last executing test programs: 1m24.423168416s ago: executing program 4 (id=1633): sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffe5a) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$netlink(r0, &(0x7f0000007900)={0x0, 0x0, &(0x7f0000007840)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="10000000"], 0x10}], 0x1, 0x0, 0x0, 0x4040040}, 0x800) socketpair$unix(0x1, 0x3, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000a80)={{0x2, 0x4e23, @empty}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x4a, {0x2, 0x0, @rand_addr=0x64010101}, 'lo\x00'}) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x8, {0x2, 0x0, @empty}, 'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_clone(0x1100, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000007e40)=0x5) writev(r2, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) (fail_nth: 3) 1m23.979862899s ago: executing program 4 (id=1635): r0 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x800) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000011c0)=""/4096) inotify_init() openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r1 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0xc89f, 0xc000, 0xa, 0x20002f7}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000093c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@deltfilter={0x24, 0x2d, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x6, 0xffff}, {0xe, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x40084}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3, &(0x7f0000000000)=0x6, 0x4) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 1m23.701523088s ago: executing program 4 (id=1636): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb0100180000000000000040000000400000000c0000000400000001000084010000000a000000030000000000000000000000000000010500000020000000000000000000000300000000020000000200000000000000006100302e61616161006100"], 0x0, 0x64}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000340)={0x50, 0x0, r2, {0x7, 0x1f, 0x0, 0x34808521, 0x401, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xa4001f7e}}, 0x50) syz_fuse_handle_req(r1, &(0x7f00000041c0)="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", 0x2000, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x0, 0x0, {0x0, 0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x24c01, 0x8) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) r5 = landlock_create_ruleset(&(0x7f0000000000)={0x10, 0x0, 0x3}, 0x18, 0x0) landlock_restrict_self(r5, 0x0) r6 = landlock_create_ruleset(&(0x7f0000000040)={0x0, 0x3}, 0x10, 0x0) landlock_restrict_self(r6, 0x0) r7 = fspick(r4, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r7, 0x7, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000780)=[&(0x7f0000000440)={0xfffffffe, 0x20011004, 0x4, 0x1, 0x0, r3, &(0x7f00000000c0)='!', 0xb7f40, 0x3000000000000000}]) 1m23.560557495s ago: executing program 4 (id=1638): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="98000000100001002abd7000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="a009000000000000140003006e657464657673696d3000000000000008002800babc00005c0016805800018054000c"], 0x98}, 0x1, 0x0, 0x0, 0x24040854}, 0x40000) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000240)={@random="5bb65d3f2511", @remote, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0xb, 0x28, 0x65, 0x0, 0x3, 0x11, 0x0, @empty, @empty=0xe0000001, {[@ra={0x94, 0x4, 0xe0}]}}, {0x4, 0x4e20, 0x10, 0x0, @gue={{0x2, 0x0, 0x0, 0x6, 0x100}}}}}}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) syz_usb_connect$uac1(0x2, 0xa3, &(0x7f0000000140)=ANY=[@ANYBLOB="12010003000000106b1d01014000010203010902910003010904000000010100000a2401ff03010201020c2402050202050308001a060724080308007f0624040506bd07240404efe1a1a97517c8714525eef2ba1b09040100000102000009040101010102000009050109ff03030908072501030805000904020000010200000904020101010200000b240201030404017d848307240107400500090582095b"], &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{0xea, &(0x7f0000000500)=@string={0xea, 0x3, "20bbdc18a076db6cfe0fd36ecde50898df3d1ae39b7bac78650260b72f06e854f026c519651d0bd1896a708f3029a02e6ee184368f2ba1b9ae3335491282d8be23ac6267165feb362f72e76969ec743eaa7b6babab97c35edec3855d8c57e5b2aeb2fca4cb077c5c6339fc5ee9483749b2bd8a714ad3ea23772a45a8286369bb39b905fad0b2874bf1cca58c8f25ffb1b4c07b723f63543a8c91a38e852d3d4b229e2625a2ae54c2bf347532fb62e9d3c4bc42b774c26e5bcae3370924332d1da6246849eb630f6aebaecbb6fdf45b39eaa085406794e0433fbcd5643ce614c009f6d79e520ed20a"}}]}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x24, r5, 0x5, 0x70bd26, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}]}, 0x24}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r5, 0x1, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1590}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x448d0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r7 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r7, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000004c0)='stat\x00') read$FUSE(r8, &(0x7f0000004180)={0x2020}, 0x2020) 1m22.634538729s ago: executing program 4 (id=1643): r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000400)={0x18, 0x0, {0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000001f00)) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x24005805) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) r2 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket(0x1e, 0x4, 0x0) write$binfmt_elf32(r2, &(0x7f0000019280)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x1, 0x8, 0x5, 0xf1, 0x3, 0x3e, 0xff, 0x287, 0x38, 0x2f3, 0xfffffffe, 0x8, 0x20, 0x3, 0xb, 0xc000, 0x2}, [{0x1, 0x4, 0x0, 0x101, 0x4, 0x9, 0x7, 0x4}, {0x6474e551, 0x1, 0x6, 0x10000, 0x1, 0xa35e, 0x0, 0x3}, {0x70000000, 0x8, 0x4, 0x8, 0x9, 0x4, 0xfffffff7}], "b6a9ec7fbf3080d4f1a9efb252", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9a5) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000003000000000000000000ff072d68bb32723d8b8ebb14895252d1dc"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) rt_tgsigqueueinfo(0x0, 0x0, 0xbffffffd, &(0x7f00000009c0)={0x10, 0x3ff, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r5, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) 1m22.289017374s ago: executing program 1 (id=1650): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket(0x28, 0x5, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x8, 0x3, &(0x7f00000000c0)=@framed, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x90) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) listen(r1, 0x8b) ioctl$sock_qrtr_TIOCINQ(r1, 0x541b, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) accept4(r2, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000000)=0x80, 0x800) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000001c0)=@ethtool_cmd={0x2e, 0x100008, 0x0, 0x8, 0xf, 0x3, 0x3, 0xfc, 0x0, 0x1, 0x0, 0x4000000, 0x0, 0xff, 0x0, 0xfffffeff}}) mmap$xdp(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x700000d, 0x811, 0xffffffffffffffff, 0x180000000) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r4 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000540)={0x2, 0x6, 0x2, 0x0, 0x2, 0x0, 0x2}, 0x10}}, 0x0) 1m22.17865085s ago: executing program 1 (id=1651): connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'ip6gre0\x00'}}, 0x1e) r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x141842, 0x8) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x4, 0x200040) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r5, 0xc008551a, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="3b1c1b2098f0bc154c9778a9229a", 0xe) sched_setaffinity(0x0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500), &(0x7f0000000640)='system_u:object_r:getty_log_t:s0\x00', 0x21, 0x7) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="ca02016eba2d52b5f2ac03cc9f38f9d9", 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newqdisc={0x9c, 0x10, 0x4, 0x0, 0x10000018, {0x0, 0x0, 0x0, 0x0, {0x1, 0xfff3}, {0x0, 0xb}, {0xe}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x44, 0x2, [@TCA_GRED_PARMS={0x38, 0x1, {0x7, 0x7fff, 0x0, 0x1, 0x21, 0x7, 0xe, 0x8, 0x101, 0x7, 0x6, 0xe, 0x1e, 0x7, 0xe00000, 0xfffffffb}}, @TCA_GRED_MAX_P={0x8, 0x4, 0x10000}]}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x3]}}]}]}, 0x9c}}, 0x0) r9 = fanotify_init(0x98803922e5400d88, 0x1000) fanotify_mark(r9, 0x105, 0x5000003a, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x42, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) syz_usb_control_io$printer(r0, 0x0, 0x0) 1m20.972331775s ago: executing program 0 (id=1655): bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) ioprio_set$uid(0x3, 0x0, 0x6000) (fail_nth: 3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) kexec_load(0x4, 0xa, 0x0, 0x0) openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x890c, 0x0) 1m20.69875058s ago: executing program 2 (id=1657): r0 = io_uring_setup(0x4c0c, &(0x7f0000000140)={0x0, 0x2637, 0x80, 0x2, 0x10001d4}) r1 = eventfd2(0x6, 0x80800) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000340)=r1, 0x1) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) (fail_nth: 1) 1m20.559688757s ago: executing program 1 (id=1659): r0 = io_uring_setup(0x4c0c, &(0x7f0000000140)={0x0, 0x2637, 0x80, 0x1002, 0x10001d4}) r1 = eventfd2(0x6, 0x80800) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f00000000c0)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000005c0)={0x40, 0x0, 0x3}, 0x10) bind$tipc(r4, 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$FOU_CMD_GET(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010029bd7000fcdbdf2503000000050002000a000000060001004e2300000400050006000a004e240400010000009bd31015fd12a70cd001cbfa014e41eee2953dc72433497dc26832aa25eaa06da4cb43ec18b8db2edc483c42939559e275500d699ef5904d72b52141a7ac4f353abee342a3e23d9e44737c10dd83ef90322a2585f2344ffc9988aca7959ff5dd20f4ffe9bf24fbe1b40945aa69848f19356da56cd7f8b2f18c18a188ac6181e254d6bb30815820d4de87e8b1c741b74d1dd8f35b580341e88b33f5dc5067b908e48e58ebe56c567ba32420048d7af962f4fc5cba22526a21bd85ce"], 0x38}}, 0x800) write$cgroup_devices(r5, &(0x7f0000000080)={'c', ' *:* ', 'rm\x00'}, 0x9) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000340)=r1, 0x1) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x12, r2, 0x6f402000) sendmsg$NFT_MSG_GETSETELEM(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0xd, 0xa, 0x202, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000040}, 0x40800) 1m20.512780931s ago: executing program 0 (id=1660): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xe, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_to_batadv\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0xf63, 0x5}, {0x800}]}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @broadcast}}}}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0xc201}) socket$kcm(0x2, 0xa, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000010000104010000000200000000000000", @ANYRES32=0x0, @ANYBLOB="00800000bcb5f31a2c0012801100010062726964676500000000766500000000140005800500190002000000080025000800ff00140003006272696467655f736c6176655f30"], 0x60}, 0x1, 0x0, 0x0, 0x44000}, 0x0) 1m20.319428586s ago: executing program 2 (id=1661): r0 = socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_udplite(0xa, 0x2, 0x88) getdents64(0xffffffffffffffff, &(0x7f0000000fc0)=""/224, 0xe0) r1 = syz_usb_connect(0x5, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x300, 0xac, 0x9b, 0xcc, 0x20, 0x18d1, 0x1eaf, 0x5abb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x7, 0x0, 0x80, 0xb, [{{0x9, 0x4, 0xbb, 0x6, 0x0, 0x3a, 0xe5, 0x4}}]}}]}}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r1, 0x0, &(0x7f0000000e80)={0x84, &(0x7f0000000a00)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c00000045000701feffffff00000000017c0000080003"], 0x59}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000005c00), r4) sendmsg$IEEE802154_SET_MACPARAMS(r4, &(0x7f0000005d00)={0x0, 0x0, &(0x7f0000005cc0)={&(0x7f0000005c40)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="090026bd7000fedbdf25230000000a0001007770616e30"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x84c) write$binfmt_script(r2, &(0x7f0000000380), 0x1000a) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) syz_open_dev$loop(&(0x7f0000000300), 0x9, 0x100) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x18, r6, 0x200, 0x70bd28, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x4) setresuid(0x0, 0xee01, 0xffffffffffffffff) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x19) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000240)={0x2, [0x39c, 0xe000]}, &(0x7f00000002c0)=0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x0) syz_usb_connect(0x5, 0x24, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e21, @local}], 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0x100, 0x6, 0x807, 0x7}, 0x8) 1m19.913371576s ago: executing program 3 (id=1662): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x2, 0x0, 0x9, "c46e9fd1a84b7fefa0bf2cca6beb9363a680b652a86bcf56a1b9f4e6b54cc6beca5462202c484c10ca5386103a5ccbe47b7b9aa6d8d701a3ba6a6c0ce8b978", 0x1}, 0x60) r1 = dup(r0) getsockopt$inet_buf(r1, 0x118, 0x1, 0x0, &(0x7f0000000000)) 1m19.496834665s ago: executing program 1 (id=1663): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket(0x28, 0x5, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x8, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000003d44d62a6ffa00000000000000000000009500e45800000000"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96}, 0x90) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) listen(r1, 0x8b) ioctl$sock_qrtr_TIOCINQ(r1, 0x541b, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000300)={'wlan0\x00'}) accept4(r2, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000000)=0x80, 0x800) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000340)={'ip6tnl0\x00', &(0x7f00000001c0)=@ethtool_cmd={0x2e, 0x100008, 0x0, 0x8, 0xf, 0x3, 0x3, 0xfc, 0x0, 0x1, 0x0, 0x4000000, 0x0, 0xff, 0x0, 0xfffffeff}}) mmap$xdp(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x700000d, 0x811, 0xffffffffffffffff, 0x180000000) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) setpriority(0x2, r3, 0x8) capset(&(0x7f0000000100)={0xf1504, r3}, &(0x7f0000000180)={0x9, 0xf, 0x4, 0x1, 0x1, 0x6}) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) syz_open_dev$radio(&(0x7f00000000c0), 0x2, 0x2) 1m19.443533557s ago: executing program 3 (id=1664): socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) socket$inet6(0xa, 0x802, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_io_uring_setup(0x88f, &(0x7f0000000480)={0x0, 0xd144, 0x1, 0x40, 0xbfdffffe}, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x16) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000012000000240000000800000085000000050000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x143102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a3200000000140000001100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/107, 0x6b}, {&(0x7f00000001c0)=""/176, 0xb0}, {&(0x7f0000000600)=""/207, 0xcf}, {&(0x7f0000000500)=""/139, 0x8b}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000700)=""/242, 0xf2}], 0x6, &(0x7f0000000340), 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x14}}}, 0x1c) r5 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000000)=0x1e) 1m19.269119672s ago: executing program 2 (id=1665): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x80040, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2800000010005fba0000000000716c9e2dd50050d32cd292a2", @ANYRES32=0x0, @ANYRES16=r2], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x4, 0x4, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0, 0xfffffffffffffdf4}], 0x1, 0xe8, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, 0x0}], 0x1, 0x10, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000040)=@arm64_fw={0x6030000000140002, &(0x7f0000000180)=0x7}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00000002c0)={0xa, 0x4e23, 0xfffffffc, @loopback}, 0x1c) listen(r5, 0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x4}, 0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x8}, 0x8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) setuid(0xee00) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = inotify_init1(0x180800) read(r7, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netfilter\x00') fchdir(r8) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r9 = syz_open_procfs(r6, &(0x7f0000000300)='fd/4\x00') pread64(r9, &(0x7f00000000c0)=""/22, 0x16, 0x6) sendmmsg$inet6(r4, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)="89", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000140)=ANY=[], 0x8397de475a1b5b02) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 1m19.247637445s ago: executing program 0 (id=1666): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) close(0xffffffffffffffff) execve(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000140)={0x4200, 0x3, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x5}}, 0x1c) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) write(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000640)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4e7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x0, 0xff}}}}}]}}]}}, 0x0) 1m19.242894386s ago: executing program 1 (id=1667): openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2042, 0x19d) (async) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2042, 0x19d) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) (async) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) fanotify_init(0xf00, 0x800) (async) r1 = fanotify_init(0xf00, 0x800) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) chdir(&(0x7f0000000140)='./bus\x00') fanotify_mark(r1, 0x1, 0x10001043, r0, 0x0) mknodat$loop(r0, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x42, 0x58) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', r0, &(0x7f00000004c0)='./file0\x00', 0x2) syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0xb5, 0x40, 0x33, 0x40, 0x1a86, 0x7522, 