last executing test programs: 9.52322424s ago: executing program 4 (id=2130): sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x890) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x62000000) r3 = socket$igmp(0x2, 0x3, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa107}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MTU={0x8, 0x4, 0x500}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, 0x0, &(0x7f0000000180)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r5, &(0x7f0000000080)={0xc, {"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", 0x1000}}, 0x1006) socket$igmp(0x2, 0x3, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x34, r7, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x18, 0x17, {0x21, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 8.44913168s ago: executing program 0 (id=2133): socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x7, 0x5, 0x5, 0x6}, {0x6, 0x5b, 0x40, 0x6}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000100)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PANTHOR_VM_CREATE(0xffffffffffffffff, 0xc0106441, &(0x7f00000001c0)={0x0, 0x0, 0x100000001}) ioctl$DRM_IOCTL_PANTHOR_GROUP_CREATE(r0, 0xc0386447, &(0x7f0000000200)={{0x8, 0x9, &(0x7f0000000140)=[{0x8, 0x0, 0x5}, {0x5, 0x0, 0x101}, {0x1, 0x0, 0x7}, {0x5, 0x0, 0x1}, {0x4, 0x0, 0x101}, {0x9, 0x0, 0x8}, {0x4, 0x0, 0x6b4}, {0x8, 0x0, 0xce6}, {0x6, 0x0, 0x9}]}, 0x3d, 0xb, 0x5, 0x3, 0x0, 0x1, 0x2, 0x8000000000000001, r1}) syz_usb_connect(0x2, 0x34, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000094d9d4084e080110aeed010203010902220001000000000904000001437b6a00090500000000000000070594", @ANYRES16], 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000001400), 0x101) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) sendmsg$nl_route_sched(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=@newqdisc={0x34, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r10, {0x4}, {0xffff, 0xffff}, {0x2, 0xa}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newqdisc={0x38, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r13, {}, {0xffff, 0xffff}, {0x2, 0x1}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_QUANTUM={0x8, 0x2, 0xa406}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x400dc}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)=@newqdisc={0x40, 0x28, 0x4ee4e6a52ff56541, 0x5001, 0xfffffdfb, {0x0, 0x0, 0x0, r6, {0x4}, {0xffff, 0xffff}, {0xe, 0x1}}, [@qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x7, 0x1, 0x2}}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x400dc}, 0x4000080) r14 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r14, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r14, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r15, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x7, 0x6361, 0x5, 0xffffffed, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x810) 6.84557335s ago: executing program 3 (id=2138): socket$nl_route(0x10, 0x3, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r1, 0x7, &(0x7f00000000c0)={0x1, 0x2, 0x8, 0x73e9}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) preadv2(r2, &(0x7f0000000380)=[{&(0x7f0000000080)=""/145, 0x91}], 0x1, 0x1, 0x3, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000070020000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000900000000000000ffffb702000005000000b70300000000000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb752c7556f53fb75d9d360d84b8ccb7302000008000000b7030000e30f00008500"/152], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000480)={r3}, 0xc) 6.709804801s ago: executing program 2 (id=2139): syz_usb_connect(0x4, 0x5f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xab, 0x2f, 0xd2, 0x8, 0x2cb7, 0x104, 0xccaf, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x4d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x4, 0x0, 0x0, 0xfd, 0x29, 0x9c, 0x0, [@uac_control={{0xa, 0x24, 0x1, 0xf867, 0x3}, [@input_terminal={0xc, 0x24, 0x2, 0x6, 0x1ff, 0x2, 0x7, 0x1, 0x3, 0x4}, @feature_unit={0x13, 0x24, 0x6, 0x6, 0x6, 0x6, [0x7, 0x9, 0x9, 0x7, 0xa, 0x8], 0x40}, @processing_unit={0x8, 0x24, 0x7, 0x4, 0x1, 0x80, "7f"}, @extension_unit={0xb, 0x24, 0x8, 0x2, 0x87f, 0x80, ':**C'}]}]}}]}}]}}, 0x0) 6.662153366s ago: executing program 3 (id=2140): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f066bbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) add_key(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd27}, 0x48) 6.135049969s ago: executing program 2 (id=2141): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x659, @empty, 0xff}, 0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x42}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000280)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000faff0000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, 0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4080) io_uring_setup(0x2f00, &(0x7f0000000500)={0x0, 0xfa0d, 0x8, 0x20001, 0x2d6, 0x0, r4}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x1e, 0x0, 0x0) socket$kcm(0x2, 0x200000000000001, 0x106) r6 = syz_open_dev$tty1(0xc, 0x4, 0x3) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000240)={0x0, 0x9, 0x8006, 0xfffffffb, 0x6, 0x0, 0x7, 0x4e, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x18, &(0x7f0000000380)={r8, 0x25a}, &(0x7f00000003c0)=0x8) ioctl$PIO_UNIMAP(r6, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x7, 0x2}]}) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 5.83505176s ago: executing program 1 (id=2142): syz_usb_connect(0x5, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x88) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) dup(r0) chdir(&(0x7f0000000140)='./bus\x00') mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000400)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) 5.768027777s ago: executing program 2 (id=2143): mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) mremap(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000ffd000/0x3000)=nil) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) io_setup(0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000000000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000001300)=ANY=[@ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="05"], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000000c0), &(0x7f0000000080)=r2}, 0x20) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r5 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r5, &(0x7f00000193c0)=""/102392, 0x18ff8) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000100)=0x1, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbffffffffffff86dd697a402d00383afefc010000000000000000000000000601ff020000000000000000000000000001010390780500000064bbcf090009ff0000000000000000000000ffff6401010100000000000000000000ffffac1e01018ff940c9431ec2cc"], 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000080000000000000020"], 0x24, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x7, 0x0, 0x25dfdbfd, {{@in6=@dev={0xfe, 0x80, '\x00', 0x1b}, @in6=@empty, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast1, 0x0, 0x3c}, @in6=@private0, {0x0, 0x8000000000b400, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffd9e5}, {0x0, 0x200000, 0x7, 0xfffffffffffffffd}, {0x40000, 0x0, 0x9}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, &(0x7f0000000100)=0x40049, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, 0x0, 0x1) sendmsg$nl_route_sched(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x4c014) 5.405877504s ago: executing program 0 (id=2144): pivot_root(0x0, 0x0) sendmsg$802154_dgram(0xffffffffffffffff, 0x0, 0x40408c0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000), 0x4) r0 = socket$packet(0x11, 0x3, 0x300) ioperm(0x0, 0x9, 0x40000000002) gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x2023, 0x800000000004, @thr={&(0x7f0000000100)="8cbea93fe4fa707d1ea570d0f533743c", &(0x7f0000019300)="e968acbb47c5b7e4acd285a34f2911b86a792daf42cb3df6df21aa8d7a53a01277db43a947e09b4b037e994c52c474a2b789025fa3eb1b25ee3c0e2d03e3bfc96c8a6f46bb10fd530971b6ab65d810eaeda01a3413bf145a98ca683de58234b394a893c12d3c6cba7804803d6293d68d00859ac7db80472125baceacad35306916a985121eff964f92115b909cb369e5eac046185e620e"}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}}, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000006c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = shmget$private(0x0, 0x4000, 0x800, &(0x7f0000ff2000/0x4000)=nil) shmat(r2, &(0x7f0000ff7000/0x3000)=nil, 0x400c) munmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000001c0), 0x0) prlimit64(0x0, 0x3, &(0x7f0000000140)={0x800, 0x4}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) syz_usb_connect(0x6, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000099dd112f37e6854010203010900240001000010100904590005030200020500ff090000000000000001"], 0x0) prctl$PR_SCHED_CORE(0x3e, 0x3, r1, 0x1, 0x0) r3 = syz_open_dev$MSR(&(0x7f0000000040), 0x7, 0x0) read$msr(r3, &(0x7f0000000300)=""/102392, 0x18ff8) open_tree(0xffffffffffffffff, 0x0, 0x0) openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000080)='net/ipv6_route\x00') fanotify_init(0x4, 0x1000) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x40002001, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) 5.134455558s ago: executing program 4 (id=2145): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000240), 0x3af4701e) (async) write$binfmt_script(r1, &(0x7f0000000240), 0x3af4701e) syz_usb_connect$hid(0x2, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) (async) r2 = syz_usb_connect$hid(0x2, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0) socket$packet(0x11, 0x2, 0x300) socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) (async) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=ANY=[@ANYRES32, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r5, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x14, 0x8, 0x0, 0x0}}, 0x10) openat$dma_heap(0xffffffffffffff9c, 0x0, 0x8c081, 0x0) symlink(0x0, 0x0) (async) symlink(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) (async) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r6) (async) close(r6) socket$inet6_mptcp(0xa, 0x1, 0x106) (async) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r7, 0x0) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e1b, @multicast2}, 0x10) socket$l2tp6(0xa, 0x2, 0x73) (async) socket$l2tp6(0xa, 0x2, 0x73) r9 = accept(r6, 0x0, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r10, 0x29, 0x46, 0x0, 0x0) (async) setsockopt$inet6_int(r10, 0x29, 0x46, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r9, &(0x7f0000000080)={0x0, 0xfffffffffffffc7d, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x10) recvfrom(r8, &(0x7f0000000180)=""/60, 0xfffffffffffffecb, 0x4112, 0x0, 0x0) syz_usb_control_io(r2, 0x0, 0xfffffffffffffffd) (async) syz_usb_control_io(r2, 0x0, 0xfffffffffffffffd) 5.123907399s ago: executing program 1 (id=2146): mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000500)=0x6) io_setup(0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000000000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000000c0), &(0x7f0000000080)=r2}, 0x20) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f00000193c0)=""/102392, 0x18ff8) sendmsg$inet(r1, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1, 0x0, 0x0, 0x6000}, 0x20) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x19, &(0x7f0000000100)=0x1, 0x4) syz_emit_ethernet(0x6e, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbffffffffffff86dd697a402d00383afefc010000000000000000000000000601ff020000000000000000000000000001010390780500000064bbcf090009ff0000000000000000000000ffff6401010100000000000000000000ffffac1e01018ff940c9431ec2cc"], 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000001000000000000000400000000000000080000000000000020"], 0x24, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=@newsa={0x104, 0x1a, 0x7, 0x0, 0x25dfdbfd, {{@in6=@dev={0xfe, 0x80, '\x00', 0x1b}, @in6=@empty, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in6=@mcast1, 0x0, 0x3c}, @in6=@private0, {0x0, 0x8000000000b400, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffd9e5}, {0x0, 0x200000, 0x7, 0xfffffffffffffffd}, {0x40000, 0x0, 0x9}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in6=@remote}]}, 0x104}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x6, 0x0, 0x8100, 0x0, {0xc3}, {}, {0xe, 0xd}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x4c014) 4.898682237s ago: executing program 4 (id=2147): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x2, @dev={0xac, 0x14, 0x14, 0xe}}, 0x3, 0x0, 0x4}}, 0x2e) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000ac0)=@newqdisc={0x840, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0x3}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x814, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0xfffffffd, 0xfffffff7, 0x7, 0x3, 0x8, 0x8, 0x59, 0x3, 0x7e5, 0x80, 0x0, 0x8, 0x82, 0x8, 0x32e222b7, 0x8, 0x200, 0xfffffffd, 0x7fff, 0x6, 0x6, 0x6, 0xbcf4, 0x5, 0x6, 0x2, 0xc, 0xf045, 0xb6e, 0x0, 0x8, 0x1fffe0, 0x40, 0x3ff, 0x2, 0xc5, 0x7, 0x6ce, 0xfffffffc, 0x1ff, 0x7, 0x5, 0x401, 0xa15b, 0xfffffff7, 0x8bc3, 0xfffffff7, 0x7, 0x7bde, 0x6, 0x200, 0x3, 0xfffffff8, 0x101, 0x8, 0x3, 0x0, 0x9, 0x7fffffff, 0x5, 0x50, 0x478, 0x10, 0x1000, 0xfffffffb, 0x1, 0x5, 0x0, 0x0, 0xffffffff, 0x10000, 0x4, 0x3, 0x5, 0x9, 0xa9, 0x9, 0x3, 0x2, 0x6, 0x1000, 0x8, 0x0, 0x6fb23f7f, 0x1, 0xc8b, 0xb, 0x2, 0x1, 0xda9, 0x9cf2, 0x7, 0x3b, 0x83, 0x2, 0x4, 0x7, 0x5, 0xffffffff, 0x1, 0x8001, 0x4, 0x7, 0x513c0574, 0xfffffff8, 0x7, 0x80000001, 0x1, 0x2, 0x6, 0x4, 0x6, 0x7, 0x2, 0x8000, 0xd86e, 0x55a0, 0x5, 0x3, 0x1, 0x6, 0xa5a0, 0xdf3c, 0x0, 0x8001, 0x0, 0x6, 0x500000, 0x777, 0x7, 0x8, 0x10000, 0x2, 0xfffffffa, 0x8, 0x2, 0xb, 0x4, 0x3, 0xb6dc, 0x6, 0x1, 0xffff8000, 0x5, 0x3, 0x51e5, 0x6, 0x0, 0x0, 0xff, 0x9, 0x85, 0x7ff4, 0x1000, 0x6, 0x7, 0x0, 0x7, 0x4, 0x23, 0x1, 0x10000, 0x26d8c571, 0xcbe, 0x865, 0x29, 0x4, 0x0, 0x4, 0x9, 0x831, 0x7, 0x1, 0x64, 0xffffffff, 0x3029, 0x0, 0x9, 0x10, 0x200001, 0x40, 0x9, 0x5, 0x8, 0x9, 0xd1, 0x4, 0x7ff, 0x2, 0x2, 0x2, 0x0, 0x7, 0x8, 0x7, 0xc2, 0x7, 0x3ff, 0x6, 0x31, 0x4, 0x9, 0x9, 0x10000, 0x0, 0x1ee, 0x4, 0x7, 0x3, 0xfffffffc, 0x2, 0x5, 0x0, 0x6, 0x4, 0xfb7, 0xcd, 0x7f, 0x3, 0x8, 0x10000, 0x8, 0x4, 0x3, 0xffffc5a7, 0x9, 0x9, 0x7, 0xb8, 0x0, 0x10, 0x0, 0xf78, 0x22, 0x5, 0x3, 0x1, 0x5, 0x2, 0xb5f, 0x8, 0x1, 0x0, 0x1, 0x2, 0x100, 0xfffffff9, 0x0, 0x5, 0x9, 0x1, 0x10000, 0x1, 0x3, 0x7]}, @TCA_TBF_PTAB={0x404, 0x3, [0x6bcb, 0x80, 0x2, 0x8001, 0x5, 0x4, 0x8, 0x0, 0x6, 0x6, 0x4, 0x1, 0x8000, 0x10, 0x7, 0x0, 0x33836860, 0x7ed8, 0x6, 0x63, 0x7, 0x5, 0x6, 0x6, 0x9, 0x9, 0xf5000000, 0x2, 0x2, 0x3, 0x10000, 0x4, 0xf147, 0x1, 0x8000, 0x1, 0x0, 0x0, 0xfff, 0xfffffff7, 0xffffffff, 0x1ff, 0x7fffffff, 0x0, 0x4567, 0x8, 0xe, 0x4, 0xffffff6d, 0xfffffff0, 0x238f, 0x1, 0x9, 0xf, 0x6, 0x0, 0x1, 0x3, 0x3, 0x200, 0x200, 0x6, 0x2, 0x1, 0x68, 0x7, 0xb, 0x3, 0x7, 0x5, 0xffffff41, 0x400000, 0x438c846d, 0x4, 0x6, 0x81, 0xa, 0x5, 0x4, 0x80000001, 0x9, 0x9b, 0xfffffffc, 0x3, 0x80000001, 0x7, 0x1000, 0x7ff, 0x0, 0x0, 0x95f, 0x6a, 0xb3, 0x10, 0x5, 0x8, 0x6, 0x0, 0x7af5, 0x8, 0x6, 0x4, 0x0, 0xfffffff9, 0x7, 0x5, 0x2, 0x0, 0x6, 0x400008, 0xfffffff7, 0x4, 0x7fffffff, 0x3, 0x6, 0x2, 0xfffffff9, 0x7fffffff, 0x0, 0x9, 0x6, 0x2, 0x5, 0x80000001, 0x8, 0x1, 0x80, 0x3, 0x2, 0x3, 0x8, 0x8, 0x0, 0x10000, 0x7, 0x7f, 0x10000, 0x88, 0x3, 0x200, 0xa, 0x10001, 0x4, 0x10, 0x8, 0xb54, 0x2, 0x8, 0x4, 0x5, 0x8, 0xff000000, 0x3, 0x1, 0x7, 0x3, 0x7, 0x100, 0x4, 0x100, 0x4351, 0x159b, 0x80000001, 0x1, 0x7fffffff, 0x9, 0xfffffe00, 0x7f, 0x7, 0x7fffffff, 0x0, 0x8, 0xfffffffc, 0x10, 0x80000001, 0x2, 0x9, 0x9, 0x8000, 0x8, 0x2, 0x7fff, 0xd, 0x2, 0x9, 0x8565, 0x8, 0x7d2b, 0x0, 0x8155, 0x2, 0x2, 0x1, 0x4, 0x2, 0x7, 0x401, 0x5, 0x8, 0x8, 0x4, 0x3, 0x6, 0x5, 0x9, 0x2, 0xd3b3, 0x4df18bf7, 0x7711, 0xd, 0x3, 0x0, 0x1, 0x3, 0x7, 0x1, 0x1, 0xaffd, 0x2e, 0x7, 0x3, 0x3, 0x5, 0x400, 0x1, 0x3, 0x2, 0x0, 0x6, 0xffffffff, 0x8, 0x8, 0x7, 0x100, 0x6, 0x6, 0x847, 0xa5, 0x10000, 0x1, 0x7, 0x47bc, 0x0, 0xd25, 0x7, 0x1000, 0x10, 0x0, 0x4, 0x4, 0x884, 0x7ff, 0x400, 0x8, 0x400, 0xc]}, @TCA_TBF_PBURST={0x8, 0x7, 0x15ac}]}}]}, 0x840}}, 0x0) lseek(r3, 0x8000000000000000, 0x4) syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000013906c08e90f01db9be9010203010902120001000000000904"], 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x101100, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_X86_SET_MSR_FILTER(r8, 0x4188aec6, &(0x7f0000000900)={0x1, [{0x2, 0x10, 0x9, &(0x7f0000000540)="bbd2"}, {0x3, 0x18, 0x0, &(0x7f0000000600)="f7c117"}, {0x1, 0x0, 0x100, 0x0}, {0x0, 0x8, 0x3, &(0x7f0000000780)='X'}, {0x1, 0x0, 0x5, 0x0}, {0x1, 0x0, 0x8, 0x0}, {0x3, 0x0, 0x96a9, 0x0}, {0x1, 0x0, 0x1, 0x0}, {0x3, 0x0, 0x200, 0x0}, {0x0, 0x0, 0x3, 0x0}, {0x2, 0xfffffead, 0x9, 0x0}, {0x3, 0x0, 0x8, 0x0}, {0x2, 0x0, 0x6, 0x0}, {0x1, 0x0, 0x5, 0x0}, {0x2, 0x0, 0x0, 0x0}, {0x2, 0x0, 0x6, 0x0}]}) r9 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) r10 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r10, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) write(r10, &(0x7f0000000340)="07000000010001", 0x7) pread64(r9, &(0x7f00000000c0)=""/110, 0x6e, 0x11a5) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfffffffffffffc6e, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_setup(0x1de0, &(0x7f00000000c0)={0x0, 0x45d6, 0x100, 0x4, 0x4}) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="020000000400000008000000013a3c031815c8502e33363a0f53060788a51bfe0e4c2d33f06a0e8ddd15951a304ef05052d406b3f741fb3e1722a815f8e1f2ad814e9025718c2d52eb0130bedb31734325b1e4e4bf00ce790b28769099ff5148736d22eb1598ef48651a2e4ad169b4ee979509d3303c609d00"/131, @ANYRES32=0x0, @ANYBLOB='\a\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xfffff000}, 0x8) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, r11}, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0100000000000000000006000000140008"], 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x2004c000) 4.769321804s ago: executing program 0 (id=2148): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r1}]}}}]}, 0x40}}, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe246875800c31e72}, 0x10844) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000340)) sendmsg$NFC_CMD_DEACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r6, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x488b4}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat(0xffffffffffffff9c, 0x0, 0x6b142, 0x0) mount(&(0x7f0000000300)=@nullb, &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='jfs\x00', 0x0, &(0x7f0000000400)='usrquota') 4.69431974s ago: executing program 0 (id=2149): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x7, 0x0, 0x7fffffff, 0x0, 0x2}, {0xfffffffffffffffe, 0xffffffffffffffff}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, [@tmpl={0x44, 0x5, [{{@in6=@rand_addr=' \x01\x00', 0x2, 0x2b}, 0xa, @in6=@private1, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x4000}]}]}, 0xfc}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) semtimedop(0x0, &(0x7f0000000200)=[{0x0, 0xffff, 0x2000}], 0x1, 0x0) semctl$SETVAL(0x0, 0x100000000000000, 0x10, &(0x7f0000000080)=0x4) connect$inet(r1, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x810) connect$inet(r1, &(0x7f0000000400)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_RW(r2, 0x3ba0, &(0x7f00000001c0)={0x48, 0xd, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x8, 0x3ff, 0x1, 