last executing test programs: 10.764468852s ago: executing program 2 (id=2452): socket$inet(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2031}, [@IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}, @IFLA_XDP_FLAGS={0x8, 0x3, 0x2}]}, @IFLA_GROUP={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20048054}, 0x0) syz_open_procfs(0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x1, 0x6, [@multicast1, @multicast1, @private=0xa010100, @rand_addr=0x64010100, @rand_addr=0x64010100, @broadcast]}, 0x28) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) r5 = syz_open_dev$vim2m(&(0x7f0000000200), 0x3, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f00000000c0)={0x1, 0x2, 0x1}) ioctl$vim2m_VIDIOC_S_FMT(r5, 0xc0d05605, &(0x7f0000000340)={0x2, @vbi={0x4, 0x5, 0x6, 0x3447504d, [0x8000, 0x8], [0xffffffff, 0x1], 0x13a}}) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000580)="17", 0xfdef, 0x10008095, 0x0, 0x0) 9.361770727s ago: executing program 4 (id=2454): syz_usb_connect(0x0, 0x24, &(0x7f0000000180)=ANY=[@ANYBLOB="12010000810087406d040e0a75940000000109021200010000000009"], 0x0) socket(0x10, 0x3, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, 0x0) socket$inet6_sctp(0xa, 0x2, 0x84) statfs(0x0, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$kcm(0x10, 0x2, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x19f2, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x8000000}, &(0x7f0000000140)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r5, &(0x7f0000000180)=ANY=[@ANYRES64=r4], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r5, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x0, 0x0, r5, 0x0}) io_uring_enter(r1, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 8.950790413s ago: executing program 0 (id=2457): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) socket$inet6_icmp(0xa, 0x2, 0x3a) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000c18000)="beef915d564c90c200"/24, 0x18) close(r3) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r5, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040e04073e2002"], 0x7) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r6, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) recvfrom(r6, &(0x7f0000000180)=""/60, 0xfffffffffffffecb, 0x4100, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x1c8, 0x2, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x8}, [@CTA_NAT_DST={0x78, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @empty}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @multicast2}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x3e}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @local}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @local}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x27}}]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x101}, @CTA_TUPLE_ORIG={0x38, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010100}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x27}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @private=0xa010100}}}]}, @CTA_TUPLE_MASTER={0x48, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @private=0xa010100}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_PROTOINFO={0x20, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0x1c, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x7f, 0x5}}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x80}, @CTA_PROTOINFO_TCP_WSCALE_ORIGINAL={0x5, 0x2, 0x7}]}}, @CTA_NAT_SRC={0x40, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x4}, @CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x10}}, @CTA_NAT_V4_MINIP={0x8, 0x1, @rand_addr=0x64010101}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}, @CTA_LABELS={0x20, 0x16, 0x1, 0x0, [0x4, 0x401, 0x9, 0x20cba4c0, 0xfff, 0x80, 0x2]}, @CTA_FILTER={0x24, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x10}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x200}, @CTA_FILTER_ORIG_FLAGS={0x8}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x108}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x2}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x2}]}, 0x1c8}}, 0x8000) 8.848526147s ago: executing program 2 (id=2458): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="009e6cc2d96aa31c1ac8156c63", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) socket$qrtr(0x2a, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x0, 0x81, 0xfffff034}, {0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) sendmmsg(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000480)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xff, 0x7fff0010}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x50) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000004300), 0x1, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_GET_MSRS_cpu(r7, 0xc008ae88, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$ttys(0xc, 0x2, 0x1) accept$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1800002) ioctl$TIOCSSOFTCAR(r8, 0x541a, &(0x7f0000000040)=0x4) 8.745523906s ago: executing program 4 (id=2459): r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$bt_hci(r0, 0x11e, 0x1, 0x0, &(0x7f0000000300)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) 8.681645196s ago: executing program 4 (id=2460): mkdir(&(0x7f0000000080)='./file0\x00', 0x20) lremovexattr(&(0x7f0000000100)='./file0\x00', 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r5}, &(0x7f0000001c00), &(0x7f0000001c40)=r6}, 0x20) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000340)=0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netlink\x00') pread64(r7, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000002340)={'vcan0\x00'}) sendmsg$nl_route(r2, 0x0, 0x4008080) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r9, {0x0, 0x10}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x14, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD_MASK={0x5, 0xb, 0x1}, @TCA_FQ_CODEL_INTERVAL={0x8, 0x3, 0xf384}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040800}, 0x2200c000) 7.41077888s ago: executing program 2 (id=2463): openat$binderfs(0xffffffffffffff9c, 0x0, 0x1002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1f}, 0x94) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) setgroups(0x0, 0x0) lseek(r3, 0x10000000005, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0xc0802, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) r4 = ioctl$KVM_GET_STATS_FD_cpu(r3, 0xaece) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r4, 0xc0189379, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mount(&(0x7f0000000280)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000340)='./cgroup\x00', &(0x7f0000000300)='squashfs\x00', 0x1a0c000, 0x0) 7.31206976s ago: executing program 1 (id=2464): sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="1ce0", 0xffeb, 0x0, &(0x7f0000001100)={0x2, 0x0, @private}, 0x10) r0 = socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(r2, 0x0, 0x0, 0xfffffe04, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x50, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x141, 0x0, 0x4}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r3 = openat$sequencer2(0xffffff9c, &(0x7f0000000080), 0x143240, 0x0) ioctl$SNDCTL_SEQ_NRMIDIS(r3, 0xc0045103, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x1, 0x1, 0x40}, 0xc) setsockopt$MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, {0xa, 0x0, 0x0, @empty}}, 0x5c) setsockopt$MRT6_FLUSH(r0, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000a40)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000380)=""/267, 0x10b}], 0x1}, 0x8}], 0x1, 0x40000002, 0x0) 6.840749031s ago: executing program 0 (id=2465): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000"], 0x7c}}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x22100, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb45, 0x100000000009, 0xa, 0x0, 0x3}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x22000, 0x0) r3 = syz_open_dev$vim2m(&(0x7f0000000080), 0x7, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f00000000c0)={0x45, 0x1, 0x2, "6040a7170200ff0120000000fcff00ff1057e31e940000000000000000aeff00", 0x50313134}) read$FUSE(r2, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x2}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid8\xc4e', 0x0) capget(&(0x7f0000000140)={0x20080522}, &(0x7f00000001c0)={0x7, 0x1, 0x2e7, 0x8, 0x1, 0x86d7}) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {0xffffffffffffffff, 0xe737}}, 0x10) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080)}, {&(0x7f0000000100)="16000000246837f73199aee6fdb9291b3091ec1a2d41d227975ad8ec030f59190200867997f9c0efa9c9092a31cdbb98ea272787afda0af59a320709c3a59ef05c6f40ceafec53f48d6186e7d8409e35306221caf67b370d875eff3191932728e5ab6c9a3acf6ccee3e352c898f5744abaedfb53f92c37acb126bd143f3e9cdfcf25a8d6129fcc3a141c3f5ab6db772f87c787817a9b699dd60732d952716b103bc1e91ac5b1ed92f35389580994bb0df9bce07e7a80921888f984139f488d256a67fec0cbb5c4e93d5c151d97f676ab93b1efbd46f600dc964231e3257bf358", 0xe0}, {&(0x7f0000001480)="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", 0x7c1}], 0x3) timerfd_create(0x1, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x36) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="8a450200000000002400128009000100626f6e640000000014000280050001000600000008"], 0x44}}, 0x40) 5.521401316s ago: executing program 2 (id=2467): socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='rxrpc_peer\x00', r5, 0x0, 0xfffffffffffffff9}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='rxrpc_peer\x00'}, 0x10) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r6, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r6, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x18, 0x110, 0x1, '\n'}], 0x18, 0xe000}, 0x5}], 0x1, 0x0) inotify_init() socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000012c0)) creat(0x0, 0xd931d3864d39dcca) 5.41839069s ago: executing program 1 (id=2468): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x50, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x101201, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@metacopy_on}]}) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mknodat$loop(r4, &(0x7f0000001600)='./file1\x00', 0x200, 0x0) chdir(&(0x7f0000000140)='./bus\x00') linkat(r4, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000180)='./bus\x00', 0x0) link(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='./file0\x00') open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r5 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r5, 0x4020aeb2, &(0x7f0000000080)={0x0, 0x2000000, @ioapic={0xeeef0000, 0x1, 0x8000, 0x0, 0x0, [{0x6, 0x7, 0xa, '\x00', 0xab}, {0x2, 0x0, 0x2, '\x00', 0x5b}, {0x60, 0x4, 0x8, '\x00', 0x3}, {0x5, 0xe, 0x7, '\x00', 0xf1}, {0xc, 0xc, 0x9, '\x00', 0x43}, {0x4, 0x78, 0xc5, '\x00', 0x9}, {0x94, 0x5, 0x9, '\x00', 0xfe}, {0xf, 0x0, 0x6, '\x00', 0xfc}, {0x1, 0x4, 0x8, '\x00', 0x33}, {0x81, 0xf, 0x57, '\x00', 0x9}, {0x5, 0x4, 0x1, '\x00', 0x6}, {0x81, 0x6, 0x6, '\x00', 0x48}, {0x3, 0x1, 0x8, '\x00', 0xff}, {0x6, 0x3, 0x2, '\x00', 0x2}, {0x6, 0x5, 0x3, '\x00', 0x50}, {0xd, 0x2, 0xd}, {0x8, 0x81, 0x81, '\x00', 0xb}, {0x3, 0x89, 0x1, '\x00', 0xf}, {0x78, 0x7, 0x2, '\x00', 0x5}, {0x3, 0x7, 0xc1, '\x00', 0x7}, {0x5, 0x26, 0x5, '\x00', 0x9}, {0x7, 0x9, 0xe4, '\x00', 0x6}, {0xc1, 0xd, 0x3, '\x00', 0x10}, {0xfd, 0x3, 0x80, '\x00', 0x6}]}}) ioctl$KVM_RESET_DIRTY_RINGS(r5, 0xaec7) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000300)=0x1, 0x4) recvmmsg(r2, &(0x7f000000e280), 0x58a, 0x42, 0x0) sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)={0x120, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x9c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x78}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x70, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x8}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "12ef60041cf2fc34038d363978ffbf3538798383831e0c084bbf2ecf4c09b677a8"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4000}, 0x60) 5.403593709s ago: executing program 3 (id=2469): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800"/13], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={{}, 0x10, 0x35, 0x5}) 5.240693655s ago: executing program 0 (id=2470): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) r1 = socket$kcm(0x10, 0x2, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_wakeup_irq', 0x0, 0xb) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) socket$inet(0x10, 0x3, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffc}, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f0000000580)="17", 0xfdef, 0x10008095, 0x0, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x8d0) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000000)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a00100000000280", 0x2a}, {&(0x7f0000000400)="6a6f8e5e", 0x4}], 0x2}, 0x0) 5.197293226s ago: executing program 3 (id=2471): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000380)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x4000000, 0x2, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x1, 0x4, 0x0, @loopback, @local}}}}) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB="376d2f001a00200c28bd7000fcdbdf250a00107300000005000000", @ANYRES32, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x811}, 0x10) sched_setaffinity(0x0, 0xffffffffffffff6c, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000002000)=""/102400, 0x19000) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{0x0}], 0x1, 0x800, 0x4000000) r3 = gettid() read$FUSE(0xffffffffffffffff, &(0x7f000001b000)={0x2020}, 0x2020) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x1a3c82) syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x109001) close_range(r0, 0xffffffffffffffff, 0x0) syz_pidfd_open(r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x10, 0x4, &(0x7f0000000240)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @sk_msg=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r4}, 0x18) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000003000000018000180140002007665746830"], 0x2c}}, 0x0) 5.108029835s ago: executing program 4 (id=2472): openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0x1, 'syz1\x00', @bcast, 0x10001, 0x8, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) ioctl$SIOCNRDECOBS(r0, 0x89e2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB='\b\x00'], 0x20) preadv(0xffffffffffffffff, 0x0, 0x0, 0x206, 0x2b4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x60005f, 0x3) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000040)) ioctl$IOCTL_VMCI_INIT_CONTEXT(r5, 0x7a0, &(0x7f0000000000)={@my=0x0}) poll(&(0x7f0000000340)=[{r5, 0x700a}], 0x1, 0x7) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x20000003}}, 0x2e) ioctl$PPPIOCGCHAN(r4, 0x80047437, &(0x7f0000001300)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x40820, 0x20}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vxcan={{0xa}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0x3}]}, 0x3c}}, 0x0) 4.555987782s ago: executing program 3 (id=2473): openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc0000001900010000000000fcdbdf2500000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000004000000000000000000000000000000000000000000000000000000000000000200000000000000000000005e43bb387ffa6532000000000000000000000000000000000000000000000000002000000000000000000000000000000000000001000000000000004400050000000000000000000000000000000000000000022b0000000a000000fe8000000000000000000000000000aa0000000004"], 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r2, &(0x7f0000004d00), 0x7fffffffffffd33, 0x20000890) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000080000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000680)='sched_switch\x00', r4}, 0x10) io_setup(0x23, &(0x7f0000000280)=0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) io_submit(r5, 0x1, &(0x7f0000000700)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x1, r6, 0x0}]) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls}, 0x94) 3.653572845s ago: executing program 1 (id=2474): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xd}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0xcc, &(0x7f00000004c0)=ANY=[], 0x0) futex(0x0, 0xc, 0x1, 0x0, 0x0, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x2844, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r5, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xf}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x4040) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r6}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0x10, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@snprintf={{}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {}, {0x85, 0x0, 0x0, 0x6a}}]}, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x94) socket$igmp6(0xa, 0x3, 0x2) 3.428055184s ago: executing program 4 (id=2475): r0 = socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f0000000080), 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x8, 0x1000, 0x0, 0xb4b, 0x9, 0x9, 0x1, 0x400002}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x50) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f0000000000)={0x80, 0x14, 0x9, 0xf8, 0xfffffffffffffe08, 0x0, 0x0}) r4 = syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_S_INPUT(r4, 