_simulate: vblank timer overrun [ 870.704561][T17131] audit: audit_backlog=65 > audit_backlog_limit=64 [ 870.730944][ T5516] audit: audit_lost=51703 audit_rate_limit=0 audit_backlog_limit=64 [ 870.746219][T17131] audit: audit_lost=51704 audit_rate_limit=0 audit_backlog_limit=64 [ 871.073364][T17146] netlink: 'syz.1.2600': attribute type 4 has an invalid length. [ 872.106720][T17194] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2614'. [ 872.851008][T17219] ptrace attach of "./syz-executor exec"[5856] was attempted by "./syz-executor exec"[17219] [ 874.135185][T17239] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 875.493368][ T30] kauditd_printk_skb: 7755 callbacks suppressed [ 875.493385][ T30] audit: type=1400 audit(1757451051.819:420400): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 875.609283][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.625029][ T30] audit: type=1400 audit(1757451051.849:420401): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 875.665767][ T5516] audit: audit_lost=52253 audit_rate_limit=0 audit_backlog_limit=64 [ 875.694283][ T5516] audit: backlog limit exceeded [ 875.712525][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.713220][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.719063][ T5856] audit: audit_lost=52254 audit_rate_limit=0 audit_backlog_limit=64 [ 875.719077][ T5856] audit: backlog limit exceeded [ 875.844721][T17258] audit: audit_backlog=65 > audit_backlog_limit=64 [ 875.938197][T17259] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2620'. [ 876.150101][T17261] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 876.156729][T17261] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 876.217304][T17261] vhci_hcd vhci_hcd.0: Device attached [ 876.289209][T17262] vhci_hcd: connection closed [ 876.289750][ T2968] vhci_hcd: stop threads [ 876.302233][ T2968] vhci_hcd: release socket [ 876.306751][ T2968] vhci_hcd: disconnect device [ 879.703184][T17319] netlink: 'syz.0.2636': attribute type 10 has an invalid length. [ 880.601096][ T30] kauditd_printk_skb: 5190 callbacks suppressed [ 880.601115][ T30] audit: type=1400 audit(1757451056.729:424394): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 880.713347][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.719893][ T5516] audit: audit_lost=52655 audit_rate_limit=0 audit_backlog_limit=64 [ 880.748894][T17332] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.751674][ T30] audit: type=1400 audit(1757451056.919:424395): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 880.778114][ T5516] audit: backlog limit exceeded [ 880.783728][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.790791][T17335] audit: audit_backlog=65 > audit_backlog_limit=64 [ 880.801977][T17335] audit: audit_lost=52656 audit_rate_limit=0 audit_backlog_limit=64 [ 880.810641][T17335] audit: backlog limit exceeded [ 881.443104][T17351] block device autoloading is deprecated and will be removed. [ 882.795096][T17378] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2648'. [ 885.610650][ T30] kauditd_printk_skb: 5576 callbacks suppressed [ 885.668454][ T30] audit: type=1400 audit(1757451061.909:429026): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 885.764732][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 885.795300][ T30] audit: type=1400 audit(1757451061.929:429027): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 885.834298][ T5516] audit: audit_lost=52973 audit_rate_limit=0 audit_backlog_limit=64 [ 885.870422][T17420] audit: audit_backlog=65 > audit_backlog_limit=64 [ 885.877454][T17420] audit: audit_lost=52974 audit_rate_limit=0 audit_backlog_limit=64 [ 885.885876][T17420] audit: backlog limit exceeded [ 885.900138][ T5516] audit: backlog limit exceeded [ 885.912063][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 885.915343][T17417] audit: audit_backlog=65 > audit_backlog_limit=64 [ 890.612670][ T30] kauditd_printk_skb: 4155 callbacks suppressed [ 890.612689][ T30] audit: type=1400 audit(1757451066.929:432036): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 890.654158][ T30] audit: type=1400 audit(1757451066.959:432037): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 890.662109][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 890.693573][ T30] audit: type=1400 audit(1757451066.959:432038): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 890.716540][ T5516] audit: audit_lost=53358 audit_rate_limit=0 audit_backlog_limit=64 [ 890.718484][ T30] audit: type=1400 audit(1757451066.959:432039): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 890.725129][ T5516] audit: backlog limit exceeded [ 890.725651][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 890.765617][ T30] audit: type=1400 audit(1757451066.969:432040): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 890.796387][ T30] audit: type=1400 audit(1757451066.969:432041): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 895.621621][ T30] kauditd_printk_skb: 6254 callbacks suppressed [ 895.621639][ T30] audit: type=1400 audit(1757451071.919:438288): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 895.719513][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 895.744615][ T5516] audit: audit_lost=53362 audit_rate_limit=0 audit_backlog_limit=64 [ 895.793996][ T5516] audit: backlog limit exceeded [ 895.798999][ T30] audit: type=1400 audit(1757451071.949:438289): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 895.826775][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 895.827171][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 895.854199][ T5516] audit: audit_lost=53363 audit_rate_limit=0 audit_backlog_limit=64 [ 895.882643][ T5516] audit: backlog limit exceeded [ 895.891596][ T5856] audit: audit_lost=53364 