'queue1\x00', 0x6}) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xb0) sync_file_range(r3, 0x800000000976, 0x80, 0x3) timer_create(0x7, &(0x7f0000001280)={0x0, 0x3b, 0x1, @thr={0x0, 0x0}}, &(0x7f00000012c0)=0x0) timer_settime(r4, 0x1, &(0x7f0000001300)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000001340)) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) r8 = socket$inet6(0x10, 0x3, 0x0) read(r8, &(0x7f00000004c0)=""/273, 0x111) sendto$inet6(r8, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) syz_usb_connect$uac1(0x3, 0xa2, 0x0, 0x0) recvfrom$inet6(r8, &(0x7f0000000000)=""/45, 0x44, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000000)="48050000150019", 0x7}], 0x1) write$binfmt_misc(r6, &(0x7f0000000000), 0xfffffecc) splice(r5, 0x0, r7, 0x0, 0x200000000622c, 0x0) syz_clone(0x40000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000100)={0x801400, &(0x7f00000000c0), 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) 4.257514994s ago: executing program 4 (id=2150): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newtaction={0x104, 0x30, 0xffff, 0x0, 0x0, {}, [{0xf0, 0x1, [@m_ife={0xec, 0x1, 0x0, 0x0, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x2c, 0x6, [@IFE_META_SKBMARK={0x8, 0x1, @val=0x1}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x7fff}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x9}, @IFE_META_PRIO={0x8, 0x3, @val=0x201}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_PARMS={0x1c, 0x1, {{0xa, 0x80, 0x3, 0x0, 0x10}}}, @TCA_IFE_METALST={0x6c, 0x6, [@IFE_META_SKBMARK={0x8}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0x7}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x3}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x1, 0x9, 0x4, 0x5, 0x1}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_TCINDEX={0x6, 0x5, @val=0x6}]}, @TCA_IFE_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x9, 0xff, 0x2000000e, 0x8, 0x2}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x104}}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x200000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000080)) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000036c0)={{0xa, 0x4e23, 0xd, @remote, 0x7fff}, {0xa, 0x4e20, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0x3ef0}, 0x0, {[0x7, 0x0, 0x7ff, 0x8, 0xbffa, 0x3, 0x10000, 0x2]}}, 0x5c) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f00000000c0)=@ethtool_gfeatures={0x51}}) preadv2(r3, &(0x7f0000003600)=[{&(0x7f0000000100)=""/95, 0x5f}, {&(0x7f0000000180)=""/7, 0x7}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/225, 0xe1}, {&(0x7f0000001440)=""/255, 0xff}, {&(0x7f0000001540)=""/163, 0xa3}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/36, 0x24}], 0x9, 0xc, 0x4239, 0x8) 3.609319718s ago: executing program 4 (id=2151): sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x890) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x62000000) r3 = socket$igmp(0x2, 0x3, 0x2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xa107}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MTU={0x8, 0x4, 0x500}]}, 0x48}, 0x1, 0x0, 0x0, 0x20040001}, 0x8000) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, 0x0, &(0x7f0000000180)) ioctl$TCSETS(0xffffffffffffffff, 0x5402, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r5, &(0x7f0000000080)={0xc, {"a2e3ada14fc752f91b3d1a0987f70e06d038e7ff7fc6e5539b3272078b089b080f384b090890e0878f0e1ac6e7049b334d959b669a240d5b67f3988f7ef3195201c0ffe8d178708c523c921b1b5d500f0d30090936cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78669a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae193973735b36d5b1b63dd1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000002335875271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38dfcd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1fe90a56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617601000000be70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d595a40b9f6ff14ac4850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9980000000b3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6c82fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce3803f465e41e610c2021d653a5520000008213b704a5000000000000008ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bc90da8196c28d920bab05f60cea0da7710a80000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4e38a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778ef85ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2bed9e53803edf1a4ae3a9737d21487b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69bf5c8f4ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034e00000000ca509383815b1b6fc6522d4e4fdc11a48cf42d48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c478b095b68441a34cb51682a8ae4d24ad92f243941ed274549b79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdbe6c4579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93ae62fccfcbb2b75a2183c46eb65ca8124e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43e4fb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e01feffffffffffff83a2b210520106b8a158b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94872cb2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369d75f2e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aa01b20f7694a00f16e2d0174035a2c22656dc00880acebdbe8ddbd75c2f998d8ac2dfad2ba3a50200000045a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae7183cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe2907ac0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf463661c953fcad6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba551eba281f2a654fb39ddff3b484439ff158e7cd419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a799567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7ccef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaeecf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461600000000000000206ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6d594f88a4facfd4c735a20307c737afae5136651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a37684f4113c48859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cef3d94d02dae17b118e5d6787463183b4b87c105000000302a808d7f5251440613d17ca51055f2f416a44fe180d2d50c312cca7cb14a20dc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb40100000006376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f86b8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7ceec7dc808bf653639d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a602000000000000007007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4549820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf6529006c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6522fb5f6ffcdd56fed88935fcb75912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae233a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a5bd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08008897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb6ce431b63ee356b0c785f2f47b90e4b15f929b47f741f0efaea2bd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b80c1c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2bb9935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c98ad90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf9f394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe360500000000000000b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1062dfa13bdc1fa7cfaadba85c72e9758f03a75500000000d2a1df0d07b3d5bd3b01faffd0addbed2881a9700af561ac8c7e36bb2fc4c40e9c766c06817bb903729a7db6ff957697c9ede7885d94ffb0759be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa37ef86faec216eb6992162f8dcbf719c1484d2f9c55f4901203a9a8a2c3e90f39c3dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d00000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000faffffffffffffff00", 0x1000}}, 0x1006) socket$igmp(0x2, 0x3, 0x2) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x34, r7, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x18, 0x17, {0x21, 0x0, @l2={'eth', 0x3a, 'ip6gre0\x00'}}}}}, 0x34}}, 0x0) 3.608062745s ago: executing program 3 (id=2152): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_GET_STATS_FD_cpu(0xffffffffffffffff, 0xaece) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ptrace$getenv(0x4201, r2, 0x4, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x380000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000300)={@local, 0x3ff, 0x0, 0x0, 0x3}, &(0x7f0000000340)=0x20) fsopen(&(0x7f0000000040)='nilfs2\x00', 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, 0x0, 0x0) accept4(r7, 0x0, 0x0, 0x80800) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000000000002004e24e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003", @ANYRES16, @ANYRESDEC=r1, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX=r7, @ANYRESDEC=0x0, @ANYRESDEC=r7], 0x210) 2.700949066s ago: executing program 2 (id=2153): r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getpeername$netrom(r0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x8, 0x101, 0x0, 0x0, {0x7, 0x0, 0x9}}, 0x14}}, 0x10) (async) r2 = syz_usb_connect(0x0, 0x24, &(0x7f00000001c0)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYRES32=r1, @ANYRES8], 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x400000000010, 0x3, 0x0) write(r3, &(0x7f0000000040)="3a03000018002551075c0165ff0ffc02802000030004000500e1000c0400070080000900", 0x33a) setsockopt$inet_MCAST_LEAVE_GROUP(r3, 0x0, 0x2d, &(0x7f00000000c0)={0x7, {{0x2, 0x4e21, @rand_addr=0x64010102}}}, 0x88) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd844", 0x4d}], 0x1}, 0x0) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="580000000206030000000000000000000300000705000100070000000900020073797a31000000000c00078008001240000000050500050002000000050004000100000011000300686173683a69702c706f727400"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) (async) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='veno', 0x4) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070088000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x90) (async) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'batadv0\x00', {0x2, 0x4e20, @broadcast}}) (async) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x101000, 0x0) syz_usb_control_io$printer(r2, 0x0, &(0x7f0000000440)={0x34, &(0x7f0000000240)=ANY=[@ANYBLOB="00000003000010"], 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r6) 2.457229466s ago: executing program 3 (id=2154): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x10, 0x803, 0x6) socket$netlink(0x10, 0x3, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r3, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x300000d, 0x1) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xe, 0x4, 0x4, 0x2, 0x0, 0x1, 0xfffffffc}, 0x50) pipe(&(0x7f00000001c0)) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000380)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000100000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bca2000000000000a6020000f8ffffffb703000018000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r4}, &(0x7f0000000280), &(0x7f0000000000)=r5}, 0x20) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000002c0)={r5, r7, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff0180c20000535a465e39b77359000000001190780a010106001090788205000180000000d0aa0e3ea1de0000000000000000"], 0x0) connect$unix(r1, &(0x7f0000000340)=@file={0x0, './file2\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 2.088547482s ago: executing program 2 (id=2155): r0 = syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r6, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01dfffffff9a26000000210000000c", @ANYRES32=r5], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r9, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="400000001000370400000011fcdbdf2500000000", @ANYRES32=r10, @ANYBLOB="890c04000000000020001280080001006774700014000280050005"], 0x40}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0xe, 0x2}, {0x0, 0x5}}}, 0x24}}, 0x800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_clone(0x30001000, &(0x7f00000001c0)="9e101a5f80b481680e829e7dc93bd8d54fc600d6bb4706b99d78019c147e252fe3c33721676eab65352daddb1ce764cb5b39d2f2126ee50787b26a41908007c041e46ff011fff733ff8cafd9152b0f9fcd20914c889dc4cd2823502cd56872e074c37092826cce3f617e83de1ee2ca1ca701188bf436de6a9080e5fd288eafb00ba93bb307ae2dcf153a0fb06be15d82de21eaff04a80a0405032deea972d33a6fb894afc5adb10c8c238a219b4ac81da01ad26f63", 0xb5, &(0x7f00000000c0), &(0x7f0000000280), &(0x7f00000002c0)="dc73c7cf22c18250578310c017e54d52b34c01a8f850e3911ab0b6a53a4edf411e187c396357961472b189252fbc88b4728d191593186271571430d908fb05f4a42c6d5922418377f8f9772ba86eae5f05ce5cc14482ecf96af3882e7d1254c4934d27f1f21f5ed92ffb5360") r11 = gettid() syz_open_procfs$namespace(r11, &(0x7f0000000040)='ns/pid\x00') sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) 2.060037752s ago: executing program 1 (id=2156): ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) socket$inet6(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x3, &(0x7f0000000200)=0x806) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="380100001a001000feffffff00010000e0000002000000000000000000000000ac1e01010000000000000000000000000001071c4e2300050a0000203a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000004d56c000000fc02000000000000000000000000000100feffffffffffff0000000000000000a39b000000000008ffff001c250820000000000500000000000000a6000000000000000000000000000000ffffffffffffffff00000000000000001f00000000000000fefffffffffffffffeffffffff030000000000008000000005350000020001002000000000000000480003006465666c61746500"/240], 0x138}}, 0x844) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r5 = syz_open_dev$sndctrl(&(0x7f0000000600), 0x0, 0x8801) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000001340)={{0x0, 0x0, 0x0, 0x8, 'syz0\x00'}, 0x3, 0x0, 0x8, 0x0, 0x3, 0x0, 'syz1\x00', &(0x7f0000000180)=['\x00', '-[\'\x00', 'r\x0e\x81|\x0f\xa3\x8a\xb9\x8c\x94\x04\x17\v\rh\x10'], 0xc15c}) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/clients\x00', 0x0, 0x0) readv(r6, &(0x7f00000038c0)=[{&(0x7f0000004980)=""/4096, 0x1000}], 0x1) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000040)={0x1, 0x7, 0x3}) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x81) unshare(0x64000600) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x110, 0xd, {0x0, @loopback=0x7f000300, @private=0xa010102}}}], 0x20}, 0x0) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="700000001200030200"/56, @ANYRES32=0x0, @ANYBLOB="816900000000080000000000000000002100010008"], 0x70}}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)=r0) 1.58133427s ago: executing program 0 (id=2157): r0 = syz_open_dev$vbi(&(0x7f0000000040), 0x3, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000140)={0x4, [0x3, 0x1000, 0x0, 0x1, 0x2, 0x6, 0x7, 0x3, 0x10, 0x1, 0x4, 0x9ee0, 0x28, 0x385, 0xef9a, 0xfff, 0x7, 0xb2, 0x1, 0x2, 0x7fff, 0x4, 0x1ff, 0x0, 0xfffc, 0x0, 0x2, 0x10, 0x6, 0xd, 0x3f1, 0x79, 0x5, 0x7, 0x6, 0x2, 0x81, 0xffff, 0x8000, 0x9, 0x0, 0x2, 0x423, 0xfff, 0x86, 0x400, 0x3, 0x9], 0x4}) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x1}, 0x0) r1 = io_uring_setup(0x2dfd, &(0x7f0000000700)={0x0, 0xaed3, 0x1000, 0x2, 0x30a}) r2 = io_uring_setup(0x7625, &(0x7f0000000600)={0x0, 0x43b6, 0x1, 0x0, 0x28e}) io_uring_register$IORING_REGISTER_FILES(r2, 0x1e, &(0x7f0000000000)=[r1], 0x1) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000100)=0x6) execveat(0xffffffffffffff9c, &(0x7f0000000300)='./file2\x00', 0x0, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x15) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) madvise(&(0x7f0000e95000/0x4000)=nil, 0x4000, 0x66) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYRES64=r5], 0x17d4}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="4801000042000100fffffffffddbdf250200000004003880100001800c00c8000200000000000000200104801c01"], 0x148}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_INTERFACE(r7, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008004}, 0x40000) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) 1.560757165s ago: executing program 3 (id=2158): socket$nl_generic(0x10, 0x3, 0x10) socket$packet(0x11, 0xa, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = socket$inet6(0xa, 0x3, 0x3c) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a3200000000140000001100"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x5000, 0x80000001, @remote, 0x7}, 0x1c) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) userfaultfd(0x801) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000640), r5) sendmsg$MPTCP_PM_CMD_GET_ADDR(r5, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="20000003", @ANYRES16=r6, @ANYBLOB="010027bd7000fddbdf2503000000080004000000000004000180"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="050a25bd7000fbdbdf2502000000080003000000f9ae9aa8c5b55ecbe87000000800020005000000080002000100000024000680080006000500000008000600040000000800060010000000080003000a0101010c000180060005004e200000080003000100000073d4bddc9722d1694461e408384c8603a432c072d51ef8c1dab272a53ef93b73400f15cd195eeba1847c978633def4078f2ccbe789ce"], 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x2004040) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00'}) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000580), 0x2, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x3d70000000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_CLEAR_DIRTY_LOG(r8, 0xc018aec0, &(0x7f0000000140)={0x0, 0x240, 0x380, &(0x7f0000000180)=[0x6bd1a312, 0xec66, 0xff, 0x8, 0x98bd, 0x80000000000000c, 0x0, 0x4, 0x10000, 0x7, 0x9004, 0x9, 0x8, 0x9, 0x5, 0x49, 0x3ff, 0x5, 0x2, 0x1, 0x8, 0x7, 0xc1, 0x1, 0x2, 0x2, 0x6, 0x9, 0x96, 0xffffffff, 0xffffffff00000000, 0x0, 0x5, 0x7, 0x4, 0x3, 0x9, 0x888f, 0x1, 0x6, 0x46, 0x1, 0x3, 0xa3de, 0x20000000006, 0x8, 0x7, 0x400, 0x3, 0xffffffffffffffb7, 0xfffffffffffffffa, 0x2, 0xe, 0x6, 0x4, 0xe6, 0x200000000000101, 0x5, 0x9, 0x66, 0x6, 0x7, 0x40000005, 0xfffffffeffffffff, 0x9, 0xd, 0x10001, 0xbbd9, 0x80000000, 0xfffffffffffffc00, 0x2, 0x7, 0x2, 0xcdc, 0x4000000007, 0x2, 0x3, 0x2, 0x2, 0xfff, 0x6, 0x4, 0x1, 0xab6, 0x0, 0x4, 0x0, 0xffffffffffffff81, 0x9, 0xff, 0x6, 0x28000000, 0x5, 0x8061d, 0x3, 0x7, 0xf6, 0x4, 0x6, 0x204, 0x7, 0xe53e, 0x4, 0x8, 0x2293332f, 0x6, 0x5, 0x1e, 0xd, 0x2, 0x4, 0xfffffffffffffffb, 0x80000001, 0x7, 0xdfd4, 0xfff9, 0x10, 0x5, 0x8, 0x1, 0x53e0f0fe, 0xeb4, 0x3, 0xfffffffffffffffe, 0xb692, 0xcc, 0x8, 0x1000003]}) r9 = syz_open_dev$vim2m(&(0x7f0000000a40), 0x10003, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r9, 0xc0405602, &(0x7f0000000180)={0x2, 0xd, 0x0, "13ffff000000c1ff8180000000000000000000bef20000008b05000000000001", 0x3131354f}) 953.385213ms ago: executing program 1 (id=2159): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r1}, @IFLA_HSR_SLAVE2={0x8, 0x2, r1}]}}}]}, 0x40}}, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xe246875800c31e72}, 0x10844) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r2) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000340)) sendmsg$NFC_CMD_DEACTIVATE_TARGET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r6, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x488b4}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat(0xffffffffffffff9c, 0x0, 0x6b142, 0x0) mount(&(0x7f0000000300)=@nullb, &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='jfs\x00', 0x0, &(0x7f0000000400)='usrquota') 890.509713ms ago: executing program 4 (id=2160): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000200), 