0xc0045627, 0x0) r5 = landlock_create_ruleset(&(0x7f0000000280)={0x6000, 0x0, 0x1}, 0x18, 0x1) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000200)={0x2020}, 0x2020) unshare(0x22020600) fsopen(0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r5, 0x1, &(0x7f0000000340)={0x2000}, 0x0) socket$alg(0x26, 0x5, 0x0) syz_open_dev$radio(&(0x7f0000000040), 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000004c0)='stat\x00') sendto(r0, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f, 0x34000}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 3.300430173s ago: executing program 2 (id=2476): openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = fsopen(&(0x7f00000001c0)='devpts\x00', 0x0) r3 = socket$inet(0xa, 0x801, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000200)='x', 0x1, 0x4000050, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x4}, 0x8) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0xf) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000040)='ro\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200003f, 0x28011, r5, 0x0) setpriority(0x2, 0x0, 0x6) 3.286149848s ago: executing program 0 (id=2477): r0 = open(&(0x7f0000001440)='./file1\x00', 0x14d77e, 0xc2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000000400)=ANY=[], 0x8) r3 = accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f0000000180)=0x10, 0x80000) setsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x3b}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000400)=0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0}, 0x18) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_remote_features={{0xb, 0xb}, {0x3c, 0xc8, "234a781334207764"}}}, 0xe) syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000340)=ANY=[@ANYBLOB="12010102020000082505a1a440000102030109025c00020105d04f0904000400000000000000bb011141020d0000052406000105240004000d240f010009000700b406241a01001809058103ff030800040904010000020d00000904010102020d0000090582024000c6047a48facb9c1b6ac48d3854ca90f89f2d66f5528437aeeeca44b13a05ee3be772084da6396f0891b82bae68a4803db0a944"], &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x32, &(0x7f0000000080)=@string={0x32, 0x3, "d482674f19861f29745a52f366ae95a5276163955f1fb96ae8d7866421fda4fcfccda2d498daf6fdb3ba644ee04e1656"}}]}) 2.369716032s ago: executing program 1 (id=2478): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f00000001c0)}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f00000001c0)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000340)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f00000000c0), r5) sendmsg$NLBL_CALIPSO_C_LISTALL(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, r6, 0x3d810686a7d95765, 0x70bd2a, 0x25dfdb79}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x24004052) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES16], 0x1000f) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_ACTIVATE(r7, 0x4bfa, 0x10000000000004) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0xe, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x104}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}]}, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) 2.094585673s ago: executing program 3 (id=2479): socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) r1 = socket$inet6(0xa, 0x80002, 0x88) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], 0x0, 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, 0x0, &(0x7f0000000200)=0x1e) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) timer_create(0x2, &(0x7f0000000180)={0x0, 0x14, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r6, 0x1, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000002180)=ANY=[@ANYBLOB="9feb0100180000000000"], 0x0, 0x2d}, 0x28) close(r0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000001004000014001a80100002800c000180080016000600000008001b00"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 2.092606654s ago: executing program 4 (id=2480): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200087fc, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) sendmmsg$inet(r0, &(0x7f0000000000), 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) timerfd_create(0x8, 0x80000) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xc8e}, {0x16}]}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a00), 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = syz_io_uring_setup(0x10d, &(0x7f0000000540)={0x0, 0xd4bb, 0x80, 0x2, 0x1dd}, &(0x7f0000000380)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) sendmsg$inet(r3, &(0x7f0000001640)={0x0, 0x0, 0x0}, 0x20000090) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x1}) listen(r3, 0x5) io_uring_enter(r4, 0x3517, 0xc2de, 0x9, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f00000000c0)={'bridge0\x00'}) 1.977516355s ago: executing program 3 (id=2481): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0xa4242, 0x0) mmap(&(0x7f00006e4000/0x2000)=nil, 0x2000, 0x0, 0x38011, r0, 0x20000) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x5, 0x1000086}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x43, &(0x7f0000000040)=0x2) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x8000000000000000, 0x0) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x3cdbfffffffff, 0x24000) r4 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CURSOR(r3, 0xc01c64a3, 0x0) ioctl$DRM_IOCTL_MODE_CURSOR2(r3, 0xc02464bb, &(0x7f0000000080)={0x2, 0x0, 0xb0, 0xffffffff, 0x4, 0x6, 0x1, 0x7, 0x6}) read$msr(r2, 0x0, 0x0) r5 = socket$rxrpc(0x21, 0x2, 0x2) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r5, 0x110, 0x2, 0x0, 0x63) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000240001002cbd700100084ef5ae00000000ddffff0500040000000000f4c529666055"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x240400c0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$MSR(&(0x7f0000000080), 0x8000002000000, 0x0) read$msr(r6, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendfile(r0, r1, 0x0, 0x200002) 1.522212088s ago: executing program 2 (id=2482): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c0704000000000000", 0x61) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000f9ffffff0000000000000000850000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000340)={r4, 0x0, 0x25, 0x0, @val=@iter={0x0}}, 0x20) connect$inet(r3, &(0x7f0000000000)={0x2, 0x1, @multicast2}, 0x10) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r6 = socket$key(0xf, 0x3, 0x2) recvmmsg(r6, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) sendmsg$key(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="0208000002"], 0x10}}, 0x0) eventfd(0x56) fcntl$dupfd(r0, 0x406, r1) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, 0x0, 0x0) shutdown(r5, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events.local\x00', 0x275a, 0x0) 1.51585073s ago: executing program 3 (id=2483): socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$kcm(0x2d, 0x2, 0x0) r2 = gettid() ptrace$getregset(0x4204, r2, 0x201, &(0x7f00000002c0)={0x0}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e99900000000000000007f000001000000000000000000000000ac1e000100000000000000000000000000000000000000000a003080"], 0xb8}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(r4, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_sfeatures={0x3b, 0x2, [{0xfe}, {0xfbfffffa}]}}) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xb8}}, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002300)=@updpolicy={0xf7c, 0x13, 0xcb23c9c9931e99e9, 0x0, 0x0, {{@in6=@private0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa, 0x40, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0xaa3, 0xfffffffffffffff8}, {0x0, 0xc}}, [@algo_aead={0xd69, 0x12, {{'morus640-sse2\x00'}, 0x68e8, 0x200, "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"}}, @user_kmaddress={0x2c, 0x13, {@in=@rand_addr=0x64010101, @in6=@empty, 0x0, 0x2}}, @offload={0xc, 0x1c, {0x0, 0x1}}, @migrate={0x9c, 0x11, [{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@multicast1, @in=@broadcast, @in6=@remote, 0x3c, 0x1, 0x0, 0x3507, 0xa}, {@in6=@mcast1, @in=@empty, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in6=@empty, 0x0, 0x2, 0x0, 0x3505, 0x2, 0x2}]}, @lastused={0xc, 0xf, 0x4}, @etimer_thresh={0x8, 0xc, 0xffff}, @lastused={0xc, 0xf, 0x2}, @replay_esn_val={0x30, 0x17, {0x5, 0x70bd2b, 0x70bd26, 0x70bd2d, 0x70bd26, 0xa, [0x5, 0xae8, 0x3, 0x5, 0x1000]}}, @offload={0xc, 0x1c, {0x0, 0x2}}, @user_kmaddress={0x2c, 0x13, {@in6=@dev={0xfe, 0x80, '\x00', 0x21}, @in=@rand_addr=0x64010102, 0x0, 0xa}}]}, 0xf7c}}, 0x40000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[], &(0x7f0000000340)='GPL\x00'}, 0x94) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)={0x88, 0x0, 0x800, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xfffffff8, 0x7f}}}}, [@NL80211_ATTR_MAC_ADDRS={0x40, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000040}, 0x48090) 924.151276ms ago: executing program 1 (id=2484): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) rt_tgsigqueueinfo(0x0, 0x0, 0x36, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000000)='console\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x80000000005, 0x100000001000087}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x14, &(0x7f0000000040)=0x6) rseq(&(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x2710}) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x40) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYRES64=r0, @ANYRES32]) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000), 0xd) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f0000000200)='./file1/file4/file5\x00', 0x81c0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file1/file4/file7\x00', 0x1c0) r3 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x18, 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x200000, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r3, 0x1, &(0x7f0000000340)={0x2000, r4}, 0x0) landlock_restrict_self(r3, 0x0) landlock_restrict_self(r3, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000500)='./file1/file4/file5\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file1/file4/file7/file5\x00', 0x0) 792.746166ms ago: executing program 1 (id=2485): socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events.local\x00', 0x275a, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x5, 0x0, 0x3, 0x0, 0xb49, 0x9, 0x8, 0x2, 0x3}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'pimreg0\x00', 0x1}) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)={'gre0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x45, 0x0, 0x1, 0xfffffffc}, {}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_EVICT_TIMEOUT={0x8, 0x6, 0x3}]}}]}, 0x38}}, 0x4000) socket$inet6_mptcp(0xa, 0x1, 0x106) r5 = syz_open_procfs(0x0, 0x0) syz_fuse_handle_req(r5, &(0x7f0000000800)="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", 0x2000, &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000240)={0x7, &(0x7f00000001c0)=[{0x3, 0x5e, 0x40, 0x7fff}, {0x7, 0x86, 0x2, 0x8}, {0x3ff, 0x0, 0x4, 0x9}, {0x4, 0x81, 0xe, 0x1ff}, {0x3, 0x1, 0x7, 0xffffb89f}, {0xb, 0xf3, 0x4, 0xfffff800}, {0xfff8, 0x3, 0x5, 0x351}]}) 310.029631ms ago: executing program 0 (id=2486): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r2 = syz_open_dev$sndctrl(&(0x7f0000000180), 0xb, 0x121841) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={{}, 0x10, 0x35, 0x5}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={0x1}, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000440)={'macsec0\x00'}) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x215}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}, 0x1, 0xba01}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000300)="ab", 0x1, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000740), 0x84800, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="14000000", @ANYBLOB="010300000100fddbdf2526"], 0x14}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="440000001000ffff27bd7000fbdbdf2500000006", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x5}, 0xc000802) sendmsg$ETHTOOL_MSG_DEBUG_GET(r4, 0x0, 0x1) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="02", 0x1}], 0x1, &(0x7f0000000080)=[@sndinfo={0x20, 0x84, 0x2, {0x413, 0x41}}], 0x20, 0x2004c840}, 0x40090) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x7, @ipv4={'\x00', '\xff\xff', @local}, 0x1}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0), 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc4c85513, &(0x7f00000001c0)={{0x2, 0x5, 0x7, 0xff, 'syz0\x00', 0xffe0}, 0x1, [0xffffffffffffffff, 0x3, 0x8001, 0x0, 0xb1a3, 0xaf8c, 0x4, 0xb, 0x70c, 0x407, 0x5, 0x7, 0xfffffffffffffffa, 0x80000000401, 0x2, 0x2, 0x2, 0x8000000000000001, 0x6, 0xfffffffffffffffd, 0x9, 0xfffffffffffffffc, 0x1, 0x101, 0x8000000000000001, 0x3, 0x7, 0x0, 0x100000004, 0x8, 0xa, 0x9, 0x6, 0x6, 0xfff, 0x1, 0x4, 0x8, 0x9, 0x4, 0x2, 0xa5a, 0x3, 0xcd7, 0x2, 0xffffffff, 0x2, 0x208, 0xa2e, 0x10, 0x4, 0x2, 0xc, 0x1, 0x8, 0x5, 0x0, 0x0, 0x2, 0x8, 0x6, 0x6, 0x7fffffff, 0x400, 0x6, 0x8, 0x7, 0x8, 0x3, 0xff, 0x6d6, 0xb, 0x3, 0x7, 0xffffffffffffffbe, 0x60, 0x0, 0x7, 0x101, 0x2, 0xffffffffffffff69, 0x3, 0x1, 0x6, 0x5e, 0xaf, 0x2, 0x0, 0x6, 0x5, 0x3, 0x3, 0xd, 0x7, 0x5b9, 0x2000000, 0x4, 0x89b7, 0x946, 0x800, 0xffffffffcb5b2d7d, 0x3, 0xc3f, 0x5, 0x4, 0x9, 0x3, 0x5, 0x1, 0x7, 0x5, 0x8001, 0xfffffffffffffffe, 0x7, 0x5, 0x89, 0x2, 0xf8b, 0xfffffffffffffff9, 0x80, 0x4, 0x9, 0x4, 0xaf, 0x5, 0x1, 0xd, 0xfffffffffffffffa]}) 0s ago: executing program 0 (id=2487): syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) r0 = socket(0x2a, 0x2, 0x0) ioctl$SIOCSIFMTU(r0, 0x541b, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000033c0)={0x53, 0x0, 0x0, 0xfa, @scatter={0x0, 0x0, &(0x7f0000000a80)}, 0x0, 0x0, 0x0, 0x0, 0x800001, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x8, 0x0, 0xff9e, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffedb, 0x0, 0x0, 0x10, 0x4}, 0x94) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf2000000000000015000200071b1750bd030100000000009500000000000000bc26080000000000bf67000000000000070300000fff0700670200000300000016060a000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a82983d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf719506d2d6b05fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, &(0x7f0000000340), 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, 0x0) getdents64(r4, &(0x7f0000001f00)=""/4093, 0xffd) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c0000002000010000000000000000000220000000000000000000000500150002000000080009000000000008000b000500000008001700"], 0x5c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) kernel console output (not intermixed with test programs): acklog limit exceeded [ 478.853758][T11092] audit: audit_backlog=65 > audit_backlog_limit=64 [ 480.233881][T11108] CUSE: unknown device info "" [ 480.254105][T11108] CUSE: zero length info key specified [ 480.964407][T11122] bridge3: entered promiscuous mode [ 481.648384][ T5867] Bluetooth: hci0: command 0x0406 tx timeout [ 483.778281][ T30] kauditd_printk_skb: 8674 callbacks suppressed [ 483.778298][ T30] audit: type=1400 audit(1756836065.669:173387): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 483.851323][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 483.865423][T11162] audit: audit_backlog=65 > audit_backlog_limit=64 [ 483.872123][T11162] audit: audit_lost=22635 audit_rate_limit=0 audit_backlog_limit=64 [ 483.880351][T11162] audit: backlog limit exceeded [ 483.927104][ T5515] audit: audit_lost=22636 audit_rate_limit=0 audit_backlog_limit=64 [ 483.955201][ T30] audit: type=1400 audit(1756836065.679:173388): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.007144][ T30] audit: type=1400 audit(1756836065.679:173389): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.037262][ T5515] audit: backlog limit exceeded [ 484.057569][ T30] audit: type=1400 audit(1756836065.679:173390): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 485.016768][T11177] netlink: 'syz.3.1341': attribute type 27 has an invalid length. [ 486.541669][T11177] vlan2: left promiscuous mode [ 486.549032][T11177] bridge0: left promiscuous mode [ 486.558745][T11177] vlan2: left allmulticast mode [ 486.569931][T11177] bridge0: left allmulticast mode [ 486.674664][T11179] 8021q: adding VLAN 0 to HW filter on device bond0 [ 486.692214][T11179] 8021q: adding VLAN 0 to HW filter on device team0 [ 486.717143][T11179] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 486.850495][ T6358] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 486.913913][ T6358] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 486.943239][ T6366] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.023326][ T6366] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.348582][ T51] Bluetooth: hci0: unexpected event 0x09 length: 6 > 3 [ 488.538014][T11226] CUSE: unknown device info "" [ 488.563524][T11226] CUSE: zero length info key specified [ 488.783557][ T30] kauditd_printk_skb: 6378 callbacks suppressed [ 488.783668][ T30] audit: type=1400 audit(1756836070.689:177372): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 488.836138][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 488.857369][ T30] audit: type=1400 audit(1756836070.689:177373): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 