0x3536, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xe4, 0xd6, 0x24}}]}}]}}, 0x0) (async) r2 = syz_usb_connect(0x0, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0xb5, 0x40, 0x33, 0x40, 0x1a86, 0x7522, 0x3536, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xe4, 0xd6, 0x24}}]}}]}}, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000200), 0x2, 0x8901) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r3, 0xc0245720, &(0x7f00000001c0)) (async) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r3, 0xc0245720, &(0x7f00000001c0)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000001300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @sched_cls=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x18000000000002a0, 0x12, 0x0, &(0x7f0000000240)="d2ff03076003008cb29e08f088a8ac000024", 0x0, 0x200009, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) syz_usb_control_io$cdc_ecm(r2, 0x0, &(0x7f0000000040)={0x1c, &(0x7f0000000080)={0x40, 0x3, 0x2, "51ce"}, 0x0, 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x1a8, 0x10, 0x401, 0x0, 0x1000000, {0x0, 0x0, 0x0, 0x0, 0x157b}, [@IFLA_VF_PORTS={0x188, 0x18, 0x0, 0x1, [{0x80, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x1}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "00a91e11e88f154e05f3539812e82d00"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f32691e58a0d105115e4037c6c22735c"}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "396d9fda86256a03330f8bd30e69ae76"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "c973fcf42c79cc6b52fe7056b153050b"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a2aa82818df7ab68b306b738c150ec6a"}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x400}]}, {0x3c, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "61f2e140d6d252997e55e319f441b785"}, @IFLA_PORT_PROFILE={0x7, 0x2, '++\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "df357ae1c572df87e137f42e0e9721cc"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x9}]}, {0x68, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "b8f750edb243e2d623398e6c974e6820"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x97}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "2017b89005546c09f92ebac82d30fa22"}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_PROFILE={0x6, 0x2, '\\\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "9e6348fabaef4761bc6a5845098a7557"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x11, 0x2, '/dev/dmmidi#\x00'}, @IFLA_PORT_PROFILE={0xb, 0x2, 'geneve\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "107648dc89794091206a2ffd1c54faa6"}, @IFLA_PORT_VF={0x8, 0x1, 0x3}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x4}, 0x40800) syz_usb_control_io$cdc_ecm(r2, 0x0, 0x0) (async) syz_usb_control_io$cdc_ecm(r2, 0x0, 0x0) syz_usb_control_io$rtl8150(r2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000080)=0x2, 0x12) (async) write$cgroup_int(r6, &(0x7f0000000080)=0x2, 0x12) ioctl$IMGETVERSION(r6, 0x80044942, &(0x7f0000000000)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'tunl0\x00', 0x1}, 0x18) openat$kvm(0xffffffffffffff9c, 0x0, 0x20a02, 0x0) (async) openat$kvm(0xffffffffffffff9c, 0x0, 0x20a02, 0x0) connect$unix(r1, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 1m18.476889308s ago: executing program 2 (id=1668): sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002640)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f00000009c0)="74771cca11c56b1b27326677f4ead63941ba8ff5f8639227522c55eafd83b025e76fec3e392e6f4067975d1f672581a5da38f99a4eadde6707609254278d76d2d34cea83141bdd2119f26594ad1ab2504e3a837b2110ade48a1fad8f4cd48b33032c2b77b66ed1da3e4a50dd39e9d9dc6beff85d3ba70d", 0x77}, {0x0}, {0x0}], 0x4}}], 0x1, 0x8080) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r2 = dup(r1) connect$inet(r2, &(0x7f0000000400)={0x27, 0x4e20, @loopback}, 0x10) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000380)={0x0, 0x2, 0x6, 0xffff, 0xfe, "0062ba7d8a000000160000400000f738096304"}) r3 = syz_open_pts(r0, 0x80) r4 = dup3(r3, r0, 0x80000) read$FUSE(r4, &(0x7f0000002d40)={0x2020}, 0x2020) read$watch_queue(r4, &(0x7f0000001d40)=""/4095, 0xfff) 1m18.359755689s ago: executing program 1 (id=1669): connect$pppoe(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, {0x1, @multicast, 'ip6gre0\x00'}}, 0x1e) r0 = syz_usb_connect(0x0, 0x2d, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x141842, 0x8) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x4, 0x200040) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r5, 0xc008551a, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="3b1c1b2098f0bc154c9778a9229a", 0xe) sched_setaffinity(0x0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x2d) lsetxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500), &(0x7f0000000640)='system_u:object_r:getty_log_t:s0\x00', 0x21, 0x7) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="ca02016eba2d52b5f2ac03cc9f38f9d9", 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@newqdisc={0x9c, 0x10, 0x4, 0x0, 0x10000018, {0x0, 0x0, 0x0, 0x0, {0x1, 0xfff3}, {0x0, 0xb}, {0xe}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x44, 0x2, [@TCA_GRED_PARMS={0x38, 0x1, {0x7, 0x7fff, 0x0, 0x1, 0x21, 0x7, 0xe, 0x8, 0x101, 0x7, 0x6, 0xe, 0x1e, 0x7, 0xe00000, 0xfffffffb}}, @TCA_GRED_MAX_P={0x8, 0x4, 0x10000}]}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x3]}}]}]}, 0x9c}}, 0x0) r9 = fanotify_init(0x98803922e5400d88, 0x1000) fanotify_mark(r9, 0x105, 0x5000003a, r1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', 0x42, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./bus\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) syz_usb_control_io$printer(r0, 0x0, 0x0) 1m18.158935857s ago: executing program 3 (id=1670): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=@base={0xf, 0x4, 0x4, 0x16, 0x0, 0xffffffffffffffff, 0xfffffffd}, 0x50) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002e00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000180)=ANY=[@ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) sendmsg$inet(r4, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1m17.240752458s ago: executing program 2 (id=1671): socket$inet_tcp(0x2, 0x1, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() prlimit64(0x0, 0xe, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="c9", 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB="580100001000030400"/20, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES8=r1], 0x158}, 0x1, 0xba01}, 0x44) sched_setaffinity(0x0, 0x0, 0x0) mknod(&(0x7f0000000080)='./bus\x00', 0x1000, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x143142, 0xa2) readv(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/145, 0x91}], 0x1) write$FUSE_INIT(r2, &(0x7f0000000140)={0x50}, 0xffd3) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x200, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x10) unshare(0x72040e80) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'netdevsim0\x00', 0x0}) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000040)={r6, 0x1, 0x6, @local}, 0x10) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x600, 0x0, 0x0, 0x6}, [@IFLA_ADDRESS={0xa, 0x3, @random="08e7eebc872f"}, @IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @wireguard={{0xe}, {0x4}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4c000}, 0x0) 1m17.23239737s ago: executing program 4 (id=1672): bind$inet6(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELTABLE={0x14, 0x2, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x6}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x3c}, 0x1, 0x0, 0x0, 0x4048000}, 0x880) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) 1m17.106770265s ago: executing program 3 (id=1673): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup(r0) getsockopt$inet_buf(r1, 0x118, 0x1, 0x0, &(0x7f0000000000)) 1m16.842980959s ago: executing program 3 (id=1674): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup(r0) getsockopt$inet_buf(r1, 0x118, 0x1, 0x0, &(0x7f0000000000)) (fail_nth: 1) 1m16.783981897s ago: executing program 0 (id=1675): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000180)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) sendmsg$tipc(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x10) 1m16.329835939s ago: executing program 2 (id=1676): openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x89}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mount$tmpfs(0x0, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000f80), 0x400, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) getrlimit(0x14, &(0x7f0000000240)) ioctl$KVM_GET_NR_MMU_PAGES(0xffffffffffffffff, 0xae45, 0x7) shutdown(0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x100}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @private=0xa010100}]}, &(0x7f0000000180)=0x10) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)=0x3) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x2b8, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x220, 0xffffffff, 0xffffffff, 0x220, 0xffffffff, 0x3, &(0x7f0000000280), {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x9, 0x9, 0x4, 'netbios-ns\x00', {0x7}}}}, {{@ip={@broadcast, @loopback, 0xff, 0xff, 'netdevsim0\x00', 'syzkaller1\x00', {}, {0xff}, 0x1d, 0x2, 0x52}, 0x0, 0x100, 0x168, 0x0, {}, [@common=@set={{0x40}, {{0x2, [0x7, 0x4, 0x1, 0x4, 0x0, 0x4], 0x5, 0x4}}}, @common=@osf={{0x50}, {'syz1\x00', 0x0, 0xa, 0x2, 0x1}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x13, 0x7, 0x6, 0x6, 'syz1\x00', 'syz1\x00', {0x98eb}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4, 0x1}, &(0x7f00000000c0)=0x8) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0xc048aec8, &(0x7f0000000980)={0x4, 0x0, @ioapic={0xd000, 0x81, 0x81, 0x3, 0x0, [{0x7, 0xff, 0x2}, {0x0, 0x7, 0x2, '\x00', 0x9}, {0x8, 0x5, 0xac, '\x00', 0x1}, {0x5, 0x7, 0x7f, '\x00', 0x3}, {0x8, 0x5, 0x6, '\x00', 0x6}, {0x6, 0x1, 0xf, '\x00', 0x6}, {0x0, 0x5, 0x95, '\x00', 0x8}, {0x2, 0x4, 0x7, '\x00', 0x6}, {0xb4, 0x80, 0x5, '\x00', 0x4}, {0x3, 0x24, 0xe6, '\x00', 0xe8}, {0x0, 0x2, 0x2, '\x00', 0xfc}, {0x5, 0x6, 0xa5, '\x00', 0xfc}, {0xc, 0x7, 0x9, '\x00', 0x6}, {0xd, 0xe3, 0x3, '\x00', 0x7}, {0x9, 0x3, 0x10, '\x00', 0x8}, {0x6, 0x8, 0x4, '\x00', 0x2}, {0x8, 0x3, 0x4, '\x00', 0x5}, {0x9, 0x81, 0x5, '\x00', 0x2}, {0x33, 0x9d, 0x0, '\x00', 0x5}, {0xf2, 0xff, 0x9b, '\x00', 0x3}, {0x9, 0x9, 0x7, '\x00', 0xfa}, {0x3, 0xaa, 0xa1, '\x00', 0x40}, {0x4, 0x81, 0x1, '\x00', 0x7}, {0x5, 0xcf, 0x3, '\x00', 0x1}]}}) 1m15.785149385s ago: executing program 3 (id=1677): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xe, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'veth0_to_batadv\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0xf63, 0x5}, {0x800}]}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @broadcast}}}}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'syzkaller1\x00', 0xc201}) socket$kcm(0x2, 0xa, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="6000000010000104010000000200000000000000", @ANYRES32=0x0, @ANYBLOB="00800000bcb5f31a2c0012801100010062726964676500000000766500000000140005800500190002000000080025000800ff00140003006272696467655f736c6176655f30"], 0x60}, 0x1, 0x0, 0x0, 0x44000}, 0x0) 1m15.783952597s ago: executing program 0 (id=1678): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x1000000) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r3 = syz_io_uring_setup(0x9c1, &(0x7f00000002c0)={0x0, 0x200002f, 0x1, 0x1000, 0x100020c}, &(0x7f0000000040)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0xc000000, 0x0, 0x0, 0x1a}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000000)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) io_uring_enter(r3, 0x847ba, 0x0, 0xe, 0x0, 0x0) socket(0x10, 0x3, 0x0) prlimit64(0x0, 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRES32=r8, @ANYBLOB=',rootmode=00000000=00000000100000,id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r8, &(0x7f00000083c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r8, &(0x7f0000000100)={0x50, 0x0, r9, {0x7, 0x1f, 0x0, 0x8000}}, 0x50) syz_fuse_handle_req(r8, &(0x7f00000041c0)="412e450a2a7b9586d1e6e9de257afc4fd60c8de430c0d6348b2cf1db8d070a539de9c1e91a178f9240dbcfe303566018f6c20c55d643a2ed46aaacf49ca491ee2f06184bdb548778a2c56e56f6b40b994419428bbbb9dfa5f9593511ca8ae1c088fb0ee5da72f505000000000000002c04754204f194ae6ceff4570d44496eeffe619998eafc7167d22e1c6aa73e89ad19224e35130a37cf68d5c41ccafe59b4b753a26e06c4306d31d78de6cede97c06e3ca2cc4af66b7548268efa91621ffca2655d2c8f1a9bb019b88fa729cb3d32f72c098c44898d42c42f39feb4faead93980726c236129acdf31c01f1cabb5ca3ec4e45eb5e6e59912792b4976e3f2b560c861d49b539d8e1870040a8cf190a8a767ec067a8048aac53336b44669d3d425843ae80681a7c02a5d5a3d90f355fd4a6ac277e75230d558f0df20cb323cc65e9b5a258cdd669c8a9534e4aff09a8fe89b124748c9e756c28789c2152a5142bc0bb205e339d43bb980b3f04a3c1a424a2a093966b20600a5410e0528fb35937c998eea19f01eaf2f39e16d85563a6737ddab3213ca1832f0afdf891e34a582f6a4ac81fda70ebc3fedac2fb3a492fdb40b91021e5d371d990064cd1f7c2c1a6472dedb505f9a4940057a3e57fd53aa3cd2eb914e073a19b6e925f8553e6875c093c7d19de25861fd9640f0eca4cda0467f12126daa2e0c6df7d4e4babe5a6e59e8391be7700790315b6b8a8aa74cd6d3f054aceaeda79430676b67fe25c9029e0894b413377fc4d8300d9f9338fadd07e4c80cac08113df8971a868458c47c06fff0c1c4bfd48ea583e9e76ef103d42c233b6de10b30612cdbeb6b60a6a4dbbe2da63cc2dd4fb93cac65af3c1279274f4af0e2c5b96e6068aa5b41f7548fb72b0c142351f64446db7425115b89132b5589ee642ebbde655adb2d7d1117456a6e4f2886879b42baf85e05d53e2aceea9c3830673bdc4d081675fe76b994651af9c3f16b7513834fce4654f84558a8308fa677d05bffcc893d5e02bf87c5ec520cd66ad58dc06f0c47d253cd36dfec82980fc8dbdc9e185fe4fbdda2c2517ec9abfbb4841252e650b6bf56fdeca9a4ee3c311de3c6859ec14cc00e95323c57c02fa894d83ea17944f3112fc19a7e11335d7951ec6dd5b4f06fb9b637313a230341ea5da6a7a959e707d0cd5fca60a6649c8df8d6c17e9a49d230e5775df14e4b43aa3420bd0b8814ec7360ab1910e69fab8932f7646d7998bdc2e8ec354c52da21ed83fb7582cb9d37bb95f144974f72c7b0ae7b42945768fa8ec0dd6daba72d05809670506ef1054282201b00906c8af64e3e13a10f180688c96549b2d3d6b04403fd571e7b132891dd4b7cf37aec25ca1e9190c17aaefbc31e059915c12c232fb7097e9fa6f35fbb265c7102db62e2264590c583ea90f1aee3f166af81430d9084eb0c760ebbb16049c9fd1fee6ce33c8ac205e3ac9c275531feadfa4054e0c027c26beb009f54aa72b864d39bb11753f77931bb960276db33021c65671e57b3708bbf979be222e8439d71f58ca87cec7a054517af398a42735b580717377a54f139e2c46813cbb03d98e49c26f4ed54d75e48573cd06145f913f4e313eeee837496dfff75aa722fd8486c45f9c959da12ae48ba4a10712120a203e2476c7b96031d8f8773f68344e6fa21831287655aabbd594e9f272eb1a7315d2d79b8bcd5e63004cd106f80b1e40a5d9e428a01bc58264f4d63c2ee9db6efa70607a642aeb883bf4b9fe009d7f09c16b05a2c9b73573e9019e161ebbdc1fc9b9cd0c5fe1b57adcba2d0f3a767ad59aafa159b3dd181f0601ff95e8af8b5410e56c81ffb8ab35b1e04af35dabf69f08572e69260b72bfd502c5a0de627fd3fee44bf1d4a261bd356056c5739398e3ff161beec1240a089625daffbc61dc5e660c274565477a0ff1797fefff04a98704802ab0674ab72d400686229608cbfd2ca20f4e62495e8b09de9d180c47375bbad72f4474b67d56104b4b466192be60f7aa668fd0a4338b856f114311842ee806d6488ab09098ed9de0e21bcc8b42a5d5713d15eca108fcc7a65d6b414a112524a6e1418644508dd957147a92d4399d13faaf01cacef40549cd11900f9aa32a8333f55796ef25d33c554a308da9797cd0ac25888311b0ac88eff0be7a36ddedcfc2b095abb4d5a6a4edbbad67b70cdf60c7ed0c5e040ced90edb3322ef684332358942ede9191b431c99b3abf8f9c50206479f0ac118c0a99df61fb9c90d846f41caa6a2448fb7e15640965e051c2af4ee72a5cc7c962bacff7019615c10e6c3054e2e5792df3aa6e2c33425552148466a88568cc79b6edebf0107b7d3d24423a665d20c3a1c0f1a6b34eb475bf875912115914cfabcf394f8a096d64e5dc95705079f748b9d4688859c0200fa43719e4722ed6c064c0efa7e07beb2a26fd724b63537fa0eb506365d5c029cd8dce7dd0a1cb9d9058c061739734af6be9e880fe7e28a211a4c368a7babd1107110ecbb384b274cc092b9511c4abde2ddd863162e2739984a9f3c0a76e3c530a27d5e385f4a3b87607b2a944e09d28239661d27719e22c0a657ea383c30859ca29cdb8fbc79bc83e995dcb361743a7e195650c37e570b768a0a1f0b118fa5be9b3c838326343ec5b376d5ee040ee29dfd868cccf9cfa4591151f519cd6e2ae1453a58aa92f90ee5be11ceb8511ab743f399be0a190eeddfd112336866831c3255ef6520d88b2581ea3767f3df01a38d9b4656f2a89c5df41443291a795da45c8a846015cd041bea0dfbe648348b10ae73ce43d9017182792cd9172eee642c549a530cc1f537f9aa70ca63792ba4a86a713ae09b917136e5bf1506ad7f367d8d2f77f47a2318facd109bba9b1327b5db9e4aeffbdcf414db761eeacc227a15cd72aa52c8ede33bdbab9de9aa1e8f470a388013d07f08777e2131bbd4856ab5c1c38d03ef407197ccf24e8b2a8db69e78f9d6623033c453e2e54fce65fb785467064a146c4bf218068b5e3efdafaf93a98253becaef226cd79468ff1bbe0c9d43877f5cbb5844fd8957f15d3ef208aac11816585cdccf039c36b429d3d7fb634054fd0f09c8abea3746a6b7379142abde26d998ac7e39b94746c60c09f86ddbd7497849d1ef839730672449f35a3c3253666e9fc053ac1c518e44e0b84555be507f7c00fa9e4864b4bf40ac3d93f12001eb780a779e655d0633803268c094ae161a0efd652003d6ac47f9a6c28d866b56233f371627b01e0fe9361dca611a28841968d4e12cb73d49ce08fe25de4a90b2d34607202b20e71f5e1eed38e17d0a2748f548cf61735f4c9cead1cb93b11929d906d65fc60f88e6919b7b5a1014e6d408bce9c8cc832eecf9147708fe451891717d2ed99dee70773feaa97985102abd3dd05c904c28898afe060621db6564887bc4afe158fbe1d819136a1ac1dc9d8674798a93daf5255460b50c34496205834c668db4c764e76ebb6cdaf5fc44b881cc2ae87b4a7cc045143f96b1620abfd0f116e673b335beefdafa1e58d9194e010cb78956044646da5ba853ce981667f2b8e5001c2df437c9d597ccd2be7d2887f5cb7aad0539abb3f9db1c8f5cd4d7d831946ba1c1aa8737c114fec1ac9a82519f57cb48c49b7f62e9eaa89f448df33fb307cd0036c70b490ac340f7d04e14f32bfeebb08a9d5bc7bbef8f231ea09311d4c82cc55c90eb53c6c003cc98a34dd3c4ec2d8b3a655a78e16e908f368733d0a02b36fe963e2d80b5e6f7b2e3aae3013c900c76e4d56e8348bef221f8a642e692c23b12520fb68c793e789eeeceb4efb2097a4d5952d144094cd7be6edc933d257f6230e962d70ba42e1b07ad9eca0ccd60d3d9a6e06b73ccf96a8aa490ed3bd58bf4d79db65355ae145b54be004e464f4dd23fb8b1bf15e13838116083da67186513652608e37c8f847b2bcafb57bcefc7efc8c8182c7d708cce5d14695b4e618e77f8e7be81f27a05e415fd37ac21507a665b2558daee5c0b0859fedfede8c03f181ef5e0ec0da6caa3edf402dd73bcb4026c489a7cca8ab700d3e9f050006c36768a16e8a48e48ed5750b8cdb7ad1fd12d4cc8333d324d6c83905303fa7013fc02553b587544affe38f1a95e0c4c39740d63b6d387fc89b30bd5fd745cb64844b13897ccf5cca135f7d39e03ce8adcda919d86b25b52764b0a0c4f07f88df68868415de13863df84a7e8d355b09cf90e482eb4174fd