last executing test programs: 4.293667726s ago: executing program 0 (id=9561): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r3, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 3.878063147s ago: executing program 2 (id=9564): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'sit0\x00', 0x0}) r3 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, &(0x7f0000000280)) io_uring_enter(r3, 0x66a8, 0x4000, 0xf, 0x0, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, 0x0, 0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_delroute={0x1c, 0x19, 0x901, 0x0, 0x0, {0x2, 0x18, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x1}}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r9 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924b68, 0x0) writev(r9, &(0x7f00000000c0), 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0x7}, {0xffff, 0xffff}, {0xfff1, 0xd}}, [@qdisc_kind_options=@q_cbs={{0x8}, {0x1c, 0x2, @TCA_CBS_PARMS={0x18, 0x1, {0x1, '\x00', 0x5, 0x28e3, 0x3, 0x200}}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x40) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 3.694815805s ago: executing program 2 (id=9565): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r0, 0xc00c620f, &(0x7f00000002c0)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000d00), 0x2000) sched_setscheduler(r2, 0x2, &(0x7f0000000280)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioprio_set$pid(0x1, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume', 0x149a82, 0x0) write$cgroup_int(r6, &(0x7f0000000040)=0x1f00, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x3, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @remote, 0x1}], 0x1c) lsm_list_modules(&(0x7f0000002600), &(0x7f0000000000), 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) 3.47309214s ago: executing program 0 (id=9566): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 3.095118339s ago: executing program 3 (id=9568): socket(0x2b, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000002000000"], &(0x7f0000000200)='GPL\x00', 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) syz_open_dev$MSR(0x0, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000002000)=""/102400, 0x19000) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = socket$kcm(0x2, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x20000000) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000400)={r7, r6}) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) 2.811522779s ago: executing program 4 (id=9570): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_usb_connect(0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000a7420040ab0501030001010203010902240001000000000904000002aad45c0009058e02000000000009050a06"], 0x0) syz_usb_control_io$cdc_ecm(r4, 0x0, &(0x7f0000001300)={0x10, &(0x7f0000001380)={0x0, 0x0, 0x4, "717e7ea0"}, 0x0, 0x0}) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x4}}}]}, @NFTA_RULE_USERDATA={0x8, 0x7, 0x1, 0x0, "07bcb709"}]}], {0x14}}, 0x74}, 0x1, 0x0, 0x0, 0x90}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x800, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x5) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x403, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000804}, 0x8000) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x80841) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f00000036c0)={0x7}) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000304000000000000020000000000", @ANYRES32=0x0, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c000280060001000100000008000500", @ANYRES32=r11, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f0000000440)={0xffffffffffffffff, 0x5803, {0x0, 0x0, 0x0, 0xe0, 0x80000000, 0x0, 0x9, 0x1, 0x9, "c6c285881e95e104d190f1cfc6fe98325bbc4fac0c5443d89e2c317f2101cd89bf7a3fdd12e0286452a55ba715d6f14011072f575a2d9a623f856f810fe6e3a4", "5516b44457aee348b338fb6463a68d13ccb8037c655e782e48ec1e452afc5718c76ba44bec9d4b7bb10c35f1d41e6cc6032e94d4387f00efb15acc5dbc03c4df", "733f79705bbecb91f5846b20d13b147da56d4aa032f5520b7b040e154376b4f5", [0x7, 0x5]}}) 2.76074342s ago: executing program 3 (id=9571): ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x2, 0x1, 0x0, 0x13, 0x2, [{0xd}]}]}, {0x0, [0x2e]}}, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x2, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r4, @ANYBLOB="80891fd25ee968527251a209d3ae51f5414bf7bb2fbc24a849435745090cbe88142487f71ecbba171e1df44d6d78c038ceb81d998b33da6e7fb60bac5074096f052e216285415e40298afaffd6b4f7aeb894d5aff8e0168c3073085723764b4ca1157f4850"], 0x1c}}, 0x0) write$nci(0xffffffffffffffff, 0x0, 0x9) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, 0x0, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x24000800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local}, 0x1c) 2.67699059s ago: executing program 2 (id=9573): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_usb_connect(0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000a7420040ab0501030001010203010902240001000000000904000002aad45c0009058e02000000000009050a06"], 0x0) syz_usb_control_io$cdc_ecm(r4, 0x0, &(0x7f0000001300)={0x10, &(0x7f0000001380)={0x0, 0x0, 0x4, "717e7ea0"}, 0x0, 0x0}) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x4}}}]}, @NFTA_RULE_USERDATA={0x8, 0x7, 0x1, 0x0, "07bcb709"}]}], {0x14}}, 0x74}, 0x1, 0x0, 0x0, 0x90}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010067656e6576650000040002800800f500", @ANYRES32=r5, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x800, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x5) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x403, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000804}, 0x8000) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x80841) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f00000036c0)={0x7}) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000304000000000000020000000000", @ANYRES32=0x0, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c000280060001000100000008000500", @ANYRES32=r11, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f0000000440)={0xffffffffffffffff, 0x5803, {0x0, 0x0, 0x0, 0xe0, 0x80000000, 0x0, 0x9, 0x1, 0x9, "c6c285881e95e104d190f1cfc6fe98325bbc4fac0c5443d89e2c317f2101cd89bf7a3fdd12e0286452a55ba715d6f14011072f575a2d9a623f856f810fe6e3a4", "5516b44457aee348b338fb6463a68d13ccb8037c655e782e48ec1e452afc5718c76ba44bec9d4b7bb10c35f1d41e6cc6032e94d4387f00efb15acc5dbc03c4df", "733f79705bbecb91f5846b20d13b147da56d4aa032f5520b7b040e154376b4f5", [0x7, 0x5]}}) 2.609088577s ago: executing program 0 (id=9574): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 2.561842295s ago: executing program 3 (id=9575): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 2.286953905s ago: executing program 1 (id=9576): ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x2, 0x1, 0x0, 0x13, 0x2, [{0xd}]}]}, {0x0, [0x2e]}}, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x2, 0x0, 0x0) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r6) sendmsg$NFC_CMD_DEV_UP(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="80891fd25ee968527251a209d3ae51f5414bf7bb2fbc24a849435745090cbe88142487f71ecbba171e1df44d6d78c038ceb81d998b33da6e7fb60bac5074096f052e216285415e40298afaffd6b4f7aeb894d5aff8e0168c3073085723764b4ca1157f4850"], 0x1c}}, 0x0) write$nci(r4, 0x0, 0x9) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r8 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, 0x0, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x24000800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local}, 0x1c) 2.218493709s ago: executing program 1 (id=9577): io_uring_setup(0x5b24, &(0x7f00000003c0)={0x0, 0x2990, 0x10000, 0x2, 0x1fd}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/198) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x24041, 0x0) io_setup(0x202, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x6, 0x0, 0x0, 0x0) r3 = gettid() clock_nanosleep(0xb, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) rt_sigqueueinfo(r3, 0x21, &(0x7f0000002d00)={0x0, 0x0, 0xfffffffe}) r4 = fsmount(r2, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000280)={0x2, 0x5, 0x4, 0x90, &(0x7f0000000140)=""/144, 0x76, &(0x7f00000009c0)=""/118, 0x5d, &(0x7f0000000940)=""/93}) openat$cgroup_subtree(r4, 0x0, 0x2, 0x0) 1.861127363s ago: executing program 1 (id=9578): socket(0x2b, 0x1, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000002000000"], &(0x7f0000000200)='GPL\x00', 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) syz_open_dev$MSR(0x0, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r3, &(0x7f0000002000)=""/102400, 0x19000) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = socket$kcm(0x29, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = socket$kcm(0x2, 0x1, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x20000000) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f0000000400)={r7, r6}) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, 0x0, 0x0) 1.856986142s ago: executing program 3 (id=9579): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 1.576867799s ago: executing program 1 (id=9580): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, 0x0}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f8, 0x0, 0x32}, 0x9c) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000004900)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000004c0)="cc", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000b80)="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", 0x390}, {&(0x7f0000000300)="439e9c06fc666cabc8569d63a866b31ff3ceda1e28f23f455e96a02001fc3fb089ed9e5234", 0x25}], 0x2}}], 0x2, 0x4048884) close_range(r0, 0xffffffffffffffff, 0x0) 1.426676253s ago: executing program 4 (id=9581): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 1.375431636s ago: executing program 0 (id=9582): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 1.177601496s ago: executing program 2 (id=9583): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0x1c3902, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x24001450) request_key(0x0, &(0x7f0000001ffb)={'syz', 0x1}, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f0000000280), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = creat(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x8, 0x40009975, r2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x44004) setsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f0000000300)=0x2, 0x4) sendfile(r0, r0, 0x0, 0x200000) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r3, 0x0, 0x3) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x5, 0x0, 0x0, 0x4) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000003980)}, &(0x7f0000003ac0)=0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 995.793137ms ago: executing program 2 (id=9584): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 948.424308ms ago: executing program 3 (id=9585): ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x2, 0x1, 0x0, 0x13, 0x2, [{0xd}]}]}, {0x0, [0x2e]}}, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x2, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r4, @ANYBLOB="80891fd25ee968527251a209d3ae51f5414bf7bb2fbc24a849435745090cbe88142487f71ecbba171e1df44d6d78c038ceb81d998b33da6e7fb60bac5074096f052e216285415e40298afaffd6b4f7aeb894d5aff8e0168c3073085723764b4ca1157f4850"], 0x1c}}, 0x0) write$nci(0xffffffffffffffff, 0x0, 0x9) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r6, 0x1, 0x41, 0x0, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x24000800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local}, 0x1c) 617.697701ms ago: executing program 0 (id=9586): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)}, {0x0}], 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000080)=ANY=[@ANYBLOB='\v\x00\x00\x00syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syz0\x00'/238], 0x118) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x7}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x35, 0x0, 0x2) timer_gettime(0x0, 0x0) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000000280)) syz_emit_vhci(0x0, 0x66) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00080007d70ca416cafb8c4076759cf6ae541cf821c0468c7bf917277c2afd7da4ab8d7924a9f24b6faf3ae47dc2e7c946b4b1a5554a80799fbce7f4c3f4219edaa9d9ff13e97932492d47", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000001a40), 0x1003, r6}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x8, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) r7 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r7, 0x0, 0x0, 0x111, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x7f) 615.931248ms ago: executing program 4 (id=9587): r0 = openat$sysctl(0xffffffffffffff9c, 0x0, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r4, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r4, 0xc06864a1, &(0x7f0000000d40)={0x0, 0x0, r5, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0xc06864ce, &(0x7f0000000340)={r6, 0x0, 0x0, 0x0, 0x1, [0x0], [0x0, 0x7], [0x0, 0x80000002, 0x2], [0x0, 0x0, 0x1, 0x1]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000140)={0x3ff, 0x2, 0x806}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x28543634fae43ad, 0x0, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x20000054}, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000080)={r7, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000300)={0x0, 0x0, r8}) close_range(r0, 0xffffffffffffffff, 0x0) 567.223343ms ago: executing program 3 (id=9588): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 449.510721ms ago: executing program 1 (id=9589): io_uring_setup(0x5b24, &(0x7f00000003c0)={0x0, 0x2990, 0x10000, 0x2, 0x1fd}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4000002, 0x50032, 0xffffffffffffffff, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000440)=""/198) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x24041, 0x0) io_setup(0x202, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r2 = fsopen(&(0x7f00000000c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x6, 0x0, 0x0, 0x0) r3 = gettid() clock_nanosleep(0xb, 0x0, &(0x7f0000000140)={0x77359400}, 0x0) rt_sigqueueinfo(r3, 0x21, &(0x7f0000002d00)={0x0, 0x0, 0xfffffffe}) r4 = fsmount(r2, 0x0, 0x0) ioctl$DRM_IOCTL_VERSION(r4, 0xc0406400, &(0x7f0000000280)={0x2, 0x5, 0x4, 0x90, &(0x7f0000000140)=""/144, 0x76, &(0x7f00000009c0)=""/118, 0x5d, &(0x7f0000000940)=""/93}) openat$cgroup_subtree(r4, 0x0, 0x2, 0x0) 448.948145ms ago: executing program 0 (id=9590): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_usb_connect(0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000a7420040ab0501030001010203010902240001000000000904000002aad45c0009058e02000000000009050a06"], 0x0) syz_usb_control_io$cdc_ecm(r4, 0x0, &(0x7f0000001300)={0x10, &(0x7f0000001380)={0x0, 0x0, 0x4, "717e7ea0"}, 0x0, 0x0}) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x4}}}]}, @NFTA_RULE_USERDATA={0x8, 0x7, 0x1, 0x0, "07bcb709"}]}], {0x14}}, 0x74}, 0x1, 0x0, 0x0, 0x90}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x800, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x5) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x403, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000804}, 0x8000) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x80841) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f00000036c0)={0x7}) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000304000000000000020000000000", @ANYRES32=0x0, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c000280060001000100000008000500", @ANYRES32=r11, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f0000000440)={0xffffffffffffffff, 0x5803, {0x0, 0x0, 0x0, 0xe0, 0x80000000, 0x0, 0x9, 0x1, 0x9, "c6c285881e95e104d190f1cfc6fe98325bbc4fac0c5443d89e2c317f2101cd89bf7a3fdd12e0286452a55ba715d6f14011072f575a2d9a623f856f810fe6e3a4", "5516b44457aee348b338fb6463a68d13ccb8037c655e782e48ec1e452afc5718c76ba44bec9d4b7bb10c35f1d41e6cc6032e94d4387f00efb15acc5dbc03c4df", "733f79705bbecb91f5846b20d13b147da56d4aa032f5520b7b040e154376b4f5", [0x7, 0x5]}}) 167.785915ms ago: executing program 4 (id=9591): ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x2, 0x1, 0x0, 0x13, 0x2, [{0xd}]}]}, {0x0, [0x2e]}}, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x2, 0x0, 0x0) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r5) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32, @ANYBLOB="80891fd25ee968527251a209d3ae51f5414bf7bb2fbc24a849435745090cbe88142487f71ecbba171e1df44d6d78c038ceb81d998b33da6e7fb60bac5074096f052e216285415e40298afaffd6b4f7aeb894d5aff8e0168c3073085723764b4ca1157f4850"], 0x1c}}, 0x0) write$nci(r4, 0x0, 0x9) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x41, 0x0, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x24000800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local}, 0x1c) 166.18973ms ago: executing program 2 (id=9592): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000003580)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xffe0, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0xa7, 0x2, [@TCA_CGROUP_EMATCHES={0x10, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xb}}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x90}, 0x40010) r4 = socket$pppl2tp(0x18, 0x1, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r6 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="a36d485c282cf3051a0bf200"/39], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC=r5, @ANYRESOCT=r6], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x18) io_setup(0x8, &(0x7f0000002740)=0x0) io_getevents(r8, 0x4, 0x13, &(0x7f0000000000), 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r8, 0x1, &(0x7f0000000480)=[&(0x7f0000000880)={0x0, 0x0, 0x0, 0x7, 0x8, r9, 0x0, 0x0, 0x6}]) io_destroy(r8) connect$pppl2tp(r4, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000040), 0x4) getpeername(r4, 0x0, &(0x7f00000000c0)) socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r10 = syz_usb_connect(0x5, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000fdc01a40f30c74933bbc0000000109021b0001000000000904000001a7a00f00090582020002"], 0x0) syz_usb_ep_write$ath9k_ep1(r10, 0x82, 0x4, &(0x7f00000005c0)=ANY=[@ANYRES8=0x0, @ANYRES32, @ANYRES16, @ANYBLOB="d3193e8241cd90da739606b61c9fc511fc3674bf1f9e53542f1725ed5016ad8a271a567d6bc43946be914839b466428c204e6e01a8caae03675414bdc89738ecabb861baf057", @ANYRES8, @ANYBLOB="fe3ebcca527df5e097a2dbe742aa85b6c6f6ad6007bb8a93800f0c48fcc256de731afafb10fe5b71622ee71bad442f765270b4167bc46effb294d82966197bef8ba266c8096ecb51404a470ebbc699a429efc4f5f3e065dd4729274df602da5609128b8fd883a72bf25023fc7e0c252568f39de46e869ea6e9c3d9ddf6076cc845829480b05a4c0a28f9", @ANYRES32=r8]) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001840), 0x125005, 0x0) 96.50968ms ago: executing program 4 (id=9593): ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000a40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x2, 0x1, 0x0, 0x13, 0x2, [{0xd}]}]}, {0x0, [0x2e]}}, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) timer_create(0x2, 0x0, 0x0) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r6) sendmsg$NFC_CMD_DEV_UP(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="010023010000340200000200000008000100", @ANYRES32=r5, @ANYBLOB="80891fd25ee968527251a209d3ae51f5414bf7bb2fbc24a849435745090cbe88142487f71ecbba171e1df44d6d78c038ceb81d998b33da6e7fb60bac5074096f052e216285415e40298afaffd6b4f7aeb894d5aff8e0168c3073085723764b4ca1157f48"], 0x1c}}, 0x0) write$nci(r4, 0x0, 0x9) ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) r8 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, 0x0, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x24000800, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local}, 0x1c) 19.147226ms ago: executing program 4 (id=9594): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) add_key$fscrypt_provisioning(&(0x7f00000007c0), 0x0, &(0x7f0000000840)={0x3, 0x0, @a}, 0x48, 0xfffffffffffffffe) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x9f1}}}}}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={0x0}, 0x1, 0x7a00}, 0x4000000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc0}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_emit_vhci(&(0x7f00000019c0)=ANY=[@ANYBLOB="040e7b070c20"], 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='wg1\x00', 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) pipe(&(0x7f0000005880)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_selinux(r4, &(0x7f00000000c0), &(0x7f0000000040)='system_u:object_r:dhcp_state_t:s0\x00', 0x1e, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) unshare(0x40020000) 0s ago: executing program 1 (id=9595): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_usb_connect(0x0, 0x81, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000a7420040ab0501030001010203010902240001000000000904000002aad45c0009058e02000000000009050a06"], 0x0) syz_usb_control_io$cdc_ecm(r4, 0x0, &(0x7f0000001300)={0x10, &(0x7f0000001380)={0x0, 0x0, 0x4, "717e7ea0"}, 0x0, 0x0}) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @range={{0xa}, @val={0x4}}}]}, @NFTA_RULE_USERDATA={0x8, 0x7, 0x1, 0x0, "07bcb709"}]}], {0x14}}, 0x74}, 0x1, 0x0, 0x0, 0x90}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000010001fff000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010067656e6576650000040002800800f500", @ANYRES32=r5], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x800, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x5) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x403, 0x70bd25, 0x0, {0x0, 0x0, 0x0, 0x0, 0x500}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000804}, 0x8000) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x80841) ioctl$DRM_IOCTL_GET_CAP(r9, 0xc010640c, &(0x7f00000036c0)={0x7}) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c00000010000304000000000000020000000000", @ANYRES32=0x0, @ANYBLOB="46060900000000001c00128009000100766c616e000000000c000280060001000100000008000500", @ANYRES32=r11, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r11, @ANYBLOB], 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f0000000440)={0xffffffffffffffff, 0x5803, {0x0, 0x0, 0x0, 0xe0, 0x80000000, 0x0, 0x9, 0x1, 0x9, "c6c285881e95e104d190f1cfc6fe98325bbc4fac0c5443d89e2c317f2101cd89bf7a3fdd12e0286452a55ba715d6f14011072f575a2d9a623f856f810fe6e3a4", "5516b44457aee348b338fb6463a68d13ccb8037c655e782e48ec1e452afc5718c76ba44bec9d4b7bb10c35f1d41e6cc6032e94d4387f00efb15acc5dbc03c4df", "733f79705bbecb91f5846b20d13b147da56d4aa032f5520b7b040e154376b4f5", [0x7, 0x5]}}) kernel console output (not intermixed with test programs): t(2000001009.670:1699398): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1202.935502][T29518] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1202.942214][T29518] audit: audit_lost=120266 audit_rate_limit=0 audit_backlog_limit=64 [ 1202.959713][T29518] audit: backlog limit exceeded [ 1202.967418][T29515] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7836'. [ 1202.977533][T29518] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1202.979868][T29515] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7836'. [ 1202.995793][T29518] audit: audit_lost=120267 audit_rate_limit=0 audit_backlog_limit=64 [ 1203.004099][T29518] audit: backlog limit exceeded [ 1203.349643][T29529] bridge0: port 1(team0) entered blocking state [ 1203.387785][T29529] bridge0: port 1(team0) entered disabled state [ 1203.419937][T29529] team0: entered allmulticast mode [ 1203.482228][T29529] team_slave_0: entered allmulticast mode [ 1203.860024][T29529] team_slave_1: entered allmulticast mode [ 1203.918043][T29529] team0: entered promiscuous mode [ 1203.980892][T29529] team_slave_0: entered promiscuous mode [ 1203.989014][T29529] team_slave_1: entered promiscuous mode [ 1203.989987][T29535] __nla_validate_parse: 40 callbacks suppressed [ 1203.990001][T29535] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7843'. [ 1204.061422][T29535] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7843'. [ 1204.214763][T29539] netlink: 'syz.0.7845': attribute type 1 has an invalid length. [ 1204.336021][T29539] 8021q: adding VLAN 0 to HW filter on device bond61 [ 1204.652101][T29539] veth123: entered promiscuous mode [ 1204.695588][T29542] vlan4: entered allmulticast mode [ 1204.727603][T29542] bond61: entered allmulticast mode [ 1204.774035][T29559] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7849'. [ 1205.507005][T29572] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7856'. [ 1205.522349][T29572] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7856'. [ 1205.882273][T29578] syz.0.7858 (29578): drop_caches: 2 [ 1205.964086][T29580] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7859'. [ 1206.124639][T29593] bridge0: port 1(team0) entered blocking state [ 1206.131387][T29593] bridge0: port 1(team0) entered disabled state [ 1206.138363][T29593] team0: entered allmulticast mode [ 1206.149356][T29593] team0: entered promiscuous mode [ 1206.264544][T29596] bridge0: entered allmulticast mode [ 1206.306670][T29596] team0: left allmulticast mode [ 1206.332011][T29596] team_slave_0: left allmulticast mode [ 1206.356025][T29596] team_slave_1: left allmulticast mode [ 1206.382641][T29596] team0: left promiscuous mode [ 1206.399479][T29596] team_slave_0: left promiscuous mode [ 1206.429380][T29596] team_slave_1: left promiscuous mode [ 1206.462000][T29596] bridge0: port 1(team0) entered disabled state [ 1206.780598][T29599] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7864'. [ 1206.902709][T29599] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7864'. [ 1207.092480][T29602] netlink: 'syz.4.7865': attribute type 1 has an invalid length. [ 1207.253104][T29602] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1207.468020][T29602] veth95: entered promiscuous mode [ 1207.511166][T29604] vlan2: entered allmulticast mode [ 1207.516883][T29604] bond46: entered allmulticast mode [ 1207.684518][T29614] bridge0: entered allmulticast mode [ 1207.723921][T29614] team0: left allmulticast mode [ 1207.738984][T29614] team_slave_0: left allmulticast mode [ 1207.764784][T29614] team_slave_1: left allmulticast mode [ 1207.785805][T29614] team0: left promiscuous mode [ 1207.809955][ T30] kauditd_printk_skb: 7812 callbacks suppressed [ 1207.809971][ T30] audit: type=1400 audit(2000001014.630:1706453): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1207.810149][T29614] team_slave_0: left promiscuous mode [ 1207.847010][ T30] audit: type=1400 audit(2000001014.660:1706454): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1207.860744][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1207.885889][T29614] team_slave_1: left promiscuous mode [ 1207.899883][ T5484] audit: audit_lost=120521 audit_rate_limit=0 audit_backlog_limit=64 [ 1207.919884][ T5484] audit: backlog limit exceeded [ 1207.922788][ T30] audit: type=1400 audit(2000001014.660:1706455): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1207.950668][T29614] bridge0: port 1(team0) entered disabled state [ 1207.961724][T29617] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1207.967480][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1207.974853][T29617] audit: audit_lost=120522 audit_rate_limit=0 audit_backlog_limit=64 [ 1207.987809][ T5484] audit: audit_lost=120523 audit_rate_limit=0 audit_backlog_limit=64 [ 1208.266052][T29620] syz.2.7871 (29620): drop_caches: 2 [ 1208.530304][T29624] netlink: 20 bytes leftover after parsing attributes in process `syz.4.7873'. [ 1208.625584][T29630] netlink: 'syz.0.7876': attribute type 1 has an invalid length. [ 1208.644181][T29630] 8021q: adding VLAN 0 to HW filter on device bond62 [ 1208.683157][T29634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7874'. [ 1208.799170][T29636] syz.1.7874 (29636): drop_caches: 2 [ 1208.835950][T29637] syz.2.7877 (29637): drop_caches: 2 [ 1208.946916][T29638] veth125: entered promiscuous mode [ 1208.967627][T29630] vlan4: entered allmulticast mode [ 1209.002334][T29630] bond62: entered allmulticast mode [ 1209.937328][T29668] bridge52: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1210.537063][T29672] __nla_validate_parse: 140 callbacks suppressed [ 1210.537080][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.564749][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.575441][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.586628][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.604580][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.626299][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.659115][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.687758][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.697793][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.706967][T29672] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7889'. [ 1210.707582][T29678] syz.2.7889 (29678): drop_caches: 2 [ 1210.830953][T29682] syz.0.7892 (29682): drop_caches: 2 [ 1210.891031][T29685] netlink: 'syz.4.7894': attribute type 1 has an invalid length. [ 1210.892533][T29686] bridge0: entered allmulticast mode [ 1211.067031][T29685] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1211.181051][T29694] veth97: entered promiscuous mode [ 1211.244624][T29702] syz.1.7897 (29702): drop_caches: 2 [ 1211.251661][T29698] vlan2: entered allmulticast mode [ 1211.264363][T29698] bond47: entered allmulticast mode [ 1211.320100][T29701] bridge0: entered allmulticast mode [ 1211.418935][T29707] team0: left allmulticast mode [ 1211.439733][T29707] team0: left promiscuous mode [ 1211.456927][T29707] bridge0: port 1(team0) entered disabled state [ 1212.238671][T29720] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1212.819864][ T30] kauditd_printk_skb: 9821 callbacks suppressed [ 1212.819880][ T30] audit: type=1400 audit(2000001019.620:1715360): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1212.829794][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.880132][ T5484] audit: audit_lost=120829 audit_rate_limit=0 audit_backlog_limit=64 [ 1212.888415][ T5484] audit: backlog limit exceeded [ 1212.893669][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.894686][ T30] audit: type=1400 audit(2000001019.620:1715361): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1212.904100][ T5484] audit: audit_lost=120830 audit_rate_limit=0 audit_backlog_limit=64 [ 1212.933425][ T5484] audit: backlog limit exceeded [ 1212.938727][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1212.945787][ T5484] audit: audit_lost=120831 audit_rate_limit=0 audit_backlog_limit=64 [ 1214.161683][T29752] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1215.207845][T29765] syz.3.7917 (29765): drop_caches: 2 [ 1215.703367][T29775] netlink: 'syz.1.7921': attribute type 1 has an invalid length. [ 1215.731840][T29775] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1215.811517][T29775] veth95: entered promiscuous mode [ 1215.854964][T29775] vlan4: entered allmulticast mode [ 1215.860371][T29775] bond44: entered allmulticast mode [ 1216.904253][T29794] netlink: 'syz.4.7927': attribute type 1 has an invalid length. [ 1217.156957][T29794] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1217.262868][T29802] veth99: entered promiscuous mode [ 1217.380971][T29794] vlan2: entered allmulticast mode [ 1217.409976][T29794] bond48: entered allmulticast mode [ 1217.742133][T29809] bridge0: port 1(team0) entered blocking state [ 1217.748751][T29809] bridge0: port 1(team0) entered disabled state [ 1217.755852][T29809] team0: entered allmulticast mode [ 1217.783406][T29809] team0: entered promiscuous mode [ 1217.836958][ T30] kauditd_printk_skb: 10288 callbacks suppressed [ 1217.836973][ T30] audit: type=1400 audit(2000001024.650:1723858): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1217.861054][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1217.868955][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1217.886880][ T5812] audit: audit_lost=121429 audit_rate_limit=0 audit_backlog_limit=64 [ 1217.894971][ T5484] audit: audit_lost=121430 audit_rate_limit=0 audit_backlog_limit=64 [ 1217.894987][ T5484] audit: backlog limit exceeded [ 1217.895074][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1217.895086][ T5484] audit: audit_lost=121431 audit_rate_limit=0 audit_backlog_limit=64 [ 1217.895098][ T5484] audit: backlog limit exceeded [ 1217.895146][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1218.686211][T29830] syz.4.7941 (29830): drop_caches: 2 [ 1218.867405][T29832] __nla_validate_parse: 262 callbacks suppressed [ 1218.867417][T29832] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7933'. [ 1219.554117][T29845] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7945'. [ 1220.772526][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1220.825238][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1220.876916][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1220.885893][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1220.887879][T29867] syz.4.7953 (29867): drop_caches: 2 [ 1220.977900][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1220.990485][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1221.044238][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1221.089532][T29874] syz.0.7955 (29874): drop_caches: 2 [ 1221.100531][T29861] netlink: 4 bytes leftover after parsing attributes in process `syz.4.7953'. [ 1221.275369][T29876] bridge52: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1221.633892][T29891] bridge0: entered allmulticast mode [ 1222.832141][T29914] netlink: 'syz.4.7968': attribute type 1 has an invalid length. [ 1222.858693][ T30] kauditd_printk_skb: 8739 callbacks suppressed [ 1222.858706][ T30] audit: type=1400 audit(2000001029.630:1730538): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1222.890269][ T30] audit: type=1400 audit(2000001029.670:1730541): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1222.912847][ T30] audit: type=1400 audit(2000001029.670:1730542): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1222.934265][ T30] audit: type=1400 audit(2000001029.670:1730543): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1222.957192][ T30] audit: type=1400 audit(2000001029.670:1730544): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1222.984182][ T30] audit: type=1400 audit(2000001029.670:1730545): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1223.007348][ T30] audit: type=1400 audit(2000001029.670:1730546): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1223.028806][ T30] audit: type=1400 audit(2000001029.670:1730547): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1223.068613][T29914] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1223.079957][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1223.106254][T29914] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1223.153899][T29914] vlan2: entered allmulticast mode [ 1223.170701][T29914] bond49: entered allmulticast mode [ 1223.297521][T29917] veth101: entered promiscuous mode [ 1224.217133][T29937] netlink: 'syz.1.7975': attribute type 1 has an invalid length. [ 1224.523811][T29937] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1224.728944][T29937] veth97: entered promiscuous mode [ 1224.753246][T29939] vlan4: entered allmulticast mode [ 1224.793284][T29939] bond45: entered allmulticast mode [ 1225.264577][T29960] bridge0: entered allmulticast mode [ 1225.291503][T29960] team0: left allmulticast mode [ 1225.305884][T29960] team0: left promiscuous mode [ 1225.322318][T29960] bridge0: port 1(team0) entered disabled state [ 1225.941241][T29963] __nla_validate_parse: 92 callbacks suppressed [ 1225.941252][T29963] netlink: 20 bytes leftover after parsing attributes in process `syz.1.7982'. [ 1226.044286][T29966] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1226.234649][T29975] netlink: 'syz.4.7985': attribute type 1 has an invalid length. [ 1226.284439][T29975] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1226.399550][T29975] veth103: entered promiscuous mode [ 