489.236647][ T5515] audit: audit_lost=23436 audit_rate_limit=0 audit_backlog_limit=64 [ 489.251210][ T5515] audit: backlog limit exceeded [ 489.261810][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.268631][ T5515] audit: audit_lost=23437 audit_rate_limit=0 audit_backlog_limit=64 [ 489.300991][ T5515] audit: backlog limit exceeded [ 489.305999][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.322966][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.494523][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.545781][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.555301][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.564939][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.574115][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.584543][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.600397][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.629007][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.657319][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 489.675131][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1356'. [ 493.469918][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.504704][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.514913][T11283] Falling back ldisc for ttyS3. [ 493.521566][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.529781][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.547561][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.561314][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.581600][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.681383][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.689988][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.712255][T11291] netlink: 'syz.4.1370': attribute type 3 has an invalid length. [ 493.817281][ T30] kauditd_printk_skb: 8411 callbacks suppressed [ 493.817296][ T30] audit: type=1400 audit(1756836075.719:181725): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.032880][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.052255][ T30] audit: type=1400 audit(1756836075.799:181726): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.076078][ T5515] audit: audit_lost=24792 audit_rate_limit=0 audit_backlog_limit=64 [ 494.085833][T11304] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.142961][T11304] audit: audit_lost=24793 audit_rate_limit=0 audit_backlog_limit=64 [ 494.161508][ T5515] audit: backlog limit exceeded [ 494.162542][T11305] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.197531][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.202851][T11304] audit: backlog limit exceeded [ 498.882794][ T30] kauditd_printk_skb: 7497 callbacks suppressed [ 498.882815][ T30] audit: type=1400 audit(1756836080.609:185194): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 498.924864][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 499.037461][ T5515] audit: audit_lost=26138 audit_rate_limit=0 audit_backlog_limit=64 [ 499.055550][ T30] audit: type=1400 audit(1756836080.779:185195): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.102981][ T5515] audit: backlog limit exceeded [ 499.126299][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 499.216029][ T5515] audit: audit_lost=26139 audit_rate_limit=0 audit_backlog_limit=64 [ 499.249772][ T30] audit: type=1400 audit(1756836080.779:185196): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.273985][ T30] audit: type=1400 audit(1756836080.779:185197): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.274031][ T30] audit: type=1400 audit(1756836080.779:185198): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.457289][T11361] validate_nla: 40 callbacks suppressed [ 499.457306][T11361] netlink: 'syz.1.1387': attribute type 4 has an invalid length. [ 500.462837][T11384] __nla_validate_parse: 7 callbacks suppressed [ 500.462855][T11384] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1393'. [ 501.395320][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.403496][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 503.895937][ T30] kauditd_printk_skb: 5682 callbacks suppressed [ 503.895955][ T30] audit: type=1400 audit(1756836085.789:190463): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.086116][ T30] audit: type=1400 audit(1756836085.789:190464): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.107737][ T30] audit: type=1400 audit(1756836085.789:190465): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.130684][ T30] audit: type=1400 audit(1756836085.789:190466): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.152205][ T30] audit: type=1400 audit(1756836085.829:190467): avc: denied { create } for pid=11434 comm="syz.3.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 504.179995][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.186908][ T30] audit: type=1400 audit(1756836085.829:190468): avc: denied { create } for pid=11434 comm="syz.3.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 504.195707][T11438] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.207578][ T30] audit: type=1400 audit(1756836085.829:190469): avc: denied { create } for pid=11434 comm="syz.3.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 504.235850][ T30] audit: type=1400 audit(1756836085.829:190470): avc: denied { write } for pid=11434 comm="syz.3.1408" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 505.417961][T11460] netlink: 'syz.2.1415': attribute type 21 has an invalid length. [ 505.425982][T11460] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1415'. [ 505.438989][T11460] netlink: 'syz.2.1415': attribute type 21 has an invalid length. [ 505.447106][T11460] netlink: 156 bytes leftover after parsing attributes in process `syz.2.1415'. [ 506.391095][T11462] sp0: Synchronizing with TNC [ 508.903597][ T30] kauditd_printk_skb: 5446 callbacks suppressed [ 508.903615][ T30] audit: type=1400 audit(1756836090.799:194671): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 508.937282][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 508.947194][ T5515] audit: audit_lost=26695 audit_rate_limit=0 audit_backlog_limit=64 [ 508.958249][ T5515] audit: backlog limit exceeded [ 508.958406][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 508.984962][ T5515] audit: audit_lost=26696 audit_rate_limit=0 audit_backlog_limit=64 [ 509.046565][T11505] audit: audit_backlog=65 > audit_backlog_limit=64 [ 509.063830][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 509.070435][ T5515] audit: backlog limit exceeded [ 509.080518][ T5846] audit: audit_lost=26697 audit_rate_limit=0 audit_backlog_limit=64 [ 509.377116][T11509] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1429'. [ 513.115767][T11554] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1437'. [ 513.135156][T11554] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1437'. [ 513.258910][T11552] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1439'. [ 513.270162][T11552] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1439'. [ 513.948271][ T30] kauditd_printk_skb: 2999 callbacks suppressed [ 513.948289][ T30] audit: type=1400 audit(1756836095.829:197557): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.048056][ T30] audit: type=1400 audit(1756836095.849:197558): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.168916][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 514.183718][ T30] audit: type=1400 audit(1756836095.849:197559): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.214322][ T5515] audit: audit_lost=26736 audit_rate_limit=0 audit_backlog_limit=64 [ 514.233536][ T5515] audit: backlog limit exceeded [ 514.238716][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 514.251098][ T30] audit: type=1400 audit(1756836095.879:197560): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.282676][ T5515] audit: audit_lost=26737 audit_rate_limit=0 audit_backlog_limit=64 [ 514.290857][ T5515] audit: backlog limit exceeded [ 515.952975][T11563] Bluetooth: hci0: command 0x0406 tx timeout [ 516.161689][ T5850] libceph: connect (1)[c::]:6789 error -101 [ 516.231223][ T5850] libceph: mon0 (1)[c::]:6789 connect error [ 516.263595][T11588] ceph: No mds server is up or the cluster is laggy [ 519.003015][ T30] kauditd_printk_skb: 5939 callbacks suppressed [ 519.003032][ T30] audit: type=1400 audit(1756836100.909:202714): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 519.078274][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 519.088922][ T5515] audit: audit_lost=27000 audit_rate_limit=0 audit_backlog_limit=64 [ 519.098058][ T30] audit: type=1400 audit(1756836100.949:202715): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 519.123857][ T5515] audit: backlog limit exceeded [ 519.139954][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 519.143625][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 519.150761][ T5515] audit: audit_lost=27001 audit_rate_limit=0 audit_backlog_limit=64 [ 519.164834][ T30] audit: type=1400 audit(1756836100.949:202716): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 519.240843][T11625] audit: audit_backlog=65 > audit_backlog_limit=64 [ 522.105714][T11658] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1462'. [ 524.030310][ T30] kauditd_printk_skb: 3826 callbacks suppressed [ 524.030329][ T30] audit: type=1400 audit(1756836105.929:206289): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 524.129877][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 524.166480][ T5515] audit: audit_lost=27087 audit_rate_limit=0 audit_backlog_limit=64 [ 524.186204][ T5515] audit: backlog limit exceeded [ 524.195133][ T30] audit: type=1400 audit(1756836105.939:206290): avc: denied { create } for pid=11677 comm="syz.2.1468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 524.219288][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 524.232276][ T5515] audit: audit_lost=27088 audit_rate_limit=0 audit_backlog_limit=64 [ 524.246981][ T5515] audit: backlog limit exceeded [ 524.252912][ T30] audit: type=1400 audit(1756836105.959:206291): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 524.307206][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 525.392281][T11695] macsec1: entered promiscuous mode [ 525.441157][T11695] bridge0: entered promiscuous mode [ 525.507286][T11695] bridge0: port 1(macsec1) entered blocking state [ 525.517763][T11695] bridge0: port 1(macsec1) entered disabled state [ 525.550794][T11695] macsec1: entered allmulticast mode [ 525.578654][T11695] macsec1: left allmulticast mode [ 525.601444][T11695] bridge0: left promiscuous mode [ 525.901209][T11701] netlink: 'syz.4.1473': attribute type 10 has an invalid length. [ 525.942188][T11701] team0: Port device netdevsim0 added [ 529.034678][ T30] kauditd_printk_skb: 5830 callbacks suppressed [ 529.034696][ T30] audit: type=1400 audit(1756836110.919:209385): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 529.124288][ T30] audit: type=1400 audit(1756836110.919:209386): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 529.166455][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 529.173622][ T5515] audit: audit_lost=28002 audit_rate_limit=0 audit_backlog_limit=64 [ 529.181789][ T30] audit: type=1400 audit(1756836110.919:209387): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 529.218449][ T5515] audit: backlog limit exceeded [ 529.247357][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 529.296916][T11747] audit: audit_backlog=66 > audit_backlog_limit=64 [ 529.305507][T11747] audit: audit_lost=28003 audit_rate_limit=0 audit_backlog_limit=64 [ 529.321018][T11747] audit: backlog limit exceeded [ 531.188375][T11775] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1493'. [ 532.778123][T11793] bridge4: entered promiscuous mode [ 532.833254][T11783] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 532.852999][T11783] Bluetooth: hci2: Error when powering off device on rfkill (-4) [ 533.098812][T11783] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 533.108789][T11783] Bluetooth: hci1: Error when powering off device on rfkill (-4) [ 533.241313][T11783] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 533.353034][T11783] Bluetooth: hci3: Error when powering off device on rfkill (-4) [ 533.399969][T11783] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 533.602950][T11783] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 533.692874][T11783] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 533.701444][T11783] Bluetooth: hci0: Error when powering off device on rfkill (-4) [ 533.759893][T11809] bridge0: entered promiscuous mode [ 533.935418][T11809] macsec1: entered promiscuous mode [ 534.053484][T11809] bridge0: port 2(macsec1) entered blocking state [ 534.083287][T11809] bridge0: port 2(macsec1) entered disabled state [ 534.100093][ T30] kauditd_printk_skb: 5000 callbacks suppressed [ 534.100108][ T30] audit: type=1400 audit(1756836115.999:212333): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 534.140129][T11809] macsec1: entered allmulticast mode [ 534.155775][T11809] bridge0: entered allmulticast mode [ 534.169199][ T30] audit: type=1400 audit(1756836115.999:212334): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 534.170393][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 534.197710][ T5515] audit: audit_lost=28689 audit_rate_limit=0 audit_backlog_limit=64 [ 534.218108][T11809] macsec1: left allmulticast mode [ 534.232829][ T30] audit: type=1400 audit(1756836115.999:212335): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 534.254314][T11809] bridge0: left allmulticast mode [ 534.254366][ T30] audit: type=1400 audit(1756836115.999:212336): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 534.289125][ T5515] audit: backlog limit exceeded [ 534.295553][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 534.310249][ T5515] audit: audit_lost=28690 audit_rate_limit=0 audit_backlog_limit=64 [ 534.321615][ T5515] audit: backlog limit exceeded [ 534.333374][T11809] bridge0: left promiscuous mode [ 535.022155][T11821] overlayfs: missing 'lowerdir' [ 538.695810][T11877] trusted_key: encrypted_key: key user:syz not found [ 539.224357][ T30] kauditd_printk_skb: 17692 callbacks suppressed [ 539.224378][ T30] audit: type=1400 audit(1756836120.989:216166): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 539.277282][ T30] audit: type=1400 audit(1756836120.989:216167): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 539.373690][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 539.406300][ T30] audit: type=1400 audit(1756836120.989:216168): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 539.412601][ T5515] audit: audit_lost=33312 audit_rate_limit=0 audit_backlog_limit=64 [ 539.461315][T11889] audit: audit_backlog=65 > audit_backlog_limit=64 [ 539.468058][T11889] audit: audit_lost=33313 audit_rate_limit=0 audit_backlog_limit=64 [ 539.476361][T11889] audit: backlog limit exceeded [ 539.538845][T11890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 539.546281][T11890] audit: audit_lost=33314 audit_rate_limit=0 audit_backlog_limit=64 [ 541.300153][T11907] block device autoloading is deprecated and will be removed. [ 543.778834][T11953] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1543'. [ 544.259580][ T30] kauditd_printk_skb: 2620 callbacks suppressed [ 544.259602][ T30] audit: type=1400 audit(1756836126.119:218787): avc: denied { write } for pid=11941 comm="syz.2.1541" name="igmp" dev="proc" ino=4026532987 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 544.354496][ T30] audit: type=1400 audit(1756836126.129:218788): avc: denied { create } for pid=11941 comm="syz.2.1541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 544.584433][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.596506][ T30] audit: type=1400 audit(1756836126.129:218789): avc: denied { create } for pid=11941 comm="syz.2.1541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 544.611285][ T5515] audit: audit_lost=33315 audit_rate_limit=0 audit_backlog_limit=64 [ 544.628776][T11966] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.638161][T11966] audit: audit_lost=33316 audit_rate_limit=0 audit_backlog_limit=64 [ 544.656484][T11966] audit: backlog limit exceeded [ 544.674116][T11966] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.687392][ T30] audit: type=1400 audit(1756836126.219:218790): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 545.263704][ T5965] libceph: connect (1)[c::]:6789 error -101 [ 545.269801][ T5965] libceph: mon0 (1)[c::]:6789 connect error [ 545.399732][T11974] ceph: No mds server is up or the cluster is laggy [ 546.991773][T11998] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 546.998348][T11998] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 547.047611][T11998] vhci_hcd vhci_hcd.0: Device attached [ 547.107059][T12003] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.147594][T11998] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.170371][T11998] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.205842][T11998] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.222733][ T9] vhci_hcd: vhci_device speed not set [ 547.282672][ T9] usb 41-1: new full-speed USB device number 2 using vhci_hcd [ 547.456409][T11998] vhci_hcd vhci_hcd.0: pdev(4) rhport(5) sockfd(16) [ 547.463041][T11998] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 