01f1b371a4dc52f3c89fc3a70c71657aa5d7573ef9acf4d2b0b321c41ff2640515bb43637ba2288ca0bff2e2a3a998ad8294c52f9edfe0a4ee0a3f8ed5b4b5c43319bb9c58dd07ea3237d7bb62cb086e7ea4a81cba2cdeb28794a09c275a704963110b64720bd089e3737ee1a91e348b5e97b63e1724de1fa9f49961d653bbb47b6fa993b035cf59659bcd0306180645162568abf51127845cbe6e37cc3c19b9d69657db4258fa5e8428a73eff6506bff474c2e302ad5559ac8de44c6f0baba5e2e579e7d7f9d9ebf540674432ac11d92bfc9abdc24126888b533f43bd6f293b0bc315915743114a35308a0ee2e710522137918a2b09ddbbc7a2313a2a6b85a1ad26f14dd70072651c8300ddf6de29704b716ce1bc431c66ccc96731f46359a9f6850976c96dcb5e0ee47446f50b6b3ba90d45224066e123ad3854d877c0cdd9325000ac0d6813c30cd43d3e150335601724ca3666458dc4c04f6562296982353e155d5255c9008c0b46d21a678c8fcb3aa8d6574476e0458eb0a76a6cb50f929ed218cc4654cb4f95fb3afbc2548b74acc312563375a19e55d488599488dfed4dd31b39f29ad61dad343dfca3b45b316a34e7a7bebd2b0f562a9e69848d13fc80a4fa52d0f17bd15d9e1fd39a7dcc86128d14493805d105a745673bddea68ca74ac09d95cc7412d5be2cbd0a247a81dc9e148111e22cdf3375805469226ca3538f960a6ba6aa0eeeb87c784ffb1bfc09180a61be3c7c535fc6d593c3b3f4de21b8c3eccc9021e80fb07dce0aeb3b023bd55f24356f646791ba80e5ca21ac092a069ae0a22cfefc08c23cc7aa69b570bd17cce9de15871d363f167288f99f04761caa67f12c949466493f661d39ee4280c955446ff5a9bb14f2d1ae21cdb91a5868e0c52097cf380f571935b140562922763f1b79c3709b949c57a00b08828ce9e685f6b234b5fe3c62d9feb249ce75e81f5efd556c14d5da24dc0554723fdbe52659969a39f470e82c50c4777c908628436e31177af1125d5f70ff627462247e5bc20c47ef75f369174586d43d42f7eefdd47fefa745badebca2a881ccc018ea411cc8a7a0881422bee8704bb98e6bea9fbec63441fb45d7ccfd436909b57a2b60b788e15bda3ca7663b19bd84d0879deb639f10def9a99d42a4b9a4fd7fecbf6d2e7598678307ba9a5b6f143c27cf1ca41e3c904007bb762cd5df6e63c4cf422c2ba959e53bd8e5664cf5df6a91a4bc8cebc52b22f30060fcbc5ead53d38eabd160c1da4cab8aa95c3640ffd78074aa2cbb05cb8ea90a0c95a4a1b2be1ee94f238000f1faffa069d87039f13f5f84ff368aec5a0b10020232b9fc954a6c22573ef48459e574d48a4845837e1d6ef386738ccedd093d4d5bf3a3f790c875ba7449d03397642feb71100f2c25ab2cadf0b0802544a2095a51b19cdece623b17d420b173a99c081f8e229b6de3c680d6bb39bb98b479517d77cca581b81cf856753a44ebd64cff111fb8ca37ea45d217a3fca44a083e6c35b0fed9f8f7631178d15e88f86c85f1ce68c900afdd1f7e5b8bd4ef3f58c447b77d3befc49180df7a5eb2ae8ae33b4ef573f3a425da8a60cde84d8eeae6d6399b9fbbfa0fa8d448b25c7f79b7554d0b02b0decbc74ae8560f630af596313fb33d442a410061ace0aa7a440d5e31ca8bb2cc495c4f0b672edb011b0c5f16781836df7f4af8329143d5a1a99d7b18ef9f774c4199d635848cedebac82637a03a189c65bf667503737c75b6639ac65ad424ca475285437e6f19830b36549f607ffc387c8b11a34a838159376a6335afaa045bd2bb04e279dd72436331d07dfbd72e2436b27f0df23a266fd15cf56d1a9e93aaac8901cfe49a3219ae36c5c65c75e5c708fb82cac4d6a50726509ec3a7d32d54cf584ae353a5bff759fc677a0b240cf8a0a72817c9d37699ca89c96e0e0d96a7665ac3a7d1febca1a1d79e2cbde8025c271360e2f90048b2d9fd56f45c013e001dad4b7785be69dc01f8a954ef7a84455986fc5c9d5167d91808efdb4476ed79f99563d887cfd4e99809d9e388501dea228cbb3cf3770082dc566455251fd9c2c742963c33500618c6ec99e0bef007408a0462a081237be4c6e5db0258d4be5fc9cf63fd1ace1f4166c053b0fb84fe24917da1255cf40bbb1b45644f6a7699cf802a35a932c374b1d62013e6afca3787627469994c02f622ab877ed5491fc2a89eea60e4e1628da89e3ad600ff6442e4ebf20e47304176b6a1703c094b3cf6d7fbbddd8d8fa5a00f28b4d8f43d88487e9d4531071512f2027198714a8d1cef126775547fc74f2a35840510f325e50361be76557767560055e084f2ecaefa0dd8ca8215301a7a887d2eaddaeb1f5c3dfdbd2cc1ba5f02d4426b98c0f861c5f724405758f442560ea6cd1d953456cc4aac6642ad61c03dbaffc2364d8ec2ef9f483c70355139d1fbd9617ab3c7eedf0b8963c1cfdab769180db43c416a90d9fdf3fd0eb2f81187642b4e2a09d6462d27527fdfda31f7b262501749dcfc6c184983f9923424131d05cc811cacf5c2c87e8e6f135349e68cde0e8997bf1dde248e5124d5dca2681abdbe58d327a8edd585821f03fdd4515728f1336495ba25c9bba56a3f706d60c35cbd0b40d0ac0583a981f9af08510ed8ed0a726e5472f8995af3837fbf1e89587633d2ef944868a153919165778e963710872af12faf96c0919c638e5affa97104471ba6e178d27602f96b9546ebe52190d91be245be08742b96389080676a566d3229e593e4f56a76ae4c58113c6adc1088703b1b92dafe32a5600e14ac1e71df829dfef425911f16a2b91f693599ecabf93065c6c4f5fefca8d4ed095599113529f65d9120d5252f577af95b404979508c343df54e4d239720e7d3a861f1dcabfa69e12d655c8a026c10a4df279b139fd222e561d205ac9b45c1054f8699eca594fb23886e0de565186597766dd5e40f74a423d5708dac254f4172f1089270988fb18715813f13ee4d131b64dd517c7e77f27f804b229f5339ac2f483b14739ac33a9645044d3010bd77ed18fb117f7b11bb51c4ed683b59e28bf25a58f123dfbeb1f0f21f03d9b57d8e61d59b311037a5b757b03ca5c95e0eb73922c6918530c99de4d6733640f2b8d13bebce31d4f5e27aab201101e48cde23a0d7e87b9511949d812e3187ee5ff11bc5858c022ed7b00790eba32f9ef7e134ce5f73a01269ca971b40e62133eca9d596a768686d6390b2c74602f6dc597faec3ed9d9658102d99c9624c1a97d00d63853578afaccc7e30a77fe054ebc23eec45f608f996fd015cd6bd50a111360f0790eff6ffb1ea59d13c8e29480bd96217188f97e53a1f5d9eae0a2badb4fea52f2bb4f8cb04d0afd99e7371a978a7d7ef473f77ea6738ff84af655313a12db24cff692ec7e282245ae9a42338db814593448f7115df3dc3f4e2faa2c2fdbd68f679d6aba01a15031347bb17d8bf8f1fad0ecf365e9dcd32e69803c5c05f4b47adbf8a21af7e9fb327f267df1c914486389a9820edf0a03bde6ef388c255761e402b2f7e1f9c1c3c95bd30c502197ab37f76b52f0d0675f366e919be19329853767bba34a540fb75bcdcc9596a4cda254a660e11bed5af9d8646ac4b7d6d7aa5d7c0005879b6d08058a56c3d3a4d3d401b883153fa7f2f6a6d34dd010f6b9e7b4e457b9ff5a5802d7723abb35f9dca0afc10fd534e7753445b7268d90145b6438b93fc475f44d5d678d79da6c5770f3a9106f3cffbabe4b88cbe7eda9b8a495be4f6717b0fbee6fec78c86031b6d878d47e357b2089de3e6dd19a265552553d1f7da53884ef84d0eebe782791c48a9c68a28d8ea3bb70c922b01dc20b2cd05cfb276e326651398f766f5faaea54a41da597cf6b50f3d5ebc634185b99069126b8d935c6bc42c47f2109de42091ef4ade3d87cc44aeb78709255501e64f34ac2d4b2725cf7777315f8ca9424bc9d61a896a93500faa6cf5a5aee1fb888e17b47a38a667be2ffa3bae46afa88bfd8b5b6e1186d6e41b9a4e490591043372c23f36fb48d80caff74cc349adc92bb25f701738c809ccf74c47afa193795ee67bc58ea7fd85542fa7e70218490fff212163401cfde016df2f42496bae403d5391e53fe200f758bbcdead0fe72c77861889b9632a257229c35bdfe8fa78375b4f5c768b9c60cafbde1f00aff6ca1879f6472f28001f5f13d4d9d6c3a90e04d8df09873550daa8262d39efbe96a79c697fbcc9a7f27c9f6d782d5d5f6d024b291376e9cc40d902f809072e1f0f2c2ab88ce3d074e88461f5971853e7be749943ab6e25e25e8afa5042dd73407f49b50841c7782c54eece62ec2beef1f16caf1ca5989427bd2726ca0fee33e303702e9892e4382e92c3f3a03a6188f39762db81819c7e12b424be8fd964dcdbfbac00139e8c5a6200506f13f484ac34ef3d26e7cadd53cf402117419c1618205bfa5382486094bd55448f2b1aa4dbec2289189b601b1bbf5792b2a641c6f5dd19cf24abc72fc5264cf11f6b44a4929267a02cd1de1b602b9de65a6c06640aa0f76109baa90d66eeb17295b1711365b7d6835a2dd55b7fe868c59453613240643c847a5b48d27897a58dda63e579c1bba58350550e147b190f0a2c9a5ce719d627ce3302028b4b6801bbfa8cd74874ffba35817c0eca034d19210950796807125fe6065dcd47d7c870ed2db5c00cff235e4154e2d89ec2a09a87551f9b7ca25d519b5603c0c33d2cf72878199ffab567fc5e093529b89d1163587f3564ba8291d2d96cf9762e7f568e786ea90849f6312c1a10f45d61600cd45c48e6870a7d76c913f9c4497374fc04401cbd11f7710740148234fe8f041f24d0278fcfd48846e6aa49f05016fc332dc5d46b4a26574fed5c0751cebb9f7ab4cdbc1ee011d82d6ef95c52c9df8eedac3ab5cf30805f23d88d4f707601f8e6c606b58f2fe234e948d6756d430a5c4ec76a33874886c8fb484059b47a9bd198a61a1896419288a9e81d0969dec778a53e8233f0f63bd0134e5f29825e7817e7c8ccb7d9acd8f86ac9d3af78c43df3036d7934dd294f2bb12063bee52c547d27a218145befb0ca96cbfaabd39fa245b51c39f4cd4cf8db105f9dc46a7aaa8f7d06fa208120ce1ac49326179618fa2c8596c44e174eb7a141056b1d17689c10dee089c8b0867b8a757ae12251bbd68db5fba2be341275fb6ee379309f5cde9b31242b0b2bac44da74776fac141936bd96e3177161f057c820a8c22cca8cce29b158eb55aed0260253fbee70a6dd281d9fca23e0b0a38d46c76a95e1262f1cafcf0fc37b52e649a1ba1e2c0f97d10bbf4d2b5632cf340bce56736071d5885ec9b4e17910744d3e63e2ca6deb21e43fc21e89c6865d3ad424ef4a14efe8843ff3168c99ee395400dcc8755719d290c567c95a5e7d28ec1190ceee240084d444265cc801cd960f69b368359bbf06b8a4ec23b47c7bf9d4b16c701a1c4fb9e81abb75bf49d450b566ce03de939fc6f5c51291380086f8c995cdd4fa15a325601c4846a69f15c77f55c900270bc9ea5f406480cb0e3e89bc869fe8b7cec4fbef7e76283d50c25ab1b4d34d093a7df062990a925a9c44aa2661abd7d381a4d6cdb64821ef624dd51b72e99af914bca2f80c25b82ac6945df7c7582e6d0ce2cd073e35f1fc120a68ba210410db64592a9aa319b30f2b818c495750e1cea0610e27d52be31e52e501a3bd51b501bc51c2ec8592f679b6e55b9aa58d513fd2bebadc83ba76eb45e5676f130193e9a666b8c8132c9f5141681fbab324b555c5c890d488ac2dd00feead0a20fbd8a46391438e3193edc6fb89161cd864fca98f4f39a2893c933dcd13bc8c5d5a548d24862e8161c0fad7f33aca8c86791d620815fe3f0daddb5defd933d0c10097a7a98e67625420b6c0db7c3e17ab07ea64e6f0f53fdc670799e06a2e3a871d6be363a2639e35339361311e0f528cc433eacea4f79bf217108c7b1d657840253ffdea18bdd1f93cdee63e7a9b8dbcb4ee06162b253e09ea0641f2771bd9823dd210905e9ea495f43194bb471cdeb690e8890b03b50835d53dde1b572dd123ccc8507bb57a45e46c0efb8fb3d5596bddf9782d86dd911636eae2cf64b5829cf8893faf789be3fa22859accf688f5b5da6c29cacc96d477e23b63cc934f685b6e42e1655c9a9b94d6d78402de22b8d9776e3915391aa258e57467d770d65480ba2f6a94b0337965a8c659c42b4e90b14da4697d0c0a6d74774c94c52d8ecb694eec747bdaa6c3a6d60739db18c6446090eebba72e62ab88b0e8b88e728ba8cb133d8524eda89a2bff1c8414da3edfa6f83788331c8a7e5a8af2dd3682d4752190a3c689949abdad8350111373e7fb46151f54a10f79d91940e37efb05f9f157bddcfacf018b65a38ab614807c34a2786af4a1d48c4d1c1abd31815715f9d1b103992207fc664f12c82fd923c57d8e7cfb9f4af55182318d055c704865cf484206d60e34cf7fe9b6ce60b1772c5c7cdacb6695227d80da18ec1f98a434b1aaf9c6b6d082f5663aed2bf267e559dca6b93d3ce34273846fc677f529690482df0a8f782b8ad7269f344f5f2b4d320a7ce2d2fa02284f8db634dc930c3e2b9a629245364acf35d41e9a14c88efde4e742ef1ea4b43d0caf2e70d4a617278823e6403934524debbd933e7676e441a48f630dc8bcccd55d9032d6bf3dea97d1669c39fb865b0e619eeb3f5461e517000f5aee3ef2abdb87d3a76b88e140eb4644a9fbddbdc9e20972cdfacf00bffa3a1ca5f84122c2ebc54067cdaa23967eaeb7bbbfe44e5843382b834fae1f62a066688595e4ee67c7ff9858672355abf7893ebeb4bcf88a62b2237c6e6cec9aebe3f28bfc310ced3a590e88d4bd0f53289206deb9addbf6f3c02115ce4980dadfc112683ae250c2d438fd9c0f2a090dbf122a0072828db798bdb868dcd47384dd3f5eeebc0307a5b268683cd51f312e8f02b5a7746b11a97ac43287d9b9765f03c720503cfe6e0117660a4c00d67895224c4d42b032000a10d7a743054758a8f54941fd5eaf72498b678d1579b3de4e5518f90f1e3d32517d09d7f5da9d180215e66218e9dd64036819cf12638ce82712a6cc79a9ddb36e86814b797d72c2bc58b18ba439e99965f745b4fb7de2878e3186e3e7b835c746b0935f6c67e92e3770bd8d5eb4f66d8175ceb7850e418c55e574db891639aa77fc62bc45dcb734681ede8484d4d4109a9adb8c3d00", 0x2000, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={0x20, 0x0, 0xfffffffffffffffc, {0x0, 0xe}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x24c01, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r10, 0x0, 0x0) dup3(r10, r8, 0x80000) 1m12.395980088s ago: executing program 0 (id=1679): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048", 0x4d}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3", 0xa3}], 0x2}], 0x1, 0x40800) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) openat$kvm(0x0, 0x0, 0x800, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x2}, 0xe) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)={0x180, r8, 0xa, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x2b, 0x44}}}}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x78, 0xbe, "436c9514d521de14b37cacf7df3f2f9c4129ad27740b4e478b42300088d8358a98f2b40e67d763822cd4044a5d9a95078dd26a2175b03ab773e00df507e153db310bc7f11504c74398f618a4c9468a82af75b9666f995577ff07369ddae9130a47a6dd47675bbcab4612c28579d40bc1f158a411"}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x5}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x5}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xa6, 0xac, "07d49de042ac3abe00a6bcb86982d0d08da9b74761b2e9969bf8d6e71c0eb5a14c489469f715ed293fb0368097ee1a44ecef397a62cebd5ca50c6a8ea8b3ae419ee846a81d234979aa34b8840d6ad3f641d19072bc081f8153c111f46cf1e6e23bd7f856181c6740d7f0948958b4537e8f7a5abb0b4d5cb5b0c99c3dbfb4aed7f725efab81e7b50c139c661daeb8c937067e6e69c3c3aa9a5ecb5c9adfb22aa6937c"}, @NL80211_ATTR_MAC={0xa}]}, 0x180}, 0x1, 0x0, 0x0, 0x4004800}, 0x1) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') lseek(r10, 0x1, 0x1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000480)={0x0, 0xff7f, 0x4, [0x1, 0x8, 0x8, 0x4e9f]}, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x24, r5, 0x1, 0x70bd2c, 0x1, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x80) 0s ago: executing program 32 (id=1679): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048", 0x4d}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3", 0xa3}], 0x2}], 0x1, 0x40800) recvmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) openat$kvm(0x0, 0x0, 0x800, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r7, &(0x7f0000000000)={0x1f, 0x1, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x0, 0x2}, 0xe) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000600)={0x180, r8, 0xa, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0x2b, 0x44}}}}, [@NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x78, 0xbe, "436c9514d521de14b37cacf7df3f2f9c4129ad27740b4e478b42300088d8358a98f2b40e67d763822cd4044a5d9a95078dd26a2175b03ab773e00df507e153db310bc7f11504c74398f618a4c9468a82af75b9666f995577ff07369ddae9130a47a6dd47675bbcab4612c28579d40bc1f158a411"}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x5}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x5}, @NL80211_ATTR_STA_EXT_CAPABILITY={0xa6, 0xac, "07d49de042ac3abe00a6bcb86982d0d08da9b74761b2e9969bf8d6e71c0eb5a14c489469f715ed293fb0368097ee1a44ecef397a62cebd5ca50c6a8ea8b3ae419ee846a81d234979aa34b8840d6ad3f641d19072bc081f8153c111f46cf1e6e23bd7f856181c6740d7f0948958b4537e8f7a5abb0b4d5cb5b0c99c3dbfb4aed7f725efab81e7b50c139c661daeb8c937067e6e69c3c3aa9a5ecb5c9adfb22aa6937c"}, @NL80211_ATTR_MAC={0xa}]}, 0x180}, 0x1, 0x0, 0x0, 0x4004800}, 0x1) r10 = syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') lseek(r10, 0x1, 0x1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r10, 0x84, 0x77, &(0x7f0000000480)={0x0, 0xff7f, 0x4, [0x1, 0x8, 0x8, 0x4e9f]}, 0x10) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)={0x24, r5, 0x1, 0x70bd2c, 0x1, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000810}, 0x80) kernel console output (not intermixed with test programs): ad } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.061439][ T30] audit: type=1400 audit(2000000034.939:151648): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 226.110564][ T5477] audit: audit_lost=8359 audit_rate_limit=0 audit_backlog_limit=64 [ 226.110585][ T5477] audit: backlog limit exceeded [ 226.227162][ T9174] netlink: 'syz.2.1237': attribute type 4 has an invalid length. [ 227.779463][ T9214] netlink: 'syz.4.1250': attribute type 1 has an invalid length. [ 227.895742][ T9216] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1250'. [ 228.042548][ T9218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9218 comm=syz.4.1250 [ 228.637495][ T9215] gretap1: entered promiscuous mode [ 228.661712][ T9215] bond1: (slave gretap1): making interface the new active one [ 228.670706][ T9215] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 228.802371][ T9226] kernel read not supported for file / (pid: 9226 comm: syz.4.1253) [ 228.821435][ T9223] syzkaller0: entered promiscuous mode [ 228.834198][ T9223] syzkaller0: entered allmulticast mode [ 231.041416][ T30] kauditd_printk_skb: 13303 callbacks suppressed [ 231.041433][ T30] audit: type=1400 audit(2000000039.949:163101): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.097815][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 231.109189][ T5477] audit: audit_lost=8977 audit_rate_limit=0 audit_backlog_limit=64 [ 231.122503][ T30] audit: type=1400 audit(2000000039.949:163102): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.140234][ T5477] audit: backlog limit exceeded [ 231.144194][ T30] audit: type=1400 audit(2000000039.949:163103): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.229993][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 231.255401][ T5477] audit: audit_lost=8978 audit_rate_limit=0 audit_backlog_limit=64 [ 231.273661][ T30] audit: type=1400 audit(2000000039.949:163104): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 231.274719][ T5477] audit: backlog limit exceeded [ 232.861707][ T9261] syzkaller0: entered promiscuous mode [ 232.867246][ T9261] syzkaller0: entered allmulticast mode [ 235.099720][ T9301] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 236.072157][ T30] kauditd_printk_skb: 9263 callbacks suppressed [ 236.072173][ T30] audit: type=1400 audit(2000000002.719:171333): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 236.167686][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 236.180244][ T30] audit: type=1400 audit(2000000002.759:171335): avc: denied { read } for pid=9314 comm="syz.3.1281" dev="nsfs" ino=4026533327 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 236.202574][ T5808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 236.203535][ T5477] audit: audit_lost=9324 audit_rate_limit=0 audit_backlog_limit=64 [ 236.218440][ T5477] audit: backlog limit exceeded [ 236.226470][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 236.233407][ T30] audit: type=1400 audit(2000000002.759:171336): avc: denied { read } for pid=9314 comm="syz.3.1281" name="cec3" dev="devtmpfs" ino=963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 236.256970][ T5477] audit: audit_lost=9325 audit_rate_limit=0 audit_backlog_limit=64 [ 236.264938][ T5477] audit: backlog limit exceeded [ 237.061567][ T9329] FAULT_INJECTION: forcing a failure. [ 237.061567][ T9329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 237.120258][ T9329] CPU: 1 UID: 0 PID: 9329 Comm: syz.3.1285 Not tainted syzkaller #0 PREEMPT(full) [ 237.120286][ T9329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 237.120298][ T9329] Call Trace: [ 237.120304][ T9329] [ 237.120312][ T9329] dump_stack_lvl+0x16c/0x1f0 [ 237.120345][ T9329] should_fail_ex+0x512/0x640 [ 237.120374][ T9329] _copy_to_user+0x32/0xd0 [ 237.120401][ T9329] simple_read_from_buffer+0xcb/0x170 [ 237.120429][ T9329] proc_fail_nth_read+0x197/0x240 [ 237.120459][ T9329] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 237.120489][ T9329] ? rw_verify_area+0xcf/0x6c0 [ 237.120510][ T9329] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 