0xffffffffffffffff, 0x4ae60) ioctl$CEC_ADAP_S_LOG_ADDRS(r2, 0xc05c6104, &(0x7f0000000040)={'\x00\f\x00', 0x0, 0x5, 0x2, 0x0, 0x9, "0097683d856f1ea0e8ae7a8600", "00004702", "0300", "97ad3700", ["fdffffff84a438dfc5d5c010", "d78cb8b0ff00", "0000efffffffffffbfff00"]}) ioctl$CEC_TRANSMIT(r2, 0xc0386105, &(0x7f0000000000)={0x63, 0xfffffffffffffff7, 0x2, 0x3, 0x2, 0x6, "0b0909d70c5a4ece54e76d48f944c89a", 0x7, 0x80, 0x0, 0x99, 0xe, 0x40, 0x4}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff00000000000000000000000000000000000000000000000200"/112], 0xb8}, 0x1, 0x0, 0x0, 0x40800}, 0x2c040010) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="b8000000190001000000000000000000e0000002000000000000000000000000ff0200000000000000000000000000014e200000000000000a"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x15, 0x1, 0x70bd29, 0x0, {{@in=@multicast1=0xe0000002, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x10, 0x100}, {0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x400}, {0x0, 0x0, 0x101}, 0x0, 0x6e6bb5, 0x0, 0x0, 0x1}}, 0xb8}}, 0x10000000) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x40) sched_setattr(0x0, &(0x7f0000000300)={0x38, 0x0, 0x8, 0x8001, 0x0, 0x9, 0x0, 0x10000000000006, 0xfa11, 0xfffffffe}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r5 = socket$tipc(0x1e, 0x5, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa"], 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xf, &(0x7f00000003c0)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r6 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x2001) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) bind$tipc(0xffffffffffffffff, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0xfffffffd}}, 0x10) write$binfmt_misc(r7, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f0000000500)={r7, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d960001000000000000000000007efff100004000", "2809e8dbe10804000000af8e0e3dc11d875397bdb22d0000b420a1a93e527d3d458d080000000000000000000000000000000000000000004300", "f4bd00000080190000efffca0000000000001a000000ff00", [0x2]}}) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@local, 0xfffd, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in=@dev={0xac, 0x14, 0x14, 0x2b}, 0x8000, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3}]}]}, 0xfc}}, 0x2) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r9, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000980)={{0x12, 0x1, 0x201, 0x32, 0xaa, 0x34, 0x10, 0xc45, 0x612a, 0x299c, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x8, 0x7, 0x60, 0x6, [{{0x9, 0x4, 0x9f, 0x9, 0x0, 0x94, 0xd6, 0x5, 0xc}}]}}]}}, &(0x7f00000002c0)={0x0, 0x0, 0x19, &(0x7f0000000380)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x6, "03512f19a6f80795d537e63d340ad641"}]}}) bind$tipc(r5, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) 825.20267ms ago: executing program 1 (id=2161): syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_connect$uac1(0x0, 0xbf, &(0x7f0000000080)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xad, 0x3, 0x1, 0x3, 0x50, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x9a6, 0xab}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0xd, 0x24, 0x2, 0x2, 0xc3, 0x174d, 0x5, "2d2061c1"}, @format_type_ii_discrete={0x10, 0x24, 0x2, 0x2, 0xff, 0x4, 0x2, "999869f46aede3"}]}, {{0x9, 0x5, 0x1, 0x9, 0x400, 0xc7, 0xfc, 0x6, {0x7, 0x25, 0x1, 0x3, 0x2, 0x5}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x9, 0x24, 0x2, 0x1, 0xa, 0x1, 0x89, 0x6, 'Q'}, @as_header={0x7, 0x24, 0x1, 0xc8, 0x1, 0x5}, @format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x0, 0x1, 0x1, 0x7, "c284"}, @as_header={0x7, 0x24, 0x1, 0x0, 0x2, 0x5}, @format_type_i_continuous={0x9, 0x24, 0x2, 0x1, 0x80, 0x0, 0x6, 0xd, '0'}, @as_header={0x7, 0x24, 0x1, 0x8, 0x9, 0x1001}]}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0xb4, 0x6, 0xf, {0x7, 0x25, 0x1, 0x0, 0xfe, 0x1ff}}}}}}}]}}, &(0x7f0000000480)={0xa, &(0x7f0000000000)={0xa, 0x6, 0x310, 0x4, 0x10, 0x0, 0x40, 0xb}, 0x33, &(0x7f0000000140)={0x5, 0xf, 0x33, 0x6, [@ptm_cap={0x3}, @ss_container_id={0x14, 0x10, 0x4, 0x5, "d0976aa8fcca7c711f355cad9af0b3f3"}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0xdb927d8e8fafe366, 0x7f, 0x7, 0xff}, @ext_cap={0x7, 0x10, 0x2, 0x2, 0x5, 0x4, 0xcaf}]}, 0x8, [{0xc7, &(0x7f0000000180)=@string={0xc7, 0x3, "91b6cb324e2382e12fbc72ce4c749f8af2a90306462918c2e6cb3cf538ce42b49ce877946baca7d54e660424152de37dbf1077ba9dec4a209054da2196e45146bfb22266ffbca449edba5f6cfbd62e7634f3306885196bff180b81aa0ad4e703dc75462ff6ba750dbf08c37335dd1a85afabb1ef2e581c603e7fd6fcf32747eae13851c450c731153885a1553d0f6581c8af319697be9951862ace383adb23cf698384d423979949d5a21b81821840869936b30118efcfb696caa4f05cbc135a08200aeb33"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x200a}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x40f}}, {0x67, &(0x7f0000000300)=@string={0x67, 0x3, "fbebbb9117660908bf6c71193ea28f5bbe24c005c71b5240332cf7fda28a3c34d159e2681f79e59f3436e56bba64a88f1f213a80324061db75015568b31f1c4748089a052c19cd751cf29ddb77ecd695b95b79c12f37c6fc932f7ebafa313208b5a1184ac4"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x402}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4}}, {0x3c, &(0x7f0000000400)=@string={0x3c, 0x3, "050e586df7b39ff4348016452b3604638fb1c5015aa9132e12bfe8891d910e66178a1f95e7f30217027978c1c52bff8a5f97ab0495b9d1f0b3c0"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x404}}]}) 429.762027ms ago: executing program 0 (id=2162): syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000406c256d0000000200000109022400010000000009040000010300000009210000000122"], 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000013c0)='./file0/file0\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000380)='./file1/file0\x00', 0x0, 0x1085408, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0), 0x0, &(0x7f00000004c0)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file1/file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') r3 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) mount_setattr(r2, &(0x7f0000000040)='./bus\x00', 0x1900, &(0x7f0000000200)={0x10000f, 0x80, 0x20000, {r3}}, 0x20) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) 403.196955ms ago: executing program 2 (id=2163): socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0xfe, 0x7fff0006}]}) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000000d08000640ffffff000800034000000008580100000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000002c010380400000800800034000000002340002803000028008000180fffffffd0900020073797a310000000008000340000000000800034000f4ffff0700"], 0x1ec}}, 0x0) syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) syz_open_dev$dri(&(0x7f0000000080), 0x40100001, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x20, 0x68, 0x309, 0x0, 0x0, {}, [@NHA_ID={0x8, 0x1, 0x1}]}, 0x20}}, 0x0) 139.076687ms ago: executing program 1 (id=2164): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_GET_STATS_FD_cpu(0xffffffffffffffff, 0xaece) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ptrace$getenv(0x4201, r2, 0x4, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r5, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x380000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000300)={@local, 0x3ff, 0x0, 0x0, 0x3}, &(0x7f0000000340)=0x20) fsopen(&(0x7f0000000040)='nilfs2\x00', 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, 0x0, 0x0) accept4(r7, 0x0, 0x0, 0x80800) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000000000002004e24e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003", @ANYRES16, @ANYRESDEC=r1, @ANYRESDEC, @ANYRESHEX, @ANYRESHEX=r7, @ANYRESDEC=0x0, @ANYRESDEC=r7], 0x210) 0s ago: executing program 3 (id=2165): mount(&(0x7f0000000080)=@nullb, &(0x7f0000000000)='./cgroup\x00', &(0x7f0000000180)='qnx4\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002040)='net/packet\x00') r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r2 = eventfd2(0xfffffffe, 0x1) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000040)={0x0, r2}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f00000020c0)={0x1, r0}) close_range(r1, 0xffffffffffffffff, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000002140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000002100), 0x2, 0xa}}, 0x20) r4 = semget$private(0x0, 0x6, 0x0) semtimedop(r4, &(0x7f00000003c0)=[{0x2, 0x4, 0x800}], 0x1, 0x0) semop(r4, &(0x7f00000000c0)=[{0x3, 0x0, 0x1000}, {0x2}], 0x2) socket$packet(0x11, 0x2, 0x300) socket$inet(0x2, 0x800, 0x10007) openat$procfs(0xffffffffffffff9c, 0x0, 0x1800, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x46) socket$inet(0x2, 0x5, 0x7) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0xc, 0x4, 0xffffbe0000000001, 0x8, 0xffffffff}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): d { read write } for pid=7071 comm="syz.2.367" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 120.673491][ T30] audit: type=1400 audit(1770671081.407:2524): avc: denied { create } for pid=7071 comm="syz.2.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 120.758098][ T7080] __nla_validate_parse: 1 callbacks suppressed [ 120.758116][ T7080] netlink: 8 bytes leftover after parsing attributes in process `syz.0.368'. [ 120.773182][ T7080] netlink: 4 bytes leftover after parsing attributes in process `syz.0.368'. [ 120.849254][ T30] audit: type=1400 audit(1770671081.437:2525): avc: denied { mounton } for pid=7071 comm="syz.2.367" path="/94/file0" dev="tmpfs" ino=520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 121.152164][ T7081] kAFS: unable to lookup cell '' [ 121.158208][ T7082] kAFS: unable to lookup cell '(,c' [ 121.847428][ T7092] mkiss: ax0: crc mode is auto. [ 122.667665][ T7116] netlink: 'syz.4.381': attribute type 10 has an invalid length. [ 122.909756][ T7116] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.050003][ T7116] bond0: (slave team0): Enslaving as an active interface with an up link [ 124.957840][ T30] kauditd_printk_skb: 4832 callbacks suppressed [ 124.957857][ T30] audit: type=1400 audit(1770671085.889:6929): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 125.023936][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 125.036649][ T30] audit: type=1400 audit(1770671085.889:6930): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 125.042626][ T7145] audit: audit_backlog=65 > audit_backlog_limit=64 [ 125.061433][ T5472] audit: audit_lost=180 audit_rate_limit=0 audit_backlog_limit=64 [ 125.072735][ T5472] audit: backlog limit exceeded [ 125.078211][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 125.084862][ T30] audit: type=1400 audit(1770671085.889:6931): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 125.105721][ T7145] audit: audit_lost=181 audit_rate_limit=0 audit_backlog_limit=64 [ 125.113739][ T5472] audit: audit_lost=182 audit_rate_limit=0 audit_backlog_limit=64 [ 125.770680][ T7153] netlink: 28 bytes leftover after parsing attributes in process `syz.3.393'. [ 125.944407][ T7157] netlink: 4 bytes leftover after parsing attributes in process `syz.2.395'. [ 127.516306][ T5862] Process accounting resumed [ 127.807529][ T7199] veth0_to_team: entered promiscuous mode [ 128.408699][ T7205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7205 comm=syz.2.411 [ 129.976518][ T30] kauditd_printk_skb: 8305 callbacks suppressed [ 129.976537][ T30] audit: type=1400 audit(1770671090.881:13849): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 130.055198][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 130.062059][ T30] audit: type=1400 audit(1770671090.961:13850): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 130.091247][ T5472] audit: audit_lost=645 audit_rate_limit=0 audit_backlog_limit=64 [ 130.114777][ T5472] audit: backlog limit exceeded [ 130.124537][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 130.132263][ T30] audit: type=1400 audit(1770671090.961:13851): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 130.134325][ T5472] audit: audit_lost=646 audit_rate_limit=0 audit_backlog_limit=64 [ 130.231089][ T7237] audit: audit_backlog=65 > audit_backlog_limit=64 [ 130.238203][ T30] audit: type=1400 audit(1770671090.961:13852): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.405645][ T7253] netlink: 28 bytes leftover after parsing attributes in process `syz.1.424'. [ 132.031407][ T7270] netlink: 52 bytes leftover after parsing attributes in process `syz.4.431'. [ 132.054725][ T7270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7270 comm=syz.4.431 [ 132.547213][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.553956][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.631857][ T7304] bridge0: port 3(dummy0) entered disabled state [ 133.638485][ T7304] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.646738][ T7304] bridge0: port 1(bridge_slave_0) entered disabled state [ 134.111956][ T7310] netlink: 12 bytes leftover after parsing attributes in process `syz.4.447'. [ 134.121015][ T7310] netlink: 60 bytes leftover after parsing attributes in process `syz.4.447'. [ 134.207914][ T7310] vlan0: entered promiscuous mode [ 134.984237][ T30] kauditd_printk_skb: 6052 callbacks suppressed [ 134.984253][ T30] audit: type=1400 audit(1770671095.914:19854): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.012569][ T30] audit: type=1400 audit(1770671095.914:19855): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.034410][ T30] audit: type=1400 audit(1770671095.924:19856): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.058267][ T30] audit: type=1400 audit(1770671095.924:19857): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.089218][ T7336] audit: audit_backlog=65 > audit_backlog_limit=64 [ 135.095929][ T7336] audit: audit_lost=664 audit_rate_limit=0 audit_backlog_limit=64 [ 135.102930][ T30] audit: type=1400 audit(1770671095.924:19858): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.104954][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 135.125672][ T30] audit: type=1400 audit(1770671095.924:19859): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 135.131464][ T7336] audit: backlog limit exceeded [ 135.493265][ T7352] netlink: 'syz.2.464': attribute type 1 has an invalid length. [ 135.638769][ T7356] bridge1: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 135.710687][ T7365] bridge: RTM_NEWNEIGH with invalid ether address [ 135.720939][ T7365] netlink: 4 bytes leftover after parsing attributes in process `syz.0.470'. [ 136.667121][ T7393] IPVS: set_ctl: invalid protocol: 59 10.1.1.2:20001 [ 136.908249][ T7404] netlink: 'syz.2.485': attribute type 13 has an invalid length. [ 136.937893][ T7404] netlink: 'syz.2.485': attribute type 17 has an invalid length. [ 136.962150][ T7404] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 137.798114][ T7429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pid=7429 comm=syz.0.495 [ 137.892260][ T52] Bluetooth: hci3: unexpected event 0x2f length: 509 > 260 [ 138.915988][ T7457] : renamed from bond_slave_0 (while UP) [ 139.846233][ T7485] ALSA: mixer_oss: invalid OSS volume '' [ 139.906963][ T7488] netlink: 'syz.4.515': attribute type 1 has an invalid length. [ 139.948238][ T7488] bond1: entered promiscuous mode [ 139.975612][ T7488] 8021q: adding VLAN 0 to HW filter on device bond1 [ 139.989970][ T5472] audit_log_start: 10037 callbacks suppressed [ 139.989983][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 140.005773][ T30] audit: type=1400 audit(1770671100.796:29844): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 140.147525][ T5472] audit: audit_lost=683 audit_rate_limit=0 audit_backlog_limit=64 [ 140.157259][ T7488] audit: audit_backlog=65 > audit_backlog_limit=64 [ 140.163880][ T7488] audit: audit_lost=684 audit_rate_limit=0 audit_backlog_limit=64 [ 140.179475][ T7488] audit: backlog limit exceeded [ 140.225604][ T7491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 140.242024][ T5472] audit: backlog limit exceeded [ 140.305339][ T7491] audit: audit_lost=685 audit_rate_limit=0 audit_backlog_limit=64 [ 140.306799][ T7495] audit: audit_backlog=65 > audit_backlog_limit=64 [ 140.410618][ T7492] 8021q: adding VLAN 0 to HW filter on device bond1 [ 140.418859][ T7492] bond1: (slave gre1): The slave device specified does not support setting the MAC address [ 140.429269][ T7492] bond1: (slave gre1): Setting fail_over_mac to active for active-backup mode [ 140.524154][ T7492] bond1: (slave gre1): making interface the new active one [ 140.564265][ T7492] gre1: entered promiscuous mode [ 140.627908][ T7492] bond1: (slave gre1): Enslaving as an active interface with an up link [ 142.864583][ T7528] futex_wake_op: syz.3.528 tries to shift op by 146; fix this program [ 143.368546][ T7543] netlink: 4 bytes leftover after parsing attributes in process `syz.4.533'. [ 143.405844][ T7540] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(7) [ 143.412519][ T7540] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 143.544128][ T7540] vhci_hcd vhci_hcd.0: Device attached [ 143.771670][ T7541] vhci_hcd: connection closed [ 143.773739][ T2897] vhci_hcd vhci_hcd.4: stop threads [ 143.805040][ T2897] vhci_hcd vhci_hcd.4: release socket [ 143.810656][ T9] usb 42-1: SetAddress Request (2) to port 0 [ 143.823068][ T9] usb 42-1: new SuperSpeed USB device number 2 using vhci_hcd [ 143.931235][ T2897] vhci_hcd vhci_hcd.4: disconnect device [ 143.978046][ T9] usb 42-1: enqueue for inactive port 0 [ 144.658033][ T9] usb usb42-port1: attempt power cycle [ 144.880526][ T7557] netlink: 'syz.4.537': attribute type 13 has an invalid length. [ 144.930301][ T7557] netlink: 'syz.4.537': attribute type 17 has an invalid length. [ 144.997438][ T30] kauditd_printk_skb: 6101 callbacks suppressed [ 144.997473][ T30] audit: type=1400 audit(1770671105.949:35427): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 145.037714][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 145.059932][ T7557] bridge0: port 3(dummy0) entered blocking state [ 145.066465][ T7557] bridge0: port 3(dummy0) entered forwarding state [ 145.073154][ T7557] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.080227][ T7557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.087587][ T7557] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.094650][ T7557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.115016][ T7532] audit: audit_backlog=65 > audit_backlog_limit=64 [ 145.122812][ T7532] audit: audit_lost=859 audit_rate_limit=0 audit_backlog_limit=64 [ 145.137212][ T5472] audit: audit_lost=860 audit_rate_limit=0 audit_backlog_limit=64 [ 145.154535][ T7532] audit: backlog limit exceeded [ 145.162399][ T5472] audit: backlog limit exceeded [ 145.170362][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 145.247491][ T9] usb usb42-port1: unable to enumerate USB device [ 145.254903][ T5472] audit: audit_lost=861 audit_rate_limit=0 audit_backlog_limit=64 [ 145.274633][ T30] audit: type=1400 audit(1770671105.949:35428): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 145.317964][ T7557] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 146.896128][ T7578] serio: Serial port ptm1 [ 147.421532][ T7591] netlink: 12 bytes leftover after parsing attributes in process `syz.1.546'. [ 148.002429][ T7608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7608 comm=syz.4.552 [ 150.006657][ T30] kauditd_printk_skb: 8675 callbacks suppressed [ 150.006675][ T30] audit: type=1400 