547.497411][T11998] vhci_hcd vhci_hcd.0: Device attached [ 547.505394][T12003] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.801699][T11998] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 547.854538][T11998] vhci_hcd vhci_hcd.0: port 0 already used [ 547.867013][T12010] vhci_hcd: connection closed [ 547.867219][T11999] vhci_hcd: connection reset by peer [ 547.891198][ T6107] vhci_hcd: stop threads [ 547.905804][ T6107] vhci_hcd: release socket [ 547.915574][ T6107] vhci_hcd: disconnect device [ 548.174083][ T6107] vhci_hcd: stop threads [ 548.178662][ T6107] vhci_hcd: release socket [ 548.412926][ T6107] vhci_hcd: disconnect device [ 549.752657][ T30] kauditd_printk_skb: 3094 callbacks suppressed [ 549.752676][ T30] audit: type=1400 audit(1756836131.599:221880): avc: denied { read write } for pid=5845 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 549.816518][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 549.825610][ T5515] audit: audit_lost=33319 audit_rate_limit=0 audit_backlog_limit=64 [ 549.839184][ T5515] audit: backlog limit exceeded [ 549.844319][ T30] audit: type=1400 audit(1756836130.879:221874): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 549.865884][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 549.875853][ T5515] audit: audit_lost=33320 audit_rate_limit=0 audit_backlog_limit=64 [ 549.941501][T12042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 549.948127][T12042] audit: audit_lost=33321 audit_rate_limit=0 audit_backlog_limit=64 [ 549.956164][T12042] audit: backlog limit exceeded [ 550.102011][T12041] netlink: 'syz.0.1563': attribute type 10 has an invalid length. [ 550.125521][T12041] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 550.148929][T12041] batadv0: entered promiscuous mode [ 550.157358][T12041] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 550.178735][T12041] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1563'. [ 550.188054][T12041] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1563'. [ 551.035160][T12056] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1567'. [ 551.077893][T12056] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1567'. [ 551.217229][T12060] bridge0: port 1(team0) entered blocking state [ 551.224094][T12060] bridge0: port 1(team0) entered disabled state [ 551.231930][T12060] team0: entered allmulticast mode [ 551.237555][T12060] team_slave_0: entered allmulticast mode [ 551.256115][T12060] team_slave_1: entered allmulticast mode [ 551.264242][T12060] team0: entered promiscuous mode [ 551.270950][T12060] team_slave_0: entered promiscuous mode [ 551.370603][T12060] team_slave_1: entered promiscuous mode [ 551.753257][T12068] netlink: 'syz.3.1571': attribute type 10 has an invalid length. [ 551.842687][T12068] hsr0: entered promiscuous mode [ 551.854987][T12068] bond0: (slave hsr0): The slave device specified does not support setting the MAC address [ 551.898271][T12068] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 551.996519][T12068] bond0: (slave hsr0): Error -22 calling dev_set_mtu [ 552.647873][ T9] vhci_hcd: vhci_device speed not set [ 554.784853][ T30] kauditd_printk_skb: 2626 callbacks suppressed [ 554.784869][ T30] audit: type=1400 audit(1756836136.689:224305): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 554.873389][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 554.879924][ T5515] audit: audit_lost=33389 audit_rate_limit=0 audit_backlog_limit=64 [ 554.882690][ T30] audit: type=1400 audit(1756836136.689:224306): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 554.930615][T12104] audit: audit_backlog=65 > audit_backlog_limit=64 [ 554.969075][T12104] audit: audit_lost=33390 audit_rate_limit=0 audit_backlog_limit=64 [ 554.971942][ T5515] audit: backlog limit exceeded [ 554.992658][T12104] audit: backlog limit exceeded [ 554.997663][ T30] audit: type=1400 audit(1756836136.689:224307): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 555.104920][ T30] audit: type=1400 audit(1756836136.689:224308): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 559.793534][ T30] kauditd_printk_skb: 7305 callbacks suppressed [ 559.793547][ T30] audit: type=1400 audit(1756836141.699:230165): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 559.930780][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 559.959043][ T5515] audit: audit_lost=33874 audit_rate_limit=0 audit_backlog_limit=64 [ 559.975910][T12166] audit: audit_backlog=65 > audit_backlog_limit=64 [ 560.024612][T12167] audit: audit_backlog=65 > audit_backlog_limit=64 [ 560.031269][T12167] audit: audit_lost=33875 audit_rate_limit=0 audit_backlog_limit=64 [ 560.039517][T12167] audit: backlog limit exceeded [ 560.055102][T12167] audit: audit_backlog=65 > audit_backlog_limit=64 [ 560.061786][T12167] audit: audit_lost=33876 audit_rate_limit=0 audit_backlog_limit=64 [ 560.070615][T12167] audit: backlog limit exceeded [ 561.999654][T12186] ceph: No mds server is up or the cluster is laggy [ 562.140155][T12200] capability: warning: `syz.0.1606' uses 32-bit capabilities (legacy support in use) [ 562.855170][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.906770][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 564.784277][T12227] netlink: 'syz.0.1613': attribute type 10 has an invalid length. [ 564.802871][ T30] kauditd_printk_skb: 3754 callbacks suppressed [ 564.802887][ T30] audit: type=1400 audit(1756836146.709:233917): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 564.842800][T12227] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1613'. [ 564.858565][T12227] bridge0: port 1(team0) entered disabled state [ 564.959074][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 564.979410][T12231] audit: audit_backlog=65 > audit_backlog_limit=64 [ 564.988475][T12231] audit: audit_lost=33878 audit_rate_limit=0 audit_backlog_limit=64 [ 565.000794][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 565.010288][ T30] audit: type=1400 audit(1756836146.729:233918): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 565.032019][ T5846] audit: audit_lost=33879 audit_rate_limit=0 audit_backlog_limit=64 [ 565.043848][T12231] audit: backlog limit exceeded [ 565.051448][ T5846] audit: backlog limit exceeded [ 565.056694][ T5515] audit: audit_lost=33880 audit_rate_limit=0 audit_backlog_limit=64 [ 565.102072][T12227] A link change request failed with some changes committed already. Interface team0 may have been left with an inconsistent configuration, please check. [ 567.589299][T12278] hsr0: left promiscuous mode [ 569.132606][T12301] netlink: 'syz.3.1635': attribute type 21 has an invalid length. [ 569.140858][T12301] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1635'. [ 569.154565][T12301] netlink: 'syz.3.1635': attribute type 21 has an invalid length. [ 569.162517][T12301] netlink: 156 bytes leftover after parsing attributes in process `syz.3.1635'. [ 569.827999][ T30] kauditd_printk_skb: 7296 callbacks suppressed [ 569.828015][ T30] audit: type=1400 audit(1756836151.729:240488): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 570.059856][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 570.066804][ T5515] audit: audit_lost=34123 audit_rate_limit=0 audit_backlog_limit=64 [ 570.075258][ T30] audit: type=1400 audit(1756836151.769:240489): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 570.097511][ T5515] audit: backlog limit exceeded [ 570.103116][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 570.109741][ T5515] audit: audit_lost=34124 audit_rate_limit=0 audit_backlog_limit=64 [ 570.118190][ T30] audit: type=1400 audit(1756836151.769:240490): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 570.140211][ T5515] audit: backlog limit exceeded [ 570.145537][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 572.074175][ T6107] Bluetooth: hci5: Frame reassembly failed (-84) [ 574.032729][T11563] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 574.832680][ T30] kauditd_printk_skb: 3888 callbacks suppressed [ 574.832691][ T30] audit: type=1400 audit(1756836156.739:244119): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 574.922096][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 574.939318][ T5515] audit: audit_lost=34212 audit_rate_limit=0 audit_backlog_limit=64 [ 574.953434][ T5515] audit: backlog limit exceeded [ 574.958508][ T30] audit: type=1400 audit(1756836156.759:244120): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 574.991493][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 575.000882][ T5515] audit: audit_lost=34213 audit_rate_limit=0 audit_backlog_limit=64 [ 575.009044][ T5515] audit: backlog limit exceeded [ 575.011815][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 575.017086][ T30] audit: type=1400 audit(1756836156.759:244121): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 578.361458][T12410] netlink: 'syz.1.1663': attribute type 21 has an invalid length. [ 578.375357][T12410] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1663'. [ 579.842655][ T30] kauditd_printk_skb: 4335 callbacks suppressed [ 579.842667][ T30] audit: type=1400 audit(1756836161.749:247201): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 579.889368][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 579.906159][ T5515] audit: audit_lost=34633 audit_rate_limit=0 audit_backlog_limit=64 [ 579.922642][ T5515] audit: backlog limit exceeded [ 579.932782][ T30] audit: type=1400 audit(1756836161.779:247202): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 579.962934][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 579.982664][ T5515] audit: audit_lost=34634 audit_rate_limit=0 audit_backlog_limit=64 [ 580.011177][ T5515] audit: backlog limit exceeded [ 580.021388][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 580.028044][ T30] audit: type=1400 audit(1756836161.779:247203): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 580.383147][T12438] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1667'. [ 584.258605][T12486] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 585.012587][ T30] kauditd_printk_skb: 6478 callbacks suppressed [ 585.012608][ T30] audit: type=1400 audit(1756836166.689:252141): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 585.069470][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 585.107017][ T30] audit: type=1400 audit(1756836166.689:252142): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 585.154917][ T5515] audit: audit_lost=35149 audit_rate_limit=0 audit_backlog_limit=64 [ 585.209244][T12502] audit: audit_backlog=65 > audit_backlog_limit=64 [ 585.215840][T12502] audit: audit_lost=35150 audit_rate_limit=0 audit_backlog_limit=64 [ 585.223883][T12502] audit: backlog limit exceeded [ 585.230919][T12502] audit: audit_backlog=65 > audit_backlog_limit=64 [ 585.237555][T12502] audit: audit_lost=35151 audit_rate_limit=0 audit_backlog_limit=64 [ 585.245608][T12502] audit: backlog limit exceeded [ 587.632166][T12537] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1694'. [ 589.841053][T12561] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1701'. [ 589.884855][T12561] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1701'. [ 590.084392][ T30] kauditd_printk_skb: 3668 callbacks suppressed [ 590.084412][ T30] audit: type=1400 audit(1756836171.969:254832): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 590.217410][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 590.242618][ T5515] audit: audit_lost=35478 audit_rate_limit=0 audit_backlog_limit=64 [ 590.268752][ T5515] audit: backlog limit exceeded [ 590.283359][ T5860] audit: audit_backlog=65 > audit_backlog_limit=64 [ 590.297843][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 590.310800][ T5860] audit: audit_lost=35479 audit_rate_limit=0 audit_backlog_limit=64 [ 590.325780][T12566] audit: audit_backlog=65 > audit_backlog_limit=64 [ 590.342311][ T5515] audit: audit_lost=35480 audit_rate_limit=0 audit_backlog_limit=64 [ 590.352010][T12566] audit: audit_lost=35481 audit_rate_limit=0 audit_backlog_limit=64 [ 592.224636][T12600] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.305836][T12600] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 593.332001][T12600] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 593.823511][T12600] veth5: left promiscuous mode [ 594.054151][T12600] bridge3: left promiscuous mode [ 594.098227][T12599] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1709'. [ 594.257700][T12602] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 594.286850][T12602] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 594.305687][T12602] batman_adv: batadv0: Removing interface: wlan0 [ 594.463090][T12602] bond0: (slave batadv0): Releasing backup interface [ 594.679076][ T3480] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.874815][ T3480] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.911105][ T3480] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.940690][ T3480] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.094725][ T30] kauditd_printk_skb: 5772 callbacks suppressed [ 595.094742][ T30] audit: type=1400 audit(1756836176.989:259270): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 595.133714][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 595.140455][ T5515] audit: audit_lost=35926 audit_rate_limit=0 audit_backlog_limit=64 [ 595.162219][ T30] audit: type=1400 audit(1756836176.999:259271): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 595.162477][ T5515] audit: backlog limit exceeded [ 595.246962][ T30] audit: type=1400 audit(1756836176.999:259272): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 595.370001][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 595.384702][ T30] audit: type=1400 audit(1756836176.999:259273): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 595.386911][ T5515] audit: audit_lost=35927 audit_rate_limit=0 audit_backlog_limit=64 [ 595.504705][ T6361] audit: audit_backlog=65 > audit_backlog_limit=64 [ 598.758942][T12666] bond_slave_0: left promiscuous mode [ 598.792277][T12666] bond_slave_1: left promiscuous mode [ 598.816078][T12666] team0: left promiscuous mode [ 598.820892][T12666] team_slave_0: left promiscuous mode [ 598.826887][T12666] team_slave_1: left promiscuous mode [ 600.149604][T12666] batadv_slave_1: left promiscuous mode [ 600.210144][ T30] kauditd_printk_skb: 4467 callbacks suppressed [ 600.210163][ T30] audit: type=1400 audit(1756836182.069:263261): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.304997][ T30] audit: type=1400 audit(1756836182.079:263262): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.351745][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.367424][ T30] audit: type=1400 audit(1756836182.079:263263): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.401196][ T5515] audit: audit_lost=36088 audit_rate_limit=0 audit_backlog_limit=64 [ 600.439610][ T5515] audit: backlog limit exceeded [ 600.439617][ T30] audit: type=1400 audit(1756836182.079:263264): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.439656][ T30] audit: type=1400 audit(1756836182.079:263265): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.465998][ C0] vkms_vblank_simulate: vblank timer overrun [ 600.583816][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.596003][ T5515] audit: audit_lost=36089 audit_rate_limit=0 audit_backlog_limit=64 [ 600.726284][T12666] bridge2: left promiscuous mode [ 600.742439][T12685] gtp0: entered promiscuous mode [ 600.772165][ T13] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.811176][ T13] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.854425][ T13] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 600.903371][ T13] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 601.165110][T12715] netlink: 88 bytes leftover after parsing attributes in process `syz.4.1739'. [ 601.262647][T12715] netlink: 'syz.4.1739': attribute type 21 has an invalid length. [ 601.262671][T12715] netlink: 128 bytes leftover after parsing attributes in process `syz.4.1739'. [ 601.262714][T12715] netlink: 'syz.4.1739': attribute type 4 has an invalid length. [ 601.262728][T12715] netlink: 3 bytes leftover after parsing attributes in process `syz.4.1739'. [ 601.274060][T12715] batadv1: entered promiscuous mode [ 601.275078][T12715] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 601.331177][ T24] libceph: connect (1)[c::]:6789 error -101 [ 601.331363][ T24] libceph: mon0 (1)[c::]:6789 connect error [ 601.592812][ T5965] libceph: connect (1)[c::]:6789 error -101 [ 601.598870][ T5965] libceph: mon0 (1)[c::]:6789 connect error [ 601.802265][T12703] ceph: No mds server is up or the cluster is laggy [ 603.569374][T12749] GUP no longer grows the stack in syz.2.1744 (12749): 200000005000-200000008000 (200000004000) [ 603.581010][T12749] CPU: 0 UID: 0 PID: 12749 Comm: syz.2.1744 Not tainted syzkaller #0 PREEMPT(full) [ 603.581044][T12749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 603.581056][T12749] Call Trace: [ 603.581066][T12749] [ 603.581074][T12749] dump_stack_lvl+0x16c/0x1f0 [ 603.581103][T12749] gup_vma_lookup+0x1d2/0x220 [ 603.581131][T12749] fixup_user_fault+0x26f/0x540 [ 603.581170][T12749] fault_in_user_writeable+0x70/0xe0 [ 603.581204][T12749] futex_lock_pi+0x681/0x7c0 [ 603.581229][T12749] ? __pfx_futex_lock_pi+0x10/0x10 [ 