237.120538][ T9329] vfs_read+0x1e4/0xcf0 [ 237.120565][ T9329] ? __pfx___mutex_lock+0x10/0x10 [ 237.120589][ T9329] ? __pfx_vfs_read+0x10/0x10 [ 237.120627][ T9329] ? __fget_files+0x20e/0x3c0 [ 237.120659][ T9329] ksys_read+0x12a/0x250 [ 237.120683][ T9329] ? __pfx_ksys_read+0x10/0x10 [ 237.120715][ T9329] do_syscall_64+0xcd/0xfa0 [ 237.120741][ T9329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.120761][ T9329] RIP: 0033:0x7f36e7b8d9dc [ 237.120778][ T9329] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 237.120797][ T9329] RSP: 002b:00007f36e8a16030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 237.120816][ T9329] RAX: ffffffffffffffda RBX: 00007f36e7de5fa0 RCX: 00007f36e7b8d9dc [ 237.120829][ T9329] RDX: 000000000000000f RSI: 00007f36e8a160a0 RDI: 0000000000000004 [ 237.120841][ T9329] RBP: 00007f36e8a16090 R08: 0000000000000000 R09: 0000000000000000 [ 237.120852][ T9329] R10: 0000200000003540 R11: 0000000000000246 R12: 0000000000000001 [ 237.120864][ T9329] R13: 00007f36e7de6038 R14: 00007f36e7de5fa0 R15: 00007fffd915fde8 [ 237.120894][ T9329] [ 237.435944][ T9335] FAULT_INJECTION: forcing a failure. [ 237.435944][ T9335] name failslab, interval 1, probability 0, space 0, times 0 [ 237.471881][ T9335] CPU: 1 UID: 0 PID: 9335 Comm: syz.1.1288 Not tainted syzkaller #0 PREEMPT(full) [ 237.471908][ T9335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 237.471919][ T9335] Call Trace: [ 237.471925][ T9335] [ 237.471933][ T9335] dump_stack_lvl+0x16c/0x1f0 [ 237.471962][ T9335] should_fail_ex+0x512/0x640 [ 237.471986][ T9335] ? kmem_cache_alloc_lru_noprof+0x66/0x6e0 [ 237.472013][ T9335] should_failslab+0xc2/0x120 [ 237.472041][ T9335] kmem_cache_alloc_lru_noprof+0x79/0x6e0 [ 237.472065][ T9335] ? __d_lookup+0x25c/0x4a0 [ 237.472085][ T9335] ? __d_alloc+0x32/0xae0 [ 237.472117][ T9335] ? __d_alloc+0x32/0xae0 [ 237.472142][ T9335] __d_alloc+0x32/0xae0 [ 237.472173][ T9335] d_alloc+0x4a/0x1e0 [ 237.472202][ T9335] lookup_one_qstr_excl+0x175/0x250 [ 237.472222][ T9335] ? mnt_want_write+0x161/0x450 [ 237.472246][ T9335] do_rmdir+0x245/0x3c0 [ 237.472272][ T9335] ? __pfx_do_rmdir+0x10/0x10 [ 237.472307][ T9335] ? getname_flags.part.0+0x1c5/0x550 [ 237.472331][ T9335] __x64_sys_rmdir+0xc5/0x110 [ 237.472357][ T9335] do_syscall_64+0xcd/0xfa0 [ 237.472383][ T9335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.472403][ T9335] RIP: 0033:0x7f5cddf8efc9 [ 237.472419][ T9335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.472438][ T9335] RSP: 002b:00007f5cded98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 237.472457][ T9335] RAX: ffffffffffffffda RBX: 00007f5cde1e5fa0 RCX: 00007f5cddf8efc9 [ 237.472469][ T9335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 237.472481][ T9335] RBP: 00007f5cded98090 R08: 0000000000000000 R09: 0000000000000000 [ 237.472493][ T9335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.472505][ T9335] R13: 00007f5cde1e6038 R14: 00007f5cde1e5fa0 R15: 00007fff56d9f778 [ 237.472535][ T9335] [ 237.817770][ T9339] syzkaller0: entered promiscuous mode [ 237.823365][ T9339] syzkaller0: entered allmulticast mode [ 238.032524][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.054146][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.217860][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.225810][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.234224][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.243499][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.251518][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.276081][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.319816][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 238.408604][ T9348] netlink: 'syz.1.1293': attribute type 3 has an invalid length. [ 239.839303][ T9376] FAULT_INJECTION: forcing a failure. [ 239.839303][ T9376] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.872662][ T9376] CPU: 1 UID: 0 PID: 9376 Comm: syz.0.1303 Not tainted syzkaller #0 PREEMPT(full) [ 239.872687][ T9376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 239.872698][ T9376] Call Trace: [ 239.872704][ T9376] [ 239.872711][ T9376] dump_stack_lvl+0x16c/0x1f0 [ 239.872740][ T9376] should_fail_ex+0x512/0x640 [ 239.872769][ T9376] _copy_to_user+0x32/0xd0 [ 239.872797][ T9376] simple_read_from_buffer+0xcb/0x170 [ 239.872823][ T9376] proc_fail_nth_read+0x197/0x240 [ 239.872854][ T9376] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 239.872884][ T9376] ? rw_verify_area+0xcf/0x6c0 [ 239.872905][ T9376] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 239.872931][ T9376] vfs_read+0x1e4/0xcf0 [ 239.872956][ T9376] ? __pfx___mutex_lock+0x10/0x10 [ 239.872979][ T9376] ? __pfx_vfs_read+0x10/0x10 [ 239.873011][ T9376] ? __fget_files+0x20e/0x3c0 [ 239.873046][ T9376] ksys_read+0x12a/0x250 [ 239.873068][ T9376] ? __pfx_ksys_read+0x10/0x10 [ 239.873100][ T9376] do_syscall_64+0xcd/0xfa0 [ 239.873127][ T9376] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 239.873147][ T9376] RIP: 0033:0x7f0aed78d9dc [ 239.873163][ T9376] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 239.873181][ T9376] RSP: 002b:00007f0aee6ed030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 239.873200][ T9376] RAX: ffffffffffffffda RBX: 00007f0aed9e5fa0 RCX: 00007f0aed78d9dc [ 239.873213][ T9376] RDX: 000000000000000f RSI: 00007f0aee6ed0a0 RDI: 0000000000000006 [ 239.873226][ T9376] RBP: 00007f0aee6ed090 R08: 0000000000000000 R09: 0000000000000000 [ 239.873238][ T9376] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 239.873250][ T9376] R13: 00007f0aed9e6038 R14: 00007f0aed9e5fa0 R15: 00007ffc0e630ab8 [ 239.873280][ T9376] [ 240.313085][ T9384] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 240.972130][ T9392] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=9392 comm=syz.1.1309 [ 241.096832][ T30] kauditd_printk_skb: 10670 callbacks suppressed [ 241.097834][ T30] audit: type=1400 audit(2000000007.699:178911): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.186714][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.200823][ T30] audit: type=1400 audit(2000000007.699:178912): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.233075][ T5477] audit: audit_lost=10358 audit_rate_limit=0 audit_backlog_limit=64 [ 241.268268][ T5477] audit: backlog limit exceeded [ 241.279836][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 241.287032][ T30] audit: type=1400 audit(2000000007.699:178913): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.292524][ T5477] audit: audit_lost=10359 audit_rate_limit=0 audit_backlog_limit=64 [ 241.324369][ T30] audit: type=1400 audit(2000000007.699:178914): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 241.331058][ T5477] audit: backlog limit exceeded [ 242.668286][ T9413] Option ' ' to dns_resolver key: bad/missing value [ 243.024222][ T9427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9427 comm=syz.1.1321 [ 243.427403][ T9435] syzkaller0: entered promiscuous mode [ 243.442324][ T9435] syzkaller0: entered allmulticast mode [ 245.508900][ T9467] mkiss: ax0: crc mode is auto. [ 245.702451][ T9475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9475 comm=syz.4.1334 [ 246.100754][ T30] kauditd_printk_skb: 10326 callbacks suppressed [ 246.100770][ T30] audit: type=1400 audit(2000000012.749:189214): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.145791][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 246.149858][ T9484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 246.160074][ T30] audit: type=1400 audit(2000000012.749:189215): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 246.190376][ T9484] audit: audit_lost=10369 audit_rate_limit=0 audit_backlog_limit=64 [ 246.214268][ T9484] audit: backlog limit exceeded [ 246.219254][ T5477] audit: audit_lost=10370 audit_rate_limit=0 audit_backlog_limit=64 [ 246.236323][ T5477] audit: backlog limit exceeded [ 246.247021][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 246.254007][ T9484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.128214][ T9493] FAULT_INJECTION: forcing a failure. [ 247.128214][ T9493] name failslab, interval 1, probability 0, space 0, times 0 [ 247.152826][ T9493] CPU: 1 UID: 0 PID: 9493 Comm: syz.0.1340 Not tainted syzkaller #0 PREEMPT(full) [ 247.152859][ T9493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 247.152871][ T9493] Call Trace: [ 247.152877][ T9493] [ 247.152885][ T9493] dump_stack_lvl+0x16c/0x1f0 [ 247.152913][ T9493] should_fail_ex+0x512/0x640 [ 247.152937][ T9493] ? kmem_cache_alloc_noprof+0x62/0x6e0 [ 247.152963][ T9493] should_failslab+0xc2/0x120 [ 247.152991][ T9493] kmem_cache_alloc_noprof+0x75/0x6e0 [ 247.153012][ T9493] ? alloc_empty_file+0x55/0x1e0 [ 247.153036][ T9493] ? alloc_empty_file+0x55/0x1e0 [ 247.153052][ T9493] alloc_empty_file+0x55/0x1e0 [ 247.153073][ T9493] path_openat+0xda/0x2cb0 [ 247.153107][ T9493] ? __pfx_path_openat+0x10/0x10 [ 247.153134][ T9493] ? __lock_acquire+0xb8a/0x1c90 [ 247.153162][ T9493] do_filp_open+0x20b/0x470 [ 247.153188][ T9493] ? __pfx_do_filp_open+0x10/0x10 [ 247.153231][ T9493] ? alloc_fd+0x471/0x7d0 [ 247.153262][ T9493] do_sys_openat2+0x11b/0x1d0 [ 247.153281][ T9493] ? __pfx_do_sys_openat2+0x10/0x10 [ 247.153302][ T9493] ? __fget_files+0x20e/0x3c0 [ 247.153331][ T9493] __x64_sys_openat+0x174/0x210 [ 247.153348][ T9493] ? __pfx___x64_sys_openat+0x10/0x10 [ 247.153365][ T9493] ? ksys_write+0x1ac/0x250 [ 247.153397][ T9493] do_syscall_64+0xcd/0xfa0 [ 247.153421][ T9493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 247.153441][ T9493] RIP: 0033:0x7f0aed78efc9 [ 247.153456][ T9493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.153472][ T9493] RSP: 002b:00007f0aee6ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 247.153490][ T9493] RAX: ffffffffffffffda RBX: 00007f0aed9e5fa0 RCX: 00007f0aed78efc9 [ 247.153501][ T9493] RDX: 0000000000000042 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 247.153513][ T9493] RBP: 00007f0aee6ed090 R08: 0000000000000000 R09: 0000000000000000 [ 247.153523][ T9493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.153534][ T9493] R13: 00007f0aed9e6038 R14: 00007f0aed9e5fa0 R15: 00007ffc0e630ab8 [ 247.153559][ T9493] [ 247.515665][ T9495] syzkaller0: entered promiscuous mode [ 247.528067][ T9495] syzkaller0: entered allmulticast mode [ 248.176536][ T9505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9505 comm=syz.2.1345 [ 249.826293][ T9524] syzkaller0: entered promiscuous mode [ 249.831897][ T9524] syzkaller0: entered allmulticast mode [ 251.179151][ T30] kauditd_printk_skb: 11588 callbacks suppressed [ 251.179171][ T30] audit: type=1400 audit(2000000017.819:200321): avc: denied { execmem } for pid=9554 comm="syz.4.1359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 251.204955][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.223557][ T5477] audit: audit_lost=10533 audit_rate_limit=0 audit_backlog_limit=64 [ 251.242202][ T5477] audit: backlog limit exceeded [ 251.248724][ T30] audit: type=1400 audit(2000000017.669:200320): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 251.253602][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.285276][ T5477] audit: audit_lost=10534 audit_rate_limit=0 audit_backlog_limit=64 [ 251.299852][ T9556] audit: audit_backlog=65 > audit_backlog_limit=64 [ 251.306617][ T5477] audit: backlog limit exceeded [ 251.317929][ T9556] audit: audit_lost=10535 audit_rate_limit=0 audit_backlog_limit=64 [ 252.895793][ T9569] syzkaller0: entered promiscuous mode [ 252.902126][ T9569] syzkaller0: entered allmulticast mode [ 255.149066][ T9595] IPv6: : Disabled Multicast RS [ 255.482510][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.488894][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.232370][ T30] kauditd_printk_skb: 10875 callbacks suppressed [ 256.232383][ T30] audit: type=1400 audit(2000000003.859:210650): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232413][ T30] audit: type=1400 audit(2000000003.949:210651): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232436][ T30] audit: type=1400 audit(2000000003.949:210652): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232459][ T30] audit: type=1400 audit(2000000003.949:210653): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232483][ T30] audit: type=1400 audit(2000000003.949:210654): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232523][ T30] audit: type=1400 audit(2000000003.949:210655): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232547][ T30] audit: type=1400 audit(2000000003.949:210656): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232570][ T30] audit: type=1400 audit(2000000003.949:210657): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232593][ T30] audit: type=1400 audit(2000000003.949:210658): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.232615][ T30] audit: type=1400 audit(2000000003.949:210659): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 256.821784][ C1] vkms_vblank_simulate: vblank timer overrun [ 256.924075][ C1] vkms_vblank_simulate: vblank timer overrun [ 257.664636][ T9651] sp0: Synchronizing with TNC [ 259.661809][ T9675] FAULT_INJECTION: forcing a failure. [ 259.661809][ T9675] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.710297][ T9675] CPU: 0 UID: 0 PID: 9675 Comm: syz.4.1400 Not tainted syzkaller #0 PREEMPT(full) [ 259.710323][ T9675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 259.710334][ T9675] Call Trace: [ 259.710340][ T9675] [ 259.710347][ T9675] dump_stack_lvl+0x16c/0x1f0 [ 259.710376][ T9675] should_fail_ex+0x512/0x640 [ 259.710403][ T9675] _copy_from_iter+0x29f/0x1720 [ 259.710431][ T9675] ? __alloc_skb+0x200/0x380 [ 259.710452][ T9675] ? __pfx__copy_from_iter+0x10/0x10 [ 259.710476][ T9675] ? netlink_autobind.isra.0+0x158/0x370 [ 259.710512][ T9675] netlink_sendmsg+0x820/0xdd0 [ 259.710543][ T9675] ? __pfx_netlink_sendmsg+0x10/0x10 [ 259.710578][ T9675] __sys_sendto+0x4a3/0x520 [ 259.710600][ T9675] ? __pfx___sys_sendto+0x10/0x10 [ 259.710644][ T9675] ? ksys_write+0x1ac/0x250 [ 259.710669][ T9675] ? __pfx_ksys_write+0x10/0x10 [ 259.710694][ T9675] __x64_sys_sendto+0xe0/0x1c0 [ 259.710714][ T9675] ? do_syscall_64+0x91/0xfa0 [ 259.710737][ T9675] ? lockdep_hardirqs_on+0x7c/0x110 [ 259.710759][ T9675] do_syscall_64+0xcd/0xfa0 [ 259.710784][ T9675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.710805][ T9675] RIP: 0033:0x7fd12418efc9 [ 259.710821][ T9675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.710839][ T9675] RSP: 002b:00007fd12507c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 259.710861][ T9675] RAX: ffffffffffffffda RBX: 00007fd1243e5fa0 RCX: 00007fd12418efc9 [ 259.710874][ T9675] RDX: 000000000000004c RSI: 0000200000000080 RDI: 0000000000000004 [ 259.710886][ T9675] RBP: 00007fd12507c090 R08: 0000000000000000 R09: 0000000000000000 [ 259.710898][ T9675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.710916][ T9675] R13: 00007fd1243e6038 R14: 00007fd1243e5fa0 R15: 00007ffcfe1628c8 [ 259.710939][ T9675] [ 260.177542][ T9683] FAULT_INJECTION: forcing a failure. [ 260.177542][ T9683] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 260.192282][ T9683] CPU: 0 UID: 0 PID: 9683 Comm: syz.0.1404 Not tainted syzkaller #0 PREEMPT(full) [ 260.192308][ T9683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 260.192319][ T9683] Call Trace: [ 260.192326][ T9683] [ 260.192333][ T9683] dump_stack_lvl+0x16c/0x1f0 [ 260.192362][ T9683] should_fail_ex+0x512/0x640 [ 260.192391][ T9683] should_fail_alloc_page+0xe7/0x130 [ 260.192422][ T9683] prepare_alloc_pages+0x3c2/0x610 [ 260.192453][ T9683] __alloc_frozen_pages_noprof+0x18b/0x2470 [ 260.192481][ T9683] ? __lock_acquire+0x622/0x1c90 [ 260.192517][ T9683] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 260.192544][ T9683] ? find_held_lock+0x2b/0x80 [ 260.192568][ T9683] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 260.192591][ T9683] ? is_bpf_text_address+0x94/0x1a0 [ 260.192621][ T9683] ? kernel_text_address+0x8d/0x100 [ 260.192648][ T9683] ? __kernel_text_address+0xd/0x40 [ 260.192674][ T9683] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 260.192707][ T9683] ? policy_nodemask+0xea/0x4e0 [ 260.192738][ T9683] alloc_pages_mpol+0x1fb/0x550 [ 260.192767][ T9683] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 260.192804][ T9683] folio_alloc_mpol_noprof+0x36/0x2f0 [ 260.192827][ T9683] vma_alloc_folio_noprof+0xed/0x1e0 [ 260.192847][ T9683] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 260.192882][ T9683] do_pte_missing+0x2202/0x3ba0 [ 260.192903][ T9683] ? find_held_lock+0x2b/0x80 [ 260.192931][ T9683] __handle_mm_fault+0x1556/0x2aa0 [ 260.192956][ T9683] ? mt_find+0x3e2/0xa20 [ 260.192982][ T9683] ? __pfx___handle_mm_fault+0x10/0x10 [ 260.193001][ T9683] ? __pfx_mt_find+0x10/0x10 [ 260.193043][ T9683] ? find_vma+0xbf/0x140 [ 260.193067][ T9683] ? __pfx_find_vma+0x10/0x10 [ 260.193095][ T9683] handle_mm_fault+0x589/0xd10 [ 260.193118][ T9683] ? __pkru_allows_pkey+0x11/0xb0 [ 260.193145][ T9683] do_user_addr_fault+0x7a6/0x1370 [ 260.193175][ T9683] ? rcu_is_watching+0x12/0xc0 [ 260.193198][ T9683] exc_page_fault+0x64/0xc0 [ 260.193222][ T9683] asm_exc_page_fault+0x26/0x30 [ 260.193240][ T9683] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 260.193278][ T9683] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 260.193296][ T9683] RSP: 0018:ffffc9001b7af9a8 EFLAGS: 00050212 [ 260.193313][ T9683] RAX: 74207265646e6962 RBX: 0000000000000015 RCX: 0000000000000015 [ 260.193326][ T9683] RDX: ffffed1006a14403 RSI: ffff8880350a2000 RDI: 00002000000034c0 [ 260.193339][ T9683] RBP: 0000000000000015 R08: 0000000000000000 R09: ffffed1006a14402 [ 260.193351][ T9683] R10: ffff8880350a2014 R11: 0000000000000001 R12: 0000000000000000 [ 260.193363][ T9683] R13: ffffc9001b7afbc0 R14: ffff8880350a2000 R15: 00002000000034c0 [ 260.193394][ T9683] _copy_to_iter+0x4eb/0x1710 [ 260.193429][ T9683] ? __pfx__copy_to_iter+0x10/0x10 [ 260.193454][ T9683] ? __asan_memcpy+0x3c/0x60 [ 260.193489][ T9683] seq_read_iter+0xd02/0x12d0 [ 260.193527][ T9683] seq_read+0x3a3/0x570 [ 260.193550][ T9683] ? __pfx_seq_read+0x10/0x10 [ 