audit(1770671110.951:44076): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 150.053695][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.080747][ T5472] audit: audit_lost=871 audit_rate_limit=0 audit_backlog_limit=64 [ 150.096805][ T5803] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.103685][ T5472] audit: backlog limit exceeded [ 150.110501][ T7655] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.117189][ T30] audit: type=1400 audit(1770671110.961:44077): avc: denied { read write } for pid=5802 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 150.141820][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 150.151610][ T5803] audit: audit_lost=872 audit_rate_limit=0 audit_backlog_limit=64 [ 150.159686][ T5472] audit: audit_lost=873 audit_rate_limit=0 audit_backlog_limit=64 [ 150.193834][ T7658] netlink: 4 bytes leftover after parsing attributes in process `syz.3.568'. [ 153.171920][ T7715] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 408 [ 153.717905][ T7737] netlink: 'syz.3.594': attribute type 1 has an invalid length. [ 153.738809][ T7737] 8021q: adding VLAN 0 to HW filter on device bond1 [ 153.841853][ T7737] bond1: (slave ip6erspan0): making interface the new active one [ 153.890843][ T7737] bond1: (slave ip6erspan0): Enslaving as an active interface with an up link [ 154.542344][ T7740] netlink: 20 bytes leftover after parsing attributes in process `syz.3.595'. [ 155.013405][ T30] kauditd_printk_skb: 8371 callbacks suppressed [ 155.013423][ T30] audit: type=1400 audit(1770671115.954:51389): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 155.087248][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 155.097228][ T5472] audit: audit_lost=1227 audit_rate_limit=0 audit_backlog_limit=64 [ 155.105649][ T30] audit: type=1400 audit(1770671115.964:51390): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 155.128966][ T5472] audit: backlog limit exceeded [ 155.134403][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 155.141019][ T5472] audit: audit_lost=1228 audit_rate_limit=0 audit_backlog_limit=64 [ 155.149166][ T30] audit: type=1400 audit(1770671115.964:51391): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 155.170686][ T5472] audit: backlog limit exceeded [ 155.178527][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 156.044427][ T7771] mac80211_hwsim hwsim9 wlan1: entered promiscuous mode [ 156.054543][ T7771] macsec1: entered allmulticast mode [ 156.059933][ T7771] mac80211_hwsim hwsim9 wlan1: entered allmulticast mode [ 156.122991][ T7776] netlink: 'syz.3.603': attribute type 13 has an invalid length. [ 156.131659][ T7776] netlink: 'syz.3.603': attribute type 17 has an invalid length. [ 156.186475][ T7776] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 157.016306][ T7812] netlink: 12 bytes leftover after parsing attributes in process `syz.4.618'. [ 157.229372][ T7818] netlink: 4 bytes leftover after parsing attributes in process `syz.0.620'. [ 157.238809][ T7818] x_tables: duplicate underflow at hook 1 [ 157.386244][ T7824] capability: warning: `syz.0.624' uses deprecated v2 capabilities in a way that may be insecure [ 158.380503][ T7846] batadv_slave_0: entered promiscuous mode [ 158.396484][ T7846] batman_adv: batadv0: Adding interface: macvtap1 [ 158.404077][ T7846] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 158.435419][ T7846] batman_adv: batadv0: Interface activated: macvtap1 [ 159.222685][ T7879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.642'. [ 159.246542][ T7879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.642'. [ 159.266612][ T7879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.642'. [ 159.283922][ T7879] netlink: 8 bytes leftover after parsing attributes in process `syz.1.642'. [ 159.914723][ T7895] netlink: 'syz.0.648': attribute type 13 has an invalid length. [ 159.932016][ T7895] netlink: 'syz.0.648': attribute type 17 has an invalid length. [ 159.968464][ T7895] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 160.025866][ T30] kauditd_printk_skb: 13284 callbacks suppressed [ 160.025883][ T30] audit: type=1400 audit(1770671120.976:64413): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.085475][ T30] audit: type=1400 audit(1770671120.976:64414): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.109221][ T30] audit: type=1400 audit(1770671120.976:64415): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.152832][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.153890][ T30] audit: type=1400 audit(1770671120.976:64416): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.201308][ T30] audit: type=1400 audit(1770671120.976:64417): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 160.233980][ T7900] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.244782][ T7901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 160.252640][ T7900] audit: audit_lost=1317 audit_rate_limit=0 audit_backlog_limit=64 [ 160.258090][ T5472] audit: audit_lost=1318 audit_rate_limit=0 audit_backlog_limit=64 [ 160.264239][ T7901] netlink: 'syz.4.650': attribute type 1 has an invalid length. [ 160.331833][ T7901] 8021q: adding VLAN 0 to HW filter on device bond2 [ 160.377972][ T7903] bond2: (slave geneve0): making interface the new active one [ 160.394377][ T7903] bond2: (slave geneve0): Enslaving as an active interface with an up link [ 160.500696][ T7910] netlink: 8 bytes leftover after parsing attributes in process `syz.1.654'. [ 160.686191][ T7919] netlink: 4 bytes leftover after parsing attributes in process `syz.3.655'. [ 160.909563][ T7928] netlink: 8 bytes leftover after parsing attributes in process `syz.4.659'. [ 160.927022][ T7928] netlink: 4 bytes leftover after parsing attributes in process `syz.4.659'. [ 161.328763][ T52] Bluetooth: hci0: command tx timeout [ 161.842183][ T7938] bond2: option primary: mode dependency failed, not supported in mode balance-rr(0) [ 161.855832][ T7938] bond2 (unregistering): Released all slaves [ 162.370306][ T7959] netlink: 4 bytes leftover after parsing attributes in process `syz.4.670'. [ 162.405256][ T7959] netlink: 12 bytes leftover after parsing attributes in process `syz.4.670'. [ 162.582842][ T7961] ptrace attach of "./syz-executor exec"[7965] was attempted by "./syz-executor exec"[7961] [ 163.805185][ T7995] netlink: 12 bytes leftover after parsing attributes in process `syz.3.680'. [ 163.859282][ T7999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=62720 sclass=netlink_route_socket pid=7999 comm=syz.3.680 [ 164.051927][ T7995] 8021q: adding VLAN 0 to HW filter on device bond2 [ 164.471624][ T8013] netlink: 'syz.2.685': attribute type 13 has an invalid length. [ 164.497428][ T8013] netlink: 'syz.2.685': attribute type 17 has an invalid length. [ 164.565856][ T8013] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 165.030032][ T30] kauditd_printk_skb: 9338 callbacks suppressed [ 165.030049][ T30] audit: type=1400 audit(1770671125.969:73506): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 165.113532][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.140633][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.148467][ T5806] audit: audit_lost=1402 audit_rate_limit=0 audit_backlog_limit=64 [ 165.153826][ T5472] audit: audit_lost=1403 audit_rate_limit=0 audit_backlog_limit=64 [ 165.157319][ T5806] audit: backlog limit exceeded [ 165.165751][ T30] audit: type=1400 audit(1770671125.989:73507): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 165.203227][ T8043] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.209924][ T8043] audit: audit_lost=1404 audit_rate_limit=0 audit_backlog_limit=64 [ 165.217536][ T5803] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.441790][ T8048] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 165.985219][ T8064] netlink: 'syz.4.702': attribute type 2 has an invalid length. [ 165.996274][ T8064] netlink: 14 bytes leftover after parsing attributes in process `syz.4.702'. [ 166.011814][ T8064] bridge0: port 3(dummy0) entered disabled state [ 166.130929][ T8064] dummy0 (unregistering): left allmulticast mode [ 166.152565][ T8064] dummy0 (unregistering): left promiscuous mode [ 166.190247][ T8064] bridge0: port 3(dummy0) entered disabled state [ 166.456546][ T10] libceph: connect (1)[c::]:6789 error -13 [ 166.464265][ T10] libceph: mon0 (1)[c::]:6789 connect error [ 166.476964][ T10] libceph: connect (1)[c::]:6789 error -13 [ 166.488744][ T10] libceph: mon0 (1)[c::]:6789 connect error [ 166.767381][ T9] libceph: connect (1)[c::]:6789 error -13 [ 166.810129][ T9] libceph: mon0 (1)[c::]:6789 connect error [ 167.136029][ T8082] ceph: No mds server is up or the cluster is laggy [ 167.749814][ T52] sysfs: cannot create duplicate filename '/devices/virtual/bluetooth/hci3/hci3:201' [ 167.760064][ T52] CPU: 1 UID: 0 PID: 52 Comm: kworker/u9:0 Tainted: G L syzkaller #0 PREEMPT(full) [ 167.760084][ T52] Tainted: [L]=SOFTLOCKUP [ 167.760089][ T52] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 167.760099][ T52] Workqueue: hci3 hci_rx_work [ 167.760118][ T52] Call Trace: [ 167.760123][ T52] [ 167.760129][ T52] dump_stack_lvl+0x100/0x190 [ 167.760148][ T52] sysfs_warn_dup.cold+0x1c/0x28 [ 167.760167][ T52] sysfs_create_dir_ns+0x24b/0x2b0 [ 167.760188][ T52] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 167.760205][ T52] ? find_held_lock+0x2b/0x80 [ 167.760223][ T52] ? kobject_add_internal+0x25f/0x930 [ 167.760241][ T52] ? kobject_add_internal+0x25f/0x930 [ 167.760258][ T52] ? do_raw_spin_unlock+0x145/0x1e0 [ 167.760274][ T52] kobject_add_internal+0x2c8/0x930 [ 167.760290][ T52] kobject_add+0x16a/0x1e0 [ 167.760305][ T52] ? __pfx_kobject_add+0x10/0x10 [ 167.760318][ T52] ? class_to_subsys+0x10f/0x150 [ 167.760335][ T52] ? kobject_put+0xb9/0x640 [ 167.760349][ T52] ? _raw_spin_unlock+0x28/0x50 [ 167.760364][ T52] device_add+0x294/0x1950 [ 167.760378][ T52] ? __pfx_dev_set_name+0x10/0x10 [ 167.760394][ T52] ? __pfx_device_add+0x10/0x10 [ 167.760407][ T52] ? mgmt_send_event_skb+0x2fb/0x460 [ 167.760423][ T52] hci_conn_add_sysfs+0x1a3/0x260 [ 167.760439][ T52] le_conn_complete_evt+0x11cb/0x1f40 [ 167.760457][ T52] ? __pfx_le_conn_complete_evt+0x10/0x10 [ 167.760475][ T52] hci_le_enh_conn_complete_evt+0x23d/0x3b0 [ 167.760490][ T52] ? skb_pull_data+0x15f/0x1e0 [ 167.760503][ T52] hci_le_meta_evt+0x34a/0x5f0 [ 167.760517][ T52] ? __pfx_hci_le_enh_conn_complete_evt+0x10/0x10 [ 167.760532][ T52] hci_event_packet+0x682/0x11c0 [ 167.760545][ T52] ? __pfx_hci_le_meta_evt+0x10/0x10 [ 167.760560][ T52] ? __pfx_hci_event_packet+0x10/0x10 [ 167.760574][ T52] ? kcov_remote_start+0x374/0x660 [ 167.760590][ T52] ? lockdep_hardirqs_on+0x78/0x100 [ 167.760606][ T52] hci_rx_work+0x451/0xfc0 [ 167.760621][ T52] process_one_work+0x9c2/0x1840 [ 167.760648][ T52] ? __pfx_process_one_work+0x10/0x10 [ 167.760666][ T52] ? assign_work+0x19c/0x250 [ 167.760680][ T52] worker_thread+0x5da/0xe40 [ 167.760700][ T52] ? kthread+0x17d/0x730 [ 167.760712][ T52] ? __pfx_worker_thread+0x10/0x10 [ 167.760725][ T52] kthread+0x3b3/0x730 [ 167.760737][ T52] ? __pfx_kthread+0x10/0x10 [ 167.760749][ T52] ? ret_from_fork+0x79/0xaf0 [ 167.760763][ T52] ? ret_from_fork+0x79/0xaf0 [ 167.760775][ T52] ? rcu_is_watching+0x12/0xc0 [ 167.760791][ T52] ? __pfx_kthread+0x10/0x10 [ 167.760803][ T52] ret_from_fork+0x754/0xaf0 [ 167.760816][ T52] ? __pfx_ret_from_fork+0x10/0x10 [ 167.760829][ T52] ? __switch_to+0x7b9/0x10c0 [ 167.760844][ T52] ? __pfx_kthread+0x10/0x10 [ 167.760856][ T52] ret_from_fork_asm+0x1a/0x30 [ 167.760872][ T52] [ 167.760888][ T52] kobject: kobject_add_internal failed for hci3:201 with -EEXIST, don't try to register things with the same name in the same directory. [ 168.053494][ T52] Bluetooth: hci3: failed to register connection device [ 170.034379][ T30] kauditd_printk_skb: 8394 callbacks suppressed [ 170.034395][ T30] audit: type=1400 audit(1770671130.991:81212): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.069354][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.076052][ T5472] audit: audit_lost=1634 audit_rate_limit=0 audit_backlog_limit=64 [ 170.083946][ T5472] audit: backlog limit exceeded [ 170.089021][ T30] audit: type=1400 audit(1770671130.991:81215): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.110587][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.117162][ T5472] audit: audit_lost=1635 audit_rate_limit=0 audit_backlog_limit=64 [ 170.125823][ T5472] audit: backlog limit exceeded [ 170.130769][ T30] audit: type=1400 audit(1770671130.991:81216): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 170.159796][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 170.579088][ T8181] netlink: 24 bytes leftover after parsing attributes in process `syz.0.736'. [ 173.023277][ T8234] xt_l2tp: missing protocol rule (udp|l2tpip) [ 173.775495][ T8243] syzkaller0: entered promiscuous mode [ 173.781025][ T8243] syzkaller0: entered allmulticast mode [ 174.659862][ T8261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1043 sclass=netlink_route_socket pid=8261 comm=syz.3.769 [ 175.045442][ T30] kauditd_printk_skb: 10392 callbacks suppressed [ 175.045461][ T30] audit: type=1400 audit(1770671135.994:91382): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.078884][ T30] audit: type=1400 audit(1770671136.014:91383): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.101661][ T30] audit: type=1400 audit(1770671136.014:91384): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.109495][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 175.123367][ T30] audit: type=1400 audit(1770671136.014:91385): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.150714][ T30] audit: type=1400 audit(1770671136.014:91386): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.172735][ T30] audit: type=1400 audit(1770671136.014:91387): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.177002][ T5472] audit: audit_lost=1712 audit_rate_limit=0 audit_backlog_limit=64 [ 175.198719][ T30] audit: type=1400 audit(1770671136.014:91388): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 175.228535][ T5472] audit: backlog limit exceeded [ 176.673315][ T8289] syz.0.776 (8289): attempted to duplicate a private mapping with mremap. This is not supported. [ 177.825561][ T8348] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8348 comm=syz.2.797 [ 177.924979][ T8352] workqueue: Failed to create a rescuer kthread for wq "ceph-completion": -EINTR [ 177.925120][ T8353] workqueue: Failed to create a rescuer kthread for wq "ceph-watch-notify": -EINTR [ 178.124516][ T8366] netlink: 'syz.3.803': attribute type 13 has an invalid length. [ 178.165188][ T8366] netlink: 'syz.3.803': attribute type 17 has an invalid length. [ 178.629282][ T8389] netlink: 28 bytes leftover after parsing attributes in process `syz.4.808'. [ 178.697779][ T8389] netlink: 72 bytes leftover after parsing attributes in process `syz.4.808'. [ 178.725397][ T8394] netlink: 24 bytes leftover after parsing attributes in process `syz.4.808'. [ 180.050974][ T30] kauditd_printk_skb: 12428 callbacks suppressed [ 180.050993][ T30] audit: type=1400 audit(1770671141.016:102842): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.116984][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.139017][ T8439] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.148103][ T5472] audit: audit_lost=2038 audit_rate_limit=0 audit_backlog_limit=64 [ 180.156263][ T30] audit: type=1400 audit(1770671141.016:102843): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 180.189673][ T8439] audit: audit_lost=2039 audit_rate_limit=0 audit_backlog_limit=64 [ 180.206357][ T5472] audit: backlog limit exceeded [ 180.225408][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.232308][ T5472] audit: audit_lost=2040 audit_rate_limit=0 audit_backlog_limit=64 [ 180.240852][ T8439] audit: backlog limit exceeded [ 181.633664][ T8496] kAFS: unable to lookup cell '({^@' [ 182.389608][ T8510] netlink: 8 bytes leftover after parsing attributes in process `syz.4.847'. [ 182.421655][ T8510] netlink: 'syz.4.847': attribute type 30 has an invalid length. [ 182.489224][ T8516] netlink: 8 bytes leftover after parsing attributes in process `syz.4.847'. [ 182.545344][ T8516] netlink: 'syz.4.847': attribute type 30 has an invalid length. [ 182.565822][ T2897] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 182.605076][ T2897] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 182.634094][ T2897] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 182.661756][ T2897] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 184.459315][ T8556] mmap: syz.3.864 (8556): VmData 25837568 exceed data ulimit 11. Update limits or use boot option ignore_rlimit_data. [ 184.728416][ T8569] netlink: 20 bytes leftover after parsing attributes in process `syz.4.868'. [ 185.099208][ T30] kauditd_printk_skb: 8554 callbacks suppressed [ 185.099225][ T30] audit: type=1400 audit(1770671146.069:111316): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 185.145051][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.159096][ T8580] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.165840][ T5472] audit: audit_lost=2068 audit_rate_limit=0 audit_backlog_limit=64 [ 185.176881][ T8580] audit: audit_lost=2069 audit_rate_limit=0 audit_backlog_limit=64 [ 185.184885][ T5472] audit: backlog limit exceeded [ 185.186684][ T8582] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.190415][ T30] audit: type=1400 audit(1770671146.069:111317): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 185.229980][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 185.236477][ T5472] audit: audit_lost=2070 audit_rate_limit=0 audit_backlog_limit=64 [ 186.612283][ T8611] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8611 comm=syz.4.882 [ 187.363888][ T8617] netlink: 8 bytes leftover after parsing attributes in process `syz.2.884'. [ 187.424230][ T8616] netlink: 4 bytes leftover after parsing attributes in process `syz.2.884'. [ 189.457891][ T8660] netlink: 8 bytes leftover after parsing attributes in process `syz.2.900'. [ 189.542287][ T8663] netlink: 4 bytes leftover after parsing attributes in process `syz.2.900'. [ 190.104353][ T30] kauditd_printk_skb: 9001 callbacks suppressed [ 190.104372][ T30] audit: type=1400 audit(1770671151.071:119367): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.134591][ T30] audit: type=1400 audit(1770671151.111:119368): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.157107][ T30] audit: type=1400 audit(1770671151.111:119369): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.178818][ T30] audit: type=1400 audit(1770671151.111:119370): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.200803][ T30] audit: type=1400 audit(1770671151.111:119371): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.201638][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 190.222382][ T30] audit: type=1400 audit(1770671151.111:119372): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.251311][ T30] audit: type=1400 audit(1770671151.111:119373): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.274164][ T5472] audit: audit_lost=2388 audit_rate_limit=0 audit_backlog_limit=64 [ 190.274339][ T30] audit: type=1400 audit(1770671151.111:119374): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 190.913996][ T5822] Bluetooth: hci4: command 0x0406 tx timeout [ 190.920203][ T5823] Bluetooth: hci2: command 0x0406 tx timeout [ 190.926293][ T5820] Bluetooth: hci3: command 0x0406 tx timeout [ 190.926328][ T5820] Bluetooth: hci0: command 