603.581258][T12749] ? find_held_lock+0x2b/0x80 [ 603.581285][T12749] ? futex_private_hash_put+0x18a/0x300 [ 603.581311][T12749] ? __pfx_futex_wake_mark+0x10/0x10 [ 603.581333][T12749] ? trace_sched_exit_tp+0xd1/0x120 [ 603.581349][T12749] ? __schedule+0x11a3/0x5de0 [ 603.581366][T12749] do_futex+0x11a/0x350 [ 603.581388][T12749] ? __pfx_do_futex+0x10/0x10 [ 603.581416][T12749] __x64_sys_futex+0x1e0/0x4c0 [ 603.581442][T12749] ? __pfx___x64_sys_futex+0x10/0x10 [ 603.581464][T12749] ? xfd_validate_state+0x61/0x180 [ 603.581486][T12749] ? preempt_schedule_notrace_thunk+0x16/0x30 [ 603.581515][T12749] do_syscall_64+0xcd/0x4c0 [ 603.581542][T12749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 603.581559][T12749] RIP: 0033:0x7f87b338ebe9 [ 603.581573][T12749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 603.581591][T12749] RSP: 002b:00007f87b427b038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 603.581607][T12749] RAX: ffffffffffffffda RBX: 00007f87b35c6270 RCX: 00007f87b338ebe9 [ 603.581617][T12749] RDX: 00000000fffffffd RSI: 000000000000008d RDI: 0000200000004000 [ 603.581627][T12749] RBP: 00007f87b3411e19 R08: 0000000000000000 R09: 0000000000000000 [ 603.581636][T12749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 603.581646][T12749] R13: 00007f87b35c6308 R14: 00007f87b35c6270 R15: 00007ffce8059e28 [ 603.581667][T12749] [ 603.778538][ C0] vkms_vblank_simulate: vblank timer overrun [ 604.037233][T12753] ceph: No mds server is up or the cluster is laggy [ 604.077732][ T5850] libceph: connect (1)[c::]:6789 error -101 [ 604.206662][ T5850] libceph: mon0 (1)[c::]:6789 connect error [ 605.218386][ T30] kauditd_printk_skb: 4506 callbacks suppressed [ 605.218403][ T30] audit: type=1400 audit(1756836187.109:265752): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 605.274830][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 605.282743][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 605.285777][ T30] audit: type=1400 audit(1756836187.109:265753): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 605.289286][ T5851] audit: audit_lost=36763 audit_rate_limit=0 audit_backlog_limit=64 [ 605.289301][ T5851] audit: backlog limit exceeded [ 605.332610][ T5515] audit: audit_lost=36764 audit_rate_limit=0 audit_backlog_limit=64 [ 605.368840][ T5515] audit: backlog limit exceeded [ 605.373950][ T30] audit: type=1400 audit(1756836187.119:265754): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 605.403991][ T30] audit: type=1400 audit(1756836187.119:265755): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 607.654364][T12806] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1760'. [ 607.706796][T12807] netlink: 'syz.4.1761': attribute type 27 has an invalid length. [ 608.250799][T12807] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 608.280616][T12807] batadv_slave_1: left promiscuous mode [ 608.679064][T12807] mac80211_hwsim hwsim11 syzkaller0: left promiscuous mode [ 608.692349][T12807] mac80211_hwsim hwsim11 syzkaller0: left allmulticast mode [ 608.710433][T12807] wireguard0: left promiscuous mode [ 608.718039][T12807] wireguard0: left allmulticast mode [ 608.731750][T12807] batadv1: left promiscuous mode [ 608.748788][ T6358] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.793631][ T6358] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.829868][ T6358] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.862385][ T6358] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.507396][ T51] Bluetooth: hci5: command 0x1003 tx timeout [ 609.514945][T11563] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 610.225830][ T30] kauditd_printk_skb: 4479 callbacks suppressed [ 610.225847][ T30] audit: type=1400 audit(1756836192.129:269383): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 610.417716][T12815] syz.1.1763 (12815): drop_caches: 2 [ 610.436212][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 610.447885][ T5515] audit: audit_lost=37049 audit_rate_limit=0 audit_backlog_limit=64 [ 610.464397][ T5515] audit: backlog limit exceeded [ 610.470298][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 610.492095][ T5515] audit: audit_lost=37050 audit_rate_limit=0 audit_backlog_limit=64 [ 610.500740][ T5515] audit: backlog limit exceeded [ 610.509307][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 610.509308][T12821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 610.509327][ T5515] audit: audit_lost=37051 audit_rate_limit=0 audit_backlog_limit=64 [ 612.245138][T12837] netlink: 'syz.3.1770': attribute type 8 has an invalid length. [ 612.869413][T12851] macsec1: entered promiscuous mode [ 612.915139][T12851] bridge0: entered promiscuous mode [ 613.000796][T12851] bridge0: port 2(macsec1) entered blocking state [ 613.021301][T12851] bridge0: port 2(macsec1) entered disabled state [ 613.052589][T12851] macsec1: entered allmulticast mode [ 613.058000][T12851] bridge0: entered allmulticast mode [ 613.171714][T12851] macsec1: left allmulticast mode [ 613.178659][T12851] bridge0: left allmulticast mode [ 613.269888][T12851] bridge0: left promiscuous mode [ 615.341247][ T30] kauditd_printk_skb: 7663 callbacks suppressed [ 615.341274][ T30] audit: type=1400 audit(1756836197.009:274980): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 615.400838][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.514594][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.521119][ T5851] audit: audit_lost=37741 audit_rate_limit=0 audit_backlog_limit=64 [ 615.532929][ T5515] audit: audit_lost=37742 audit_rate_limit=0 audit_backlog_limit=64 [ 615.566241][ T5515] audit: backlog limit exceeded [ 615.573382][ T30] audit: type=1400 audit(1756836197.279:274981): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 615.612645][ T5851] audit: backlog limit exceeded [ 615.622651][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.629187][ T5515] audit: audit_lost=37743 audit_rate_limit=0 audit_backlog_limit=64 [ 615.949830][T12880] Bluetooth: received HCILL_WAKE_UP_IND in state 2 [ 615.990964][ T6107] Bluetooth: hci5: Frame reassembly failed (-84) [ 617.850809][T12905] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 618.032913][ T51] Bluetooth: hci5: command 0x1003 tx timeout [ 618.042222][T11563] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 619.239079][T12923] trusted_key: encrypted_key: key user:syz not found [ 620.155560][T12940] netlink: 'syz.0.1795': attribute type 12 has an invalid length. [ 620.343400][ T5515] audit_log_start: 5158 callbacks suppressed [ 620.343414][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 620.361884][ T5515] audit: audit_lost=38274 audit_rate_limit=0 audit_backlog_limit=64 [ 620.421569][ T30] audit: type=1400 audit(1756836202.179:278549): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 620.501179][ T30] audit: type=1400 audit(1756836202.179:278550): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 620.575569][ T5515] audit: backlog limit exceeded [ 620.602630][ T30] audit: type=1400 audit(1756836202.179:278551): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 620.603248][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 620.644101][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 620.707927][T12946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 620.745915][T12946] audit: audit_lost=38275 audit_rate_limit=0 audit_backlog_limit=64 [ 624.276144][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.282714][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 625.353068][ T30] kauditd_printk_skb: 3893 callbacks suppressed [ 625.353088][ T30] audit: type=1400 audit(1756836207.179:281690): avc: denied { create } for pid=13004 comm="syz.3.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 625.878359][ T30] audit: type=1400 audit(1756836207.189:281691): avc: denied { allowed } for pid=13004 comm="syz.3.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 626.034836][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 626.041563][ T30] audit: type=1400 audit(1756836207.279:281692): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 626.063087][ T5515] audit: audit_lost=38528 audit_rate_limit=0 audit_backlog_limit=64 [ 626.073719][ T5515] audit: backlog limit exceeded [ 626.253607][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 626.262762][ T5515] audit: audit_lost=38529 audit_rate_limit=0 audit_backlog_limit=64 [ 626.270923][ T5515] audit: backlog limit exceeded [ 626.397000][ T30] audit: type=1400 audit(1756836207.279:281693): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 627.309953][T13021] IPVS: length: 147 != 8 [ 627.744336][T13032] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1818'. [ 627.753423][T13032] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1818'. [ 629.537644][T13045] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1821'. [ 629.551309][T13045] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 629.583364][T13045] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 629.603048][T13045] batman_adv: batadv0: Removing interface: wlan0 [ 630.287494][T13049] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1822'. [ 630.301273][T13049] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 630.309031][T13049] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 630.365237][ T30] kauditd_printk_skb: 16032 callbacks suppressed [ 630.365257][ T30] audit: type=1400 audit(1756836212.269:287281): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 630.459971][T13049] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 630.482189][T13049] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 630.497787][ T30] audit: type=1400 audit(1756836212.239:287280): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 630.529391][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.536518][ T5515] audit: audit_lost=42012 audit_rate_limit=0 audit_backlog_limit=64 [ 630.544915][ T5515] audit: backlog limit exceeded [ 630.573369][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.580907][ T5851] audit: audit_lost=42013 audit_rate_limit=0 audit_backlog_limit=64 [ 630.590604][T13053] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.590776][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.598709][T13055] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.622085][T13049] batman_adv: batadv0: Interface deactivated: ipvlan2 [ 630.639257][T13049] batman_adv: batadv0: Removing interface: ipvlan2 [ 633.316866][T12327] libceph: connect (1)[c::]:6789 error -101 [ 633.323147][T12327] libceph: mon0 (1)[c::]:6789 connect error [ 633.363674][T13079] ceph: No mds server is up or the cluster is laggy [ 635.376031][ T30] kauditd_printk_skb: 2735 callbacks suppressed [ 635.376048][ T30] audit: type=1400 audit(1756836217.279:289797): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 635.441259][ T30] audit: type=1400 audit(1756836217.279:289798): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 635.554621][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 635.561853][T13113] audit: audit_backlog=65 > audit_backlog_limit=64 [ 635.568601][T13113] audit: audit_lost=42088 audit_rate_limit=0 audit_backlog_limit=64 [ 635.588226][ T5515] audit: audit_lost=42089 audit_rate_limit=0 audit_backlog_limit=64 [ 635.606442][ T5515] audit: backlog limit exceeded [ 635.625759][ T30] audit: type=1400 audit(1756836217.279:289799): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 635.652213][T13113] audit: backlog limit exceeded [ 635.653602][ T30] audit: type=1400 audit(1756836217.279:289800): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 640.407739][ T30] kauditd_printk_skb: 5119 callbacks suppressed [ 640.407757][ T30] audit: type=1400 audit(1756836222.309:291758): avc: denied { prog_load } for pid=13163 comm="syz.4.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 640.458250][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.459449][ T30] audit: type=1400 audit(1756836222.339:291759): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 640.510349][ T5515] audit: audit_lost=43144 audit_rate_limit=0 audit_backlog_limit=64 [ 640.528893][ T5515] audit: backlog limit exceeded [ 640.543327][ T30] audit: type=1400 audit(1756836222.339:291760): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 640.628938][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.656405][ T5515] audit: audit_lost=43145 audit_rate_limit=0 audit_backlog_limit=64 [ 640.706075][ T30] audit: type=1400 audit(1756836222.339:291761): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 640.733644][T13173] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.304027][T13197] ptrace attach of "./syz-executor exec"[5846] was attempted by "./syz-executor exec"[13197] [ 643.380612][T13194] netlink: 'syz.1.1857': attribute type 14 has an invalid length. [ 645.867931][ T30] kauditd_printk_skb: 11699 callbacks suppressed [ 645.867958][ T30] audit: type=1400 audit(1756836227.319:295550): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 645.926087][ T30] audit: type=1400 audit(1756836227.319:295551): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 646.125207][ T30] audit: type=1400 audit(1756836227.319:295552): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 646.167340][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 646.205361][T13243] audit: audit_backlog=65 > audit_backlog_limit=64 [ 646.214848][ T5515] audit: audit_lost=45783 audit_rate_limit=0 audit_backlog_limit=64 [ 646.214893][ T30] audit: type=1400 audit(1756836227.319:295553): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 646.252685][T13243] audit: audit_lost=45784 audit_rate_limit=0 audit_backlog_limit=64 [ 646.260917][T13243] audit: backlog limit exceeded [ 646.270977][ T5515] audit: backlog limit exceeded [ 650.934148][ T5515] audit_log_start: 5503 callbacks suppressed [ 650.934165][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 650.950089][ T30] audit: type=1400 audit(1756836232.744:299485): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 650.976316][ T5515] audit: audit_lost=46309 audit_rate_limit=0 audit_backlog_limit=64 [ 650.985562][ T5515] audit: backlog limit exceeded [ 650.993761][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 651.000570][ T5515] audit: audit_lost=46310 audit_rate_limit=0 audit_backlog_limit=64 [ 651.010419][ T5515] audit: backlog limit exceeded [ 651.016417][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 651.025938][ T5515] audit: audit_lost=46311 audit_rate_limit=0 audit_backlog_limit=64 [ 651.034364][ T5515] audit: backlog limit exceeded [ 651.164272][T13306] netlink: 'syz.3.1887': attribute type 4 has an invalid length. [ 651.176622][T13306] netlink: 'syz.3.1887': attribute type 4 has an invalid length. [ 651.188946][T13306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=13306 comm=syz.3.1887 [ 651.586532][T13309] block device autoloading is deprecated and will be removed. [ 651.684600][T13312] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1888'. [ 651.693576][T13312] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1888'. [ 656.024322][ T30] kauditd_printk_skb: 13419 callbacks suppressed [ 656.024492][ T30] audit: type=1400 audit(1756836237.564:302144): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 656.082810][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 656.091727][ T30] audit: type=1400 audit(1756836237.564:302145): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 656.096067][ T5515] audit: audit_lost=49899 audit_rate_limit=0 audit_backlog_limit=64 [ 656.288261][ T30] audit: type=1400 audit(1756836237.574:302146): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 656.299341][ T5515] audit: backlog limit exceeded [ 656.310790][ T30] audit: type=1400 audit(1756836237.574:302147): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 656.339925][T13369] (unnamed net_device) (uninitialized): (slave batadv0): Device is not bonding slave [ 656.351561][T13369] (unnamed net_device) (uninitialized): option active_slave: invalid value (batadv0) [ 656.371583][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 656.390639][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 656.397859][ T5845] audit: audit_lost=49900 audit_rate_limit=0 audit_backlog_limit=64 [ 656.607523][T13373] (unnamed net_device) (uninitialized): option downdelay: invalid value (18446744073709551609) [ 656.682847][T13373] (unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647 [ 658.927845][T13404] netlink: 56 bytes leftover after parsing attributes in process `syz.4.1915'. [ 659.510831][T13414] netlink: 88 bytes leftover after parsing attributes in process `syz.2.1917'. [ 659.613593][T13416] netlink: 'syz.2.1917': attribute type 21 has an invalid length. [ 659.622627][T13416] netlink: 128 bytes leftover after parsing attributes in process `syz.2.1917'. [ 659.829755][T13416] netlink: 'syz.2.1917': attribute type 4 has an invalid length. [ 659.867961][T13416] netlink: 3 bytes leftover after parsing attributes in process `syz.2.1917'. [ 660.087301][T13414] batadv0: entered promiscuous mode [ 660.094605][T13414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 661.040556][ T30] kauditd_printk_skb: 2635 callbacks suppressed [ 661.040572][ T30] audit: type=1400 audit(1756836242.944:304768): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 661.062880][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 