260.193597][ T9683] full_proxy_read+0x131/0x1a0 [ 260.193619][ T9683] ? __pfx_full_proxy_read+0x10/0x10 [ 260.193640][ T9683] vfs_read+0x1e4/0xcf0 [ 260.193668][ T9683] ? __pfx___mutex_lock+0x10/0x10 [ 260.193694][ T9683] ? __pfx_vfs_read+0x10/0x10 [ 260.193727][ T9683] ? __fget_files+0x20e/0x3c0 [ 260.193762][ T9683] ksys_read+0x12a/0x250 [ 260.193785][ T9683] ? __pfx_ksys_read+0x10/0x10 [ 260.193818][ T9683] do_syscall_64+0xcd/0xfa0 [ 260.193845][ T9683] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 260.193864][ T9683] RIP: 0033:0x7f0aed78efc9 [ 260.193885][ T9683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.193903][ T9683] RSP: 002b:00007f0aee6ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 260.193921][ T9683] RAX: ffffffffffffffda RBX: 00007f0aed9e5fa0 RCX: 00007f0aed78efc9 [ 260.193934][ T9683] RDX: 0000000000002020 RSI: 00002000000034c0 RDI: 0000000000000003 [ 260.193946][ T9683] RBP: 00007f0aee6ed090 R08: 0000000000000000 R09: 0000000000000000 [ 260.193958][ T9683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.193970][ T9683] R13: 00007f0aed9e6038 R14: 00007f0aed9e5fa0 R15: 00007ffc0e630ab8 [ 260.194001][ T9683] [ 260.624925][ T9679] syzkaller0: entered promiscuous mode [ 260.630499][ T9679] syzkaller0: entered allmulticast mode [ 261.244126][ T30] kauditd_printk_skb: 8501 callbacks suppressed [ 261.244143][ T30] audit: type=1400 audit(2000000008.949:216674): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.330477][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 261.349487][ T30] audit: type=1400 audit(2000000008.989:216675): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.370699][ T9704] audit: audit_backlog=65 > audit_backlog_limit=64 [ 261.370718][ T9704] audit: audit_lost=11547 audit_rate_limit=0 audit_backlog_limit=64 [ 261.370731][ T9704] audit: backlog limit exceeded [ 261.380296][ T5477] audit: audit_lost=11548 audit_rate_limit=0 audit_backlog_limit=64 [ 261.400105][ T5477] audit: backlog limit exceeded [ 261.405247][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 261.419661][ T9706] audit: audit_backlog=65 > audit_backlog_limit=64 [ 263.868548][ T9731] syzkaller0: entered promiscuous mode [ 263.882744][ T9731] syzkaller0: entered allmulticast mode [ 263.996198][ T9747] Option 'Ó¾,0A–˜' to dns_resolver key: bad/missing value [ 266.251391][ T30] kauditd_printk_skb: 12942 callbacks suppressed [ 266.251403][ T30] audit: type=1400 audit(2000000013.959:228468): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.279553][ T30] audit: type=1400 audit(2000000013.959:228469): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.305937][ T30] audit: type=1400 audit(2000000013.959:228470): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.332573][ T30] audit: type=1400 audit(2000000013.959:228471): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.358787][ T30] audit: type=1400 audit(2000000013.989:228472): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.401203][ T30] audit: type=1400 audit(2000000013.989:228473): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.402252][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 266.434756][ T5477] audit: audit_lost=11933 audit_rate_limit=0 audit_backlog_limit=64 [ 266.434937][ T30] audit: type=1400 audit(2000000013.989:228474): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 266.444337][ T5477] audit: backlog limit exceeded [ 266.943544][ T9765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9765 comm=syz.2.1432 [ 267.036990][ T9768] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 267.043525][ T9768] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 267.056834][ T9768] vhci_hcd vhci_hcd.0: Device attached [ 267.083787][ T9768] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=48 sclass=netlink_tcpdiag_socket pid=9768 comm=syz.2.1433 [ 267.100820][ T9769] vhci_hcd: connection closed [ 267.102586][ T801] vhci_hcd: stop threads [ 267.112378][ T801] vhci_hcd: release socket [ 267.117978][ T801] vhci_hcd: disconnect device [ 267.473750][ T9777] syzkaller0: entered promiscuous mode [ 267.479452][ T9777] syzkaller0: entered allmulticast mode [ 268.750471][ T9799] FAULT_INJECTION: forcing a failure. [ 268.750471][ T9799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.765392][ T9799] CPU: 0 UID: 0 PID: 9799 Comm: syz.2.1442 Not tainted syzkaller #0 PREEMPT(full) [ 268.765420][ T9799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 268.765432][ T9799] Call Trace: [ 268.765439][ T9799] [ 268.765447][ T9799] dump_stack_lvl+0x16c/0x1f0 [ 268.765476][ T9799] should_fail_ex+0x512/0x640 [ 268.765505][ T9799] _copy_from_user+0x2e/0xd0 [ 268.765540][ T9799] kstrtouint_from_user+0xd6/0x1d0 [ 268.765559][ T9799] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 268.765579][ T9799] ? __lock_acquire+0xb8a/0x1c90 [ 268.765616][ T9799] proc_fail_nth_write+0x83/0x220 [ 268.765646][ T9799] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 268.765681][ T9799] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 268.765708][ T9799] vfs_write+0x2a0/0x11d0 [ 268.765738][ T9799] ? __pfx___mutex_lock+0x10/0x10 [ 268.765763][ T9799] ? __pfx_vfs_write+0x10/0x10 [ 268.765796][ T9799] ? __fget_files+0x20e/0x3c0 [ 268.765831][ T9799] ksys_write+0x12a/0x250 [ 268.765854][ T9799] ? __pfx_ksys_write+0x10/0x10 [ 268.765888][ T9799] do_syscall_64+0xcd/0xfa0 [ 268.765914][ T9799] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.765934][ T9799] RIP: 0033:0x7f5ce698da7f [ 268.765951][ T9799] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 268.765970][ T9799] RSP: 002b:00007f5ce7832030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 268.765989][ T9799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5ce698da7f [ 268.766002][ T9799] RDX: 0000000000000001 RSI: 00007f5ce78320a0 RDI: 0000000000000005 [ 268.766014][ T9799] RBP: 00007f5ce7832090 R08: 0000000000000000 R09: 0000000000000000 [ 268.766026][ T9799] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000001 [ 268.766037][ T9799] R13: 00007f5ce6be6218 R14: 00007f5ce6be6180 R15: 00007ffe7d53f828 [ 268.766067][ T9799] [ 269.380087][ T9806] FAULT_INJECTION: forcing a failure. [ 269.380087][ T9806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 269.393672][ T9806] CPU: 1 UID: 0 PID: 9806 Comm: syz.2.1446 Not tainted syzkaller #0 PREEMPT(full) [ 269.393697][ T9806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 269.393709][ T9806] Call Trace: [ 269.393715][ T9806] [ 269.393723][ T9806] dump_stack_lvl+0x16c/0x1f0 [ 269.393751][ T9806] should_fail_ex+0x512/0x640 [ 269.393781][ T9806] _copy_to_user+0x32/0xd0 [ 269.393808][ T9806] simple_read_from_buffer+0xcb/0x170 [ 269.393834][ T9806] proc_fail_nth_read+0x197/0x240 [ 269.393863][ T9806] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 269.393892][ T9806] ? rw_verify_area+0xcf/0x6c0 [ 269.393912][ T9806] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 269.393938][ T9806] vfs_read+0x1e4/0xcf0 [ 269.393966][ T9806] ? __pfx___mutex_lock+0x10/0x10 [ 269.393991][ T9806] ? __pfx_vfs_read+0x10/0x10 [ 269.394023][ T9806] ? __fget_files+0x20e/0x3c0 [ 269.394057][ T9806] ksys_read+0x12a/0x250 [ 269.394080][ T9806] ? __pfx_ksys_read+0x10/0x10 [ 269.394111][ T9806] do_syscall_64+0xcd/0xfa0 [ 269.394137][ T9806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 269.394157][ T9806] RIP: 0033:0x7f5ce698d9dc [ 269.394170][ T9806] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 269.394181][ T9806] RSP: 002b:00007f5ce7874030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 269.394192][ T9806] RAX: ffffffffffffffda RBX: 00007f5ce6be5fa0 RCX: 00007f5ce698d9dc [ 269.394200][ T9806] RDX: 000000000000000f RSI: 00007f5ce78740a0 RDI: 0000000000000003 [ 269.394206][ T9806] RBP: 00007f5ce7874090 R08: 0000000000000000 R09: 0000000000000000 [ 269.394213][ T9806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.394225][ T9806] R13: 00007f5ce6be6038 R14: 00007f5ce6be5fa0 R15: 00007ffe7d53f828 [ 269.394242][ T9806] [ 270.944735][ T9828] FAULT_INJECTION: forcing a failure. [ 270.944735][ T9828] name failslab, interval 1, probability 0, space 0, times 0 [ 270.957577][ T9828] CPU: 1 UID: 0 PID: 9828 Comm: syz.4.1451 Not tainted syzkaller #0 PREEMPT(full) [ 270.957593][ T9828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 270.957600][ T9828] Call Trace: [ 270.957605][ T9828] [ 270.957610][ T9828] dump_stack_lvl+0x16c/0x1f0 [ 270.957628][ T9828] should_fail_ex+0x512/0x640 [ 270.957645][ T9828] should_failslab+0xc2/0x120 [ 270.957662][ T9828] kmem_cache_alloc_node_noprof+0x78/0x770 [ 270.957676][ T9828] ? __alloc_skb+0x2b2/0x380 [ 270.957688][ T9828] ? is_bpf_text_address+0x94/0x1a0 [ 270.957708][ T9828] ? __alloc_skb+0x2b2/0x380 [ 270.957719][ T9828] __alloc_skb+0x2b2/0x380 [ 270.957730][ T9828] ? __pfx___alloc_skb+0x10/0x10 [ 270.957743][ T9828] ? __find_rr_leaf+0x3fc/0xe00 [ 270.957764][ T9828] tcp_v6_send_response+0x2af/0x27a0 [ 270.957780][ T9828] ? fib6_node_lookup+0x12d/0x190 [ 270.957801][ T9828] ? __pfx_tcp_v6_send_response+0x10/0x10 [ 270.957818][ T9828] ? __lock_acquire+0x622/0x1c90 [ 270.957838][ T9828] ? lock_acquire+0x179/0x350 [ 270.957854][ T9828] tcp_v6_send_reset+0x625/0x1630 [ 270.957875][ T9828] ? inet6_lhash2_lookup+0x40f/0x4c0 [ 270.957891][ T9828] ? __pfx_tcp_v6_send_reset+0x10/0x10 [ 270.957911][ T9828] ? inet6_lookup_listener+0x286/0x860 [ 270.957927][ T9828] ? __asan_memmove+0x3c/0x60 [ 270.957942][ T9828] tcp_v6_rcv+0x1721/0x4310 [ 270.957967][ T9828] ? __pfx_tcp_v6_rcv+0x10/0x10 [ 270.957981][ T9828] ? __pfx_ipvlan_skb_to_addr+0x10/0x10 [ 270.957996][ T9828] ? __pfx_raw6_local_deliver+0x10/0x10 [ 270.958011][ T9828] ? find_held_lock+0x2b/0x80 [ 270.958023][ T9828] ? __pfx_tcp_v6_rcv+0x10/0x10 [ 270.958039][ T9828] ip6_protocol_deliver_rcu+0x188/0x1520 [ 270.958058][ T9828] ip6_input_finish+0x1e4/0x4b0 [ 270.958070][ T9828] ip6_input+0x105/0x2f0 [ 270.958081][ T9828] ipv6_rcv+0x264/0x650 [ 270.958092][ T9828] ? __pfx_ipv6_rcv+0x10/0x10 [ 270.958105][ T9828] __netif_receive_skb_one_core+0x12d/0x1e0 [ 270.958118][ T9828] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 270.958131][ T9828] ? lock_acquire+0x179/0x350 [ 270.958146][ T9828] ? __phys_addr+0xe8/0x180 [ 270.958159][ T9828] __netif_receive_skb+0x1d/0x160 [ 270.958171][ T9828] netif_receive_skb+0x137/0x7b0 [ 270.958182][ T9828] ? __pfx_netif_receive_skb+0x10/0x10 [ 270.958199][ T9828] tun_rx_batched.isra.0+0x3ee/0x740 [ 270.958216][ T9828] ? __pfx_tun_rx_batched.isra.0+0x10/0x10 [ 270.958235][ T9828] ? tun_get_user+0x1ded/0x3cc0 [ 270.958249][ T9828] ? rcu_is_watching+0x12/0xc0 [ 270.958263][ T9828] tun_get_user+0x28b2/0x3cc0 [ 270.958286][ T9828] ? __pfx_tun_get_user+0x10/0x10 [ 270.958302][ T9828] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 270.958322][ T9828] ? find_held_lock+0x2b/0x80 [ 270.958332][ T9828] ? tun_get+0x191/0x370 [ 270.958350][ T9828] tun_chr_write_iter+0xdc/0x210 [ 270.958367][ T9828] vfs_write+0x7d3/0x11d0 [ 270.958381][ T9828] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 270.958399][ T9828] ? __pfx_vfs_write+0x10/0x10 [ 270.958411][ T9828] ? find_held_lock+0x2b/0x80 [ 270.958431][ T9828] ksys_write+0x12a/0x250 [ 270.958444][ T9828] ? __pfx_ksys_write+0x10/0x10 [ 270.958463][ T9828] do_syscall_64+0xcd/0xfa0 [ 270.958478][ T9828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.958490][ T9828] RIP: 0033:0x7fd12418da7f [ 270.958499][ T9828] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 270.958510][ T9828] RSP: 002b:00007fd12507c000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 270.958521][ T9828] RAX: ffffffffffffffda RBX: 00007fd1243e5fa0 RCX: 00007fd12418da7f [ 270.958528][ T9828] RDX: 0000000000000056 RSI: 0000200000000000 RDI: 00000000000000c8 [ 270.958535][ T9828] RBP: 00007fd12507c090 R08: 0000000000000000 R09: 0000000000000000 [ 270.958541][ T9828] R10: 0000000000000056 R11: 0000000000000293 R12: 0000000000000001 [ 270.958548][ T9828] R13: 00007fd1243e6038 R14: 00007fd1243e5fa0 R15: 00007ffcfe1628c8 [ 270.958564][ T9828] [ 271.364231][ T30] kauditd_printk_skb: 8763 callbacks suppressed [ 271.364248][ T30] audit: type=1400 audit(2000000001.419:236422): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364317][ T30] audit: type=1400 audit(2000000001.419:236423): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364363][ T30] audit: type=1400 audit(2000000001.419:236424): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364420][ T30] audit: type=1400 audit(2000000001.419:236425): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364461][ T30] audit: type=1400 audit(2000000001.419:236426): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364500][ T30] audit: type=1400 audit(2000000001.419:236427): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364539][ T30] audit: type=1400 audit(2000000001.419:236428): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364580][ T30] audit: type=1400 audit(2000000001.419:236429): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.364621][ T30] audit: type=1400 audit(2000000001.419:236430): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 271.365189][ T30] audit: type=1400 audit(2000000001.419:236431): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.367536][ T9863] bridge0: port 4(veth1_to_bridge) entered blocking state [ 273.387348][ T9863] bridge0: port 4(veth1_to_bridge) entered disabled state [ 273.402902][ T9863] veth1_to_bridge: entered allmulticast mode [ 273.495646][ T9863] veth1_to_bridge: entered promiscuous mode [ 273.509202][ T9863] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 273.558568][ T9863] bridge0: port 4(veth1_to_bridge) entered blocking state [ 273.565823][ T9863] bridge0: port 4(veth1_to_bridge) entered forwarding state [ 274.086242][ T9868] syzkaller0: entered promiscuous mode [ 274.117257][ T9868] syzkaller0: entered allmulticast mode [ 276.370967][ T30] kauditd_printk_skb: 10732 callbacks suppressed [ 276.371028][ T30] audit: type=1400 audit(2000000002.199:247164): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.384041][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.413676][ T30] audit: type=1400 audit(2000000002.199:247165): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.421095][ T5477] audit: audit_lost=12206 audit_rate_limit=0 audit_backlog_limit=64 [ 276.443839][ T30] audit: type=1400 audit(2000000002.199:247166): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.443883][ T30] audit: type=1400 audit(2000000002.199:247167): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.443920][ T30] audit: type=1400 audit(2000000002.199:247168): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.509918][ T30] audit: type=1400 audit(2000000002.199:247169): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 276.561486][ T5477] audit: backlog limit exceeded [ 276.566763][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.369119][ T9921] validate_nla: 38 callbacks suppressed [ 277.369137][ T9921] netlink: 'syz.0.1480': attribute type 10 has an invalid length. [ 277.387213][ T9921] batman_adv: batadv0: Adding interface: team0 [ 277.414100][ T9922] futex_wake_op: syz.4.1479 tries to shift op by -1; fix this program [ 277.432859][ T9921] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 277.458153][ T9921] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 279.977508][ T9985] syzkaller0: entered promiscuous mode [ 279.984097][ T9985] syzkaller0: entered allmulticast mode [ 280.137548][ T9990] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(11) [ 280.144164][ T9990] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 280.153994][ T9990] vhci_hcd vhci_hcd.0: Device attached [ 280.630227][ T24] usb 41-1: new high-speed USB device number 2 using vhci_hcd [ 280.705453][ T9991] vhci_hcd: connection reset by peer [ 280.712949][ T6483] vhci_hcd: stop threads [ 280.717307][ T6483] vhci_hcd: release socket [ 280.742718][ T6483] vhci_hcd: disconnect device [ 280.791569][T10001] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1507'. [ 280.800827][T10001] netlink: 'syz.2.1507': attribute type 20 has an invalid length. [ 280.808711][T10001] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1507'. [ 281.391320][ T30] kauditd_printk_skb: 9443 callbacks suppressed [ 281.391332][ T30] audit: type=1400 audit(2000000002.219:254898): avc: denied { read } for pid=10011 comm="syz.4.1512" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 281.461179][ T30] audit: type=1400 audit(2000000002.259:254899): avc: denied { create } for pid=10011 comm="syz.4.