0x0406 tx timeout [ 190.926348][ T5820] Bluetooth: hci1: command 0x0406 tx timeout [ 191.519923][ T8720] netlink: 4 bytes leftover after parsing attributes in process `syz.0.915'. [ 191.519963][ T8720] bridge_slave_1: left allmulticast mode [ 191.519976][ T8720] bridge_slave_1: left promiscuous mode [ 191.520088][ T8720] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.530115][ T8720] bridge_slave_0: left allmulticast mode [ 191.530134][ T8720] bridge_slave_0: left promiscuous mode [ 191.530247][ T8720] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.562125][ T8721] x_tables: duplicate underflow at hook 1 [ 193.338809][ T8755] syz.1.923 (8755): /proc/8752/oom_adj is deprecated, please use /proc/8752/oom_score_adj instead. [ 193.966805][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.973172][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.345915][ T8770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8770 comm=syz.4.928 [ 195.112900][ T30] kauditd_printk_skb: 5047 callbacks suppressed [ 195.112917][ T30] audit: type=1400 audit(1770671156.053:124397): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 195.148345][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 195.149602][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 195.155024][ T5472] audit: audit_lost=2397 audit_rate_limit=0 audit_backlog_limit=64 [ 195.155039][ T5472] audit: backlog limit exceeded [ 195.155117][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 195.155129][ T5472] audit: audit_lost=2398 audit_rate_limit=0 audit_backlog_limit=64 [ 195.155140][ T5472] audit: backlog limit exceeded [ 195.155180][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 195.205440][ T8781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8781 comm=syz.3.931 [ 195.218340][ T30] audit: type=1400 audit(1770671156.063:124398): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 195.241132][ T8781] netlink: 12 bytes leftover after parsing attributes in process `syz.3.931'. [ 195.336783][ T8785] vlan2: entered allmulticast mode [ 195.409692][ T8785] bond3: entered allmulticast mode [ 198.880894][ T8883] IPVS: Error connecting to the multicast addr [ 199.027594][ T8887] netlink: 'syz.3.964': attribute type 4 has an invalid length. [ 199.240872][ T5862] libceph: connect (1)[c::]:6789 error -101 [ 199.248639][ T5862] libceph: mon0 (1)[c::]:6789 connect error [ 199.303952][ T8910] mkiss: ax0: crc mode is auto. [ 199.534417][ T5862] libceph: connect (1)[c::]:6789 error -101 [ 199.540756][ T5862] libceph: mon0 (1)[c::]:6789 connect error [ 199.970486][ T8904] ceph: No mds server is up or the cluster is laggy [ 200.068836][ T5862] libceph: connect (1)[c::]:6789 error -101 [ 200.083074][ T5862] libceph: mon0 (1)[c::]:6789 connect error [ 200.154552][ T30] kauditd_printk_skb: 7221 callbacks suppressed [ 200.154565][ T30] audit: type=1400 audit(1770671161.083:131484): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 200.200918][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 200.209528][ T5472] audit: audit_lost=2445 audit_rate_limit=0 audit_backlog_limit=64 [ 200.232652][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 200.246730][ T5805] audit: audit_lost=2446 audit_rate_limit=0 audit_backlog_limit=64 [ 200.259419][ T30] audit: type=1400 audit(1770671161.083:131485): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 200.260660][ T5472] audit: backlog limit exceeded [ 200.261040][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 200.308458][ T5805] audit: backlog limit exceeded [ 200.355389][ T8934] audit: audit_backlog=65 > audit_backlog_limit=64 [ 201.732563][ T5824] Bluetooth: hci0: unexpected event for opcode 0x2031 [ 203.623708][ T9012] netlink: 8 bytes leftover after parsing attributes in process `syz.0.998'. [ 203.702557][ T9015] netlink: 4 bytes leftover after parsing attributes in process `syz.0.998'. [ 204.789453][ T9035] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=9035 comm=syz.1.1005 [ 205.326538][ T30] kauditd_printk_skb: 13836 callbacks suppressed [ 205.326556][ T30] audit: type=1400 audit(1770671166.043:139930): avc: denied { read } for pid=9037 comm="syz.3.1008" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 205.421288][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 205.522128][ T9056] audit: audit_backlog=65 > audit_backlog_limit=64 [ 205.533210][ T5472] audit: audit_lost=4245 audit_rate_limit=0 audit_backlog_limit=64 [ 205.543710][ T9056] audit: audit_lost=4246 audit_rate_limit=0 audit_backlog_limit=64 [ 205.544457][ T30] audit: type=1400 audit(1770671166.043:139931): avc: denied { read } for pid=9037 comm="syz.3.1008" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 205.552375][ T9054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 205.581824][ T5472] audit: backlog limit exceeded [ 205.614654][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 205.621559][ T9056] audit: backlog limit exceeded [ 207.245817][ T9092] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1021'. [ 207.333382][ T9095] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1021'. [ 208.598925][ T9117] netlink: 'syz.0.1030': attribute type 21 has an invalid length. [ 208.623077][ T9117] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1030'. [ 208.664400][ T9120] netlink: 'syz.0.1030': attribute type 21 has an invalid length. [ 208.732981][ T9120] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1030'. [ 210.371667][ T30] kauditd_printk_skb: 7903 callbacks suppressed [ 210.371685][ T30] audit: type=1400 audit(1770671171.333:147291): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.435478][ T30] audit: type=1400 audit(1770671171.333:147292): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.481471][ T30] audit: type=1400 audit(1770671171.333:147293): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.519258][ T30] audit: type=1400 audit(1770671171.333:147294): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.545826][ T30] audit: type=1400 audit(1770671171.333:147295): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.614946][ T30] audit: type=1400 audit(1770671171.333:147296): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.615442][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 210.673329][ T30] audit: type=1400 audit(1770671171.333:147297): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.732643][ T30] audit: type=1400 audit(1770671171.333:147298): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 210.739097][ T5472] audit: audit_lost=4429 audit_rate_limit=0 audit_backlog_limit=64 [ 212.104875][ T9206] CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. [ 212.155567][ T9206] CIFS: Unable to determine destination address [ 212.379954][ T9222] netlink: 'syz.4.1062': attribute type 13 has an invalid length. [ 212.387911][ T9222] netlink: 'syz.4.1062': attribute type 17 has an invalid length. [ 212.409120][ T9222] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 213.037911][ T9238] veth1_vlan: default FDB implementation only supports local addresses [ 215.381302][ T30] kauditd_printk_skb: 9030 callbacks suppressed [ 215.381318][ T30] audit: type=1400 audit(1770671176.333:156040): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 215.424964][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.460501][ T5806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.467531][ T30] audit: type=1400 audit(1770671176.343:156041): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 215.495121][ T5806] audit: audit_lost=4526 audit_rate_limit=0 audit_backlog_limit=64 [ 215.506987][ T5472] audit: audit_lost=4527 audit_rate_limit=0 audit_backlog_limit=64 [ 215.520725][ T5806] audit: backlog limit exceeded [ 215.538857][ T30] audit: type=1400 audit(1770671176.343:156042): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 215.554506][ T9276] audit: audit_backlog=65 > audit_backlog_limit=64 [ 215.567441][ T9276] audit: audit_lost=4528 audit_rate_limit=0 audit_backlog_limit=64 [ 217.998844][ T9324] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1099'. [ 219.192976][ T9348] Cannot find add_set index 0 as target [ 220.383008][ T30] kauditd_printk_skb: 8482 callbacks suppressed [ 220.383024][ T30] audit: type=1400 audit(1770671181.353:163920): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 220.434081][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.449009][ T5472] audit: audit_lost=4730 audit_rate_limit=0 audit_backlog_limit=64 [ 220.463162][ T30] audit: type=1400 audit(1770671181.363:163921): avc: denied { create } for pid=9375 comm="syz.0.1118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 220.493130][ T5472] audit: backlog limit exceeded [ 220.498518][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.513462][ T5472] audit: audit_lost=4731 audit_rate_limit=0 audit_backlog_limit=64 [ 220.522304][ T5472] audit: backlog limit exceeded [ 220.528493][ T5802] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.535295][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 220.705044][ T9387] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9387 comm=syz.4.1119 [ 221.232492][ T9396] netlink: 'syz.4.1125': attribute type 1 has an invalid length. [ 221.302377][ T9396] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1125'. [ 221.403004][ T9402] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1127'. [ 221.629010][ T9402] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9402 comm=syz.0.1127 [ 221.729032][ T9422] netlink: 'syz.1.1134': attribute type 8 has an invalid length. [ 221.742706][ T9423] netlink: 'syz.1.1134': attribute type 8 has an invalid length. [ 222.619294][ T9438] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 222.877547][ T9444] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1142'. [ 222.905021][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 222.939049][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 222.986261][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.027570][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.047837][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.074421][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.106631][ T9452] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 223.113181][ T9452] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 223.125485][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.143099][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.163043][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.176424][ T9452] vhci_hcd vhci_hcd.0: Device attached [ 223.185641][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.195235][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.208833][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.218315][ T9444] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1142'. [ 223.484337][ T5920] usb 41-1: new low-speed USB device number 2 using vhci_hcd [ 223.560683][ T9463] netlink: 'syz.0.1147': attribute type 10 has an invalid length. [ 223.611943][ T9464] netlink: 'syz.0.1147': attribute type 10 has an invalid length. [ 223.658823][ T9463] team0: Port device netdevsim0 added [ 223.709263][ T9464] team0: Port device netdevsim0 removed [ 223.756087][ T9464] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 223.823398][ T9466] bond1: entered allmulticast mode [ 223.840517][ T9466] 8021q: adding VLAN 0 to HW filter on device bond1 [ 225.154815][ T9496] bond0: (slave bond_slave_0): Releasing backup interface [ 225.176306][ T9496] bond0: (slave bond_slave_1): Releasing backup interface [ 225.189495][ T9496] team0: Port device team_slave_0 removed [ 225.214824][ T9496] team0: Port device team_slave_1 removed [ 225.234863][ T9496] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 225.264767][ T9496] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 225.280586][ T9496] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 225.298204][ T9496] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 225.315697][ T9496] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 225.404324][ T30] kauditd_printk_skb: 8990 callbacks suppressed [ 225.404353][ T30] audit: type=1400 audit(1770671186.373:170964): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 225.479136][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.488610][ T5472] audit: audit_lost=5382 audit_rate_limit=0 audit_backlog_limit=64 [ 225.497013][ T5472] audit: backlog limit exceeded [ 225.502131][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.508712][ T5472] audit: audit_lost=5383 audit_rate_limit=0 audit_backlog_limit=64 [ 225.517349][ T5472] audit: backlog limit exceeded [ 225.522591][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.524989][ T9509] audit: audit_backlog=65 > audit_backlog_limit=64 [ 225.529491][ T5472] audit: audit_lost=5384 audit_rate_limit=0 audit_backlog_limit=64 [ 225.738624][ T9518] batman_adv: batadv0: Interface deactivated: macvtap1 [ 225.746025][ T9518] batman_adv: batadv0: Removing interface: macvtap1 [ 226.013390][ T49] Bluetooth: (null): Invalid header checksum [ 226.178320][ T9528] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 226.184024][ T49] Bluetooth: (null): Invalid header checksum [ 226.226043][ T49] Bluetooth: (null): Invalid header checksum [ 226.246012][ T49] Bluetooth: (null): Invalid header checksum [ 226.252080][ T49] Bluetooth: (null): Invalid header checksum [ 226.325926][ T49] Bluetooth: (null): Invalid header checksum [ 226.443542][ T13] Bluetooth: (null): Invalid header checksum [ 226.767347][ T36] Bluetooth: (null): Invalid header checksum [ 226.781023][ T36] Bluetooth: (null): Invalid header checksum [ 226.823972][ T36] Bluetooth: (null): Invalid header checksum [ 226.850485][ T9537] netlink: 'syz.1.1169': attribute type 32 has an invalid length. [ 226.877926][ T9537] bond1: option coupled_control: invalid value (64) [ 226.891507][ T49] Bluetooth: (null): Invalid header checksum [ 226.918553][ T9537] bond1 (unregistering): Released all slaves [ 226.993582][ T49] Bluetooth: (null): Invalid header checksum [ 227.103432][ T36] Bluetooth: (null): Invalid header checksum [ 227.214142][ T36] Bluetooth: (null): Invalid header checksum [ 227.242597][ T9549] netlink: 'syz.3.1174': attribute type 13 has an invalid length. [ 227.274203][ T9549] netlink: 'syz.3.1174': attribute type 17 has an invalid length. [ 227.324677][ T5927] Bluetooth: (null): Invalid header checksum [ 227.369919][ T9549] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 227.584194][ T36] Bluetooth: (null): Invalid header checksum [ 227.600279][ T36] Bluetooth: (null): Invalid header checksum [ 227.653249][ T36] Bluetooth: (null): Invalid header checksum [ 227.764491][ T36] Bluetooth: (null): Invalid header checksum [ 227.874982][ T13] Bluetooth: (null): Invalid header checksum [ 227.983181][ T13] Bluetooth: (null): Invalid header checksum [ 228.138761][ T13] Bluetooth: (null): Invalid header checksum [ 228.211143][ T13] Bluetooth: (null): Invalid header checksum [ 228.324305][ T49] Bluetooth: (null): Invalid header checksum [ 228.433387][ T36] Bluetooth: (null): Invalid header checksum [ 228.553767][ T49] Bluetooth: (null): Invalid header checksum [ 230.414855][ T30] kauditd_printk_skb: 8555 callbacks suppressed [ 230.414875][ T30] audit: type=1400 audit(1770671191.383:179166): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.485509][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.493316][ T5472] audit: audit_lost=5503 audit_rate_limit=0 audit_backlog_limit=64 [ 230.501439][ T5472] audit: backlog limit exceeded [ 230.507286][ T30] audit: type=1400 audit(1770671191.413:179167): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.537532][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 230.544452][ T5472] audit: audit_lost=5504 audit_rate_limit=0 audit_backlog_limit=64 [ 230.552651][ T5472] audit: backlog limit exceeded [ 230.557890][ T30] audit: type=1400 audit(1770671191.413:179168): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 230.585429][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 231.302112][ T9616] netlink: 'syz.2.1196': attribute type 10 has an invalid length. [ 231.318322][ T9616] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.327462][ T9616] bond0: (slave team0): Enslaving as an active interface with an up link [ 232.576452][ T9633] netlink: 'syz.4.1201': attribute type 13 has an invalid length. [ 232.585774][ T9633] netlink: 'syz.4.1201': attribute type 17 has an invalid length. [ 232.601475][ T9633] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 232.986780][ T9650] __nla_validate_parse: 54 callbacks suppressed [ 232.986792][ T9650] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1207'. [ 233.011185][ T9650] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1207'. [ 233.020670][ T9650] netlink: 'syz.2.1207': attribute type 11 has an invalid length. [ 233.050070][ T13] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 233.059474][ T9650] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1207'. [ 233.073194][ T13] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 233.092309][ T9650] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1207'. [ 233.101857][ T13] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 233.110814][ T13] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 233.120894][ T9650] netlink: 'syz.2.1207': attribute type 11 has an invalid length. [ 233.717554][ T9669] veth0_to_bridge: entered allmulticast mode [ 233.760810][ T5927] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.422874][ T30] kauditd_printk_skb: 8069 callbacks suppressed [ 235.422890][ T30] audit: type=1400 audit(1770671196.383:186318): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.453981][ T30] audit: type=1400 audit(1770671196.393:186319): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.480154][ T30] audit: type=1400 audit(1770671196.393:186320): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.505072][ T30] audit: type=1400 audit(1770671196.393:186321): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.528403][ T30] audit: type=1400 audit(1770671196.393:186322): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.556328][ T30] audit: type=1400 audit(1770671196.393:186323): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.587078][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 235.622874][ T30] audit: type=1400 audit(1770671196.393:186324): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 235.622991][ T5472] audit: audit_lost=5812 audit_rate_limit=0 audit_backlog_limit=64 [ 235.673170][ T5472] audit: backlog limit exceeded [ 236.074338][ T9708] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1226'. [ 236.146479][ T9708] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=9708 comm=syz.0.1226 [ 236.569895][ T9719] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1229'. [ 238.210010][ T9751] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1239'. [ 239.636704][ T9772] netlink: 'syz.2.1244': attribute type 21 has an invalid length. [ 240.010283][ T9789] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1251'. [ 240.432959][ T30] kauditd_printk_skb: 8646 callbacks suppressed [ 240.432977][ T30] audit: type=1400 audit(1770671201.403:192829): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.481566][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.486551][ T30] audit: type=1400 audit(1770671201.403:192830): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.539447][ T30] audit: type=1400 