661.077876][T13431] audit: audit_backlog=65 > audit_backlog_limit=64 [ 661.093693][T13434] audit: audit_backlog=65 > audit_backlog_limit=64 [ 661.103988][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 661.111031][T13431] audit: audit_lost=49906 audit_rate_limit=0 audit_backlog_limit=64 [ 661.120419][ T5515] audit: audit_lost=49907 audit_rate_limit=0 audit_backlog_limit=64 [ 661.125793][T13434] audit: audit_lost=49908 audit_rate_limit=0 audit_backlog_limit=64 [ 661.130065][T13431] audit: backlog limit exceeded [ 661.137488][T13435] audit: audit_backlog=65 > audit_backlog_limit=64 [ 662.184089][ T9] libceph: connect (1)[c::]:6789 error -101 [ 662.190580][ T9] libceph: mon0 (1)[c::]:6789 connect error [ 662.364865][T13444] ceph: No mds server is up or the cluster is laggy [ 665.688601][T13502] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1939'. [ 665.699059][T13502] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1939'. [ 666.042740][ T30] kauditd_printk_skb: 6031 callbacks suppressed [ 666.042756][ T30] audit: type=1400 audit(1756836247.934:308256): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 666.111286][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 666.135876][ T5515] audit: audit_lost=50757 audit_rate_limit=0 audit_backlog_limit=64 [ 666.148837][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 666.161530][ T5515] audit: backlog limit exceeded [ 666.178238][ T5851] audit: audit_lost=50758 audit_rate_limit=0 audit_backlog_limit=64 [ 666.188544][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 666.209827][ T5851] audit: backlog limit exceeded [ 666.216955][ T5515] audit: audit_lost=50759 audit_rate_limit=0 audit_backlog_limit=64 [ 666.270364][ T30] audit: type=1400 audit(1756836247.954:308257): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 668.496811][T13530] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1946'. [ 668.513503][T13530] netlink: 16 bytes leftover after parsing attributes in process `syz.3.1946'. [ 670.856099][T13554] bond0: (slave bond0): Error: Device is in use and cannot be enslaved [ 671.054238][ T30] kauditd_printk_skb: 3870 callbacks suppressed [ 671.054254][ T30] audit: type=1400 audit(1756836252.939:311548): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.082742][ T30] audit: type=1400 audit(1756836252.959:311549): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.145998][ T30] audit: type=1400 audit(1756836252.959:311550): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.168786][ T30] audit: type=1400 audit(1756836252.959:311551): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.190428][ T30] audit: type=1400 audit(1756836252.959:311552): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.216773][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 671.226530][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 671.234281][ T5515] audit: audit_lost=50953 audit_rate_limit=0 audit_backlog_limit=64 [ 671.499282][ T30] audit: type=1400 audit(1756836252.959:311553): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.522539][ T5845] audit: audit_lost=50954 audit_rate_limit=0 audit_backlog_limit=64 [ 671.981778][T13568] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 671.988353][T13568] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 672.016908][T13568] vhci_hcd vhci_hcd.0: Device attached [ 672.062082][T13575] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1959'. [ 672.235022][T12327] vhci_hcd: vhci_device speed not set [ 672.302611][T12327] usb 41-1: new full-speed USB device number 3 using vhci_hcd [ 673.744623][T13596] sctp: [Deprecated]: syz.2.1964 (pid 13596) Use of int in maxseg socket option. [ 673.744623][T13596] Use struct sctp_assoc_value instead [ 676.183671][ T30] kauditd_printk_skb: 5441 callbacks suppressed [ 676.183689][ T30] audit: type=1400 audit(1756836258.090:316294): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 676.291970][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 676.300147][T13620] audit: audit_backlog=65 > audit_backlog_limit=64 [ 676.300413][ T5851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 676.306812][ T5515] audit: audit_lost=51188 audit_rate_limit=0 audit_backlog_limit=64 [ 676.342676][ T30] audit: type=1400 audit(1756836258.090:316295): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 676.367063][ T5515] audit: backlog limit exceeded [ 676.372076][ T5851] audit: audit_lost=51189 audit_rate_limit=0 audit_backlog_limit=64 [ 676.372230][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 676.388328][T13621] audit: audit_backlog=65 > audit_backlog_limit=64 [ 680.271483][T13678] netlink: 172 bytes leftover after parsing attributes in process `syz.2.1986'. [ 680.357361][T13678] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1986'. [ 680.380996][T13678] netlink: 172 bytes leftover after parsing attributes in process `syz.2.1986'. [ 680.402003][T13678] netlink: 100 bytes leftover after parsing attributes in process `syz.2.1986'. [ 680.472615][T13678] netlink: 32 bytes leftover after parsing attributes in process `syz.2.1986'. [ 681.193828][ T30] kauditd_printk_skb: 4722 callbacks suppressed [ 681.193847][ T30] audit: type=1400 audit(1756836263.100:320441): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 681.293374][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 681.299905][ T5515] audit: audit_lost=51383 audit_rate_limit=0 audit_backlog_limit=64 [ 681.311336][ T30] audit: type=1400 audit(1756836263.100:320442): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 681.344916][T13685] audit: audit_backlog=65 > audit_backlog_limit=64 [ 681.351457][T13685] audit: audit_lost=51384 audit_rate_limit=0 audit_backlog_limit=64 [ 681.367818][T13687] audit: audit_backlog=65 > audit_backlog_limit=64 [ 681.370405][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 681.374800][T13685] audit: backlog limit exceeded [ 681.387974][ T5515] audit: backlog limit exceeded [ 685.714776][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.721366][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 686.208985][ T30] kauditd_printk_skb: 4010 callbacks suppressed [ 686.209003][ T30] audit: type=1400 audit(1756836268.116:324449): avc: denied { prog_load } for pid=13750 comm="syz.2.2007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 686.288276][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 686.302949][T13755] audit: audit_backlog=65 > audit_backlog_limit=64 [ 686.316210][ T30] audit: type=1400 audit(1756836268.146:324450): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 686.337946][ T5515] audit: audit_lost=51387 audit_rate_limit=0 audit_backlog_limit=64 [ 686.353971][ T5515] audit: backlog limit exceeded [ 686.354011][T13755] audit: audit_lost=51388 audit_rate_limit=0 audit_backlog_limit=64 [ 686.359309][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 686.367994][T13753] audit: audit_backlog=65 > audit_backlog_limit=64 [ 686.374120][ T30] audit: type=1400 audit(1756836268.146:324451): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 688.160849][T13788] netlink: 'syz.1.2015': attribute type 4 has an invalid length. [ 690.662256][T13826] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2029'. [ 691.348846][ T30] kauditd_printk_skb: 9932 callbacks suppressed [ 691.348868][ T30] audit: type=1400 audit(1756836273.236:332840): avc: denied { allowed } for pid=13833 comm="syz.0.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 691.760629][T13840] Bluetooth: received HCILL_WAKE_UP_IND in state 2 [ 691.795665][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 691.797363][ T6358] Bluetooth: hci5: Frame reassembly failed (-84) [ 691.818310][ T30] audit: type=1400 audit(1756836273.316:332841): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 691.876232][ T30] audit: type=1400 audit(1756836273.316:332842): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 691.916626][ T30] audit: type=1400 audit(1756836273.316:332843): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.007898][ T5515] audit: audit_lost=51904 audit_rate_limit=0 audit_backlog_limit=64 [ 692.024527][ T5515] audit: backlog limit exceeded [ 692.036379][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 692.046763][ T5515] audit: audit_lost=51905 audit_rate_limit=0 audit_backlog_limit=64 [ 692.106999][ T30] audit: type=1400 audit(1756836273.366:332845): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 693.792639][T11563] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 696.352745][ T30] kauditd_printk_skb: 3010 callbacks suppressed [ 696.352762][ T30] audit: type=1400 audit(1756836278.266:335854): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 696.376014][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 696.472353][ T5515] audit: audit_lost=51906 audit_rate_limit=0 audit_backlog_limit=64 [ 696.508777][ T5515] audit: backlog limit exceeded [ 696.519654][T13900] audit: audit_backlog=65 > audit_backlog_limit=64 [ 696.533234][T13900] audit: audit_lost=51907 audit_rate_limit=0 audit_backlog_limit=64 [ 696.542093][T13900] audit: backlog limit exceeded [ 696.550414][T13900] audit: audit_backlog=65 > audit_backlog_limit=64 [ 696.558206][T13900] audit: audit_lost=51908 audit_rate_limit=0 audit_backlog_limit=64 [ 696.567001][T13900] audit: backlog limit exceeded [ 701.362900][ T30] kauditd_printk_skb: 7650 callbacks suppressed [ 701.362917][ T30] audit: type=1400 audit(1756836283.246:340868): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 701.430775][ T30] audit: type=1400 audit(1756836283.266:340869): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 701.455432][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 701.467719][T13964] audit: audit_backlog=65 > audit_backlog_limit=64 [ 701.500082][ T5860] audit: audit_backlog=65 > audit_backlog_limit=64 [ 701.508142][ T5860] audit: audit_lost=52788 audit_rate_limit=0 audit_backlog_limit=64 [ 701.522641][ T5515] audit: audit_lost=52789 audit_rate_limit=0 audit_backlog_limit=64 [ 701.540924][ T30] audit: type=1400 audit(1756836283.266:340870): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 701.552671][ T5515] audit: backlog limit exceeded [ 701.571021][ T5860] audit: backlog limit exceeded [ 702.740144][T13988] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2072'. [ 703.221887][T13997] bond0: (slave ip6gretap0): Enslaving as an active interface with an up link [ 703.899266][T13997] netlink: 'syz.2.2073': attribute type 1 has an invalid length. [ 703.993740][T13997] 8021q: adding VLAN 0 to HW filter on device bond3 [ 704.112886][T13997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13997 comm=syz.2.2073 [ 704.207220][T13998] bond3: (slave veth7): Enslaving as an active interface with a down link [ 704.371269][T14010] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2076'. [ 705.634457][T14038] mkiss: ax0: crc mode is auto. [ 706.374663][ T30] kauditd_printk_skb: 6020 callbacks suppressed [ 706.374681][ T30] audit: type=1400 audit(1756836288.266:346454): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 706.437302][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 706.451472][ T5515] audit: audit_lost=52936 audit_rate_limit=0 audit_backlog_limit=64 [ 706.457026][ T30] audit: type=1400 audit(1756836288.286:346455): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 706.482395][ T5515] audit: backlog limit exceeded [ 706.506146][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 706.534815][ T5515] audit: audit_lost=52937 audit_rate_limit=0 audit_backlog_limit=64 [ 706.564400][ T30] audit: type=1400 audit(1756836288.286:346456): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 706.667708][ T5515] audit: backlog limit exceeded [ 706.699677][ T30] audit: type=1400 audit(1756836288.286:346457): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 708.470752][T14077] netlink: 'syz.3.2094': attribute type 12 has an invalid length. [ 710.376249][T14104] block nbd0: Attempted send on invalid socket [ 710.383914][T14104] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 711.439511][ T30] kauditd_printk_skb: 5174 callbacks suppressed [ 711.439558][ T30] audit: type=1400 audit(1756836293.296:349295): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 711.491564][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 711.507189][ T30] audit: type=1400 audit(1756836293.346:349296): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 711.528792][ T5515] audit: audit_lost=53717 audit_rate_limit=0 audit_backlog_limit=64 [ 711.560091][ T5515] audit: backlog limit exceeded [ 711.569435][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 711.586690][ T5515] audit: audit_lost=53718 audit_rate_limit=0 audit_backlog_limit=64 [ 711.597026][ T30] audit: type=1400 audit(1756836293.346:349297): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 711.660694][ T5515] audit: backlog limit exceeded [ 711.676389][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 712.201929][T14130] netlink: 'syz.2.2107': attribute type 1 has an invalid length. [ 712.637539][T14130] 8021q: adding VLAN 0 to HW filter on device bond4 [ 715.634568][T14184] ptrace attach of "./syz-executor exec"[5851] was attempted by "./syz-executor exec"[14184] [ 716.432707][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 716.456886][ T30] kauditd_printk_skb: 5294 callbacks suppressed [ 716.456903][ T30] audit: type=1400 audit(1756836298.366:354005): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.501406][ T30] audit: type=1400 audit(1756836298.366:354006): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.542932][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.550625][ T5515] audit: audit_lost=53915 audit_rate_limit=0 audit_backlog_limit=64 [ 716.610286][ T30] audit: type=1400 audit(1756836298.366:354007): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.618810][ T5515] audit: backlog limit exceeded [ 716.862765][ T30] audit: type=1400 audit(1756836298.366:354008): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.906148][ T30] audit: type=1400 audit(1756836298.366:354009): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.944676][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 717.022858][ T5515] audit: audit_lost=53916 audit_rate_limit=0 audit_backlog_limit=64 [ 718.572159][T14216] netlink: 5 bytes leftover after parsing attributes in process `syz.3.2128'. [ 718.583766][T14216] 0猉功D: renamed from macvtap0 [ 718.599280][T14216] 0猉功D: entered allmulticast mode [ 718.604651][T14216] veth0_macvtap: entered allmulticast mode [ 718.611650][T14216] A link change request failed with some changes committed already. Interface 30猉功D may have been left with an inconsistent configuration, please check. [ 719.931503][T14233] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2134'. [ 720.851175][T14251] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2137'. [ 720.867762][T14251] netlink: 'syz.4.2137': attribute type 10 has an invalid length. [ 720.876298][T14251] team0: Device bond0 is already an upper device of the team interface [ 720.889970][T14251] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2137'. [ 721.574656][ T30] kauditd_printk_skb: 3569 callbacks suppressed [ 721.574670][ T30] audit: type=1400 audit(1756836303.416:357395): avc: denied { prog_load } for pid=14255 comm="syz.1.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 721.665342][ T30] audit: type=1400 audit(1756836303.416:357396): avc: denied { create } for pid=14255 comm="syz.1.