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 281.506170][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.518211][ T5477] audit: audit_lost=12779 audit_rate_limit=0 audit_backlog_limit=64 [ 281.519253][ T30] audit: type=1400 audit(2000000002.279:254900): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.548897][ T5477] audit: backlog limit exceeded [ 281.555001][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.563485][ T5477] audit: audit_lost=12780 audit_rate_limit=0 audit_backlog_limit=64 [ 281.572394][ T30] audit: type=1400 audit(2000000002.279:254901): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 281.588911][ T5477] audit: backlog limit exceeded [ 282.412875][T10023] FAULT_INJECTION: forcing a failure. [ 282.412875][T10023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.441380][T10023] CPU: 0 UID: 0 PID: 10023 Comm: syz.1.1515 Not tainted syzkaller #0 PREEMPT(full) [ 282.441406][T10023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.441417][T10023] Call Trace: [ 282.441424][T10023] [ 282.441431][T10023] dump_stack_lvl+0x16c/0x1f0 [ 282.441457][T10023] should_fail_ex+0x512/0x640 [ 282.441490][T10023] _copy_to_user+0x32/0xd0 [ 282.441517][T10023] simple_read_from_buffer+0xcb/0x170 [ 282.441541][T10023] proc_fail_nth_read+0x197/0x240 [ 282.441570][T10023] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 282.441598][T10023] ? rw_verify_area+0xcf/0x6c0 [ 282.441617][T10023] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 282.441643][T10023] vfs_read+0x1e4/0xcf0 [ 282.441670][T10023] ? __pfx___mutex_lock+0x10/0x10 [ 282.441694][T10023] ? __pfx_vfs_read+0x10/0x10 [ 282.441722][T10023] ? __fget_files+0x20e/0x3c0 [ 282.441754][T10023] ksys_read+0x12a/0x250 [ 282.441776][T10023] ? __pfx_ksys_read+0x10/0x10 [ 282.441806][T10023] do_syscall_64+0xcd/0xfa0 [ 282.441830][T10023] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.441851][T10023] RIP: 0033:0x7f5cddf8d9dc [ 282.441867][T10023] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 282.441885][T10023] RSP: 002b:00007f5cded98030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 282.441904][T10023] RAX: ffffffffffffffda RBX: 00007f5cde1e5fa0 RCX: 00007f5cddf8d9dc [ 282.441917][T10023] RDX: 000000000000000f RSI: 00007f5cded980a0 RDI: 0000000000000003 [ 282.441929][T10023] RBP: 00007f5cded98090 R08: 0000000000000000 R09: 0000000000000000 [ 282.441941][T10023] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 282.441954][T10023] R13: 00007f5cde1e6038 R14: 00007f5cde1e5fa0 R15: 00007fff56d9f778 [ 282.441983][T10023] [ 283.428452][T10043] syzkaller0: entered promiscuous mode [ 283.457883][T10043] syzkaller0: entered allmulticast mode [ 285.790460][ T24] vhci_hcd: vhci_device speed not set [ 286.402538][ T30] kauditd_printk_skb: 10041 callbacks suppressed [ 286.402554][ T30] audit: type=1400 audit(2000000001.059:264943): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.456525][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 286.467754][ T5477] audit: audit_lost=12781 audit_rate_limit=0 audit_backlog_limit=64 [ 286.477095][ T5477] audit: backlog limit exceeded [ 286.482113][ T30] audit: type=1400 audit(2000000001.089:264944): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.512648][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 286.520448][ T30] audit: type=1400 audit(2000000001.089:264945): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.523147][ T5477] audit: audit_lost=12782 audit_rate_limit=0 audit_backlog_limit=64 [ 286.542924][ T30] audit: type=1400 audit(2000000001.089:264946): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 286.568533][ T5477] audit: backlog limit exceeded [ 286.671976][T10064] sp0: Synchronizing with TNC [ 287.011263][T10083] FAULT_INJECTION: forcing a failure. [ 287.011263][T10083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.031233][T10083] CPU: 1 UID: 0 PID: 10083 Comm: syz.1.1534 Not tainted syzkaller #0 PREEMPT(full) [ 287.031259][T10083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 287.031270][T10083] Call Trace: [ 287.031277][T10083] [ 287.031284][T10083] dump_stack_lvl+0x16c/0x1f0 [ 287.031313][T10083] should_fail_ex+0x512/0x640 [ 287.031341][T10083] _copy_from_user+0x2e/0xd0 [ 287.031368][T10083] do_sys_poll+0x1d5/0xdf0 [ 287.031390][T10083] ? is_bpf_text_address+0x94/0x1a0 [ 287.031419][T10083] ? kernel_text_address+0x8d/0x100 [ 287.031447][T10083] ? __kernel_text_address+0xd/0x40 [ 287.031475][T10083] ? arch_stack_walk+0xa6/0x100 [ 287.031505][T10083] ? __pfx_do_sys_poll+0x10/0x10 [ 287.031557][T10083] ? __lock_acquire+0x622/0x1c90 [ 287.031633][T10083] ? __pfx_timespec64_add_safe+0x10/0x10 [ 287.031660][T10083] ? ktime_get_ts64+0x2d2/0x400 [ 287.031684][T10083] ? read_tsc+0x9/0x20 [ 287.031699][T10083] ? ktime_get_ts64+0x256/0x400 [ 287.031730][T10083] __x64_sys_poll+0x1a6/0x450 [ 287.031754][T10083] ? __pfx___x64_sys_poll+0x10/0x10 [ 287.031787][T10083] do_syscall_64+0xcd/0xfa0 [ 287.031813][T10083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 287.031833][T10083] RIP: 0033:0x7f5cddf8efc9 [ 287.031848][T10083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.031867][T10083] RSP: 002b:00007f5cded98038 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 287.031885][T10083] RAX: ffffffffffffffda RBX: 00007f5cde1e5fa0 RCX: 00007f5cddf8efc9 [ 287.031899][T10083] RDX: 000000000bc05b1d RSI: 0000000000000001 RDI: 0000200000000880 [ 287.031910][T10083] RBP: 00007f5cded98090 R08: 0000000000000000 R09: 0000000000000000 [ 287.031921][T10083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.031933][T10083] R13: 00007f5cde1e6038 R14: 00007f5cde1e5fa0 R15: 00007fff56d9f778 [ 287.031961][T10083] [ 287.646543][T10095] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1539'. [ 287.776259][T10095] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=10095 comm=syz.0.1539 [ 288.633583][T10111] netlink: 'syz.2.1542': attribute type 10 has an invalid length. [ 288.656001][T10111] veth0_vlan: left promiscuous mode [ 288.664029][T10111] veth0_vlan: entered promiscuous mode [ 288.677822][T10111] team0: Device veth0_vlan failed to register rx_handler [ 290.181795][T10129] FAULT_INJECTION: forcing a failure. [ 290.181795][T10129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.240929][T10129] CPU: 0 UID: 0 PID: 10129 Comm: syz.3.1550 Not tainted syzkaller #0 PREEMPT(full) [ 290.240957][T10129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 290.240969][T10129] Call Trace: [ 290.240975][T10129] [ 290.240984][T10129] dump_stack_lvl+0x16c/0x1f0 [ 290.241012][T10129] should_fail_ex+0x512/0x640 [ 290.241041][T10129] _copy_to_user+0x32/0xd0 [ 290.241068][T10129] simple_read_from_buffer+0xcb/0x170 [ 290.241095][T10129] proc_fail_nth_read+0x197/0x240 [ 290.241124][T10129] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 290.241153][T10129] ? rw_verify_area+0xcf/0x6c0 [ 290.241175][T10129] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 290.241203][T10129] vfs_read+0x1e4/0xcf0 [ 290.241231][T10129] ? __pfx___mutex_lock+0x10/0x10 [ 290.241256][T10129] ? __pfx_vfs_read+0x10/0x10 [ 290.241288][T10129] ? __fget_files+0x20e/0x3c0 [ 290.241322][T10129] ksys_read+0x12a/0x250 [ 290.241346][T10129] ? __pfx_ksys_read+0x10/0x10 [ 290.241369][T10129] ? fput+0x9b/0xd0 [ 290.241392][T10129] do_syscall_64+0xcd/0xfa0 [ 290.241417][T10129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.241438][T10129] RIP: 0033:0x7f36e7b8d9dc [ 290.241454][T10129] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 290.241472][T10129] RSP: 002b:00007f36e8a16030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 290.241491][T10129] RAX: ffffffffffffffda RBX: 00007f36e7de5fa0 RCX: 00007f36e7b8d9dc [ 290.241504][T10129] RDX: 000000000000000f RSI: 00007f36e8a160a0 RDI: 0000000000000004 [ 290.241517][T10129] RBP: 00007f36e8a16090 R08: 0000000000000000 R09: 0000000000000000 [ 290.241528][T10129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.241540][T10129] R13: 00007f36e7de6038 R14: 00007f36e7de5fa0 R15: 00007fffd915fde8 [ 290.241570][T10129] [ 291.412545][ T30] kauditd_printk_skb: 7119 callbacks suppressed [ 291.412562][ T30] audit: type=1400 audit(2000000006.069:272048): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.523685][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 291.533281][ T30] audit: type=1400 audit(2000000006.069:272049): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.560699][ T5477] audit: audit_lost=12789 audit_rate_limit=0 audit_backlog_limit=64 [ 291.565348][ T5815] audit: audit_backlog=65 > audit_backlog_limit=64 [ 291.589129][ T5477] audit: backlog limit exceeded [ 291.590293][ T5815] audit: audit_lost=12790 audit_rate_limit=0 audit_backlog_limit=64 [ 291.604142][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 291.605743][ T30] audit: type=1400 audit(2000000006.069:272050): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 291.640762][ T5477] audit: audit_lost=12791 audit_rate_limit=0 audit_backlog_limit=64 [ 296.420382][ T30] kauditd_printk_skb: 9813 callbacks suppressed [ 296.420397][ T30] audit: type=1400 audit(2000000011.079:281454): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.480206][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.481386][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.486792][ T5477] audit: audit_lost=12928 audit_rate_limit=0 audit_backlog_limit=64 [ 296.495666][ T30] audit: type=1400 audit(2000000011.079:281455): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 296.530313][ T5477] audit: backlog limit exceeded [ 296.530673][ T5805] audit: audit_lost=12929 audit_rate_limit=0 audit_backlog_limit=64 [ 296.550506][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 296.580213][ T5477] audit: audit_lost=12930 audit_rate_limit=0 audit_backlog_limit=64 [ 296.590411][ T5477] audit: backlog limit exceeded [ 300.684883][T10328] FAULT_INJECTION: forcing a failure. [ 300.684883][T10328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.740542][T10328] CPU: 1 UID: 0 PID: 10328 Comm: syz.0.1621 Not tainted syzkaller #0 PREEMPT(full) [ 300.740559][T10328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 300.740566][T10328] Call Trace: [ 300.740570][T10328] [ 300.740575][T10328] dump_stack_lvl+0x16c/0x1f0 [ 300.740594][T10328] should_fail_ex+0x512/0x640 [ 300.740611][T10328] _copy_from_user+0x2e/0xd0 [ 300.740626][T10328] kstrtouint_from_user+0xd6/0x1d0 [ 300.740638][T10328] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 300.740648][T10328] ? __lock_acquire+0xb8a/0x1c90 [ 300.740669][T10328] proc_fail_nth_write+0x83/0x220 [ 300.740686][T10328] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 300.740706][T10328] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 300.740721][T10328] vfs_write+0x2a0/0x11d0 [ 300.740738][T10328] ? __pfx___mutex_lock+0x10/0x10 [ 300.740753][T10328] ? __pfx_vfs_write+0x10/0x10 [ 300.740771][T10328] ? __fget_files+0x20e/0x3c0 [ 300.740790][T10328] ksys_write+0x12a/0x250 [ 300.740803][T10328] ? __pfx_ksys_write+0x10/0x10 [ 300.740821][T10328] do_syscall_64+0xcd/0xfa0 [ 300.740836][T10328] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.740848][T10328] RIP: 0033:0x7f0aed78da7f [ 300.740857][T10328] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 300.740868][T10328] RSP: 002b:00007f0aee6ed030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 300.740879][T10328] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0aed78da7f [ 300.740886][T10328] RDX: 0000000000000001 RSI: 00007f0aee6ed0a0 RDI: 0000000000000003 [ 300.740893][T10328] RBP: 00007f0aee6ed090 R08: 0000000000000000 R09: 0000000000000000 [ 300.740900][T10328] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 300.740906][T10328] R13: 00007f0aed9e6038 R14: 00007f0aed9e5fa0 R15: 00007ffc0e630ab8 [ 300.740922][T10328] [ 301.444183][ T30] kauditd_printk_skb: 8579 callbacks suppressed [ 301.444194][ T30] audit: type=1400 audit(2000000016.029:289074): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.474227][ T30] audit: type=1400 audit(2000000016.099:289075): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.498665][ T30] audit: type=1400 audit(2000000016.099:289076): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.529340][ T30] audit: type=1400 audit(2000000016.099:289077): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.552031][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 301.558526][ T5477] audit: audit_lost=13251 audit_rate_limit=0 audit_backlog_limit=64 [ 301.566645][ T30] audit: type=1400 audit(2000000016.099:289078): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.566687][ T30] audit: type=1400 audit(2000000016.099:289079): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.566728][ T30] audit: type=1400 audit(2000000016.099:289080): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 301.566770][ T30] audit: type=1400 audit(2000000016.099:289081): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 302.277078][T10350] FAULT_INJECTION: forcing a failure. [ 302.277078][T10350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.311988][T10350] CPU: 0 UID: 0 PID: 10350 Comm: syz.1.1630 Not tainted syzkaller #0 PREEMPT(full) [ 302.312016][T10350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 302.312027][T10350] Call Trace: [ 302.312034][T10350] [ 302.312042][T10350] dump_stack_lvl+0x16c/0x1f0 [ 302.312071][T10350] should_fail_ex+0x512/0x640 [ 302.312100][T10350] _copy_from_user+0x2e/0xd0 [ 302.312134][T10350] kstrtouint_from_user+0xd6/0x1d0 [ 302.312154][T10350] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 302.312172][T10350] ? __lock_acquire+0xb8a/0x1c90 [ 302.312209][T10350] proc_fail_nth_write+0x83/0x220 [ 302.312237][T10350] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 302.312273][T10350] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 302.312299][T10350] vfs_write+0x2a0/0x11d0 [ 302.312328][T10350] ? __pfx___mutex_lock+0x10/0x10 [ 302.312353][T10350] ? __pfx_vfs_write+0x10/0x10 [ 302.312386][T10350] ? __fget_files+0x20e/0x3c0 [ 302.312420][T10350] ksys_write+0x12a/0x250 [ 302.312443][T10350] ? __pfx_ksys_write+0x10/0x10 [ 302.312476][T10350] do_syscall_64+0xcd/0xfa0 [ 302.312503][T10350] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 302.312524][T10350] RIP: 0033:0x7f5cddf8da7f [ 302.312540][T10350] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 302.312559][T10350] RSP: 002b:00007f5cded98030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 302.312578][T10350] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5cddf8da7f [ 302.312591][T10350] RDX: 0000000000000001 RSI: 00007f5cded980a0 RDI: 0000000000000003 [ 302.312603][T10350] RBP: 00007f5cded98090 R08: 0000000000000000 R09: 0000000000000000 [ 302.312616][T10350] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 302.312627][T10350] R13: 00007f5cde1e6038 R14: 00007f5cde1e5fa0 R15: 00007fff56d9f778 [ 302.312658][T10350] [ 302.816353][T10357] FAULT_INJECTION: forcing a failure. [ 302.816353][T10357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 302.852631][T10357] CPU: 1 UID: 0 PID: 10357 Comm: syz.4.1633 Not tainted syzkaller #0 PREEMPT(full) [ 302.852658][T10357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 302.852670][T10357] Call Trace: [ 302.852677][T10357] [ 302.852685][T10357] dump_stack_lvl+0x16c/0x1f0 [ 302.852714][T10357] should_fail_ex+0x512/0x640 [ 302.852742][T10357] _copy_from_iter+0x29f/0x1720 [ 302.852771][T10357] ? __alloc_skb+0x200/0x380 [ 302.852795][T10357] ? __pfx__copy_from_iter+0x10/0x10 [ 302.852819][T10357] ? netlink_autobind.isra.0+0x158/0x370 [ 302.852863][T10357] netlink_sendmsg+0x820/0xdd0 [ 302.852894][T10357] ? __pfx_netlink_sendmsg+0x10/0x10 [ 302.852931][T10357] sock_write_iter+0x566/0x610 [ 302.852960][T10357] ? __pfx_sock_write_iter+0x10/0x10 [ 302.853000][T10357] ? __pfx_file_has_perm+0x10/0x10 [ 302.853026][T10357] do_iter_readv_writev+0x662/0x9e0 [ 302.853051][T10357] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 302.853071][T10357] ? selinux_file_permission+0x126/0x660 [ 302.853100][T10357] ? bpf_lsm_file_permission+0x9/0x10 [ 302.853125][T10357] ? security_file_permission+0x71/0x210 [ 302.853152][T10357] ? rw_verify_area+0xcf/0x6c0 [ 302.853175][T10357] vfs_writev+0x35f/0xde0 [ 302.853204][T10357] ? __pfx_vfs_writev+0x10/0x10 [ 302.853247][T10357] ? __fget_files+0x20e/0x3c0 [ 302.853270][T10357] ? __fget_files+0x1f0/0x3c0 [ 302.853302][T10357] ? do_writev+0x28c/0x340 [ 302.853322][T10357] do_writev+0x28c/0x340 [ 302.853345][T10357] ? __pfx_do_writev+0x10/0x10 [ 302.853376][T10357] do_syscall_64+0xcd/0xfa0 [ 302.853401][T10357] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 302.853424][T10357] RIP: 0033:0x7fd12418efc9 [ 302.853439][T10357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 302.853455][T10357] RSP: 002b:00007fd12507c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 302.853471][T10357] RAX: ffffffffffffffda RBX: 00007fd1243e5fa0 RCX: 00007fd12418efc9 [ 302.853485][T10357] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000003 [ 302.853497][T10357] RBP: 00007fd12507c090 R08: 0000000000000000 R09: 0000000000000000 [ 302.853508][T10357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 302.853519][T10357] R13: 00007fd1243e6038 R14: 00007fd1243e5fa0 R15: 00007ffcfe1628c8 [ 302.853543][T10357] [ 303.639317][T10368] netdevsim netdevsim4 netdevsim0: entered promiscuous mode [ 303.661387][T10368] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 303.987175][T10377] FAULT_INJECTION: forcing a failure. [ 303.987175][T10377] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 304.001933][T10377] CPU: 0 UID: 0 PID: 10377 Comm: syz.2.1640 Not tainted syzkaller #0 PREEMPT(full) [ 304.001956][T10377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 304.001967][T10377] Call Trace: [ 304.001972][T10377] [ 304.001979][T10377] dump_stack_lvl+0x16c/0x1f0 [ 304.002005][T10377] should_fail_ex+0x512/0x640 [ 304.002030][T10377] strncpy_from_user+0x3b/0x2e0 [ 304.002051][T10377] getname_flags.part.0+0x8f/0x550 [ 304.002076][T10377] getname_flags+0x93/0xf0 [ 304.002098][T10377] do_sys_openat2+0xb8/0x1d0 [ 304.002115][T10377] ? __pfx_do_sys_openat2+0x10/0x10 [ 304.002135][T10377] ? __fget_files+0x20e/0x3c0 [ 304.002164][T10377] __x64_sys_openat+0x174/0x210 [ 304.002182][T10377] ? __pfx___x64_sys_openat+0x10/0x10 [ 304.002200][T10377] ? ksys_write+0x1ac/0x250 [ 304.002232][T10377] do_syscall_64+0xcd/0xfa0 [ 304.002257][T10377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.002277][T10377] RIP: 0033:0x7f5ce698d810 [ 304.002293][T10377] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 304.002312][T10377] RSP: 002b:00007f5ce7873b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 304.002331][T10377] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5ce698d810 [ 304.002344][T10377] RDX: 0000000000000002 RSI: 00007f5ce7873c10 RDI: 00000000ffffff9c [ 304.002357][T10377] RBP: 00007f5ce7873c10 R08: 0000000000000000 R09: 00007f5ce7873987 [ 304.002369][T10377] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 304.002380][T10377] R13: 00007f5ce6be6038 R14: 00007f5ce6be5fa0 R15: 00007ffe7d53f828 [ 304.002409][T10377] [ 306.217177][T10419] FAULT_INJECTION: forcing a failure. [ 306.217177][T10419] name failslab, interval 1, probability 0, space 0, times 0 [ 306.230783][T10419] CPU: 1 UID: 0 PID: 10419 Comm: syz.0.1655 Not tainted syzkaller #0 PREEMPT(full) [ 306.230808][T10419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 306.230827][T10419] Call Trace: [ 306.230834][T10419] [ 306.230841][T10419] dump_stack_lvl+0x16c/0x1f0 [ 306.230871][T10419] should_fail_ex+0x512/0x640 [ 306.230901][T10419] should_failslab+0xc2/0x120 [ 306.230929][T10419] kmem_cache_alloc_node_noprof+0x78/0x770 [ 306.230953][T10419] ? alloc_io_context+0x21/0x2f0 [ 306.230986][T10419] ? alloc_io_context+0x21/0x2f0 [ 306.231012][T10419] alloc_io_context+0x21/0x2f0 [ 306.231037][T10419] set_task_ioprio+0x49e/0x670 [ 306.231066][T10419] __do_sys_ioprio_set+0x55b/0xb50 [ 306.231090][T10419] ? __do_sys_ioprio_set+0x3dd/0xb50 [ 306.231121][T10419] do_syscall_64+0xcd/0xfa0 [ 306.231146][T10419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.231165][T10419] RIP: 0033:0x7f0aed78efc9 [ 306.231181][T10419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.231200][T10419] RSP: 002b:00007f0aee6ed038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fb [ 306.231217][T10419] RAX: ffffffffffffffda RBX: 00007f0aed9e5fa0 RCX: 00007f0aed78efc9 [ 306.231230][T10419] RDX: 0000000000006000 RSI: 0000000000000000 RDI: 0000000000000003 [ 306.231241][T10419] RBP: 00007f0aee6ed090 R08: 0000000000000000 R09: 0000000000000000 [ 306.231253][T10419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.231264][T10419] R13: 00007f0aed9e6038 R14: 00007f0aed9e5fa0 R15: 00007ffc0e630ab8 [ 306.231293][T10419] [ 306.454359][T10424] FAULT_INJECTION: forcing a failure. [ 306.454359][T10424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.459850][ T30] kauditd_printk_skb: 8381 callbacks suppressed [ 306.459866][ T30] audit: type=1400 audit(2000000021.069:296808): avc: denied { read write } for pid=5815 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 306.498243][ T30] audit: type=1400 audit(2000000021.079:296809): avc: denied { create } for pid=10420 comm="syz.3.