audit(1770671201.403:192831): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.586061][ T9806] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.602262][ T9806] audit: audit_lost=6527 audit_rate_limit=0 audit_backlog_limit=64 [ 240.626921][ T9806] audit: backlog limit exceeded [ 240.638980][ T9807] audit: audit_backlog=65 > audit_backlog_limit=64 [ 240.646540][ T30] audit: type=1400 audit(1770671201.403:192832): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 240.652913][ T9807] audit: audit_lost=6528 audit_rate_limit=0 audit_backlog_limit=64 [ 241.757757][ T9827] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1264'. [ 241.882867][ T5816] Bluetooth: hci5: command 0x1003 tx timeout [ 241.889886][ T5824] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 243.400303][ T9861] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1275'. [ 245.445206][ T30] kauditd_printk_skb: 14384 callbacks suppressed [ 245.445222][ T30] audit: type=1400 audit(1770671206.413:201610): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.501277][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.544886][ T5472] audit: audit_lost=8398 audit_rate_limit=0 audit_backlog_limit=64 [ 245.557486][ T30] audit: type=1400 audit(1770671206.413:201611): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.558553][ T9901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.589594][ T5472] audit: backlog limit exceeded [ 245.601304][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 245.615124][ T9901] audit: audit_lost=8399 audit_rate_limit=0 audit_backlog_limit=64 [ 245.626211][ T5472] audit: audit_lost=8400 audit_rate_limit=0 audit_backlog_limit=64 [ 245.639167][ T30] audit: type=1400 audit(1770671206.413:201612): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 245.775271][ T9904] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1287'. [ 245.827064][ T9905] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1287'. [ 247.916061][ T9935] netlink: 'syz.3.1297': attribute type 4 has an invalid length. [ 248.011539][ T9938] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1298'. [ 248.035282][ T9938] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1298'. [ 248.877851][ T9969] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1311'. [ 248.894164][ T9969] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1311'. [ 250.466198][ T30] kauditd_printk_skb: 6214 callbacks suppressed [ 250.466217][ T30] audit: type=1400 audit(1770671211.433:207669): avc: denied { read write } for pid=5803 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.484038][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.535215][ T5802] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.543288][ T30] audit: type=1400 audit(1770671211.433:207670): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 250.564888][ T5802] audit: audit_lost=8453 audit_rate_limit=0 audit_backlog_limit=64 [ 250.584918][ T5472] audit: audit_lost=8454 audit_rate_limit=0 audit_backlog_limit=64 [ 250.592912][ T5802] audit: backlog limit exceeded [ 250.607980][ T5472] audit: backlog limit exceeded [ 250.627135][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 250.649578][ T5472] audit: audit_lost=8455 audit_rate_limit=0 audit_backlog_limit=64 [ 250.930297][T10012] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1324'. [ 250.967302][T10012] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1324'. [ 251.213916][T10014] bond3 (unregistering): Released all slaves [ 252.482974][T10054] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1337'. [ 252.524400][T10054] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1337'. [ 253.984155][T10082] netlink: 'syz.0.1348': attribute type 13 has an invalid length. [ 254.003439][T10082] netlink: 'syz.0.1348': attribute type 17 has an invalid length. [ 254.103258][T10082] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 255.396387][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.402765][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.473059][ T30] kauditd_printk_skb: 7183 callbacks suppressed [ 255.473076][ T30] audit: type=1400 audit(1770671216.433:214739): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.515153][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.521835][ T5472] audit: audit_lost=8494 audit_rate_limit=0 audit_backlog_limit=64 [ 255.530816][ T5472] audit: backlog limit exceeded [ 255.536087][ T30] audit: type=1400 audit(1770671216.433:214740): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.559499][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.568080][ T5472] audit: audit_lost=8495 audit_rate_limit=0 audit_backlog_limit=64 [ 255.576381][ T5472] audit: backlog limit exceeded [ 255.581458][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 255.588337][ T30] audit: type=1400 audit(1770671216.433:214741): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 255.771543][T10103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=10103 comm=syz.4.1355 [ 256.513449][T10037] syz.3.1332 (10037): drop_caches: 1 [ 257.143349][T10118] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1361'. [ 257.269661][T10124] netlink: 'syz.1.1363': attribute type 13 has an invalid length. [ 257.288068][T10124] netlink: 'syz.1.1363': attribute type 17 has an invalid length. [ 257.317432][T10124] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 257.509433][T10132] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1366'. [ 257.524398][T10132] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1366'. [ 257.616051][T10134] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1367'. [ 257.636387][T10136] xt_addrtype: output interface limitation not valid in PREROUTING and INPUT [ 257.669299][T10134] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1367'. [ 257.748919][T10147] netlink: 'syz.2.1368': attribute type 13 has an invalid length. [ 257.782281][T10147] netlink: 'syz.2.1368': attribute type 17 has an invalid length. [ 257.793636][T10146] netlink: 'syz.3.1371': attribute type 1 has an invalid length. [ 257.822557][T10147] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 257.852991][T10146] 8021q: adding VLAN 0 to HW filter on device bond4 [ 260.483231][ T30] kauditd_printk_skb: 12545 callbacks suppressed [ 260.483242][ T30] audit: type=1400 audit(1770671221.453:226577): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.549820][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.556502][ T5472] audit: audit_lost=8733 audit_rate_limit=0 audit_backlog_limit=64 [ 260.565166][ T30] audit: type=1400 audit(1770671221.453:226578): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 260.642895][ T5472] audit: backlog limit exceeded [ 260.849139][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.860391][ T5472] audit: audit_lost=8734 audit_rate_limit=0 audit_backlog_limit=64 [ 260.879742][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 260.891907][ T5472] audit: backlog limit exceeded [ 260.999993][ T5805] audit: audit_lost=8735 audit_rate_limit=0 audit_backlog_limit=64 [ 261.913988][T10227] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1397'. [ 261.984559][T10227] 8021q: adding VLAN 0 to HW filter on device bond2 [ 263.151341][T10259] netlink: 'syz.3.1406': attribute type 13 has an invalid length. [ 263.191147][T10259] netlink: 'syz.3.1406': attribute type 17 has an invalid length. [ 263.280557][T10259] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 263.762333][T10273] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1411'. [ 264.520761][T10279] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1413'. [ 264.593881][T10284] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1413'. [ 265.525422][ T30] kauditd_printk_skb: 10475 callbacks suppressed [ 265.525443][ T30] audit: type=1400 audit(1770671226.453:236645): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.554820][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.561648][ T5472] audit: audit_lost=8872 audit_rate_limit=0 audit_backlog_limit=64 [ 265.694054][ T30] audit: type=1400 audit(1770671226.453:236646): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.748821][ T30] audit: type=1400 audit(1770671226.453:236647): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.794663][ T5472] audit: backlog limit exceeded [ 265.809802][ T30] audit: type=1400 audit(1770671226.463:236648): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 265.814936][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.852038][T10309] audit: audit_backlog=65 > audit_backlog_limit=64 [ 265.881737][T10309] audit: audit_lost=8873 audit_rate_limit=0 audit_backlog_limit=64 [ 266.836012][T10327] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1428'. [ 267.017216][T10331] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 268.525794][T10381] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1449'. [ 268.555150][T10381] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1449'. [ 270.284065][ T5810] libceph: connect (1)[c::]:6789 error -101 [ 270.311312][ T5810] libceph: mon0 (1)[c::]:6789 connect error [ 270.543048][ T30] kauditd_printk_skb: 8140 callbacks suppressed [ 270.543064][ T30] audit: type=1400 audit(1770671231.513:242467): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.576025][T10441] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1467'. [ 270.593623][ T5810] libceph: connect (1)[c::]:6789 error -101 [ 270.600192][ T5810] libceph: mon0 (1)[c::]:6789 connect error [ 270.601697][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.620062][ T30] audit: type=1400 audit(1770671231.513:242468): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.632847][ T5472] audit: audit_lost=9648 audit_rate_limit=0 audit_backlog_limit=64 [ 270.663787][ T30] audit: type=1400 audit(1770671231.513:242469): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.668258][ T5472] audit: backlog limit exceeded [ 270.707857][ T30] audit: type=1400 audit(1770671231.513:242470): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.710339][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 270.753874][ T30] audit: type=1400 audit(1770671231.513:242471): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 270.775167][ T5472] audit: audit_lost=9649 audit_rate_limit=0 audit_backlog_limit=64 [ 270.959249][T10447] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1469'. [ 271.034892][T10433] ceph: No mds server is up or the cluster is laggy [ 271.466337][T10461] ptrace attach of "./syz-executor exec"[5805] was attempted by "./syz-executor exec"[10461] [ 271.477882][T10462] ptrace attach of "./syz-executor exec"[5805] was attempted by "./syz-executor exec"[10462] [ 272.254451][T10473] netdevsim netdevsim3: Direct firmware load for . [ 272.254451][T10473] failed with error -2 [ 272.994457][T10488] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1483'. [ 273.695804][T10504] netlink: 'syz.4.1488': attribute type 13 has an invalid length. [ 273.711255][T10504] netlink: 'syz.4.1488': attribute type 17 has an invalid length. [ 273.746925][T10504] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 274.176868][T10517] x_tables: duplicate underflow at hook 1 [ 275.140825][T10520] Process accounting resumed [ 275.556941][ T30] kauditd_printk_skb: 12153 callbacks suppressed [ 275.558417][ T30] audit: type=1400 audit(1770671236.503:253442): avc: denied { create } for pid=10545 comm="syz.3.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 275.601117][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.608000][ T5472] audit: audit_lost=10044 audit_rate_limit=0 audit_backlog_limit=64 [ 275.616678][ T5472] audit: backlog limit exceeded [ 275.620105][T10556] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.629583][T10556] audit: audit_lost=10045 audit_rate_limit=0 audit_backlog_limit=64 [ 275.630125][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 275.654907][ T30] audit: type=1400 audit(1770671236.503:253443): avc: denied { execmem } for pid=10545 comm="syz.3.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 275.674810][T10556] audit: backlog limit exceeded [ 275.675072][ T5472] audit: audit_lost=10046 audit_rate_limit=0 audit_backlog_limit=64 [ 275.738125][T10556] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1507'. [ 275.761938][T10556] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1507'. [ 278.759869][T10603] netlink: 52 bytes leftover after parsing attributes in process `syz.3.1521'. [ 278.780399][T10603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10603 comm=syz.3.1521 [ 279.043313][T10613] netlink: 'syz.0.1522': attribute type 13 has an invalid length. [ 279.072207][T10613] netlink: 'syz.0.1522': attribute type 17 has an invalid length. [ 279.094619][T10614] netlink: 'syz.3.1524': attribute type 13 has an invalid length. [ 279.134643][T10614] netlink: 'syz.3.1524': attribute type 17 has an invalid length. [ 279.164813][T10613] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 279.232278][T10614] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 280.563111][ T30] kauditd_printk_skb: 8479 callbacks suppressed [ 280.563129][ T30] audit: type=1400 audit(1770671241.523:261274): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.578975][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.632096][ T5472] audit: audit_lost=10263 audit_rate_limit=0 audit_backlog_limit=64 [ 280.639360][ T30] audit: type=1400 audit(1770671241.533:261275): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.694996][T10639] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.701667][ T5472] audit: backlog limit exceeded [ 280.704835][ T30] audit: type=1400 audit(1770671241.533:261276): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 280.728938][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 280.735844][T10639] audit: audit_lost=10264 audit_rate_limit=0 audit_backlog_limit=64 [ 280.736000][T10640] audit: audit_backlog=65 > audit_backlog_limit=64 [ 281.441056][T10661] netlink: 'syz.2.1540': attribute type 13 has an invalid length. [ 281.497651][T10661] netlink: 'syz.2.1540': attribute type 17 has an invalid length. [ 281.632698][T10661] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 282.285834][T10682] netlink: 52 bytes leftover after parsing attributes in process `syz.4.1545'. [ 284.609334][T10718] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1558'. [ 284.693291][T10721] EXT4-fs: Conflicting test_dummy_encryption options [ 285.572801][ T30] kauditd_printk_skb: 9875 callbacks suppressed [ 285.572818][ T30] audit: type=1400 audit(1770671246.533:268855): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 285.604273][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.616277][ T5472] audit: audit_lost=11031 audit_rate_limit=0 audit_backlog_limit=64 [ 285.624927][ T5472] audit: backlog limit exceeded [ 285.630027][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.637069][ T5472] audit: audit_lost=11032 audit_rate_limit=0 audit_backlog_limit=64 [ 285.645092][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 285.645110][ T5805] audit: audit_lost=11033 audit_rate_limit=0 audit_backlog_limit=64 [ 285.645122][ T5805] audit: backlog limit exceeded [ 285.687335][T10731] netlink: 'syz.4.1565': attribute type 21 has an invalid length. [ 285.695296][ T5472] audit: backlog limit exceeded [ 286.519034][T10751] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 290.574943][T10834] SELinux: security_context_str_to_sid (5] S9q#) failed with errno=-22 [ 290.682027][ T30] kauditd_printk_skb: 8198 callbacks suppressed [ 290.682044][ T30] audit: type=1400 audit(1770671251.563:277039): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.733414][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.739958][ T5472] audit: audit_lost=11039 audit_rate_limit=0 audit_backlog_limit=64 [ 290.751786][ T30] audit: type=1400 audit(1770671251.563:277040): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 290.755004][T10836] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.773443][ T5472] audit: backlog limit exceeded [ 290.780274][T10834] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.806013][T10834] audit: audit_lost=11040 audit_rate_limit=0 audit_backlog_limit=64 [ 290.806864][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 290.830425][T10834] audit: backlog limit exceeded [ 291.446594][T10854] xt_time: invalid argument - start or stop time greater than 23:59:59 [ 291.994544][T10878] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1613'. [ 292.122215][T10878] netlink: 'syz.1.1613': attribute type 5 has an invalid length. [ 292.159073][T10878] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1613'. [ 292.288820][T10878] geneve2: entered promiscuous mode [ 292.325523][T10878] geneve2: entered allmulticast mode [ 292.347184][ T13] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 256 - 0 [ 292.477240][T10887] ptrace attach of "./syz-executor exec"[5804] was attempted by "./syz-executor exec"[10887] [ 292.542343][ T13] netdevsim netdevsim1 netdevsim1: set [1, 1] type 2 family 0 port 256 - 0 [ 292.636937][ T13] netdevsim netdevsim1 netdevsim2: set [1, 1] type 2 family 0 port 256 - 0 [ 292.682163][ T13] netdevsim netdevsim1 netdevsim3: set [1, 1] type 2 family 0 port 256 - 0 [ 294.838126][T10923] ip6tnl2: entered promiscuous mode [ 295.683670][ T30] kauditd_printk_skb: 8171 callbacks suppressed [ 295.683690][ T30] audit: type=1400 audit(1770671256.653:284293): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 295.744670][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.752826][ T30] audit: type=1400 audit(1770671256.653:284294): avc: denied { read } for pid=10951 comm="syz.2.1639" name="video2" dev="devtmpfs" ino=934 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 295.765031][T10954] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.789488][ T5472] audit: audit_lost=11348 audit_rate_limit=0 audit_backlog_limit=64 [ 295.792196][ T30] audit: type=1400 audit(1770671256.663:284295): avc: denied { setattr } for pid=10951 comm="syz.2.1639" name="mixer" dev="devtmpfs" ino=1293 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=0 [ 295.812990][ T5472] audit: backlog limit exceeded [ 295.841434][T10954] audit: audit_lost=11349 audit_rate_limit=0 audit_backlog_limit=64 [ 295.859002][ T30] audit: type=1400 audit(1770671256.663:284296): avc: denied { read } for pid=10951 comm="syz.2.1639" dev="nsfs" ino=4026532814 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 295.862216][T10954] audit: backlog limit exceeded [ 300.707420][ T30] kauditd_printk_skb: 13758 callbacks suppressed [ 300.707460][ T30] audit: type=1400 audit(1770671261.573:297638): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 300.802963][ T30] audit: type=1400 audit(1770671261.573:297639): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 300.816554][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.827982][ T5805] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.834436][ T5472] audit: audit_lost=11489 audit_rate_limit=0 audit_backlog_limit=64 [ 300.856799][ T5805] audit: audit_lost=11490 audit_rate_limit=0 audit_backlog_limit=64 [ 300.872830][ T5805] audit: backlog limit exceeded [ 300.876762][T11042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.883047][ T30] audit: type=1400 audit(1770671261.573:297640): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 300.884572][ T5472] audit: backlog limit exceeded [ 300.924054][T11042] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1668'. [ 