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 721.758713][ T30] audit: type=1400 audit(1756836303.666:357397): avc: denied { read } for pid=14255 comm="syz.1.2139" dev="nsfs" ino=4026532785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 721.940612][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 722.008596][ T5515] audit: audit_lost=53978 audit_rate_limit=0 audit_backlog_limit=64 [ 722.023922][ T30] audit: type=1400 audit(1756836303.666:357398): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 722.045545][ T5515] audit: backlog limit exceeded [ 722.087899][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 722.134972][ T5515] audit: audit_lost=53979 audit_rate_limit=0 audit_backlog_limit=64 [ 722.184898][ T30] audit: type=1400 audit(1756836303.666:357399): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.692344][ T30] kauditd_printk_skb: 5090 callbacks suppressed [ 726.692360][ T30] audit: type=1400 audit(1756836308.596:362276): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.880454][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.885512][T14323] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.894509][ T5515] audit: audit_lost=54051 audit_rate_limit=0 audit_backlog_limit=64 [ 726.912910][ T30] audit: type=1400 audit(1756836308.646:362277): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.937710][ T5515] audit: backlog limit exceeded [ 726.948994][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.961848][ T5515] audit: audit_lost=54052 audit_rate_limit=0 audit_backlog_limit=64 [ 726.979091][ T30] audit: type=1400 audit(1756836308.646:362278): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 727.002444][ T5515] audit: backlog limit exceeded [ 727.038037][T14323] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2156'. [ 729.437228][T14356] netlink: 'syz.2.2162': attribute type 10 has an invalid length. [ 729.499027][T14356] team0: Device hsr_slave_0 failed to register rx_handler [ 729.737816][T14359] IPv6: NLM_F_CREATE should be specified when creating new route [ 730.649622][T14374] netlink: 172 bytes leftover after parsing attributes in process `syz.0.2168'. [ 730.672920][T14374] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2168'. [ 730.689036][T14374] netlink: 172 bytes leftover after parsing attributes in process `syz.0.2168'. [ 730.752615][T14374] netlink: 100 bytes leftover after parsing attributes in process `syz.0.2168'. [ 730.818454][T14374] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2168'. [ 731.693108][ T30] kauditd_printk_skb: 3428 callbacks suppressed [ 731.693124][ T30] audit: type=1400 audit(1756836313.606:364784): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.723666][T14385] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.732620][T14385] audit: audit_lost=54361 audit_rate_limit=0 audit_backlog_limit=64 [ 731.742569][T14385] audit: backlog limit exceeded [ 731.750893][T14385] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.757548][T14385] audit: audit_lost=54362 audit_rate_limit=0 audit_backlog_limit=64 [ 731.765602][T14385] audit: backlog limit exceeded [ 731.877606][T14387] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.895207][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.901723][ T5515] audit: audit_lost=54363 audit_rate_limit=0 audit_backlog_limit=64 [ 736.705412][ T30] kauditd_printk_skb: 4861 callbacks suppressed [ 736.705428][ T30] audit: type=1400 audit(1756836318.596:369295): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 736.814431][ T30] audit: type=1400 audit(1756836318.616:369296): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 736.907866][ T30] audit: type=1400 audit(1756836318.616:369297): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 736.982546][ T30] audit: type=1400 audit(1756836318.616:369298): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 736.986402][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 737.098571][ T30] audit: type=1400 audit(1756836318.616:369299): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 737.143059][ T5515] audit: audit_lost=54481 audit_rate_limit=0 audit_backlog_limit=64 [ 737.179744][ T5515] audit: backlog limit exceeded [ 737.203847][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 737.217370][T14453] audit: audit_backlog=65 > audit_backlog_limit=64 [ 741.718492][ T30] kauditd_printk_skb: 3997 callbacks suppressed [ 741.718510][ T30] audit: type=1400 audit(1756836323.616:373293): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 741.793834][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 741.951519][ T5515] audit: audit_lost=54484 audit_rate_limit=0 audit_backlog_limit=64 [ 741.965893][ T30] audit: type=1400 audit(1756836323.626:373294): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 741.996469][ T5515] audit: backlog limit exceeded [ 742.120435][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 742.141247][ T5515] audit: audit_lost=54485 audit_rate_limit=0 audit_backlog_limit=64 [ 742.151573][ T30] audit: type=1400 audit(1756836323.626:373295): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 742.192486][ T5515] audit: backlog limit exceeded [ 742.203702][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 742.517580][T14516] netlink: 'syz.3.2206': attribute type 10 has an invalid length. [ 742.543538][T14516] 8021q: adding VLAN 0 to HW filter on device team0 [ 742.666205][T14516] team0: entered allmulticast mode [ 742.692996][T14516] bond0: (slave team0): Enslaving as an active interface with an up link [ 743.249583][T14535] netlink: 5 bytes leftover after parsing attributes in process `syz.3.2211'. [ 743.267829][T14535] 0{X功: renamed from gretap0 [ 743.280910][T14535] 0{X功: entered allmulticast mode [ 743.290041][T14535] A link change request failed with some changes committed already. Interface 30{X功 may have been left with an inconsistent configuration, please check. [ 743.686640][T14541] block nbd0: Attempted send on invalid socket [ 743.693188][T14541] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 746.885662][ T30] kauditd_printk_skb: 4083 callbacks suppressed [ 746.885677][ T30] audit: type=1400 audit(1756836328.486:376808): avc: denied { create } for pid=14573 comm="syz.0.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 746.970011][ T30] audit: type=1400 audit(1756836328.486:376809): avc: denied { create } for pid=14573 comm="syz.0.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 746.994477][T14578] bond2: (slave veth0_to_bond): Releasing backup interface [ 746.995869][ T30] audit: type=1400 audit(1756836328.486:376810): avc: denied { create } for pid=14573 comm="syz.0.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 747.023280][ T30] audit: type=1400 audit(1756836328.826:376811): avc: denied { read write } for pid=6361 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 747.048363][ T30] audit: type=1400 audit(1756836328.376:376807): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 747.069877][ T30] audit: type=1400 audit(1756836328.846:376812): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 747.093626][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.101556][ T5515] audit: audit_lost=54677 audit_rate_limit=0 audit_backlog_limit=64 [ 747.120575][ T5515] audit: backlog limit exceeded [ 747.121248][T14581] audit: audit_backlog=65 > audit_backlog_limit=64 [ 747.161270][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 747.168095][T14578] bond0: (slave bond_slave_0): Releasing backup interface [ 747.172057][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 747.455147][T14578] bond0: (slave bond_slave_1): Releasing backup interface [ 747.476210][T14578] team_slave_0: left allmulticast mode [ 747.493888][T14578] team0: Port device team_slave_0 removed [ 747.576691][T14578] team_slave_1: left allmulticast mode [ 747.651286][T14578] team0: Port device team_slave_1 removed [ 747.668290][T14578] bond3: (slave batadv_slave_1): Releasing active interface [ 747.704090][T14578] bond1: (slave ip6gretap1): Releasing backup interface [ 747.712059][T14578] bond1: (slave ip6gretap1): the permanent HWaddr of slave - 8a:f7:70:20:17:af - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 747.738108][T14578] bond1: (slave macvlan2): Removing an active aggregator [ 747.749918][T14578] bond1: (slave macvlan2): Releasing backup interface [ 748.181116][T14601] netlink: 'syz.1.2228': attribute type 10 has an invalid length. [ 748.220344][T14601] team0: Port device netdevsim0 added [ 749.944388][T14631] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14631 comm=syz.0.2237 [ 751.894737][ T30] kauditd_printk_skb: 3499 callbacks suppressed [ 751.894752][ T30] audit: type=1400 audit(1756836333.806:379488): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.952329][ T30] audit: type=1400 audit(1756836333.836:379489): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.973769][ T30] audit: type=1400 audit(1756836333.836:379490): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.977370][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 751.995180][ T30] audit: type=1400 audit(1756836333.836:379491): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.995220][ T30] audit: type=1400 audit(1756836333.836:379492): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.995257][ T30] audit: type=1400 audit(1756836333.836:379493): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.995301][ T30] audit: type=1400 audit(1756836333.836:379494): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.995336][ T30] audit: type=1400 audit(1756836333.836:379495): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 752.172550][ T5515] audit: audit_lost=54953 audit_rate_limit=0 audit_backlog_limit=64 [ 756.127620][T14684] C: renamed from team_slave_0 [ 756.165166][T14684] netlink: 'syz.3.2250': attribute type 3 has an invalid length. [ 756.173591][T14684] netlink: 152 bytes leftover after parsing attributes in process `syz.3.2250'. [ 756.209407][T14684] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 757.005224][ T30] kauditd_printk_skb: 7738 callbacks suppressed [ 757.005246][ T30] audit: type=1400 audit(1756836338.896:386438): avc: denied { prog_load } for pid=14681 comm="syz.4.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 757.141532][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.160856][ T5515] audit: audit_lost=55219 audit_rate_limit=0 audit_backlog_limit=64 [ 757.169589][ T30] audit: type=1400 audit(1756836338.916:386439): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 757.175950][T14711] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.198839][ T5515] audit: backlog limit exceeded [ 757.204263][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 757.211124][ T5515] audit: audit_lost=55220 audit_rate_limit=0 audit_backlog_limit=64 [ 757.220463][T14711] audit: audit_lost=55221 audit_rate_limit=0 audit_backlog_limit=64 [ 757.230543][ T5515] audit: backlog limit exceeded [ 757.301178][T14713] netlink: 'syz.3.2260': attribute type 2 has an invalid length. [ 762.014348][ T30] kauditd_printk_skb: 7696 callbacks suppressed [ 762.014360][ T30] audit: type=1400 audit(1756836343.916:392185): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 762.112629][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 762.134133][ T5515] audit: audit_lost=55872 audit_rate_limit=0 audit_backlog_limit=64 [ 762.134157][ T5515] audit: backlog limit exceeded [ 762.134279][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 762.134290][ T5515] audit: audit_lost=55873 audit_rate_limit=0 audit_backlog_limit=64 [ 762.134301][ T5515] audit: backlog limit exceeded [ 762.134361][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 762.134373][ T5515] audit: audit_lost=55874 audit_rate_limit=0 audit_backlog_limit=64 [ 762.134384][ T5515] audit: backlog limit exceeded [ 762.413946][T14789] netlink: 172 bytes leftover after parsing attributes in process `syz.1.2279'. [ 762.459312][T14789] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2279'. [ 762.811601][T14789] netlink: 172 bytes leftover after parsing attributes in process `syz.1.2279'. [ 763.009112][T14789] netlink: 100 bytes leftover after parsing attributes in process `syz.1.2279'. [ 763.093559][T14789] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2279'. [ 765.513252][T14818] netlink: 'syz.3.2289': attribute type 1 has an invalid length. [ 765.551258][T14818] 8021q: adding VLAN 0 to HW filter on device bond5 [ 765.684336][T14818] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14818 comm=syz.3.2289 [ 765.775545][T14821] bond5: (slave veth3): Enslaving as an active interface with a down link [ 767.082276][T14842] audit_log_start: 6908 callbacks suppressed [ 767.082301][T14842] audit: audit_backlog=65 > audit_backlog_limit=64 [ 767.098249][ T30] audit: type=1400 audit(1756836348.706:395059): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098298][ T30] audit: type=1400 audit(1756836348.706:395060): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098336][ T30] audit: type=1400 audit(1756836348.706:395061): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098372][ T30] audit: type=1400 audit(1756836348.706:395062): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098433][ T30] audit: type=1400 audit(1756836348.706:395063): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098473][ T30] audit: type=1400 audit(1756836348.706:395064): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098509][ T30] audit: type=1400 audit(1756836348.706:395065): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098547][ T30] audit: type=1400 audit(1756836348.706:395066): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.098585][ T30] audit: type=1400 audit(1756836348.706:395067): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.381888][T14840] syz.1.2291 (14840): drop_caches: 2 [ 768.461923][T14846] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 770.607441][T14876] netlink: 'syz.4.2303': attribute type 4 has an invalid length. [ 772.091556][ T30] kauditd_printk_skb: 4225 callbacks suppressed [ 772.091573][ T30] audit: type=1400 audit(1756836353.986:399291): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.135163][ T30] audit: type=1400 audit(1756836353.986:399292): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.157361][ T30] audit: type=1400 audit(1756836353.986:399293): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.178846][ T30] audit: type=1400 audit(1756836353.986:399294): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.200978][ T30] audit: type=1400 audit(1756836353.986:399295): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.224514][ T30] audit: type=1400 audit(1756836353.996:399296): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.249226][ T30] audit: type=1400 audit(1756836353.996:399297): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 772.310564][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 772.320467][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 772.390580][T14893] audit: audit_backlog=65 > audit_backlog_limit=64 [ 772.407896][T14893] netlink: 'syz.4.2306': attribute type 21 has an invalid length. [ 772.416305][T14893] netlink: 128 bytes leftover after parsing attributes in process `syz.4.2306'. [ 772.427015][T14893] netlink: 'syz.4.2306': attribute type 4 has an invalid length. [ 772.437041][T14893] netlink: 3 bytes leftover after parsing attributes in process `syz.4.2306'. [ 772.499820][T14895] batadv2: entered promiscuous mode [ 772.510029][T14895] 8021q: adding VLAN 0 to HW filter on device batadv2 [ 776.428330][T14936] sp0: Synchronizing with TNC [ 777.100139][ T30] kauditd_printk_skb: 4372 callbacks suppressed [ 777.100177][ T30] audit: type=1400 audit(1756836359.006:403484): avc: denied { create } for pid=14948 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 777.210883][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 777.220401][T14947] audit: audit_backlog=65 > audit_backlog_limit=64 [ 777.234121][ T5515] audit: audit_lost=57284 audit_rate_limit=0 audit_backlog_limit=64 [ 777.265207][ T5515] audit: backlog limit exceeded [ 777.277317][ T30] audit: type=1400 audit(1756836359.016:403485): avc: denied { execmem } for pid=14948 comm="syz.3.2319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 777.312540][ T30] audit: type=1400 audit(1756836359.046:403486): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 777.338685][T14947] audit: audit_lost=57285 audit_rate_limit=0 audit_backlog_limit=64 [ 777.524832][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 777.541099][ T30] audit: type=1400 audit(1756836359.046:403487): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 780.837901][T14991] ptrace attach of "./syz-executor exec"[6361] was attempted by "./syz-executor exec"[14991] [ 780.998434][T14998] netlink: 9 bytes leftover after parsing attributes in process `syz.1.2332'. [ 781.018995][T14998] gretap0: entered promiscuous mode [ 781.068816][T14998] netlink: 5 bytes leftover after parsing attributes in process `syz.1.2332'. [ 781.105301][T14998] 0{X功: renamed from gretap0 [ 781.153738][T14998] 0{X功: left promiscuous mode [ 781.159024][T14998] 0{X功: entered allmulticast mode [ 781.171008][T14998] A link change request failed with some changes committed already. Interface 30{X功 may have been left with an inconsistent configuration, please check. [ 782.104403][ T30] kauditd_printk_skb: 6905 callbacks suppressed [ 782.104417][ T30] audit: type=1400 audit(1756836364.016:406280): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 782.155885][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 782.165679][ T5515] audit: audit_lost=58657 audit_rate_limit=0 audit_backlog_limit=64 [ 782.166271][T15011] audit: audit_backlog=65 > audit_backlog_limit=64 [ 782.181999][ T5515] audit: backlog limit exceeded [ 782.187200][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 782.195823][T15011] audit: audit_lost=58658 audit_rate_limit=0 audit_backlog_limit=64 [ 782.202614][ T5515] audit: audit_lost=58659 audit_rate_limit=0 audit_backlog_limit=64 [ 782.206100][ T30] audit: type=1400 audit(1756836364.016:406281): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 782.215734][ T5515] audit: backlog limit exceeded [ 786.379616][T15069] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2349'. [ 787.140160][ T30] kauditd_printk_skb: 3343 callbacks suppressed [ 787.140180][ T30] audit: type=1400 audit(1756836369.046:409192): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 787.332986][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 787.449479][ T5515] audit: audit_lost=58804 audit_rate_limit=0 audit_backlog_limit=64 [ 787.458934][ T5515] audit: backlog limit exceeded [ 787.613361][ T30] audit: type=1400 audit(1756836369.046:409193): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 787.626732][T15084] mac80211_hwsim hwsim11 syzkaller0: entered promiscuous mode [ 787.635588][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 787.662432][ T5515] audit: audit_lost=58805 audit_rate_limit=0 audit_backlog_limit=64 [ 787.672499][T15084] mac80211_hwsim hwsim11 syzkaller0: entered allmulticast mode [ 787.749326][ T30] audit: type=1400 audit(1756836369.046:409194): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 