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 306.519187][ T30] audit: type=1400 audit(2000000021.099:296810): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.564341][ T30] audit: type=1400 audit(2000000021.099:296811): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.586243][ T30] audit: type=1400 audit(2000000021.099:296812): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.620586][T10424] CPU: 1 UID: 0 PID: 10424 Comm: syz.2.1657 Not tainted syzkaller #0 PREEMPT(full) [ 306.620613][T10424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 306.620624][T10424] Call Trace: [ 306.620631][T10424] [ 306.620638][T10424] dump_stack_lvl+0x16c/0x1f0 [ 306.620667][T10424] should_fail_ex+0x512/0x640 [ 306.620695][T10424] _copy_to_user+0x32/0xd0 [ 306.620729][T10424] simple_read_from_buffer+0xcb/0x170 [ 306.620756][T10424] proc_fail_nth_read+0x197/0x240 [ 306.620786][T10424] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 306.620816][T10424] ? rw_verify_area+0xcf/0x6c0 [ 306.620837][T10424] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 306.620864][T10424] vfs_read+0x1e4/0xcf0 [ 306.620892][T10424] ? __pfx___mutex_lock+0x10/0x10 [ 306.620918][T10424] ? __pfx_vfs_read+0x10/0x10 [ 306.620950][T10424] ? __fget_files+0x20e/0x3c0 [ 306.620983][T10424] ksys_read+0x12a/0x250 [ 306.621006][T10424] ? __pfx_ksys_read+0x10/0x10 [ 306.621039][T10424] do_syscall_64+0xcd/0xfa0 [ 306.621064][T10424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.621085][T10424] RIP: 0033:0x7f5ce698d9dc [ 306.621101][T10424] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 306.621119][T10424] RSP: 002b:00007f5ce7874030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 306.621138][T10424] RAX: ffffffffffffffda RBX: 00007f5ce6be5fa0 RCX: 00007f5ce698d9dc [ 306.621151][T10424] RDX: 000000000000000f RSI: 00007f5ce78740a0 RDI: 0000000000000004 [ 306.621163][T10424] RBP: 00007f5ce7874090 R08: 0000000000000000 R09: 0000000000000000 [ 306.621175][T10424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 306.621186][T10424] R13: 00007f5ce6be6038 R14: 00007f5ce6be5fa0 R15: 00007ffe7d53f828 [ 306.621216][T10424] [ 306.636118][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.660208][T10426] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.685413][T10428] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.691517][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.696711][T10428] audit: audit_lost=13470 audit_rate_limit=0 audit_backlog_limit=64 [ 306.701907][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.706026][ T5477] audit: audit_lost=13471 audit_rate_limit=0 audit_backlog_limit=64 [ 306.711447][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.749126][ T5823] Bluetooth: hci3: command 0x0406 tx timeout [ 306.764340][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.764809][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.917082][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.929586][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.942109][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 306.954667][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.242770][T10458] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1665'. [ 308.670362][ C1] net_ratelimit: 3868 callbacks suppressed [ 308.670375][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.688402][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.700567][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.712798][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.725227][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.737645][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.750096][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.762582][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.775037][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 308.787456][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 309.991574][T10473] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1671'. [ 310.067926][T10473] vlan2: entered allmulticast mode [ 310.109223][T10473] gretap0: entered allmulticast mode [ 310.814556][T10482] FAULT_INJECTION: forcing a failure. [ 310.814556][T10482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.001449][T10482] CPU: 1 UID: 0 PID: 10482 Comm: syz.3.1674 Not tainted syzkaller #0 PREEMPT(full) [ 311.001476][T10482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 311.001487][T10482] Call Trace: [ 311.001494][T10482] [ 311.001501][T10482] dump_stack_lvl+0x16c/0x1f0 [ 311.001531][T10482] should_fail_ex+0x512/0x640 [ 311.001560][T10482] _copy_to_user+0x32/0xd0 [ 311.001588][T10482] simple_read_from_buffer+0xcb/0x170 [ 311.001615][T10482] proc_fail_nth_read+0x197/0x240 [ 311.001644][T10482] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 311.001674][T10482] ? rw_verify_area+0xcf/0x6c0 [ 311.001695][T10482] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 311.001723][T10482] vfs_read+0x1e4/0xcf0 [ 311.001750][T10482] ? __pfx___mutex_lock+0x10/0x10 [ 311.001775][T10482] ? __pfx_vfs_read+0x10/0x10 [ 311.001807][T10482] ? __fget_files+0x20e/0x3c0 [ 311.001841][T10482] ksys_read+0x12a/0x250 [ 311.001863][T10482] ? __pfx_ksys_read+0x10/0x10 [ 311.001895][T10482] do_syscall_64+0xcd/0xfa0 [ 311.001921][T10482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 311.001940][T10482] RIP: 0033:0x7f36e7b8d9dc [ 311.001956][T10482] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 311.001974][T10482] RSP: 002b:00007f36e8a16030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 311.001992][T10482] RAX: ffffffffffffffda RBX: 00007f36e7de5fa0 RCX: 00007f36e7b8d9dc [ 311.002006][T10482] RDX: 000000000000000f RSI: 00007f36e8a160a0 RDI: 0000000000000003 [ 311.002018][T10482] RBP: 00007f36e8a16090 R08: 0000000000000000 R09: 0000000000000000 [ 311.002030][T10482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.002041][T10482] R13: 00007f36e7de6038 R14: 00007f36e7de5fa0 R15: 00007fffd915fde8 [ 311.002068][T10482] [ 311.462143][ T30] kauditd_printk_skb: 6479 callbacks suppressed [ 311.462159][ T30] audit: type=1400 audit(2000000026.119:300327): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.559604][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.586418][ T30] audit: type=1400 audit(2000000026.149:300328): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 311.611182][ T5477] audit: audit_lost=14460 audit_rate_limit=0 audit_backlog_limit=64 [ 311.648616][ T5477] audit: backlog limit exceeded [ 311.661342][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.688975][T10493] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.700903][ T5477] audit: audit_lost=14461 audit_rate_limit=0 audit_backlog_limit=64 [ 311.719893][T10493] audit: audit_lost=14462 audit_rate_limit=0 audit_backlog_limit=64 [ 311.731767][ T30] audit: type=1400 audit(2000000026.149:300329): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.680395][ C0] net_ratelimit: 14763 callbacks suppressed [ 313.680416][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 313.680485][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.686773][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 313.698721][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 313.710708][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 313.722718][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.734561][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 313.746537][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 313.758438][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 313.770564][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 316.580160][ C1] sched: DL replenish lagged too much [ 317.120602][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 317.140891][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.690275][ C1] net_ratelimit: 21186 callbacks suppressed [ 318.690295][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 318.690329][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 318.696601][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.708502][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 318.720532][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.732455][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 318.744427][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 318.756340][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 318.768303][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 318.780229][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.107652][ T5477] audit_log_start: 287 callbacks suppressed [ 323.107671][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.137054][ T5477] audit: audit_lost=14558 audit_rate_limit=0 audit_backlog_limit=64 [ 323.700567][ C0] net_ratelimit: 21746 callbacks suppressed [ 323.700572][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.700587][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.701001][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.706884][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 323.718911][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.730844][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.742867][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.754824][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 323.767385][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 323.778602][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 324.534594][ T30] audit: type=1400 audit(2000000026.149:300330): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.710402][ C1] net_ratelimit: 21631 callbacks suppressed [ 328.710424][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 328.710426][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 328.710869][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 328.716780][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.728723][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 328.740643][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 328.752652][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 328.764533][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 328.776539][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 328.788444][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.720230][ C0] net_ratelimit: 21943 callbacks suppressed [ 333.720252][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 333.720299][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.726631][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 333.738576][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.750486][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 333.762467][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 333.774543][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 333.786473][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 333.798344][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 333.810310][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.730234][ C0] net_ratelimit: 21541 callbacks suppressed [ 338.730255][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 338.730427][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 338.736606][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 338.748668][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.760558][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 338.772512][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 338.784341][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 338.796942][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 338.808328][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 338.820326][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 339.658650][ T5477] audit: backlog limit exceeded [ 339.689426][ T5477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 339.997559][ T30] audit: type=1400 audit(2000000026.149:300331): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 343.740203][ C1] net_ratelimit: 21650 callbacks suppressed [ 343.740224][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 343.740536][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 343.746553][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.758440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 343.770457][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.782330][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 343.794313][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 343.806234][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 343.818250][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 343.830105][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 348.750240][ C1] net_ratelimit: 20212 callbacks suppressed [ 348.750261][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.750314][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 348.756614][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.768534][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 348.780488][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 348.792471][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 348.805350][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.816294][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 348.828348][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.840250][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.760189][ C0] net_ratelimit: 16962 callbacks suppressed [ 353.760205][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.760211][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.760615][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.766606][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.778467][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.790614][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 353.802441][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.815524][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 353.826347][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 353.838318][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.770333][ C0] net_ratelimit: 16593 callbacks suppressed [ 358.770354][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 358.770707][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.776744][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 358.788679][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.801265][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 358.812545][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 358.824549][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 358.837437][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 358.848440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 358.860450][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.780201][ C0] net_ratelimit: 16179 callbacks suppressed [ 363.780222][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 363.780580][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.786587][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 363.798625][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.810516][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 363.822479][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 363.834424][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 363.847643][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 363.858259][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 363.870270][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.790182][ C0] net_ratelimit: 16680 callbacks suppressed [ 368.790203][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 368.790295][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.796561][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 368.808552][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.820426][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 368.832396][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 368.845326][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 368.857425][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 368.868234][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 368.880212][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.800262][ C0] net_ratelimit: 16722 callbacks suppressed [ 373.800285][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 373.801644][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.806626][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 373.818725][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.830527][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 373.842587][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 373.854454][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 