audit_rate_limit=0 audit_backlog_limit=64 [ 896.010361][T17559] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 899.330849][T17612] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2698'. [ 900.232852][T17623] netlink: 'syz.3.2710': attribute type 12 has an invalid length. [ 900.631524][ T30] kauditd_printk_skb: 6169 callbacks suppressed [ 900.631542][ T30] audit: type=1400 audit(1757451076.929:442598): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 900.702517][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 900.709846][T17647] audit: audit_backlog=65 > audit_backlog_limit=64 [ 900.729460][ T5516] audit: audit_lost=53985 audit_rate_limit=0 audit_backlog_limit=64 [ 900.928607][T17647] audit: audit_lost=53986 audit_rate_limit=0 audit_backlog_limit=64 [ 900.938516][ T5516] audit: backlog limit exceeded [ 900.939416][ T30] audit: type=1400 audit(1757451076.929:442599): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 900.947882][T17647] audit: backlog limit exceeded [ 900.977290][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 900.993285][ T5516] audit: audit_lost=53987 audit_rate_limit=0 audit_backlog_limit=64 [ 903.063317][T17678] trusted_key: encrypted_key: key user:syz not found [ 904.095589][T17688] netlink: 9 bytes leftover after parsing attributes in process `syz.0.2717'. [ 904.222401][T17691] netlink: 5 bytes leftover after parsing attributes in process `syz.0.2717'. [ 904.397983][T17688] gretap0: entered promiscuous mode [ 904.408208][T17691] 0ªî{X¹¦: renamed from gretap0 [ 904.423583][T17691] 0ªî{X¹¦: left promiscuous mode [ 904.429141][T17691] 0ªî{X¹¦: entered allmulticast mode [ 904.442616][T17691] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 905.963614][ T30] kauditd_printk_skb: 3821 callbacks suppressed [ 905.963630][ T30] audit: type=1400 audit(1757451081.949:446195): avc: denied { read } for pid=17713 comm="syz.0.2721" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 906.004509][ T30] audit: type=1400 audit(1757451081.949:446196): avc: denied { map_create } for pid=17713 comm="syz.0.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 906.031449][ T30] audit: type=1400 audit(1757451081.959:446197): avc: denied { bpf } for pid=17713 comm="syz.0.2721" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 906.032293][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 906.234097][ T5516] audit: audit_lost=54063 audit_rate_limit=0 audit_backlog_limit=64 [ 906.258059][ T5848] audit: audit_backlog=65 > audit_backlog_limit=64 [ 906.265803][ T5516] audit: backlog limit exceeded [ 906.270799][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 906.278991][ T5516] audit: audit_lost=54064 audit_rate_limit=0 audit_backlog_limit=64 [ 906.287484][ T5516] audit: backlog limit exceeded [ 911.002054][ T30] kauditd_printk_skb: 4261 callbacks suppressed [ 911.002078][ T30] audit: type=1400 audit(1757451087.229:449755): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 911.030699][ T30] audit: type=1400 audit(1757451087.239:449756): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 911.157760][ T30] audit: type=1400 audit(1757451087.239:449757): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 911.158312][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 911.224135][ T30] audit: type=1400 audit(1757451087.239:449758): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 911.227934][T17786] audit: audit_backlog=65 > audit_backlog_limit=64 [ 911.278383][ T5516] audit: audit_lost=54300 audit_rate_limit=0 audit_backlog_limit=64 [ 911.295189][T17786] audit: audit_lost=54301 audit_rate_limit=0 audit_backlog_limit=64 [ 911.304300][ T30] audit: type=1400 audit(1757451087.239:449759): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 911.305252][ T5516] audit: backlog limit exceeded [ 916.057213][ T30] kauditd_printk_skb: 4298 callbacks suppressed [ 916.057230][ T30] audit: type=1400 audit(1757451092.379:453745): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 916.148275][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 916.235052][T17859] audit: audit_backlog=65 > audit_backlog_limit=64 [ 916.240839][ T30] audit: type=1400 audit(1757451092.379:453746): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 916.278239][T17860] audit: audit_backlog=65 > audit_backlog_limit=64 [ 916.292584][T17860] audit: audit_lost=54406 audit_rate_limit=0 audit_backlog_limit=64 [ 916.300660][ T5516] audit: audit_lost=54407 audit_rate_limit=0 audit_backlog_limit=64 [ 916.309156][ T5516] audit: backlog limit exceeded [ 916.322097][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 916.334456][ T30] audit: type=1400 audit(1757451092.379:453747): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 920.648877][T17928] netlink: 'syz.4.2770': attribute type 10 has an invalid length. [ 920.699086][T17928] team0: Device hsr_slave_0 failed to register rx_handler [ 920.999210][T17935] IPv6: NLM_F_CREATE should be specified when creating new route [ 921.037626][T17936] netlink: 'syz.2.2771': attribute type 4 has an invalid length. [ 921.063738][ T30] kauditd_printk_skb: 3300 callbacks suppressed [ 921.063756][ T30] audit: type=1400 audit(1757451097.389:456224): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.148286][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 921.187273][T17937] audit: audit_backlog=65 > audit_backlog_limit=64 [ 921.194454][ T30] audit: type=1400 audit(1757451097.389:456225): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.196137][ T5516] audit: audit_lost=54683 audit_rate_limit=0 audit_backlog_limit=64 [ 921.215915][ T30] audit: type=1400 audit(1757451097.389:456226): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.215955][ T30] audit: type=1400 