787.783096][ T5515] audit: backlog limit exceeded [ 787.788298][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 789.589876][T15122] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2364'. [ 789.845065][T15122] netlink: 'syz.3.2364': attribute type 10 has an invalid length. [ 789.854611][T15122] team0: Device bond0 is already an upper device of the team interface [ 789.888123][T15122] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2364'. [ 792.142555][ T30] kauditd_printk_skb: 5913 callbacks suppressed [ 792.142571][ T30] audit: type=1400 audit(1756836374.046:413267): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 792.187106][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 792.194034][ T5515] audit: audit_lost=59420 audit_rate_limit=0 audit_backlog_limit=64 [ 792.206200][ T5515] audit: backlog limit exceeded [ 792.211427][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 792.218446][ T5515] audit: audit_lost=59421 audit_rate_limit=0 audit_backlog_limit=64 [ 792.226758][ T5515] audit: backlog limit exceeded [ 792.234184][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 792.248481][T15154] audit: audit_backlog=65 > audit_backlog_limit=64 [ 792.269118][ T30] audit: type=1400 audit(1756836374.056:413268): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.226121][T15203] netlink: 'syz.2.2384': attribute type 10 has an invalid length. [ 797.154981][ T30] kauditd_printk_skb: 3632 callbacks suppressed [ 797.154993][ T30] audit: type=1400 audit(1756836379.066:416822): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 797.213600][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 797.237937][ T5515] audit: audit_lost=59449 audit_rate_limit=0 audit_backlog_limit=64 [ 797.686789][ T30] audit: type=1400 audit(1756836379.066:416823): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 797.730835][ T5515] audit: backlog limit exceeded [ 797.744003][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 797.750518][ T5515] audit: audit_lost=59450 audit_rate_limit=0 audit_backlog_limit=64 [ 797.784919][ T30] audit: type=1400 audit(1756836379.066:416824): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 797.812700][ T5515] audit: backlog limit exceeded [ 797.832773][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 800.215692][T15264] mac80211_hwsim hwsim11 syzkaller0: left allmulticast mode [ 802.165404][ T30] kauditd_printk_skb: 5731 callbacks suppressed [ 802.165420][ T30] audit: type=1400 audit(1756836384.076:422128): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.255338][ T30] audit: type=1400 audit(1756836384.076:422129): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.324244][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.347235][T15297] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.359636][ T30] audit: type=1400 audit(1756836384.076:422130): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.411725][ T5515] audit: audit_lost=59594 audit_rate_limit=0 audit_backlog_limit=64 [ 802.424402][ T5515] audit: backlog limit exceeded [ 802.443396][T15297] audit: audit_lost=59595 audit_rate_limit=0 audit_backlog_limit=64 [ 802.454247][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.483974][ T5515] audit: audit_lost=59596 audit_rate_limit=0 audit_backlog_limit=64 [ 803.051627][T15308] netlink: 'syz.0.2415': attribute type 10 has an invalid length. [ 803.103127][T15311] netlink: 'syz.0.2415': attribute type 10 has an invalid length. [ 803.113256][T15311] netlink: 2 bytes leftover after parsing attributes in process `syz.0.2415'. [ 803.181040][T15308] team0: left allmulticast mode [ 803.286622][T15311] team0: entered promiscuous mode [ 803.297051][T15311] 8021q: adding VLAN 0 to HW filter on device team0 [ 807.172590][ T30] kauditd_printk_skb: 4411 callbacks suppressed [ 807.172613][ T30] audit: type=1400 audit(1756836389.076:426069): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 807.251311][ T30] audit: type=1400 audit(1756836389.086:426070): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 807.313878][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.322461][ T5515] audit: audit_lost=59754 audit_rate_limit=0 audit_backlog_limit=64 [ 807.341622][ T6361] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.357167][ T30] audit: type=1400 audit(1756836389.086:426071): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 807.372522][ T5515] audit: backlog limit exceeded [ 807.402996][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.409707][ T5515] audit: audit_lost=59755 audit_rate_limit=0 audit_backlog_limit=64 [ 807.412633][ T6361] audit: audit_lost=59756 audit_rate_limit=0 audit_backlog_limit=64 [ 808.460300][T15376] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2430'. [ 808.602073][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.608959][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 812.031842][T15418] 0{X功: left allmulticast mode [ 812.079794][T15418] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 812.562651][ T30] kauditd_printk_skb: 8050 callbacks suppressed [ 812.562674][ T30] audit: type=1400 audit(1756836394.186:430536): avc: denied { create } for pid=15419 comm="syz.0.2445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 812.683744][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 812.690282][ T5515] audit: audit_lost=60952 audit_rate_limit=0 audit_backlog_limit=64 [ 812.719867][ T5515] audit: backlog limit exceeded [ 812.744678][ T30] audit: type=1400 audit(1756836394.342:430537): avc: denied { bpf } for pid=15419 comm="syz.0.2445" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 812.787879][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 812.832826][ T30] audit: type=1400 audit(1756836394.402:430538): avc: denied { prog_load } for pid=15419 comm="syz.0.2445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 812.887151][ T5515] audit: audit_lost=60953 audit_rate_limit=0 audit_backlog_limit=64 [ 812.892469][ T30] audit: type=1400 audit(1756836394.522:430539): avc: denied { read } for pid=15419 comm="syz.0.2445" name="video8" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 812.924436][ T5515] audit: backlog limit exceeded [ 813.396760][T15435] netlink: 5 bytes leftover after parsing attributes in process `syz.0.2448'. [ 813.405986][T15435] 0{X功: renamed from gretap0 [ 813.750339][T15435] 0{X功: entered allmulticast mode [ 813.757825][T15435] A link change request failed with some changes committed already. Interface 30{X功 may have been left with an inconsistent configuration, please check. [ 814.736149][T15456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 814.746586][T15456] 8021q: adding VLAN 0 to HW filter on device team0 [ 815.296980][T15456] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 817.573148][ T30] kauditd_printk_skb: 5875 callbacks suppressed [ 817.573166][ T30] audit: type=1400 audit(1756836399.472:432982): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.618936][ T30] audit: type=1400 audit(1756836399.482:432983): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.641506][ T30] audit: type=1400 audit(1756836399.482:432984): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.696285][ T30] audit: type=1400 audit(1756836399.482:432985): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.720094][ T30] audit: type=1400 audit(1756836399.482:432986): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.720493][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.742974][ T30] audit: type=1400 audit(1756836399.482:432987): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.868105][T15496] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.875024][ T30] audit: type=1400 audit(1756836399.482:432988): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.909698][T15498] audit: audit_backlog=65 > audit_backlog_limit=64 [ 818.683431][T15505] bond4: entered promiscuous mode [ 820.197347][T15529] netlink: 'syz.0.2470': attribute type 10 has an invalid length. [ 820.224760][T15529] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 820.240872][T15529] team0: Port device netdevsim0 added [ 822.625703][ T30] kauditd_printk_skb: 4630 callbacks suppressed [ 822.625722][ T30] audit: type=1400 audit(1756836404.392:436455): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 822.696659][ T30] audit: type=1400 audit(1756836404.532:436456): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 822.758149][ T30] audit: type=1400 audit(1756836404.532:436457): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 822.798235][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.813665][T15554] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.824310][T15554] audit: audit_lost=62487 audit_rate_limit=0 audit_backlog_limit=64 [ 822.842851][ T30] audit: type=1400 audit(1756836404.532:436458): avc: denied { read } for pid=5515 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 822.864121][ T5515] audit: audit_lost=62488 audit_rate_limit=0 audit_backlog_limit=64 [ 822.864143][ T5515] audit: backlog limit exceeded [ 822.864413][ T5515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 825.291490][ T31] INFO: task kworker/0:2:12327 blocked for more than 143 seconds. [ 825.312662][ T31] Not tainted syzkaller #0 [ 825.329930][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 825.352424][ T31] task:kworker/0:2 state:D stack:26504 pid:12327 tgid:12327 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 825.380045][ T31] Workqueue: usb_hub_wq hub_event [ 825.395493][ T31] Call Trace: [ 825.404410][ T31] [ 825.414703][ T31] __schedule+0x1190/0x5de0 [ 825.425293][ T31] ? __pfx___schedule+0x10/0x10 [ 825.434780][ T31] ? find_held_lock+0x2b/0x80 [ 825.444716][ T31] ? schedule+0x2d7/0x3a0 [ 825.496845][ T31] schedule+0xe7/0x3a0 [ 825.508749][ T31] usb_kill_urb+0x253/0x320 [ 825.518670][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 825.531031][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 825.610858][T15585] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2487'. [ 825.626106][ T31] ? lockdep_init_map_type+0xd0/0x280 [ 825.636043][ T31] usb_start_wait_urb+0x250/0x4b0 [ 825.656651][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 825.669358][ T31] ? __asan_memset+0x23/0x50 [ 825.679354][ T31] usb_control_msg+0x326/0x4a0 [ 825.843048][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 825.852332][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 825.864935][ T31] hub_port_init+0x690/0x3a70 [ 825.890427][ T31] hub_event+0x2ce1/0x4fe0 [ 825.897879][ T31] ? __pfx_hub_event+0x10/0x10 [ 825.957624][ T31] ? __pfx___iowrite64_lo_hi+0x10/0x10 [ 825.966089][ T31] ? rcu_is_watching+0x12/0xc0 [ 825.975631][ T31] process_one_work+0x9cf/0x1b70 [ 825.985782][ T31] ? __pfx_hcd_resume_work+0x10/0x10 [ 825.994916][ T31] ? __pfx_process_one_work+0x10/0x10 [ 826.016765][ T31] ? assign_work+0x1a0/0x250 [ 826.035493][ T31] worker_thread+0x6c8/0xf10 [ 826.040786][ T31] ? __kthread_parkme+0x19e/0x250 [ 826.046703][ T31] ? __pfx_worker_thread+0x10/0x10 [ 826.051920][ T31] kthread+0x3c5/0x780 [ 826.198999][ T31] ? __pfx_kthread+0x10/0x10 [ 826.203957][ T31] ? rcu_is_watching+0x12/0xc0 [ 826.208987][ T31] ? __pfx_kthread+0x10/0x10 [ 826.214953][ T31] ret_from_fork+0x5d4/0x6f0 [ 826.220063][ T31] ? __pfx_kthread+0x10/0x10 [ 826.225110][ T31] ret_from_fork_asm+0x1a/0x30 [ 826.230027][ T31] [ 826.237396][ T31] [ 826.237396][ T31] Showing all locks held in the system: [ 826.246749][ T31] 1 lock held by khungtaskd/31: [ 826.290069][ T31] #0: ffffffff8e5c1260 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 826.345653][ T31] 3 locks held by kworker/u8:7/3480: [ 826.361109][ T31] #0: ffff88801b881148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 826.390272][ T31] #1: ffffc9000c2b7d10 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 826.415842][ T31] #2: ffffffff90383708 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 [ 826.439982][ T31] 2 locks held by getty/5609: [ 826.450512][ T31] #0: ffff8880364fc0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 826.476524][ T31] #1: ffffc900036c42f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 826.504915][ T31] 5 locks held by kworker/0:2/12327: [ 826.523919][ T31] #0: ffff888144282148 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 826.553394][ T31] #1: ffffc900123f7d10 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 826.590169][ T31] #2: ffff88802aab5198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x4fe0 [ 826.610389][ T31] #3: ffff88802ab50518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2981/0x4fe0 [ 826.628360][ T31] #4: ffff88802a924868 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x29aa/0x4fe0 [ 826.638761][ T31] 2 locks held by syz.1.2485/15572: [ 826.644683][ T31] #0: ffffffff90383708 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x230 [ 826.655380][ T31] #1: ffffffff8e5cc7f8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x284/0x3c0 [ 826.666281][ T31] 1 lock held by syz.1.2485/15575: [ 826.687870][ T31] [ 826.690258][ T31] ============================================= [ 826.690258][ T31] [ 826.699419][ T31] NMI backtrace for cpu 0 [ 826.699441][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 826.699462][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 826.699473][ T31] Call Trace: [ 826.699478][ T31] [ 826.699485][ T31] dump_stack_lvl+0x116/0x1f0 [ 826.699511][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 826.699535][ T31] ? _raw_spin_unlock_irqrestore+0x61/0x80 [ 826.699554][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 826.699591][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 826.699617][ T31] watchdog+0xf0e/0x1260 [ 826.699641][ T31] ? __pfx_watchdog+0x10/0x10 [ 826.699659][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 826.699680][ T31] ? __kthread_parkme+0x19e/0x250 [ 826.699707][ T31] ? __pfx_watchdog+0x10/0x10 [ 826.699725][ T31] kthread+0x3c5/0x780 [ 826.699742][ T31] ? __pfx_kthread+0x10/0x10 [ 826.699762][ T31] ? rcu_is_watching+0x12/0xc0 [ 826.699783][ T31] ? __pfx_kthread+0x10/0x10 [ 826.699801][ T31] ret_from_fork+0x5d4/0x6f0 [ 826.699817][ T31] ? __pfx_kthread+0x10/0x10 [ 826.699835][ T31] ret_from_fork_asm+0x1a/0x30 [ 826.699868][ T31] [ 826.699874][ T31] Sending NMI from CPU 0 to CPUs 1: [ 826.821575][ C1] NMI backtrace for cpu 1 [ 826.821590][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT(full) [ 826.821606][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 826.821614][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 826.821634][ C1] Code: 1c 62 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 53 13 16 00 fb f4 4c 09 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 826.821648][ C1] RSP: 0018:ffffc90000197df8 EFLAGS: 000002c2 [ 826.821660][ C1] RAX: 000000000143b119 RBX: 0000000000000001 RCX: ffffffff8b93fc29 [ 826.821668][ C1] RDX: 0000000000000000 RSI: ffffffff8de50a40 RDI: ffffffff8c162a00 [ 826.821677][ C1] RBP: ffffed1003c5d488 R08: 0000000000000001 R09: ffffed10170a6655 [ 826.821685][ C1] R10: ffff8880b85332ab R11: 0000000000000000 R12: 0000000000000001 [ 826.821693][ C1] R13: ffff88801e2ea440 R14: ffffffff90ab5290 R15: 0000000000000000 [ 826.821702][ C1] FS: 0000000000000000(0000) GS:ffff8881247b8000(0000) knlGS:0000000000000000 [ 826.821715][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 826.821724][ C1] CR2: 0000200000404030 CR3: 000000005eccd000 CR4: 00000000003526f0 [ 826.821733][ C1] Call Trace: [ 826.821738][ C1] [ 826.821743][ C1] default_idle+0x13/0x20 [ 826.821759][ C1] default_idle_call+0x6d/0xb0 [ 826.821774][ C1] do_idle+0x391/0x510 [ 826.821792][ C1] ? __pfx_do_idle+0x10/0x10 [ 826.821808][ C1] ? trace_sched_exit_tp+0x2f/0x120 [ 826.821825][ C1] cpu_startup_entry+0x4f/0x60 [ 826.821840][ C1] start_secondary+0x21d/0x2b0 [ 826.821861][ C1] ? __pfx_start_secondary+0x10/0x10 [ 826.821881][ C1] common_startup_64+0x13e/0x148 [ 826.821902][ C1] [ 826.822621][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 826.822633][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 826.822652][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 826.822660][ T31] Call Trace: [ 826.822667][ T31] [ 826.822674][ T31] dump_stack_lvl+0x3d/0x1f0 [ 826.822695][ T31] vpanic+0x6e8/0x7a0 [ 826.822720][ T31] ? __pfx_vpanic+0x10/0x10 [ 826.822745][ T31] ? __pfx___irq_work_queue_local+0x10/0x10 [ 826.822767][ T31] panic+0xca/0xd0 [ 826.822789][ T31] ? __pfx_panic+0x10/0x10 [ 826.822812][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 826.822836][ T31] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 826.822861][ T31] ? watchdog+0xd78/0x1260 [ 826.822878][ T31] ? watchdog+0xd6b/0x1260 [ 826.822896][ T31] watchdog+0xd89/0x1260 [ 826.822917][ T31] ? __pfx_watchdog+0x10/0x10 [ 826.822932][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 826.822950][ T31] ? __kthread_parkme+0x19e/0x250 [ 826.822973][ T31] ? __pfx_watchdog+0x10/0x10 [ 826.822990][ T31] kthread+0x3c5/0x780 [ 826.823007][ T31] ? __pfx_kthread+0x10/0x10 [ 826.823024][ T31] ? rcu_is_watching+0x12/0xc0 [ 826.823044][ T31] ? __pfx_kthread+0x10/0x10 [ 826.823060][ T31] ret_from_fork+0x5d4/0x6f0 [ 826.823075][ T31] ? __pfx_kthread+0x10/0x10 [ 826.823090][ T31] ret_from_fork_asm+0x1a/0x30 [ 826.823118][ T31] [ 827.130087][ T31] Kernel Offset: disabled [ 827.134387][ T31] Rebooting in 86400 seconds..