301.031469][T11047] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11047 comm=syz.1.1668 [ 301.059398][T11046] netlink: 'syz.3.1669': attribute type 13 has an invalid length. [ 301.073139][T11046] netlink: 'syz.3.1669': attribute type 17 has an invalid length. [ 301.721023][T11063] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1674'. [ 302.408593][T11046] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 303.036383][T11083] netlink: 'syz.0.1680': attribute type 4 has an invalid length. [ 303.048098][T11085] netlink: 'syz.0.1680': attribute type 4 has an invalid length. [ 305.063779][T11127] netlink: 'syz.0.1695': attribute type 13 has an invalid length. [ 305.074341][T11127] netlink: 'syz.0.1695': attribute type 17 has an invalid length. [ 305.125911][T11127] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 305.397304][T11133] netlink: 'syz.3.1697': attribute type 10 has an invalid length. [ 305.449695][T11133] team0: Port device netdevsim0 added [ 305.715731][ T30] kauditd_printk_skb: 6870 callbacks suppressed [ 305.715748][ T30] audit: type=1400 audit(1770671266.683:304278): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.003401][ T30] audit: type=1400 audit(1770671266.683:304279): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.056367][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.065919][ T30] audit: type=1400 audit(1770671266.683:304280): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.104449][ T5472] audit: audit_lost=11569 audit_rate_limit=0 audit_backlog_limit=64 [ 306.144144][ T30] audit: type=1400 audit(1770671266.683:304281): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.146844][ T5472] audit: backlog limit exceeded [ 306.198353][ T30] audit: type=1400 audit(1770671266.683:304282): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.256973][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 306.268197][ T30] audit: type=1400 audit(1770671266.683:304283): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 306.277640][ T5824] Bluetooth: hci2: unexpected event for opcode 0x0c12 [ 307.160718][T11162] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1706'. [ 307.210547][T11164] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1706'. [ 308.136519][T11179] x_tables: ip6_tables: icmp6 match: only valid for protocol 58 [ 309.365023][T11198] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1718'. [ 309.443177][T11200] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1718'. [ 310.423959][T11208] netlink: 'syz.4.1719': attribute type 13 has an invalid length. [ 310.442020][T11208] netlink: 'syz.4.1719': attribute type 17 has an invalid length. [ 310.481967][T11208] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 310.578831][T11211] netlink: 'syz.0.1720': attribute type 13 has an invalid length. [ 310.604849][T11211] netlink: 'syz.0.1720': attribute type 17 has an invalid length. [ 310.638376][T11211] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 310.722850][ T30] kauditd_printk_skb: 7505 callbacks suppressed [ 310.722869][ T30] audit: type=1400 audit(1770671271.683:311571): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.790645][ T30] audit: type=1400 audit(1770671271.683:311572): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.801730][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 310.840106][ T5472] audit: audit_lost=11643 audit_rate_limit=0 audit_backlog_limit=64 [ 310.840134][ T30] audit: type=1400 audit(1770671271.683:311573): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.900099][ T5472] audit: backlog limit exceeded [ 310.906464][ T30] audit: type=1400 audit(1770671271.743:311574): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 310.910257][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 310.943671][ T5472] audit: audit_lost=11644 audit_rate_limit=0 audit_backlog_limit=64 [ 310.951797][ T5472] audit: backlog limit exceeded [ 312.156762][T11233] ipip0: entered allmulticast mode [ 313.923712][T11262] netlink: 'syz.4.1741': attribute type 1 has an invalid length. [ 313.959485][T11262] 8021q: adding VLAN 0 to HW filter on device bond3 [ 314.098908][T11262] vlan2: entered allmulticast mode [ 314.122848][T11262] veth0_to_bond: entered allmulticast mode [ 314.218056][T11262] bond3: (slave vlan2): making interface the new active one [ 314.229954][T11262] bond3: (slave vlan2): Enslaving as an active interface with an up link [ 315.050133][T11277] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1744'. [ 315.652529][T11282] vlan3: entered promiscuous mode [ 315.680389][T11282] bridge0: entered promiscuous mode [ 315.732873][ T30] kauditd_printk_skb: 9359 callbacks suppressed [ 315.732890][ T30] audit: type=1400 audit(1770671276.693:320934): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 315.852056][ T30] audit: type=1400 audit(1770671276.773:320935): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 315.853443][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 315.882031][ T30] audit: type=1400 audit(1770671276.773:320936): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 315.905231][ T5472] audit: audit_lost=11645 audit_rate_limit=0 audit_backlog_limit=64 [ 315.905603][T11289] audit: audit_backlog=65 > audit_backlog_limit=64 [ 315.921822][T11291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 315.930131][ T5472] audit: backlog limit exceeded [ 315.930166][T11289] audit: audit_lost=11646 audit_rate_limit=0 audit_backlog_limit=64 [ 315.947437][T11291] audit: audit_lost=11647 audit_rate_limit=0 audit_backlog_limit=64 [ 316.839462][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.845868][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.047682][ T5824] Bluetooth: hci2: unexpected event for opcode 0x0c12 [ 319.802213][T11391] bond1: entered promiscuous mode [ 319.811045][T11391] bond1: entered allmulticast mode [ 319.819605][T11391] 8021q: adding VLAN 0 to HW filter on device bond1 [ 319.832583][T11400] netlink: 'syz.1.1781': attribute type 13 has an invalid length. [ 319.847747][T11400] netlink: 'syz.1.1781': attribute type 17 has an invalid length. [ 319.907331][T11400] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 320.744718][ T30] kauditd_printk_skb: 7218 callbacks suppressed [ 320.744734][ T30] audit: type=1400 audit(1770671281.713:328048): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 320.748426][T11431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=11431 comm=syz.2.1791 [ 320.815698][ T30] audit: type=1400 audit(1770671281.713:328050): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.045232][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 321.054363][T11433] audit: audit_backlog=65 > audit_backlog_limit=64 [ 321.061368][T11433] audit: audit_lost=11683 audit_rate_limit=0 audit_backlog_limit=64 [ 321.070334][ T5472] audit: audit_lost=11684 audit_rate_limit=0 audit_backlog_limit=64 [ 321.078795][ T5472] audit: backlog limit exceeded [ 321.086923][ T30] audit: type=1400 audit(1770671281.713:328049): avc: denied { create } for pid=11427 comm="syz.2.1791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 321.108810][T11433] audit: backlog limit exceeded [ 321.115582][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 321.822127][T11455] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1800'. [ 321.862004][T11455] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1800'. [ 321.883259][T11455] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1800'. [ 321.909688][T11455] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1800'. [ 322.737496][T11473] netlink: 'syz.3.1805': attribute type 5 has an invalid length. [ 323.549562][T11490] netlink: 'syz.2.1810': attribute type 13 has an invalid length. [ 323.570911][T11490] netlink: 'syz.2.1810': attribute type 17 has an invalid length. [ 323.658754][T11490] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 325.753003][ T30] kauditd_printk_skb: 10412 callbacks suppressed [ 325.753021][ T30] audit: type=1400 audit(1770671286.723:337822): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 325.792386][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.802469][ T5472] audit: audit_lost=11899 audit_rate_limit=0 audit_backlog_limit=64 [ 325.819820][ T5472] audit: backlog limit exceeded [ 325.825924][ T30] audit: type=1400 audit(1770671286.723:337823): avc: denied { read write } for pid=5802 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.860686][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.867821][ T5472] audit: audit_lost=11900 audit_rate_limit=0 audit_backlog_limit=64 [ 325.877641][ T5472] audit: backlog limit exceeded [ 325.888003][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 325.894941][ T30] audit: type=1400 audit(1770671286.753:337824): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 326.288494][T11526] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1823'. [ 328.144605][T11573] netlink: 'syz.2.1836': attribute type 13 has an invalid length. [ 328.166637][T11573] netlink: 'syz.2.1836': attribute type 17 has an invalid length. [ 328.309030][T11573] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 328.522485][T11583] netlink: 'syz.0.1840': attribute type 12 has an invalid length. [ 328.531808][T11583] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1840'. [ 329.713389][ T5824] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 330.644352][T11602] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1848'. [ 330.844874][ T30] kauditd_printk_skb: 12614 callbacks suppressed [ 330.844898][ T30] audit: type=1400 audit(1770671291.813:348670): avc: denied { create } for pid=11597 comm="syz.4.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 330.891592][ T30] audit: type=1400 audit(1770671291.853:348671): avc: denied { read write } for pid=5804 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 330.933635][ T30] audit: type=1400 audit(1770671291.863:348672): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 330.971073][ T30] audit: type=1400 audit(1770671291.863:348673): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.001149][ T30] audit: type=1400 audit(1770671291.863:348674): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.116699][ T30] audit: type=1400 audit(1770671291.863:348675): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.139057][ T30] audit: type=1400 audit(1770671291.863:348676): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 331.244232][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 331.251013][ T5472] audit: audit_lost=12491 audit_rate_limit=0 audit_backlog_limit=64 [ 331.259378][ T5472] audit: backlog limit exceeded [ 331.645051][T11626] netlink: 'syz.1.1855': attribute type 4 has an invalid length. [ 331.946631][T11636] netlink: 'syz.0.1860': attribute type 13 has an invalid length. [ 331.959422][T11636] netlink: 'syz.0.1860': attribute type 17 has an invalid length. [ 332.065395][T11636] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 333.878622][T11669] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1869'. [ 334.260475][T11675] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1872'. [ 335.852883][ T30] kauditd_printk_skb: 10795 callbacks suppressed [ 335.852906][ T30] audit: type=1400 audit(1770671296.823:358464): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 335.907331][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.936539][T11712] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.938165][ T5802] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.953421][T11711] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.959966][T11711] audit: audit_lost=12828 audit_rate_limit=0 audit_backlog_limit=64 [ 335.964919][T11709] audit: audit_backlog=65 > audit_backlog_limit=64 [ 335.979382][ T5472] audit: audit_lost=12829 audit_rate_limit=0 audit_backlog_limit=64 [ 335.984699][ T30] audit: type=1400 audit(1770671296.823:358465): avc: denied { mounton } for pid=11706 comm="syz.1.1886" path="/394/file0" dev="tmpfs" ino=2129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 335.987553][ T5472] audit: backlog limit exceeded [ 336.118815][T11717] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1885'. [ 336.207860][T11721] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1885'. [ 336.460899][T11724] netlink: 36 bytes leftover after parsing attributes in process `syz.3.1890'. [ 336.633046][T11732] netlink: 'syz.1.1891': attribute type 10 has an invalid length. [ 336.688217][T11732] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.728530][T11732] bond0: (slave team0): Enslaving as an active interface with an up link [ 337.671653][T11755] ip6tnl2: entered promiscuous mode [ 338.645505][T11766] netlink: 'syz.4.1902': attribute type 13 has an invalid length. [ 338.653418][T11766] netlink: 'syz.4.1902': attribute type 17 has an invalid length. [ 338.719299][T11766] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 339.111839][T11768] EXT4-fs: Conflicting test_dummy_encryption options [ 340.003025][T11787] netlink: 'syz.0.1910': attribute type 1 has an invalid length. [ 340.828625][T11794] netlink: 27 bytes leftover after parsing attributes in process `syz.0.1913'. [ 340.866676][ T30] kauditd_printk_skb: 12565 callbacks suppressed [ 340.866695][ T30] audit: type=1400 audit(1770671301.813:367702): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.912669][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 340.922917][ T5472] audit: audit_lost=13940 audit_rate_limit=0 audit_backlog_limit=64 [ 340.923698][ T30] audit: type=1400 audit(1770671301.833:367704): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 340.944626][ T5472] audit: backlog limit exceeded [ 340.973179][ T30] audit: type=1400 audit(1770671301.833:367705): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.003610][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 341.010270][ T30] audit: type=1400 audit(1770671301.833:367706): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.022904][ T5472] audit: audit_lost=13941 audit_rate_limit=0 audit_backlog_limit=64 [ 341.055089][ T5472] audit: backlog limit exceeded [ 341.536705][T11814] netlink: 'syz.1.1919': attribute type 13 has an invalid length. [ 341.549777][T11814] netlink: 'syz.1.1919': attribute type 17 has an invalid length. [ 341.592057][T11814] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 342.920940][T11843] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 343.721550][T11850] netlink: 'syz.2.1932': attribute type 13 has an invalid length. [ 343.738474][T11850] netlink: 'syz.2.1932': attribute type 17 has an invalid length. [ 343.856361][T11850] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 344.606765][T11858] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1936'. [ 345.872904][ T30] kauditd_printk_skb: 14533 callbacks suppressed [ 345.872922][ T30] audit: type=1400 audit(1770671306.833:382240): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 345.948911][ T30] audit: type=1400 audit(1770671306.843:382241): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 345.982523][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.989391][ T5472] audit: audit_lost=13942 audit_rate_limit=0 audit_backlog_limit=64 [ 345.997779][ T5472] audit: backlog limit exceeded [ 346.007710][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 346.014595][ T30] audit: type=1400 audit(1770671306.843:382242): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 346.037929][ T5472] audit: audit_lost=13943 audit_rate_limit=0 audit_backlog_limit=64 [ 346.046140][ T5472] audit: backlog limit exceeded [ 346.051572][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 346.378564][T11894] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 346.910988][ T5862] libceph: connect (1)[c::]:6789 error -101 [ 346.917225][ T5862] libceph: mon0 (1)[c::]:6789 connect error [ 347.044514][T11906] ceph: No mds server is up or the cluster is laggy [ 347.318036][T11926] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1955'. [ 347.373706][T11930] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1955'. [ 347.720278][T11938] netlink: 'syz.2.1959': attribute type 13 has an invalid length. [ 347.733786][T11938] netlink: 'syz.2.1959': attribute type 17 has an invalid length. [ 347.766486][T11938] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 348.627861][T11952] netlink: 'syz.4.1962': attribute type 1 has an invalid length. [ 348.978116][T11954] bond4: (slave vxcan1): The slave device specified does not support setting the MAC address [ 349.661281][T11954] bond4: (slave vxcan1): Error -95 calling set_mac_address [ 349.731622][T11956] bond4: (slave bridge2): Enslaving as an active interface with a down link [ 349.952230][T11971] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1967'. [ 350.883110][ T30] kauditd_printk_skb: 8889 callbacks suppressed [ 350.883129][ T30] audit: type=1400 audit(1770671311.843:389063): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.923922][T11987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=11987 comm=syz.2.1971 [ 350.938509][ T30] audit: type=1400 audit(1770671311.853:389064): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 350.966866][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 350.969647][T11986] audit: audit_backlog=65 > audit_backlog_limit=64 [ 350.980333][T11986] audit: audit_lost=14634 audit_rate_limit=0 audit_backlog_limit=64 [ 350.990130][T11986] audit: backlog limit exceeded [ 351.016924][ T30] audit: type=1400 audit(1770671311.853:389065): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.039567][ T5472] audit: audit_lost=14635 audit_rate_limit=0 audit_backlog_limit=64 [ 351.050202][ T5472] audit: backlog limit exceeded [ 351.055256][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 352.680316][T12012] netlink: 'syz.3.1980': attribute type 13 has an invalid length. [ 352.688320][T12012] netlink: 'syz.3.1980': attribute type 17 has an invalid length. [ 352.730539][T12012] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 352.831390][T12016] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1974'. [ 353.956905][T12034] FAULT_INJECTION: forcing a failure. [ 353.956905][T12034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.972144][T12034] CPU: 1 UID: 0 PID: 12034 Comm: syz.1.1988 Tainted: G L syzkaller #0 PREEMPT(full) [ 353.972175][T12034] Tainted: [L]=SOFTLOCKUP [ 353.972181][T12034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 353.972191][T12034] Call Trace: [ 353.972197][T12034] [ 353.972203][T12034] dump_stack_lvl+0x100/0x190 [ 353.972230][T12034] should_fail_ex.cold+0x5/0xa [ 353.972246][T12034] _copy_from_iter+0x1f4/0x1690 [ 353.972269][T12034] ? __alloc_skb+0x220/0x410 [ 353.972286][T12034] ? __alloc_skb+0x35d/0x410 [ 353.972303][T12034] ? __pfx__copy_from_iter+0x10/0x10 [ 353.972322][T12034] ? netlink_autobind.isra.0+0xa0/0x370 [ 353.972351][T12034] netlink_sendmsg+0x808/0xda0 [ 353.972375][T12034] ? __pfx_netlink_sendmsg+0x10/0x10 [ 353.972395][T12034] ? PageHuge+0x180/0x180 [ 353.972416][T12034] ____sys_sendmsg+0xa54/0xc30 [ 353.972432][T12034] ? __pfx_____sys_sendmsg+0x10/0x10 [ 353.972454][T12034] ___sys_sendmsg+0x190/0x1e0 [ 353.972470][T12034] ? __pfx____sys_sendmsg+0x10/0x10 [ 353.972493][T12034] ? find_held_lock+0x2b/0x80 [ 353.972524][T12034] __sys_sendmsg+0x170/0x220 [ 353.972544][T12034] ? __pfx___sys_sendmsg+0x10/0x10 [ 353.972575][T12034] do_syscall_64+0xc9/0xf80 [ 353.972593][T12034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.972608][T12034] RIP: 0033:0x7f1f7a19af79 [ 