audit(1757451097.389:456227): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.215994][ T30] audit: type=1400 audit(1757451097.389:456228): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.216029][ T30] audit: type=1400 audit(1757451097.389:456229): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 921.216069][ T30] audit: type=1400 audit(1757451097.389:456230): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.484432][T17980] netlink: 'syz.1.2777': attribute type 12 has an invalid length. [ 925.350437][T18010] netlink: 60 bytes leftover after parsing attributes in process `syz.3.2784'. [ 925.360264][T18010] veth1_virt_wifi: entered promiscuous mode [ 926.072909][ T30] kauditd_printk_skb: 8676 callbacks suppressed [ 926.072926][ T30] audit: type=1400 audit(1757451102.399:460203): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 926.142734][ T30] audit: type=1400 audit(1757451102.399:460204): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 926.208135][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 926.208664][T18016] audit: audit_backlog=65 > audit_backlog_limit=64 [ 926.226658][ T30] audit: type=1400 audit(1757451102.399:460205): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 926.265638][T18020] audit: audit_backlog=65 > audit_backlog_limit=64 [ 926.282062][ T30] audit: type=1400 audit(1757451102.399:460206): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 926.297627][ T5516] audit: audit_lost=56252 audit_rate_limit=0 audit_backlog_limit=64 [ 926.305936][T18016] audit: audit_lost=56253 audit_rate_limit=0 audit_backlog_limit=64 [ 926.322678][T18020] audit: audit_lost=56254 audit_rate_limit=0 audit_backlog_limit=64 [ 930.099362][T18115] netlink: 'syz.3.2798': attribute type 21 has an invalid length. [ 930.154486][T18123] batadv2: entered promiscuous mode [ 930.159762][T18115] netlink: 128 bytes leftover after parsing attributes in process `syz.3.2798'. [ 930.160520][T18123] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 930.247121][T18115] netlink: 'syz.3.2798': attribute type 4 has an invalid length. [ 930.297354][T18115] netlink: 3 bytes leftover after parsing attributes in process `syz.3.2798'. [ 931.110941][ T30] kauditd_printk_skb: 16750 callbacks suppressed [ 931.110959][ T30] audit: type=1400 audit(1757451107.379:465389): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 931.154611][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.163066][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 931.229246][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 931.258789][ T5516] audit: audit_lost=60110 audit_rate_limit=0 audit_backlog_limit=64 [ 931.276369][T18137] audit: audit_backlog=65 > audit_backlog_limit=64 [ 931.515589][T18142] audit: audit_backlog=65 > audit_backlog_limit=64 [ 931.532512][ T5516] audit: backlog limit exceeded [ 931.539104][ T30] audit: type=1400 audit(1757451107.429:465390): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 931.565409][T18137] audit: audit_lost=60111 audit_rate_limit=0 audit_backlog_limit=64 [ 931.584410][T18142] audit: audit_lost=60112 audit_rate_limit=0 audit_backlog_limit=64 [ 931.584606][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 932.592770][T18163] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2806'. [ 934.601974][T16271] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 936.146194][ T30] kauditd_printk_skb: 5868 callbacks suppressed [ 936.146209][ T30] audit: type=1400 audit(1757451112.469:469308): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 936.362496][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 936.378027][ T5516] audit: audit_lost=60763 audit_rate_limit=0 audit_backlog_limit=64 [ 936.405090][ T5516] audit: backlog limit exceeded [ 936.436057][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 936.479572][ T5516] audit: audit_lost=60764 audit_rate_limit=0 audit_backlog_limit=64 [ 936.494798][T18222] audit: audit_backlog=65 > audit_backlog_limit=64 [ 936.503035][ T30] audit: type=1400 audit(1757451112.469:469309): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 936.541919][ T5516] audit: backlog limit exceeded [ 936.547107][T18222] audit: audit_lost=60765 audit_rate_limit=0 audit_backlog_limit=64 [ 937.934616][T18247] syz_tun: entered promiscuous mode [ 937.940853][T18247] batadv_slave_0: entered promiscuous mode [ 937.947752][T18247] hsr1: Slave A (syz_tun) is not up; please bring it up to get a fully working HSR network [ 937.991196][ T24] Process accounting resumed [ 938.001524][T18247] hsr1: Slave B (batadv_slave_0) is not up; please bring it up to get a fully working HSR network [ 938.037893][T18247] hsr1: entered allmulticast mode [ 938.081369][T18247] syz_tun: entered allmulticast mode [ 938.149657][T18247] batadv_slave_0: entered allmulticast mode [ 939.746553][T18290] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2835'. [ 939.755693][T18290] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2835'. [ 941.156636][ T30] kauditd_printk_skb: 6053 callbacks suppressed [ 941.156654][ T30] audit: type=1400 audit(1757451117.479:473607): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 941.208196][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 941.227033][ T5516] audit: audit_lost=61351 audit_rate_limit=0 audit_backlog_limit=64 [ 941.255144][ T5516] audit: backlog limit exceeded [ 941.268270][ T30] audit: type=1400 audit(1757451117.479:473608): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 941.270902][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 941.384159][ T30] audit: type=1400 audit(1757451117.479:473609): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 941.500806][ T30] audit: type=1400 audit(1757451117.479:473610): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 941.533623][ T5516] audit: audit_lost=61352 