373.867793][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 373.878410][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 373.890484][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.544360][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.565854][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.810180][ C0] net_ratelimit: 16418 callbacks suppressed [ 378.810202][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 378.811201][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.816533][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 378.828529][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.840433][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 378.852349][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 378.864311][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 378.877197][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 378.888148][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 378.900110][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.820451][ C0] net_ratelimit: 16915 callbacks suppressed [ 383.820473][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 383.820524][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.826807][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 383.838810][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 383.850746][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 383.863792][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.874594][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 383.886588][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 383.898473][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 383.910456][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 385.928848][ T30] audit: type=1400 audit(2000000026.149:300332): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 387.880043][ T5477] audit: audit_lost=14559 audit_rate_limit=0 audit_backlog_limit=64 [ 388.830268][ C0] net_ratelimit: 16455 callbacks suppressed [ 388.830290][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 388.831562][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.836647][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 388.848678][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.860594][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 388.872543][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 388.884493][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 388.897657][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 388.908348][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 388.920356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.840199][ C1] net_ratelimit: 16649 callbacks suppressed [ 393.840220][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.840260][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 393.846598][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.858463][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 393.870497][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 393.882417][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 393.895436][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.906209][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 393.918219][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 393.930046][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 398.850261][ C1] net_ratelimit: 16927 callbacks suppressed [ 398.850282][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.850328][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 398.856639][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.868493][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 398.880521][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 398.892440][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 398.905493][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.916370][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 398.928356][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 398.940157][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 400.630401][ T5477] audit: backlog limit exceeded [ 402.338873][ T30] audit: type=1400 audit(2000000026.149:300333): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 403.860625][ C1] net_ratelimit: 16796 callbacks suppressed [ 403.860645][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.861190][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 403.867022][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.878881][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 403.890865][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 403.902839][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 403.915854][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.926652][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 403.938649][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 403.950514][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.870498][ C0] net_ratelimit: 16856 callbacks suppressed [ 408.870519][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.870724][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.876846][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.888896][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.900813][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.912796][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 408.925550][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.937801][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 408.948581][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 408.960566][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.880194][ C0] net_ratelimit: 16942 callbacks suppressed [ 413.880215][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 413.881415][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.886573][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 413.898535][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.910441][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 413.922428][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 413.934346][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 413.947925][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 413.958279][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 413.970235][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.890564][ C0] net_ratelimit: 16917 callbacks suppressed [ 418.890585][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 418.890992][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.896931][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 418.908950][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.920820][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 418.932781][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 418.944722][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 418.957761][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 418.968539][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 418.980589][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.900201][ C1] net_ratelimit: 17035 callbacks suppressed [ 423.900224][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.900384][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 423.906547][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.918436][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 423.930416][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 423.942396][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 423.955266][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.966224][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 423.978180][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 423.990079][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 428.910324][ C0] net_ratelimit: 16613 callbacks suppressed [ 428.910345][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 428.910681][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.916661][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 428.928693][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.940575][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 428.952587][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 428.964473][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 428.977624][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 428.988352][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 429.000437][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.706475][ T30] audit: type=1400 audit(2000000026.149:300334): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 433.920424][ C0] net_ratelimit: 17164 callbacks suppressed [ 433.920446][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 433.920967][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.926768][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 433.938787][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.950705][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 433.962636][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 433.974609][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 433.987693][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 433.998582][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 434.010565][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.930292][ C1] net_ratelimit: 16659 callbacks suppressed [ 438.930312][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.930518][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 438.936675][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.948528][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 438.960564][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 438.972449][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 438.985509][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 438.996278][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 439.008288][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 439.020152][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 440.935122][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.955674][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 443.940205][ C0] net_ratelimit: 16734 callbacks suppressed [ 443.940227][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 443.940414][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 443.946542][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 443.959637][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.970523][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 443.982492][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 443.994287][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 444.006312][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 444.018207][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 444.031354][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.950210][ C0] net_ratelimit: 16636 callbacks suppressed [ 448.950232][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 448.950445][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.956555][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 448.968593][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 448.980426][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 448.992417][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 449.004325][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 449.017385][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 449.028193][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 449.040176][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.960353][ C0] net_ratelimit: 16992 callbacks suppressed [ 453.960373][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 453.961534][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.966741][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 453.978712][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 453.990607][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 454.002587][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 454.014571][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 454.027777][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 454.038399][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 454.050417][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.970456][ C0] net_ratelimit: 16023 callbacks suppressed [ 458.970477][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 458.971544][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 458.976854][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 458.988809][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.000747][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 459.012686][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 459.024680][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 459.037579][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 459.048505][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 459.060505][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.976737][ T30] audit: type=1400 audit(2000000026.149:300335): avc: denied { read } for pid=5477 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 463.998061][ C0] net_ratelimit: 16877 callbacks suppressed [ 463.998082][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 463.998162][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.998539][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 463.998641][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.998972][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 463.999141][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 463.999409][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 463.999852][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 464.000341][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 464.000771][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 467.800132][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 467.807104][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5938/1:b..l [ 467.815416][ C0] rcu: (detected by 0, t=10503 jiffies, g=42101, q=422 ncpus=2) [ 467.823137][ C0] task:kworker/0:7 state:R running task stack:26600 pid:5938 tgid:5938 ppid:2 task_flags:0x4208060 flags:0x00080000 [ 467.837601][ C0] Workqueue: events_power_efficient gc_worker [ 467.843696][ C0] Call Trace: [ 467.846977][ C0] [ 467.849905][ C0] __schedule+0x1190/0x5de0 [ 467.854422][ C0] ? find_held_lock+0x2b/0x80 [ 467.859097][ C0] ? debug_object_activate+0x2ec/0x4c0 [ 467.864560][ C0] ? __pfx___schedule+0x10/0x10 [ 467.869411][ C0] ? debug_object_activate+0x2ec/0x4c0 [ 467.874876][ C0] ? mark_held_locks+0x49/0x80 [ 467.879643][ C0] preempt_schedule_irq+0x51/0x90 [ 467.884670][ C0] irqentry_exit+0x36/0x90 [ 467.889093][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 467.895073][ C0] RIP: 0010:gc_worker+0x2d5/0x16e0 [ 467.900195][ C0] Code: 00 00 48 c7 c7 68 e5 83 90 e8 57 b4 12 f8 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 35 d6 36 f8 58 48 85 db 0f 85 d4 0f 00 00 b6 da 36 f8 8b 1d 60 87 fd 06 41 89 dc 31 ff 41 83 e4 01 44 89 [ 467.919802][ C0] RSP: 0018:ffffc9000464fb48 EFLAGS: 00000293 [ 467.925870][ C0] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff89866939 [ 467.933839][ C0] RDX: ffff888078172480 RSI: ffffffff89866948 RDI: 0000000000000007 [ 467.941809][ C0] RBP: ffffffff9afbf2ac R08: 0000000000000007 R09: 0000000000000000 [ 467.949777][ C0] R10: 0000000000000000 R11: 0000000000000001 R12: ffff888024000000 [ 467.957748][ C0] R13: 0000000000040000 R14: dffffc0000000000 R15: 0000000000001770 [ 467.965731][ C0] ? gc_worker+0xe19/0x16e0 [ 467.970250][ C0] ? gc_worker+0xe28/0x16e0 [ 467.974764][ C0] ? gc_worker+0xe28/0x16e0 [ 467.979273][ C0] ? debug_object_deactivate+0x1ec/0x3a0 [ 467.984928][ C0] ? __pfx_gc_worker+0x10/0x10 [ 467.989708][ C0] ? rcu_is_watching+0x12/0xc0 [ 467.994480][ C0] process_one_work+0x9cf/0x1b70 [ 467.999442][ C0] ? __pfx_do_cache_clean+0x10/0x10 [ 468.004648][ C0] ? __pfx_process_one_work+0x10/0x10 [ 468.010043][ C0] ? assign_work+0x1a0/0x250 [ 468.014639][ C0] worker_thread+0x6c8/0xf10 [ 468.019246][ C0] ? __kthread_parkme+0x19e/0x250 [ 468.024279][ C0] ? __pfx_worker_thread+0x10/0x10 [ 468.029396][ C0] kthread+0x3c5/0x780 [ 468.033468][ C0] ? __pfx_kthread+0x10/0x10 [ 468.038062][ C0] ? rcu_is_watching+0x12/0xc0 [ 468.042823][ C0] ? __pfx_kthread+0x10/0x10 [ 468.047423][ C0] ret_from_fork+0x675/0x7d0 [ 468.052018][ C0] ? __pfx_kthread+0x10/0x10 [ 468.056613][ C0] ret_from_fork_asm+0x1a/0x30 [ 468.061396][ C0] [ 469.000154][ C0] net_ratelimit: 15947 callbacks suppressed [ 469.000175][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 469.000941][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.006540][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 469.018514][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.030470][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 469.042370][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 469.054353][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 469.067195][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 469.078185][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 469.090192][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.010414][ C0] net_ratelimit: 16401 callbacks suppressed [ 474.010437][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 474.011563][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.016796][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 474.028812][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.040652][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 474.052647][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 474.064579][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 474.077629][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 474.088447][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:be:ce:52:fb:25:28, vlan:0) [ 474.100424][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 475.309075][ T31] INFO: task kworker/u8:7:3446 blocked for more than 147 seconds. [ 475.332704][ T31] Not tainted syzkaller #0 [ 475.337659][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.