353.972620][T12034] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 353.972634][T12034] RSP: 002b:00007f1f783ee028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 353.972649][T12034] RAX: ffffffffffffffda RBX: 00007f1f7a415fa0 RCX: 00007f1f7a19af79 [ 353.972658][T12034] RDX: 0000000020004804 RSI: 0000200000000340 RDI: 0000000000000003 [ 353.972667][T12034] RBP: 00007f1f783ee090 R08: 0000000000000000 R09: 0000000000000000 [ 353.972675][T12034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.972683][T12034] R13: 00007f1f7a416038 R14: 00007f1f7a415fa0 R15: 00007ffc7430cf18 [ 353.972702][T12034] [ 355.685507][T12072] bridge0: the hash_elasticity option has been deprecated and is always 16 [ 355.712705][T12072] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.720798][T12072] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.893106][ T30] kauditd_printk_skb: 8853 callbacks suppressed [ 355.893127][ T30] audit: type=1400 audit(1770671316.853:397791): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.954483][ T5803] audit: audit_backlog=65 > audit_backlog_limit=64 [ 355.961603][ T30] audit: type=1400 audit(1770671316.863:397792): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.967415][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 355.983333][ T30] audit: type=1400 audit(1770671316.863:397793): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 355.989996][ T5803] audit: audit_lost=14679 audit_rate_limit=0 audit_backlog_limit=64 [ 356.019663][ T30] audit: type=1400 audit(1770671316.863:397794): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.019710][ T30] audit: type=1400 audit(1770671316.863:397795): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.019753][ T30] audit: type=1400 audit(1770671316.863:397796): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.019790][ T30] audit: type=1400 audit(1770671316.863:397797): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.401314][T12088] mkiss: ax0: crc mode is auto. [ 360.922825][ T30] kauditd_printk_skb: 9477 callbacks suppressed [ 360.922847][ T30] audit: type=1400 audit(1770671321.863:406231): avc: denied { create } for pid=12193 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 360.981323][ T30] audit: type=1400 audit(1770671321.863:406232): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 360.981714][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.011885][T12202] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.014620][T12199] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.022854][T12203] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.025277][T12201] audit: audit_backlog=65 > audit_backlog_limit=64 [ 361.052874][T12199] audit: audit_lost=15028 audit_rate_limit=0 audit_backlog_limit=64 [ 361.055386][T12202] audit: audit_lost=15029 audit_rate_limit=0 audit_backlog_limit=64 [ 361.061012][T12201] audit: audit_lost=15030 audit_rate_limit=0 audit_backlog_limit=64 [ 362.177458][T12222] ip6tnl1: entered promiscuous mode [ 365.278923][T12273] ip6tnl1: entered promiscuous mode [ 365.932825][ T30] kauditd_printk_skb: 8946 callbacks suppressed [ 365.932841][ T30] audit: type=1400 audit(1770671326.893:413969): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 365.996144][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.014752][ T30] audit: type=1400 audit(1770671326.893:413970): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 366.028710][T12284] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.042711][ T5472] audit: audit_lost=15434 audit_rate_limit=0 audit_backlog_limit=64 [ 366.064881][ T5472] audit: backlog limit exceeded [ 366.072591][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 366.072833][T12284] audit: audit_lost=15435 audit_rate_limit=0 audit_backlog_limit=64 [ 366.087189][ T5472] audit: audit_lost=15436 audit_rate_limit=0 audit_backlog_limit=64 [ 366.087208][ T5472] audit: backlog limit exceeded [ 366.886809][T12295] netlink: 'syz.2.2076': attribute type 10 has an invalid length. [ 366.901491][T12295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 366.911610][T12295] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 368.739713][T12322] netlink: 'syz.4.2086': attribute type 13 has an invalid length. [ 368.750319][T12322] netlink: 'syz.4.2086': attribute type 17 has an invalid length. [ 368.987562][T12322] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 370.808445][T12351] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2095'. [ 370.824131][T12351] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2095'. [ 370.943124][ T30] kauditd_printk_skb: 12882 callbacks suppressed [ 370.943141][ T30] audit: type=1400 audit(1770671331.913:423705): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 370.979394][ T30] audit: type=1400 audit(1770671331.913:423706): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.005870][ T30] audit: type=1400 audit(1770671331.913:423707): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.029209][ T30] audit: type=1400 audit(1770671331.913:423708): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.052185][ T30] audit: type=1400 audit(1770671331.913:423709): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.075412][ T30] audit: type=1400 audit(1770671331.913:423710): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.098275][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.098398][ T30] audit: type=1400 audit(1770671331.913:423711): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.105122][ T5472] audit: audit_lost=16486 audit_rate_limit=0 audit_backlog_limit=64 [ 371.199645][T12359] audit: audit_backlog=65 > audit_backlog_limit=64 [ 371.684315][T12364] netlink: 'syz.4.2099': attribute type 21 has an invalid length. [ 371.697429][T12364] netlink: 168 bytes leftover after parsing attributes in process `syz.4.2099'. [ 371.905455][T12372] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2102'. [ 371.918303][T12372] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2102'. [ 372.086102][T12375] netlink: 'syz.3.2103': attribute type 13 has an invalid length. [ 372.112933][T12375] netlink: 'syz.3.2103': attribute type 17 has an invalid length. [ 372.144617][T12375] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.151779][T12375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 372.159204][T12375] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.166306][T12375] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.189947][T12375] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 375.429577][T12442] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 375.516112][T12446] netlink: 'syz.3.2123': attribute type 29 has an invalid length. [ 375.654893][T12450] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 375.737091][T12451] netlink: 'syz.2.2127': attribute type 13 has an invalid length. [ 375.773997][T12451] netlink: 'syz.2.2127': attribute type 17 has an invalid length. [ 375.857570][T12451] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 375.955967][ T30] kauditd_printk_skb: 9841 callbacks suppressed [ 375.955985][ T30] audit: type=1400 audit(1770671336.913:433148): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 375.992870][ T30] audit: type=1400 audit(1770671336.913:433149): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.036908][ T30] audit: type=1400 audit(1770671336.913:433150): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.037983][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.119303][ T30] audit: type=1400 audit(1770671336.913:433151): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.182335][T12461] audit: audit_backlog=65 > audit_backlog_limit=64 [ 376.190543][T12461] audit: audit_lost=16622 audit_rate_limit=0 audit_backlog_limit=64 [ 376.198835][ T30] audit: type=1400 audit(1770671336.913:433152): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 376.230777][T12461] audit: backlog limit exceeded [ 376.240651][ T5472] audit: audit_lost=16623 audit_rate_limit=0 audit_backlog_limit=64 [ 376.700508][T12466] xt_connbytes: Forcing CT accounting to be enabled [ 376.873679][T12466] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'nat' [ 377.105872][T12472] netlink: 'syz.0.2133': attribute type 1 has an invalid length. [ 378.275496][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.281842][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 379.816665][T12499] netlink: 'syz.2.2143': attribute type 13 has an invalid length. [ 379.851109][T12499] netlink: 'syz.2.2143': attribute type 17 has an invalid length. [ 379.889630][T12499] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 380.436802][T12509] netlink: 'syz.1.2146': attribute type 13 has an invalid length. [ 380.471354][T12509] netlink: 'syz.1.2146': attribute type 17 has an invalid length. [ 380.534786][T12509] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 380.910996][T12516] netlink: 1268 bytes leftover after parsing attributes in process `syz.0.2149'. [ 380.962998][ T30] kauditd_printk_skb: 11659 callbacks suppressed [ 380.963018][ T30] audit: type=1400 audit(1770671341.933:443440): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.002358][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.009120][ T5472] audit: audit_lost=17081 audit_rate_limit=0 audit_backlog_limit=64 [ 381.017654][ T30] audit: type=1400 audit(1770671341.963:443441): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.039647][ T5472] audit: backlog limit exceeded [ 381.045233][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.051878][ T5472] audit: audit_lost=17082 audit_rate_limit=0 audit_backlog_limit=64 [ 381.060376][ T30] audit: type=1400 audit(1770671341.963:443442): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 381.090179][ T5472] audit: backlog limit exceeded [ 381.097006][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.241162][T12521] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2150'. [ 381.270638][T12521] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2150'. [ 382.779860][T12534] netlink: 666 bytes leftover after parsing attributes in process `syz.2.2153'. [ 383.441733][T12543] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2155'. [ 383.500126][T12545] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2155'. [ 385.995725][ T31] INFO: task kworker/0:5:5920 blocked for more than 143 seconds. [ 386.011067][ T31] Tainted: G L syzkaller #0 [ 386.018903][ T30] kauditd_printk_skb: 11422 callbacks suppressed [ 386.018919][ T30] audit: type=1400 audit(1770671346.983:454407): avc: denied { create } for pid=12571 comm="syz.1.2164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 386.022778][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 386.062921][ T31] task:kworker/0:5 state:D stack:24168 pid:5920 tgid:5920 ppid:2 task_flags:0x4208060 flags:0x00080000 [ 386.076692][ T30] audit: type=1400 audit(1770671347.053:454408): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 386.102638][ T31] Workqueue: usb_hub_wq hub_event [ 386.123642][ T31] Call Trace: [ 386.127962][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.134842][ T5472] audit: audit_lost=17236 audit_rate_limit=0 audit_backlog_limit=64 [ 386.142965][ T5472] audit: backlog limit exceeded [ 386.153742][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.163680][ T30] audit: type=1400 audit(1770671347.063:454409): avc: denied { read } for pid=5472 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 386.188154][ T31] [ 386.192423][ T5472] audit: audit_lost=17237 audit_rate_limit=0 audit_backlog_limit=64 [ 386.209092][ T5472] audit: backlog limit exceeded [ 386.221562][ T5472] audit: audit_backlog=65 > audit_backlog_limit=64 [ 386.235854][ T31] ? __schedule+0xf67/0x5fa0 [ 386.247787][ T31] __schedule+0xfe6/0x5fa0 [ 386.259885][ T31] ? __lock_acquire+0x4a5/0x2630 [ 386.274400][ T31] ? __pfx___schedule+0x10/0x10 [ 386.289686][ T31] ? find_held_lock+0x2b/0x80 [ 386.318632][ T31] ? schedule+0x2bf/0x390 [ 386.336651][ T31] schedule+0xdd/0x390 [ 386.350606][ T31] usb_kill_urb+0x253/0x320 [ 386.369851][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 386.388225][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 386.405549][ T31] usb_start_wait_urb+0x252/0x4c0 [ 386.423566][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 386.447223][ T31] ? __asan_memset+0x23/0x50 [ 386.462195][ T31] usb_control_msg+0x326/0x4a0 [ 386.472985][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 386.490497][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 386.523068][ T31] hub_port_init+0x642/0x37f0 [ 386.532943][ T31] hub_event+0x2f27/0x4af0 [ 386.543139][ T31] ? __pfx_hub_event+0x10/0x10 [ 386.561328][ T31] ? interval_tree_remove+0x8b0/0xef0 [ 386.579379][ T31] ? process_one_work+0x80b/0x1840 [ 386.593394][ T31] ? rcu_is_watching+0x12/0xc0 [ 386.598325][ T31] process_one_work+0x9c2/0x1840 [ 386.603836][ T31] ? __pfx_process_one_work+0x10/0x10 [ 386.609397][ T31] ? assign_work+0x19c/0x250 [ 386.620202][ T31] worker_thread+0x5da/0xe40 [ 386.632120][ T31] ? __pfx_worker_thread+0x10/0x10 [ 386.728027][ T31] ? kthread+0x17d/0x730 [ 386.745581][ T31] ? __pfx_worker_thread+0x10/0x10 [ 386.767224][ T31] kthread+0x3b3/0x730 [ 386.778426][ T31] ? __pfx_kthread+0x10/0x10 [ 386.793430][ T31] ? ret_from_fork+0x79/0xaf0 [ 386.806633][ T31] ? ret_from_fork+0x79/0xaf0 [ 386.818777][ T31] ? rcu_is_watching+0x12/0xc0 [ 386.835364][ T31] ? __pfx_kthread+0x10/0x10 [ 386.871798][ T31] ret_from_fork+0x754/0xaf0 [ 386.880648][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 386.891316][ T31] ? __switch_to+0x7b9/0x10c0 [ 386.900407][ T31] ? __pfx_kthread+0x10/0x10 [ 386.913290][ T31] ret_from_fork_asm+0x1a/0x30 [ 386.929416][ T31] [ 386.938203][ T31] [ 386.938203][ T31] Showing all locks held in the system: [ 386.958352][ T31] 1 lock held by khungtaskd/31: [ 386.968107][ T31] #0: ffffffff8e5e32e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 386.992964][ T31] 2 locks held by dhcpcd/5472: [ 387.004580][ T31] 2 locks held by getty/5564: [ 387.015585][ T31] #0: ffff88814e5200a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 387.030237][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 387.042517][ T31] 5 locks held by kworker/0:5/5920: [ 387.048083][ T31] #0: ffff88814269c148 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 387.063140][ T31] #1: ffffc900046afc98 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 387.075719][ T31] #2: ffff88802b583198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1bd/0x4af0 [ 387.086479][ T31] #3: ffff88802b586518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2bd2/0x4af0 [ 387.097727][ T31] #4: ffff88802b158e68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x2bfb/0x4af0 [ 387.107977][ T31] [ 387.110524][ T31] ============================================= [ 387.110524][ T31] [ 387.120850][ T31] NMI backtrace for cpu 0 [ 387.120866][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 387.120890][ T31] Tainted: [L]=SOFTLOCKUP [ 387.120896][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 387.120906][ T31] Call Trace: [ 387.120912][ T31] [ 387.120918][ T31] dump_stack_lvl+0x100/0x190 [ 387.120947][ T31] nmi_cpu_backtrace.cold+0x12d/0x151 [ 387.120972][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 387.120993][ T31] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 387.121020][ T31] sys_info+0x141/0x190 [ 387.121041][ T31] watchdog+0xcc3/0xfe0 [ 387.121073][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.121099][ T31] ? __kthread_parkme+0x18c/0x230 [ 387.121126][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.121152][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.121176][ T31] kthread+0x3b3/0x730 [ 387.121195][ T31] ? __pfx_kthread+0x10/0x10 [ 387.121211][ T31] ? ret_from_fork+0x79/0xaf0 [ 387.121230][ T31] ? ret_from_fork+0x79/0xaf0 [ 387.121250][ T31] ? rcu_is_watching+0x12/0xc0 [ 387.121276][ T31] ? __pfx_kthread+0x10/0x10 [ 387.121295][ T31] ret_from_fork+0x754/0xaf0 [ 387.121315][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 387.121337][ T31] ? __switch_to+0x7b9/0x10c0 [ 387.121361][ T31] ? __pfx_kthread+0x10/0x10 [ 387.121380][ T31] ret_from_fork_asm+0x1a/0x30 [ 387.121407][ T31] [ 387.121415][ T31] Sending NMI from CPU 0 to CPUs 1: [ 387.267742][ C1] NMI backtrace for cpu 1 [ 387.267762][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT(full) [ 387.267782][ C1] Tainted: [L]=SOFTLOCKUP [ 387.267787][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 387.267795][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 387.267816][ C1] Code: 56 78 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 03 9e 14 00 fb f4 7c 33 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 387.267829][ C1] RSP: 0018:ffffc90000197df0 EFLAGS: 00000242 [ 387.267841][ C1] RAX: 00000000005f946b RBX: ffff88801e2ca4c0 RCX: ffffffff8b76e4b5 [ 387.267851][ C1] RDX: 0000000000000000 RSI: ffffffff8dc46051 RDI: ffffffff8bfa38a0 [ 387.267860][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: ffffed10170a673d [ 387.267868][ C1] R10: ffff8880b85339eb R11: 0000000000000000 R12: ffffed1003c59498 [ 387.267876][ C1] R13: 0000000000000001 R14: ffffffff90b74ed0 R15: 0000000000000000 [ 387.267885][ C1] FS: 0000000000000000(0000) GS:ffff8881246d9000(0000) knlGS:0000000000000000 [ 387.267899][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 387.267908][ C1] CR2: 0000001b2fb0bff8 CR3: 000000000e392000 CR4: 00000000003526f0 [ 387.267917][ C1] Call Trace: [ 387.267922][ C1] [ 387.267927][ C1] default_idle+0x9/0x10 [ 387.267943][ C1] default_idle_call+0x6c/0xb0 [ 387.267958][ C1] do_idle+0x35b/0x4b0 [ 387.267978][ C1] ? __pfx_do_idle+0x10/0x10 [ 387.267997][ C1] cpu_startup_entry+0x4f/0x60 [ 387.268015][ C1] start_secondary+0x21d/0x2d0 [ 387.268029][ C1] ? __pfx_start_secondary+0x10/0x10 [ 387.268044][ C1] common_startup_64+0x13e/0x148 [ 387.268068][ C1] [ 387.443497][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 387.450364][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 387.461014][ T31] Tainted: [L]=SOFTLOCKUP [ 387.465311][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 387.475345][ T31] Call Trace: [ 387.478613][ T31] [ 387.481533][ T31] dump_stack_lvl+0x100/0x190 [ 387.486191][ T31] vpanic+0x20d/0x630 [ 387.490148][ T31] panic+0xd1/0xd1 [ 387.493845][ T31] ? __pfx_panic+0x10/0x10 [ 387.498236][ T31] ? nmi_trigger_cpumask_backtrace+0x1b5/0x230 [ 387.504377][ T31] ? nmi_trigger_cpumask_backtrace+0x1f6/0x230 [ 387.510541][ T31] ? nmi_trigger_cpumask_backtrace+0x200/0x230 [ 387.516703][ T31] ? watchdog.cold+0x198/0x1ca [ 387.521481][ T31] ? watchdog+0xcd3/0xfe0 [ 387.525824][ T31] watchdog.cold+0x1a9/0x1ca [ 387.530426][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.535119][ T31] ? __kthread_parkme+0x18c/0x230 [ 387.540159][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.544855][ T31] ? __pfx_watchdog+0x10/0x10 [ 387.549542][ T31] kthread+0x3b3/0x730 [ 387.553621][ T31] ? __pfx_kthread+0x10/0x10 [ 387.558220][ T31] ? ret_from_fork+0x79/0xaf0 [ 387.562893][ T31] ? ret_from_fork+0x79/0xaf0 [ 387.567556][ T31] ? rcu_is_watching+0x12/0xc0 [ 387.572320][ T31] ? __pfx_kthread+0x10/0x10 [ 387.576895][ T31] ret_from_fork+0x754/0xaf0 [ 387.581475][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 387.586572][ T31] ? __switch_to+0x7b9/0x10c0 [ 387.591239][ T31] ? __pfx_kthread+0x10/0x10 [ 387.595816][ T31] ret_from_fork_asm+0x1a/0x30 [ 387.600571][ T31] [ 387.603854][ T31] Kernel Offset: disabled [ 387.608157][ T31] Rebooting in 86400 seconds..