audit_rate_limit=0 audit_backlog_limit=64 [ 941.546185][T18326] audit: audit_backlog=65 > audit_backlog_limit=64 [ 942.283931][T18334] syz_tun (unregistering): left promiscuous mode [ 943.431104][T18367] netlink: 'syz.2.2850': attribute type 12 has an invalid length. [ 946.173302][ T5516] audit_log_start: 3314 callbacks suppressed [ 946.173319][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 946.188135][T18405] audit: audit_backlog=65 > audit_backlog_limit=64 [ 946.194756][T18405] audit: audit_lost=61405 audit_rate_limit=0 audit_backlog_limit=64 [ 946.202819][T18405] audit: backlog limit exceeded [ 946.210397][T18405] audit: audit_backlog=65 > audit_backlog_limit=64 [ 946.217072][T18405] audit: audit_lost=61406 audit_rate_limit=0 audit_backlog_limit=64 [ 946.225185][T18405] audit: backlog limit exceeded [ 946.231395][T18405] audit: audit_backlog=65 > audit_backlog_limit=64 [ 946.237968][T18405] audit: audit_lost=61407 audit_rate_limit=0 audit_backlog_limit=64 [ 946.246232][T18405] audit: backlog limit exceeded [ 947.366081][T18426] ipvlan2: entered promiscuous mode [ 951.181339][ T30] kauditd_printk_skb: 3655 callbacks suppressed [ 951.181363][ T30] audit: type=1400 audit(1757451127.509:480281): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 951.736709][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 951.743417][ T5516] audit: audit_lost=61456 audit_rate_limit=0 audit_backlog_limit=64 [ 951.751645][ T30] audit: type=1400 audit(1757451127.529:480282): avc: denied { read } for pid=18485 comm="syz.0.2880" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 951.775937][ T5516] audit: backlog limit exceeded [ 951.781169][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 951.788182][ T5516] audit: audit_lost=61457 audit_rate_limit=0 audit_backlog_limit=64 [ 951.799530][ T5516] audit: backlog limit exceeded [ 951.807804][ T30] audit: type=1400 audit(1757451127.539:480283): avc: denied { map_create } for pid=18485 comm="syz.0.2880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 951.830780][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 953.620493][T18526] syzkaller0: entered promiscuous mode [ 954.092179][T18540] netlink: 'syz.1.2891': attribute type 4 has an invalid length. [ 956.195612][ T30] kauditd_printk_skb: 6322 callbacks suppressed [ 956.195633][ T30] audit: type=1400 audit(1757451132.499:485243): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 956.288069][ T30] audit: type=1400 audit(1757451132.519:485246): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 956.288703][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 956.319434][ T5516] audit: audit_lost=61912 audit_rate_limit=0 audit_backlog_limit=64 [ 956.328957][ T5516] audit: backlog limit exceeded [ 956.335833][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 956.399927][ T30] audit: type=1400 audit(1757451132.519:485247): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 956.407921][ T5516] audit: audit_lost=61913 audit_rate_limit=0 audit_backlog_limit=64 [ 956.432759][ T30] audit: type=1400 audit(1757451132.519:485248): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 956.441861][ T5516] audit: backlog limit exceeded [ 959.485654][T18603] mac80211_hwsim hwsim7 wlan1: entered allmulticast mode [ 959.538428][T18603] team0: left allmulticast mode [ 959.561350][T18603] team_slave_0: left allmulticast mode [ 959.714800][T18603] team_slave_1: left allmulticast mode [ 959.720310][T18603] netdevsim netdevsim2 netdevsim0: left allmulticast mode [ 959.748604][T18603] team0: left promiscuous mode [ 959.762975][T18603] team_slave_0: left promiscuous mode [ 959.844244][T18603] team_slave_1: left promiscuous mode [ 959.882589][T18603] netdevsim netdevsim2 netdevsim0: left promiscuous mode [ 959.930775][T18603] bridge0: port 3(team0) entered disabled state [ 959.982344][T18603] bridge_slave_0: left allmulticast mode [ 959.993599][T18603] bridge_slave_0: left promiscuous mode [ 960.000663][T18603] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.027251][T18603] bridge_slave_1: left allmulticast mode [ 960.048487][T18603] bridge_slave_1: left promiscuous mode [ 960.067672][T18603] bridge0: port 2(bridge_slave_1) entered disabled state [ 960.245258][T18603] bond0: (slave bond_slave_0): Releasing backup interface [ 960.306527][T18603] bond0: (slave bond_slave_1): Releasing backup interface [ 960.340893][T18603] team0: Port device team_slave_0 removed [ 960.371007][T18603] team0: Port device team_slave_1 removed [ 960.428428][T18603] team0: Port device netdevsim0 removed [ 960.460095][T18603] bond6: (slave veth5): Releasing active interface [ 961.205215][ T30] kauditd_printk_skb: 6086 callbacks suppressed [ 961.205233][ T30] audit: type=1400 audit(1757451137.519:491026): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 961.274458][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 961.282462][ T5516] audit: audit_lost=62017 audit_rate_limit=0 audit_backlog_limit=64 [ 961.537231][ T5516] audit: backlog limit exceeded [ 961.552890][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 961.561017][ T30] audit: type=1400 audit(1757451137.519:491027): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 961.567832][ T5516] audit: audit_lost=62018 audit_rate_limit=0 audit_backlog_limit=64 [ 961.708601][ T5516] audit: backlog limit exceeded [ 961.730075][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 961.731873][ T30] audit: type=1400 audit(1757451137.529:491028): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 965.516762][T18688] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 966.190000][T18704] pim6reg1: entered promiscuous mode [ 966.209754][T18704] pim6reg1: entered allmulticast mode [ 966.215963][ T30] kauditd_printk_skb: 6370 callbacks suppressed [ 966.215977][ T30] audit: type=1400 audit(1757451142.529:495756): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 966.299681][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 966.314035][ T30] audit: type=1400 audit(1757451142.539:495757): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 966.355210][ T5516] audit: audit_lost=62567 audit_rate_limit=0 audit_backlog_limit=64 [ 966.389690][ T30] audit: type=1400 audit(1757451142.539:495758): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 966.436367][ T5516] audit: backlog limit exceeded [ 966.492125][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 966.492151][ T5516] audit: audit_lost=62568 audit_rate_limit=0 audit_backlog_limit=64 [ 966.492165][ T5516] audit: backlog limit exceeded [ 966.492282][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 966.891142][T18710] netlink: 52 bytes leftover after parsing attributes in process `syz.0.2930'. [ 970.086016][T18768] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2943'. [ 971.409059][ T30] kauditd_printk_skb: 3739 callbacks suppressed [ 971.409078][ T30] audit: type=1400 audit(1757451147.719:498071): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 971.473696][ T30] audit: type=1400 audit(1757451147.719:498072): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 971.541544][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 971.550906][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 971.551275][ T5516] audit: audit_lost=63045 audit_rate_limit=0 audit_backlog_limit=64 [ 971.591825][ T5516] audit: backlog limit exceeded [ 971.609185][ T5856] audit: audit_lost=63046 audit_rate_limit=0 audit_backlog_limit=64 [ 971.629077][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 971.641454][ T5856] audit: backlog limit exceeded [ 971.666419][ T30] audit: type=1400 audit(1757451147.719:498073): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 974.485369][T18828] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2956'. [ 976.413365][ T30] kauditd_printk_skb: 2248 callbacks suppressed [ 976.413382][ T30] audit: type=1400 audit(1757451152.739:499912): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.441552][ T30] audit: type=1400 audit(1757451152.759:499913): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.462938][ T30] audit: type=1400 audit(1757451152.759:499914): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.490627][ T30] audit: type=1400 audit(1757451152.759:499915): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.517404][ T30] audit: type=1400 audit(1757451152.759:499916): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.539012][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 976.539160][ T30] audit: type=1400 audit(1757451152.759:499917): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 976.645016][ T5516] audit: audit_lost=63184 audit_rate_limit=0 audit_backlog_limit=64 [ 976.697684][ T5516] audit: backlog limit exceeded [ 976.717296][ T30] audit: type=1400 audit(1757451152.759:499918): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 979.071969][T18924] syz.1.2970 (18924): drop_caches: 2 [ 979.385348][T18937] netlink: 'syz.3.2973': attribute type 21 has an invalid length. [ 979.394020][T18937] netlink: 128 bytes leftover after parsing attributes in process `syz.3.2973'. [ 979.406814][T18937] netlink: 'syz.3.2973': attribute type 4 has an invalid length. [ 979.444464][T18937] netlink: 3 bytes leftover after parsing attributes in process `syz.3.2973'. [ 980.087273][T18954] netlink: 72 bytes leftover after parsing attributes in process `syz.2.2977'. [ 980.090243][T18954] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2977'. [ 980.604183][T18945] bridge3: the hash_elasticity option has been deprecated and is always 16 [ 981.601167][ T30] kauditd_printk_skb: 6020 callbacks suppressed [ 981.601185][ T30] audit: type=1400 audit(1757451157.709:503140): avc: denied { read } for pid=18966 comm="syz.1.2980" dev="nsfs" ino=4026533285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 981.628885][ C1] vkms_vblank_simulate: vblank timer overrun [ 981.774573][ T30] audit: type=1400 audit(1757451157.749:503141): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 981.781491][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 981.795825][ C1] vkms_vblank_simulate: vblank timer overrun [ 981.798598][ T30] audit: type=1400 audit(1757451157.749:503142): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 981.837863][ T30] audit: type=1400 audit(1757451157.749:503143): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 981.859128][ C1] vkms_vblank_simulate: vblank timer overrun [ 981.894115][ T30] audit: type=1400 audit(1757451157.749:503144): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 981.926458][ T30] audit: type=1400 audit(1757451157.749:503145): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 981.947993][ T5516] audit: audit_lost=64118 audit_rate_limit=0 audit_backlog_limit=64 [ 981.948014][ T5516] audit: backlog limit exceeded [ 981.951039][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 982.091135][T18972] netlink: 'syz.0.2992': attribute type 10 has an invalid length. [ 982.114961][T18972] team0: Device hsr_slave_0 failed to register rx_handler [ 982.455933][T18983] IPv6: NLM_F_CREATE should be specified when creating new route [ 984.531923][T19009] netlink: 'syz.4.2989': attribute type 5 has an invalid length. [ 984.638958][T19009] ip6erspan0: entered promiscuous mode [ 986.662726][ T30] kauditd_printk_skb: 2380 callbacks suppressed [ 986.662738][ T30] audit: type=1400 audit(1757451162.989:505323): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 986.719442][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 986.804407][ T5516] audit: audit_lost=64187 audit_rate_limit=0 audit_backlog_limit=64 [ 986.851372][ T5516] audit: backlog limit exceeded [ 986.870565][ T30] audit: type=1400 audit(1757451162.989:505324): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 986.872105][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 986.979485][ T5516] audit: audit_lost=64188 audit_rate_limit=0 audit_backlog_limit=64 [ 987.021528][ T5516] audit: backlog limit exceeded [ 987.038458][ T30] audit: type=1400 audit(1757451162.989:505325): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 987.071111][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 987.716593][T19049] netlink: 'syz.2.3002': attribute type 8 has an invalid length. [ 989.100276][T19066] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3006'. [ 989.789660][T19089] netlink: 14 bytes leftover after parsing attributes in process `syz.0.3009'. [ 990.329523][T19089] bond0 (unregistering): (slave wlan1): Releasing backup interface [ 990.338861][T19089] bond0 (unregistering): Released all slaves [ 991.673010][ T30] kauditd_printk_skb: 3728 callbacks suppressed [ 991.673078][ T30] audit: type=1400 audit(1757451167.999:508806): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 992.008117][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 992.041921][ T5516] audit: audit_lost=64272 audit_rate_limit=0 audit_backlog_limit=64 [ 992.062198][ T30] audit: type=1400 audit(1757451167.999:508807): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 992.103167][ T30] audit: type=1400 audit(1757451167.999:508808): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 992.129554][ T5516] audit: backlog limit exceeded [ 992.189692][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 992.191767][ T30] audit: type=1400 audit(1757451167.999:508809): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 992.262426][ T30] audit: type=1400 audit(1757451167.999:508810): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 992.268497][ T5516] audit: audit_lost=64273 audit_rate_limit=0 audit_backlog_limit=64 [ 992.601893][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.609874][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 996.439148][T19219] syz.1.3041 (19219): drop_caches: 2 [ 996.446047][T19219] syz.1.3041 (19219): drop_caches: 2 [ 996.683904][ T30] kauditd_printk_skb: 3718 callbacks suppressed [ 996.683921][ T30] audit: type=1400 audit(1757451173.009:512438): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 996.718628][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 996.734632][ T5516] audit: audit_lost=64304 audit_rate_limit=0 audit_backlog_limit=64 [ 996.746538][T19225] audit: audit_backlog=65 > audit_backlog_limit=64 [ 996.758138][ T5516] audit: backlog limit exceeded [ 996.768840][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 996.790807][T19225] audit: audit_lost=64305 audit_rate_limit=0 audit_backlog_limit=64 [ 996.794029][T19226] audit: audit_backlog=65 > audit_backlog_limit=64 [ 996.808179][ T5516] audit: audit_lost=64306 audit_rate_limit=0 audit_backlog_limit=64 [ 996.819628][T19226] audit: audit_lost=64307 audit_rate_limit=0 audit_backlog_limit=64 [ 1001.692003][ T30] kauditd_printk_skb: 10487 callbacks suppressed [ 1001.692024][ T30] audit: type=1400 audit(1757451177.999:518048): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1001.724270][ T30] audit: type=1400 audit(1757451178.019:518049): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1001.748480][ T30] audit: type=1400 audit(1757451178.019:518050): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1001.757426][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1001.780578][ T30] audit: type=1400 audit(1757451178.019:518051): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1001.811728][ T5516] audit: audit_lost=65933 audit_rate_limit=0 audit_backlog_limit=64 [ 1001.819723][ T5516] audit: backlog limit exceeded [ 1001.828453][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1001.838654][ T5516] audit: audit_lost=65934 audit_rate_limit=0 audit_backlog_limit=64 [ 1001.843976][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1002.227449][T19318] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3051'. [ 1004.748427][T19361] trusted_key: encrypted_key: key user:syz not found [ 1006.701420][ T30] kauditd_printk_skb: 10316 callbacks suppressed [ 1006.701458][ T30] audit: type=1400 audit(1757451183.019:524564): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1006.772518][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1006.782251][ T5516] audit: audit_lost=67203 audit_rate_limit=0 audit_backlog_limit=64 [ 1006.798182][ T5516] audit: backlog limit exceeded [ 1006.807399][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1007.015165][ T30] audit: type=1400 audit(1757451183.069:524565): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1007.046626][ T5516] audit: audit_lost=67204 audit_rate_limit=0 audit_backlog_limit=64 [ 1007.060364][ T30] audit: type=1400 audit(1757451183.069:524566): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1007.081245][ T5516] audit: backlog limit exceeded [ 1007.096263][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1007.449892][T19406] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3070'. [ 1008.990574][T19428] netlink: 'syz.3.3074': attribute type 10 has an invalid length. [ 1009.000601][T19428] team0: left allmulticast mode [ 1009.011913][T19428] team_slave_0: left allmulticast mode [ 1009.018921][T19428] team_slave_1: left allmulticast mode [ 1009.116185][T19428] team0: left promiscuous mode [ 1009.255320][T19428] team_slave_0: left promiscuous mode [ 1009.255366][T19429] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3074'. [ 1009.336794][T19428] team_slave_1: left promiscuous mode [ 1009.359882][T19428] bond0: left promiscuous mode [ 1009.390887][T19428] bond_slave_0: left promiscuous mode [ 1009.444304][T19428] bond_slave_1: left promiscuous mode [ 1009.825954][T19428] bridge0: port 2(team0) entered disabled state [ 1011.659518][T19469] netlink: 356 bytes leftover after parsing attributes in process `syz.3.3083'. [ 1011.715171][T19471] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3084'. [ 1011.725970][ T30] kauditd_printk_skb: 3833 callbacks suppressed [ 1011.725986][ T30] audit: type=1400 audit(1757451188.051:527600): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1011.787097][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1011.801301][ T5516] audit: audit_lost=67472 audit_rate_limit=0 audit_backlog_limit=64 [ 1011.819667][ T30] audit: type=1400 audit(1757451188.051:527601): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1011.847422][ T5516] audit: backlog limit exceeded [ 1011.853598][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1011.857289][ T5856] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1011.860141][ T5516] audit: audit_lost=67473 audit_rate_limit=0 audit_backlog_limit=64 [ 1011.893817][T19473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1011.902883][T19474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3084'. [ 1011.912572][T19474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3084'. [ 1011.921425][ T30] audit: type=1400 audit(1757451188.051:527602): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1011.944455][T19474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3084'. [ 1011.959336][T19474] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3084'. [ 1014.410694][T19526] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19526 comm=syz.3.3100 [ 1016.734919][ T30] kauditd_printk_skb: 4791 callbacks suppressed [ 1016.734941][ T30] audit: type=1400 audit(1757451193.061:531555): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1016.826462][ T30] audit: type=1400 audit(1757451193.061:531556): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1016.827566][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1016.864290][T19558] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1016.864798][T19557] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1016.883604][T19558] audit: audit_lost=67754 audit_rate_limit=0 audit_backlog_limit=64 [ 1016.892294][T19557] audit: audit_lost=67755 audit_rate_limit=0 audit_backlog_limit=64 [ 1016.905783][T19557] audit: backlog limit exceeded [ 1016.910730][ T5516] audit: audit_lost=67756 audit_rate_limit=0 audit_backlog_limit=64 [ 1016.926885][T19557] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1018.198086][T19571] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19571 comm=syz.4.3111 [ 1020.766594][ T31] INFO: task kworker/0:0:9 blocked for more than 143 seconds. [ 1020.797290][ T31] Not tainted syzkaller #0 [ 1020.811272][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1020.899240][ T31] task:kworker/0:0 state:D stack:26168 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 1020.968797][ T31] Workqueue: usb_hub_wq hub_event [ 1020.982128][ T31] Call Trace: [ 1020.994748][ T31] [ 1021.004707][ T31] __schedule+0x1190/0x5de0 [ 1021.020559][ T31] ? __pfx___schedule+0x10/0x10 [ 1021.048834][ T31] ? find_held_lock+0x2b/0x80 [ 1021.072371][ T31] ? schedule+0x2d7/0x3a0 [ 1021.092023][ T31] schedule+0xe7/0x3a0 [ 1021.113268][ T31] usb_kill_urb+0x253/0x320 [ 1021.126882][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 1021.137186][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 1021.157630][ T31] ? lockdep_init_map_type+0xd0/0x280 [ 1021.169652][ T31] usb_start_wait_urb+0x250/0x4b0 [ 1021.182560][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 1021.192218][ T31] ? __asan_memset+0x23/0x50 [ 1021.200060][ T31] usb_control_msg+0x326/0x4a0 [ 1021.209722][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 1021.222778][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 1021.232465][ T31] hub_port_init+0x690/0x3a70 [ 1021.240141][ T31] hub_event+0x2ce1/0x4fe0 [ 1021.249643][ T31] ? __pfx_hub_event+0x10/0x10 [ 1021.259309][ T31] ? pool_move_batch+0x290/0x290 [ 1021.270714][ T31] ? rcu_is_watching+0x12/0xc0 [ 1021.280332][ T31] process_one_work+0x9cc/0x1b70 [ 1021.290826][ T31] ? __pfx_hcd_resume_work+0x10/0x10 [ 1021.302316][ T31] ? __pfx_process_one_work+0x10/0x10 [ 1021.313602][ T31] ? assign_work+0x1a0/0x250 [ 1021.323244][ T31] worker_thread+0x6c8/0xf10 [ 1021.332776][ T31] ? __pfx_worker_thread+0x10/0x10 [ 1021.348222][ T31] kthread+0x3c2/0x780 [ 1021.356407][ T31] ? __pfx_kthread+0x10/0x10 [ 1021.366447][ T31] ? rcu_is_watching+0x12/0xc0 [ 1021.395478][ T31] ? __pfx_kthread+0x10/0x10 [ 1021.405587][ T31] ret_from_fork+0x5d4/0x6f0 [ 1021.415011][ T31] ? __pfx_kthread+0x10/0x10 [ 1021.453359][ T31] ret_from_fork_asm+0x1a/0x30 [ 1021.492114][ T31] [ 1021.499804][ T31] [ 1021.499804][ T31] Showing all locks held in the system: [ 1021.526423][ T31] 5 locks held by kworker/0:0/9: [ 1021.547022][ T31] #0: ffff888140ec6d48 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 1021.583699][ T31] #1: ffffc900000e7d10 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 1021.633122][ T31] #2: ffff88802aabb198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x4fe0 [ 1021.666250][ T31] #3: ffff88802aabe518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2981/0x4fe0 [ 1021.700142][ T31] #4: ffff88802a5bba68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x29aa/0x4fe0 [ 1021.731059][ T31] 1 lock held by khungtaskd/31: [ 1021.779914][ T30] kauditd_printk_skb: 5866 callbacks suppressed [ 1021.779927][ T30] audit: type=1400 audit(1757451198.101:536948): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1021.823049][ T30] audit: type=1400 audit(1757451198.101:536949): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1021.823117][ T31] #0: ffffffff8e5c1260 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 1021.857472][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1021.884433][ T5844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1021.890978][ T5844] audit: audit_lost=67915 audit_rate_limit=0 audit_backlog_limit=64 [ 1021.921290][ T5844] audit: backlog limit exceeded [ 1021.928148][ T30] audit: type=1400 audit(1757451198.101:536950): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1021.949393][ C0] vkms_vblank_simulate: vblank timer overrun [ 1021.955562][ T31] 5 locks held by kworker/u8:9/2987: [ 1021.960829][ T31] 2 locks held by getty/5609: [ 1021.966733][ T31] #0: ffff88814dbba0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 1021.977575][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 1021.991364][ T31] 4 locks held by syz.2.3120/19609: [ 1021.998617][ T30] audit: type=1400 audit(1757451198.141:536951): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1022.022898][ T5516] audit: audit_lost=67916 audit_rate_limit=0 audit_backlog_limit=64 [ 1022.031001][ T31] [ 1022.034987][ T31] ============================================= [ 1022.034987][ T31] [ 1022.045659][ T5516] audit: backlog limit exceeded [ 1022.073199][ T31] NMI backtrace for cpu 0 [ 1022.073223][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 1022.073247][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1022.073254][ T31] Call Trace: [ 1022.073259][ T31] [ 1022.073264][ T31] dump_stack_lvl+0x116/0x1f0 [ 1022.073285][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 1022.073296][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1022.073316][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 1022.073327][ T31] watchdog+0xf0e/0x1260 [ 1022.073342][ T31] ? __pfx_watchdog+0x10/0x10 [ 1022.073353][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 1022.073367][ T31] ? __kthread_parkme+0x19e/0x250 [ 1022.073384][ T31] ? __pfx_watchdog+0x10/0x10 [ 1022.073395][ T31] kthread+0x3c2/0x780 [ 1022.073406][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.073417][ T31] ? rcu_is_watching+0x12/0xc0 [ 1022.073432][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.073443][ T31] ret_from_fork+0x5d4/0x6f0 [ 1022.073453][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.073463][ T31] ret_from_fork_asm+0x1a/0x30 [ 1022.073483][ T31] [ 1022.073487][ T31] Sending NMI from CPU 0 to CPUs 1: [ 1022.189057][ C1] NMI backtrace for cpu 1 [ 1022.189073][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 1022.189088][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1022.189095][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 1022.189118][ C1] Code: cc 61 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 53 b3 15 00 fb f4 8c 09 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 1022.189131][ C1] RSP: 0018:ffffc90000197df8 EFLAGS: 000002c2 [ 1022.189143][ C1] RAX: 0000000001d6392f RBX: 0000000000000001 RCX: ffffffff8b945c29 [ 1022.189151][ C1] RDX: 0000000000000000 RSI: ffffffff8de522e8 RDI: ffffffff8c162d80 [ 1022.189158][ C1] RBP: ffffed1003c56488 R08: 0000000000000001 R09: ffffed10170a6655 [ 1022.189166][ C1] R10: ffff8880b85332ab R11: 0000000000000000 R12: 0000000000000001 [ 1022.189174][ C1] R13: ffff88801e2b2440 R14: ffffffff90ab6b90 R15: 0000000000000000 [ 1022.189182][ C1] FS: 0000000000000000(0000) GS:ffff8881247b5000(0000) knlGS:0000000000000000 [ 1022.189195][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1022.189204][ C1] CR2: 00002000003fe030 CR3: 000000007f1a3000 CR4: 00000000003526f0 [ 1022.189212][ C1] Call Trace: [ 1022.189218][ C1] [ 1022.189222][ C1] default_idle+0x13/0x20 [ 1022.189240][ C1] default_idle_call+0x6d/0xb0 [ 1022.189256][ C1] do_idle+0x391/0x510 [ 1022.189275][ C1] ? __pfx_do_idle+0x10/0x10 [ 1022.189290][ C1] ? trace_sched_exit_tp+0x2f/0x120 [ 1022.189306][ C1] cpu_startup_entry+0x4f/0x60 [ 1022.189321][ C1] start_secondary+0x21d/0x2b0 [ 1022.189340][ C1] ? __pfx_start_secondary+0x10/0x10 [ 1022.189359][ C1] common_startup_64+0x13e/0x148 [ 1022.189378][ C1] [ 1022.359262][ C0] vkms_vblank_simulate: vblank timer overrun [ 1022.381759][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 1022.388667][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 1022.397810][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 1022.407871][ T31] Call Trace: [ 1022.411152][ T31] [ 1022.414088][ T31] dump_stack_lvl+0x3d/0x1f0 [ 1022.418696][ T31] vpanic+0x6e8/0x7a0 [ 1022.422702][ T31] ? __pfx_vpanic+0x10/0x10 [ 1022.427223][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1022.433200][ T31] panic+0xca/0xd0 [ 1022.436929][ T31] ? __pfx_panic+0x10/0x10 [ 1022.441330][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 1022.446699][ T31] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 1022.452833][ T31] ? watchdog+0xd78/0x1260 [ 1022.457228][ T31] ? watchdog+0xd6b/0x1260 [ 1022.461624][ T31] watchdog+0xd89/0x1260 [ 1022.465858][ T31] ? __pfx_watchdog+0x10/0x10 [ 1022.470516][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 1022.475707][ T31] ? __kthread_parkme+0x19e/0x250 [ 1022.480759][ T31] ? __pfx_watchdog+0x10/0x10 [ 1022.485462][ T31] kthread+0x3c2/0x780 [ 1022.489526][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.494096][ T31] ? rcu_is_watching+0x12/0xc0 [ 1022.498843][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.503409][ T31] ret_from_fork+0x5d4/0x6f0 [ 1022.507977][ T31] ? __pfx_kthread+0x10/0x10 [ 1022.512543][ T31] ret_from_fork_asm+0x1a/0x30 [ 1022.517300][ T31] [ 1022.520533][ T31] Kernel Offset: disabled [ 1022.524847][ T31] Rebooting in 86400 seconds..