1226.426215][T29978] vlan2: entered allmulticast mode [ 1226.444459][T29978] bond50: entered allmulticast mode [ 1227.866390][ T30] kauditd_printk_skb: 8931 callbacks suppressed [ 1227.866406][ T30] audit: type=1400 audit(2000001034.680:1738278): avc: denied { mounton } for pid=29998 comm="syz.3.7993" path="/1582/file0" dev="tmpfs" ino=8344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1227.948457][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1227.963703][ T5484] audit: audit_lost=122519 audit_rate_limit=0 audit_backlog_limit=64 [ 1227.979861][ T5484] audit: backlog limit exceeded [ 1227.985531][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1228.005040][ T5484] audit: audit_lost=122520 audit_rate_limit=0 audit_backlog_limit=64 [ 1228.049170][ T30] audit: type=1400 audit(2000001034.680:1738279): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1228.061055][ T5484] audit: backlog limit exceeded [ 1228.100065][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1228.117988][ T5484] audit: audit_lost=122521 audit_rate_limit=0 audit_backlog_limit=64 [ 1228.251793][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.262247][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.282467][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.331513][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.358748][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.416285][T30008] syz.2.7994 (30008): drop_caches: 2 [ 1228.441873][T30009] syz.0.7995 (30009): drop_caches: 2 [ 1228.466682][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.478122][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.488817][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.510449][T30003] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7994'. [ 1228.545867][T30014] netlink: 'syz.1.7996': attribute type 1 has an invalid length. [ 1228.604994][T30014] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1228.795904][T30020] bridge0: entered allmulticast mode [ 1228.817343][T30024] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1228.948124][T30014] veth99: entered promiscuous mode [ 1228.997368][T30018] vlan4: entered allmulticast mode [ 1229.043259][T30018] bond46: entered allmulticast mode [ 1229.077288][T30031] netlink: 'syz.0.8001': attribute type 1 has an invalid length. [ 1229.247015][T30031] 8021q: adding VLAN 0 to HW filter on device bond63 [ 1229.263283][T30034] vlan4: entered allmulticast mode [ 1229.268405][T30034] bond63: entered allmulticast mode [ 1229.396642][T30030] veth127: entered promiscuous mode [ 1230.723411][T30070] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1230.899133][T30076] syz.0.8016 (30076): drop_caches: 2 [ 1231.550317][T30089] netlink: 'syz.2.8020': attribute type 1 has an invalid length. [ 1231.680782][T30089] 8021q: adding VLAN 0 to HW filter on device bond36 [ 1231.813741][T30093] veth69: entered promiscuous mode [ 1231.967965][T30099] netlink: 'syz.3.8024': attribute type 1 has an invalid length. [ 1232.050723][T30089] vlan1: entered allmulticast mode [ 1232.081971][T30089] bond36: entered allmulticast mode [ 1232.237749][T30099] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1232.385957][T30101] veth87: entered promiscuous mode [ 1232.428288][T30102] vlan1: entered allmulticast mode [ 1232.466266][T30102] bond44: entered allmulticast mode [ 1232.608066][T30112] syz.0.8027 (30112): drop_caches: 2 [ 1232.872674][ T30] kauditd_printk_skb: 10526 callbacks suppressed [ 1232.872690][ T30] audit: type=1400 audit(2000001039.690:1748091): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1232.935483][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1232.942034][ T30] audit: type=1400 audit(2000001039.690:1748092): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1232.942075][ T30] audit: type=1400 audit(2000001039.690:1748093): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1232.990129][ T30] audit: type=1400 audit(2000001039.720:1748094): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1233.015802][ T30] audit: type=1400 audit(2000001039.720:1748095): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1233.037173][ T5484] audit: audit_lost=122760 audit_rate_limit=0 audit_backlog_limit=64 [ 1233.037193][ T5484] audit: backlog limit exceeded [ 1233.037855][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1233.059664][ T30] audit: type=1400 audit(2000001039.720:1748096): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1233.211942][T30129] bridge0: entered allmulticast mode [ 1233.756299][T30143] __nla_validate_parse: 80 callbacks suppressed [ 1233.756317][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.773883][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.808807][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.852643][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.898102][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.907266][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.937722][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1233.937795][T30145] syz.4.8038 (30145): drop_caches: 2 [ 1233.971941][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1234.045548][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1234.107166][T30143] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8038'. [ 1235.289208][T30169] syz.2.8047 (30169): drop_caches: 2 [ 1236.296557][T30188] bridge0: entered allmulticast mode [ 1236.457390][T30195] syz.3.8057 (30195): drop_caches: 2 [ 1237.884457][ T30] kauditd_printk_skb: 8951 callbacks suppressed [ 1237.884468][ T30] audit: type=1400 audit(2000001044.700:1757040): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1237.940383][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1237.947637][ T5484] audit: audit_lost=122764 audit_rate_limit=0 audit_backlog_limit=64 [ 1237.957961][ T5484] audit: backlog limit exceeded [ 1237.968194][ T30] audit: type=1400 audit(2000001044.730:1757041): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1237.999591][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1238.007330][ T5484] audit: audit_lost=122765 audit_rate_limit=0 audit_backlog_limit=64 [ 1238.017080][ T5484] audit: backlog limit exceeded [ 1238.022596][ T30] audit: type=1400 audit(2000001044.730:1757042): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1238.046038][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1238.243709][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.250206][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1238.891002][T30232] __nla_validate_parse: 84 callbacks suppressed [ 1238.891019][T30232] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8069'. [ 1239.272813][T30245] syz.0.8072 (30245): drop_caches: 2 [ 1239.379533][T30248] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8074'. [ 1239.783609][T30251] netlink: 'syz.1.8076': attribute type 1 has an invalid length. [ 1239.854157][T30251] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1240.012004][T30251] veth101: entered promiscuous mode [ 1240.031229][T30255] vlan4: entered allmulticast mode [ 1240.036374][T30255] bond47: entered allmulticast mode [ 1241.757062][T30288] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8087'. [ 1242.793885][T30306] netlink: 'syz.1.8096': attribute type 1 has an invalid length. [ 1242.824048][T30306] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1242.869719][T30306] veth103: entered promiscuous mode [ 1242.889991][ T30] kauditd_printk_skb: 10043 callbacks suppressed [ 1242.890006][ T30] audit: type=1400 audit(2000001049.710:1763832): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1242.936459][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1242.943304][ T5484] audit: audit_lost=123851 audit_rate_limit=0 audit_backlog_limit=64 [ 1242.950052][T30312] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1242.952417][ T5484] audit: backlog limit exceeded [ 1242.967681][T30312] audit: audit_lost=123852 audit_rate_limit=0 audit_backlog_limit=64 [ 1242.967761][T30315] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1242.979402][T30312] audit: backlog limit exceeded [ 1242.982713][T30315] audit: audit_lost=123853 audit_rate_limit=0 audit_backlog_limit=64 [ 1242.982731][T30315] audit: backlog limit exceeded [ 1243.025190][T30313] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8091'. [ 1243.042458][T30306] vlan4: entered allmulticast mode [ 1243.067806][T30306] bond48: entered allmulticast mode [ 1243.530550][T30324] syz.0.8100 (30324): drop_caches: 2 [ 1244.283057][T30341] netlink: 'syz.2.8108': attribute type 1 has an invalid length. [ 1244.683701][T30341] 8021q: adding VLAN 0 to HW filter on device bond37 [ 1244.842362][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1244.866910][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1244.879282][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1244.917884][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1244.929915][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1244.930811][T30353] syz.4.8109 (30353): drop_caches: 2 [ 1244.938786][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1245.174874][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1245.185570][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1245.195373][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1245.246177][T30348] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8109'. [ 1245.266544][T30360] syz.0.8111 (30360): drop_caches: 2 [ 1245.314433][T30346] veth71: entered promiscuous mode [ 1245.385980][T30341] vlan1: entered allmulticast mode [ 1245.433931][T30341] bond37: entered allmulticast mode [ 1245.502003][T30363] syz.3.8113 (30363): drop_caches: 2 [ 1245.648244][T30368] bridge0: entered allmulticast mode [ 1246.541337][T30395] syz.2.8125 (30395): drop_caches: 2 [ 1246.634440][T30397] syz.4.8121 (30397): drop_caches: 2 [ 1247.640468][T30421] bridge0: entered allmulticast mode [ 1247.900225][ T30] kauditd_printk_skb: 6450 callbacks suppressed [ 1247.900239][ T30] audit: type=1400 audit(2000001054.710:1770275): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.941320][T30426] syz.3.8135 (30426): drop_caches: 2 [ 1247.964506][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1247.975007][ T30] audit: type=1400 audit(2000001054.720:1770278): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975050][ T30] audit: type=1400 audit(2000001054.720:1770279): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975091][ T30] audit: type=1400 audit(2000001054.720:1770280): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975129][ T30] audit: type=1400 audit(2000001054.720:1770281): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975167][ T30] audit: type=1400 audit(2000001054.720:1770282): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975205][ T30] audit: type=1400 audit(2000001054.720:1770283): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975242][ T30] audit: type=1400 audit(2000001054.720:1770284): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1247.975278][ T30] audit: type=1400 audit(2000001054.720:1770285): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1248.279098][T30437] syz.1.8136 (30437): drop_caches: 2 [ 1248.475406][T30442] syz.0.8140 (30442): drop_caches: 2 [ 1250.871797][T30484] syz.1.8155 (30484): drop_caches: 2 [ 1250.987944][T30490] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1251.198722][T30492] netlink: 'syz.0.8161': attribute type 1 has an invalid length. [ 1251.270808][T30492] 8021q: adding VLAN 0 to HW filter on device bond64 [ 1251.458055][T30492] veth129: entered promiscuous mode [ 1251.539551][T30492] vlan4: entered allmulticast mode [ 1251.555490][T30492] bond64: entered allmulticast mode [ 1251.694025][T30505] __nla_validate_parse: 402 callbacks suppressed [ 1251.694038][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.719938][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.749990][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.753288][T30506] syz.4.8160 (30506): drop_caches: 2 [ 1251.773116][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.784739][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.841420][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.851749][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.872907][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.883011][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1251.905931][T30505] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8160'. [ 1252.910667][ T5484] audit_log_start: 12998 callbacks suppressed [ 1252.910685][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1252.929985][ T30] audit: type=1400 audit(2000001059.660:1777954): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1252.964834][ T5484] audit: audit_lost=125633 audit_rate_limit=0 audit_backlog_limit=64 [ 1252.984190][T30525] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1252.985810][ T5484] audit: backlog limit exceeded [ 1253.028077][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1253.034850][T30525] audit: audit_lost=125634 audit_rate_limit=0 audit_backlog_limit=64 [ 1253.044144][T30525] audit: backlog limit exceeded [ 1253.057714][ T5484] audit: audit_lost=125635 audit_rate_limit=0 audit_backlog_limit=64 [ 1253.114850][ T30] audit: type=1400 audit(2000001059.660:1777955): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1254.341767][T30552] netlink: 'syz.4.8178': attribute type 1 has an invalid length. [ 1254.543978][T30552] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1254.581953][T30559] syz.2.8179 (30559): drop_caches: 2 [ 1254.699042][T30561] veth105: entered promiscuous mode [ 1254.963801][T30552] vlan2: entered allmulticast mode [ 1254.979106][T30552] bond51: entered allmulticast mode [ 1256.252025][T30600] syz.2.8193 (30600): drop_caches: 2 [ 1256.312810][T30602] syz.4.8194 (30602): drop_caches: 2 [ 1256.912434][T30620] __nla_validate_parse: 135 callbacks suppressed [ 1256.912446][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1256.941196][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1256.956802][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1256.979024][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1256.989105][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.000344][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.033271][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.084733][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.118823][T30624] syz.3.8199 (30624): drop_caches: 2 [ 1257.137850][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.147853][T30620] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8199'. [ 1257.435043][T30633] syz.0.8205 (30633): drop_caches: 2 [ 1257.574198][T30637] syz.0.8207 (30637): drop_caches: 2 [ 1258.075174][ T30] kauditd_printk_skb: 7982 callbacks suppressed [ 1258.075185][ T30] audit: type=1400 audit(2000001064.890:1785610): avc: denied { read write } for pid=5814 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1258.146751][T30657] netlink: 'syz.1.8214': attribute type 1 has an invalid length. [ 1258.163094][ T30] audit: type=1400 audit(2000001064.930:1785611): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1258.208778][ T30] audit: type=1400 audit(2000001064.930:1785612): avc: denied { create } for pid=30650 comm="syz.0.8212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1258.209666][T30653] syz.0.8212 (30653): drop_caches: 2 [ 1258.243256][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1258.255195][ T5484] audit: audit_lost=125745 audit_rate_limit=0 audit_backlog_limit=64 [ 1258.264125][ T5484] audit: backlog limit exceeded [ 1258.271074][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1258.277706][ T5484] audit: audit_lost=125746 audit_rate_limit=0 audit_backlog_limit=64 [ 1258.280211][T30656] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1258.287378][ T5484] audit: backlog limit exceeded [ 1258.323299][T30657] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1258.440421][T30661] veth105: entered promiscuous mode [ 1258.495492][T30657] vlan4: entered allmulticast mode [ 1258.549729][T30657] bond49: entered allmulticast mode [ 1259.289579][T30674] syz.1.8219 (30674): drop_caches: 2 [ 1261.267173][T30714] syz.1.8231 (30714): drop_caches: 2 [ 1262.110839][T30726] __nla_validate_parse: 178 callbacks suppressed [ 1262.110856][T30726] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8234'. [ 1262.536934][T30733] netlink: 'syz.3.8236': attribute type 1 has an invalid length. [ 1262.575327][T30733] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1262.617093][T30733] veth89: entered promiscuous mode [ 1262.667466][T30733] vlan1: entered allmulticast mode [ 1262.686883][T30733] bond45: entered allmulticast mode [ 1262.707931][T30737] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8237'. [ 1262.832419][T30741] syz.1.8239 (30741): drop_caches: 2 [ 1263.080458][ T30] kauditd_printk_skb: 8515 callbacks suppressed [ 1263.080473][ T30] audit: type=1400 audit(2000001069.900:1793721): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1263.100118][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1263.109077][T30743] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1263.122952][T30748] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1263.122968][T30748] audit: audit_lost=125883 audit_rate_limit=0 audit_backlog_limit=64 [ 1263.122982][T30748] audit: backlog limit exceeded [ 1263.124854][T30748] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1263.145012][T30743] audit: audit_lost=125884 audit_rate_limit=0 audit_backlog_limit=64 [ 1263.162351][T30748] audit: audit_lost=125885 audit_rate_limit=0 audit_backlog_limit=64 [ 1263.166850][ T5484] audit: audit_lost=125886 audit_rate_limit=0 audit_backlog_limit=64 [ 1263.237025][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.246043][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.269875][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.279028][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.296464][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.298666][T30750] syz.4.8242 (30750): drop_caches: 2 [ 1263.346157][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.395959][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.405075][T30748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1263.596754][T30757] netlink: 'syz.2.8245': attribute type 1 has an invalid length. [ 1263.648160][T30757] 8021q: adding VLAN 0 to HW filter on device bond38 [ 1263.730226][T30757] veth73: entered promiscuous mode [ 1263.752629][T30757] vlan1: entered allmulticast mode [ 1263.757839][T30757] bond38: entered allmulticast mode [ 1264.651508][T30780] syz.3.8252 (30780): drop_caches: 2 [ 1264.766102][T30790] bridge0: entered allmulticast mode [ 1265.045111][T30796] syz.1.8258 (30796): drop_caches: 2 [ 1265.057726][T30793] syz.3.8257 (30793): drop_caches: 2 [ 1266.104658][T30820] bridge0: entered allmulticast mode [ 1266.463774][T30827] netlink: 'syz.3.8268': attribute type 1 has an invalid length. [ 1266.590755][T30827] 8021q: adding VLAN 0 to HW filter on device bond46 [ 1266.754711][T30834] veth91: entered promiscuous mode [ 1266.786578][T30827] vlan1: entered allmulticast mode [ 1266.791978][T30827] bond46: entered allmulticast mode [ 1266.897888][T30841] syz.0.8272 (30841): drop_caches: 2 [ 1267.111414][T30844] bridge0: entered allmulticast mode [ 1267.603273][T30855] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1267.906975][T30864] syz.3.8280 (30864): drop_caches: 2 [ 1268.091885][ T30] kauditd_printk_skb: 9030 callbacks suppressed [ 1268.091898][ T30] audit: type=1400 audit(2000001074.900:1802710): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1268.154527][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1268.242060][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1268.248611][ T5822] audit: audit_lost=125900 audit_rate_limit=0 audit_backlog_limit=64 [ 1268.255691][ T5829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1268.262524][ T5822] audit: backlog limit exceeded [ 1268.268153][T30867] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1268.276253][ T5484] audit: audit_lost=125901 audit_rate_limit=0 audit_backlog_limit=64 [ 1268.276257][T30867] audit: audit_lost=125902 audit_rate_limit=0 audit_backlog_limit=64 [ 1268.276275][T30867] audit: backlog limit exceeded [ 1268.435770][T30876] syz.0.8283 (30876): drop_caches: 2 [ 1268.648259][T30883] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1269.317805][T30896] __nla_validate_parse: 41 callbacks suppressed [ 1269.317819][T30896] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8289'. [ 1269.352484][T30896] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8289'. [ 1269.626367][T30899] bridge0: entered allmulticast mode [ 1269.730684][T30901] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8291'. [ 1270.238885][T30914] bridge50: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1270.627373][T30921] syz.3.8299 (30921): drop_caches: 2 [ 1270.732499][T30923] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8297'. [ 1270.994894][T30933] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8302'. [ 1271.044950][T30933] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8302'. [ 1271.106164][T30935] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8303'. [ 1271.437521][T30943] bridge0: entered allmulticast mode [ 1272.276663][T30967] bridge54: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1272.450336][T30971] syz.1.8315 (30971): drop_caches: 2 [ 1273.110026][ T30] kauditd_printk_skb: 13288 callbacks suppressed [ 1273.110043][ T30] audit: type=1400 audit(2000001079.930:1811457): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1273.131031][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1273.163140][T30977] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1273.187264][T30973] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1273.199920][ T5484] audit: audit_lost=127417 audit_rate_limit=0 audit_backlog_limit=64 [ 1273.208088][ T30] audit: type=1400 audit(2000001079.930:1811458): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1273.208127][T30977] audit: audit_lost=127418 audit_rate_limit=0 audit_backlog_limit=64 [ 1273.247885][T30973] audit: audit_lost=127419 audit_rate_limit=0 audit_backlog_limit=64 [ 1273.262663][ T5484] audit: backlog limit exceeded [ 1273.277717][T30973] audit: backlog limit exceeded [ 1273.481398][T30980] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8319'. [ 1273.953068][T30996] netlink: 'syz.1.8324': attribute type 1 has an invalid length. [ 1274.035317][T30996] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1274.090967][T30996] veth107: entered promiscuous mode [ 1274.124056][T30996] vlan4: entered allmulticast mode [ 1274.130072][T30996] bond50: entered allmulticast mode [ 1274.621443][T31009] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8327'. [ 1274.918195][T31016] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8329'. [ 1275.270443][T31018] netlink: 'syz.2.8330': attribute type 1 has an invalid length. [ 1275.326687][T31018] 8021q: adding VLAN 0 to HW filter on device bond39 [ 1275.476604][T31018] veth75: entered promiscuous mode [ 1275.637175][T31018] vlan1: entered allmulticast mode [ 1275.665049][T31018] bond39: entered allmulticast mode [ 1275.721748][T31026] bridge0: entered allmulticast mode [ 1275.747665][T31022] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8332'. [ 1275.800037][T31032] syz.1.8334 (31032): drop_caches: 2 [ 1275.900593][T31033] netlink: 'syz.4.8335': attribute type 1 has an invalid length. [ 1275.944002][T31037] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8337'. [ 1276.013954][T31033] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1276.054532][T31042] veth107: entered promiscuous mode [ 1276.133199][T31033] vlan2: entered allmulticast mode [ 1276.138432][T31033] bond52: entered allmulticast mode [ 1276.466869][T31047] syz.2.8339 (31047): drop_caches: 2 [ 1276.849236][T31061] netlink: 'syz.0.8345': attribute type 1 has an invalid length. [ 1276.890769][T31061] 8021q: adding VLAN 0 to HW filter on device bond65 [ 1276.964719][T31061] veth131: entered promiscuous mode [ 1276.997320][T31065] syz.4.8347 (31065): drop_caches: 2 [ 1277.009252][T31061] vlan4: entered allmulticast mode [ 1277.016821][T31061] bond65: entered allmulticast mode [ 1277.428741][T31079] syz.1.8352 (31079): drop_caches: 2 [ 1277.944488][T31091] syz.1.8357 (31091): drop_caches: 2 [ 1278.122099][ T30] kauditd_printk_skb: 9847 callbacks suppressed [ 1278.122115][ T30] audit: type=1400 audit(2000001084.930:1821002): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1278.153743][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1278.192082][ T5824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1278.198745][ T5484] audit: audit_lost=127521 audit_rate_limit=0 audit_backlog_limit=64 [ 1278.209671][ T30] audit: type=1400 audit(2000001084.940:1821003): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1278.243707][ T5824] audit: audit_lost=127522 audit_rate_limit=0 audit_backlog_limit=64 [ 1278.359974][ T5484] audit: backlog limit exceeded [ 1278.372631][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1278.396106][T31090] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1278.402898][ T5484] audit: audit_lost=127523 audit_rate_limit=0 audit_backlog_limit=64 [ 1279.269214][T31114] netlink: 'syz.1.8364': attribute type 1 has an invalid length. [ 1279.370527][T31114] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1279.468413][T31115] vlan4: entered allmulticast mode [ 1279.473690][T31115] bond51: entered allmulticast mode [ 1279.627188][T31114] veth109: entered promiscuous mode [ 1279.796019][T31125] netlink: 'syz.4.8368': attribute type 1 has an invalid length. [ 1279.906270][T31125] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1280.026855][T31125] veth109: entered promiscuous mode [ 1280.057004][T31130] vlan2: entered allmulticast mode [ 1280.085788][T31130] bond53: entered allmulticast mode [ 1280.545770][T31145] syz.1.8374 (31145): drop_caches: 2 [ 1280.577967][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.627774][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.629419][T31149] syz.3.8375 (31149): drop_caches: 2 [ 1280.679448][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.728553][T31151] syz.2.8377 (31151): drop_caches: 2 [ 1280.763375][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.796393][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.807471][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.820447][T31157] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8378'. [ 1280.836175][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.849987][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.862408][T31148] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8375'. [ 1280.876554][T31156] syz.1.8376 (31156): drop_caches: 2 [ 1283.071641][T31189] syz.0.8388 (31189): drop_caches: 2 [ 1283.132677][ T30] kauditd_printk_skb: 10561 callbacks suppressed [ 1283.132692][ T30] audit: type=1400 audit(2000001089.950:1831561): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1283.182116][T31194] netlink: 'syz.4.8390': attribute type 1 has an invalid length. [ 1283.191034][T31195] syz.2.8391 (31195): drop_caches: 2 [ 1283.209410][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1283.214460][T31197] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1283.224904][ T5484] audit: audit_lost=127525 audit_rate_limit=0 audit_backlog_limit=64 [ 1283.232869][T31197] audit: audit_lost=127526 audit_rate_limit=0 audit_backlog_limit=64 [ 1283.252247][ T5824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1283.258020][ T30] audit: type=1400 audit(2000001089.950:1831562): avc: denied { create } for pid=31192 comm="syz.2.8391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1283.261574][T31200] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1283.280171][ T30] audit: type=1400 audit(2000001089.950:1831563): avc: denied { allowed } for pid=31192 comm="syz.2.8391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1283.298035][T31197] audit: backlog limit exceeded [ 1283.335002][T31194] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1283.444214][T31194] veth111: entered promiscuous mode [ 1283.477505][T31202] vlan2: entered allmulticast mode [ 1283.483901][T31202] bond54: entered allmulticast mode [ 1283.527174][T31200] syz.1.8393 (31200): drop_caches: 2 [ 1284.915126][T31237] syz.1.8406 (31237): drop_caches: 2 [ 1285.089486][T31248] netlink: 'syz.1.8410': attribute type 1 has an invalid length. [ 1285.137015][T31248] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1285.180891][T31252] netlink: 'syz.4.8412': attribute type 1 has an invalid length. [ 1285.426655][T31252] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1285.487451][T31271] syz.0.8414 (31271): drop_caches: 2 [ 1285.516531][T31248] veth111: entered promiscuous mode [ 1285.540962][T31264] vlan4: entered allmulticast mode [ 1285.584446][T31264] bond52: entered allmulticast mode [ 1285.888752][T31269] veth113: entered promiscuous mode [ 1285.950473][T31250] vlan2: entered allmulticast mode [ 1285.961388][T31250] bond55: entered allmulticast mode [ 1285.980237][T31277] syz.3.8420 (31277): drop_caches: 2 [ 1286.047234][T31279] syz.3.8421 (31279): drop_caches: 2 [ 1286.513525][T31292] syz.1.8425 (31292): drop_caches: 2 [ 1286.681965][T31294] syz.2.8426 (31294): drop_caches: 2 [ 1286.692724][T31296] syz.1.8427 (31296): drop_caches: 2 [ 1286.781010][T31298] __nla_validate_parse: 81 callbacks suppressed [ 1286.781028][T31298] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8428'. [ 1286.858576][T31301] netlink: 'syz.1.8430': attribute type 1 has an invalid length. [ 1286.861480][T31302] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8429'. [ 1286.931313][T31301] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1287.051488][T31309] syz.3.8431 (31309): drop_caches: 2 [ 1287.113301][T31301] veth113: entered promiscuous mode [ 1287.126297][T31305] vlan4: entered allmulticast mode [ 1287.141697][T31305] bond53: entered allmulticast mode [ 1287.506684][T31319] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8435'. [ 1287.803880][T31326] netlink: 'syz.4.8438': attribute type 1 has an invalid length. [ 1287.893579][T31327] veth115: entered promiscuous mode [ 1287.951895][T31326] 8021q: adding VLAN 0 to HW filter on device bond56 [ 1287.967249][T31327] vlan2: entered allmulticast mode [ 1287.974687][T31331] netlink: 'syz.1.8439': attribute type 1 has an invalid length. [ 1288.004453][T31327] bond56: entered allmulticast mode [ 1288.091343][T31331] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1288.140083][ T30] kauditd_printk_skb: 12015 callbacks suppressed [ 1288.140098][ T30] audit: type=1400 audit(2000001094.960:1841606): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1288.178118][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1288.186715][ T5484] audit: audit_lost=128185 audit_rate_limit=0 audit_backlog_limit=64 [ 1288.189730][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1288.194983][ T30] audit: type=1400 audit(2000001094.980:1841607): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1288.229911][ T5484] audit: backlog limit exceeded [ 1288.233561][ T30] audit: type=1400 audit(2000001094.980:1841608): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1288.256462][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1288.267104][ T5812] audit: audit_lost=128186 audit_rate_limit=0 audit_backlog_limit=64 [ 1288.275458][T31336] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1288.343495][T31334] veth115: entered promiscuous mode [ 1288.398446][T31331] vlan4: entered allmulticast mode [ 1288.430701][T31331] bond54: entered allmulticast mode [ 1288.524264][T31341] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8442'. [ 1288.749025][T31347] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8444'. [ 1289.256923][T31356] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8447'. [ 1289.498368][T31364] syz.2.8450 (31364): drop_caches: 2 [ 1289.637563][T31368] syz.2.8452 (31368): drop_caches: 2 [ 1289.977830][T31378] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8457'. [ 1290.385955][T31390] syz.0.8461 (31390): drop_caches: 2 [ 1290.479254][T31392] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8462'. [ 1290.529438][T31392] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8462'. [ 1290.539430][T31392] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8462'. [ 1290.946293][T31403] netlink: 'syz.0.8466': attribute type 1 has an invalid length. [ 1291.164185][T31403] 8021q: adding VLAN 0 to HW filter on device bond66 [ 1291.242228][T31409] veth133: entered promiscuous mode [ 1291.333861][T31403] vlan4: entered allmulticast mode [ 1291.354741][T31403] bond66: entered allmulticast mode [ 1291.547613][T31418] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1292.242209][T31429] __nla_validate_parse: 97 callbacks suppressed [ 1292.242227][T31429] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8474'. [ 1292.678249][T31441] netlink: 'syz.1.8478': attribute type 1 has an invalid length. [ 1292.794751][T31441] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1292.965484][T31441] veth117: entered promiscuous mode [ 1293.022574][T31443] vlan4: entered allmulticast mode [ 1293.046237][T31443] bond55: entered allmulticast mode [ 1293.151891][ T30] kauditd_printk_skb: 13333 callbacks suppressed [ 1293.151906][ T30] audit: type=1400 audit(2000001099.970:1854487): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1293.234296][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1293.257991][ T5484] audit: audit_lost=128339 audit_rate_limit=0 audit_backlog_limit=64 [ 1293.272194][T31449] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1293.278729][T31449] audit: audit_lost=128340 audit_rate_limit=0 audit_backlog_limit=64 [ 1293.288361][ T30] audit: type=1400 audit(2000001099.970:1854488): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1293.299782][ T5484] audit: backlog limit exceeded [ 1293.329727][ T30] audit: type=1400 audit(2000001099.970:1854489): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1293.335286][T31449] audit: backlog limit exceeded [ 1293.379857][ T30] audit: type=1400 audit(2000001099.970:1854490): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1293.477647][T31449] syz.4.8481 (31449): drop_caches: 2 [ 1293.542495][T31453] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8482'. [ 1294.205167][T31475] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8491'. [ 1295.563392][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.606866][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.697647][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.706795][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.716945][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.726990][T31502] syz.2.8499 (31502): drop_caches: 2 [ 1295.726997][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1295.727035][T31499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8499'. [ 1296.173247][T31511] syz.0.8503 (31511): drop_caches: 2 [ 1297.262334][T31531] __nla_validate_parse: 38 callbacks suppressed [ 1297.262350][T31531] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8512'. [ 1297.315161][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.362405][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.374627][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.394435][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.411852][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.423808][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.437270][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.481939][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.516699][T31534] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8511'. [ 1297.568949][T31544] syz.0.8515 (31544): drop_caches: 2 [ 1297.945444][T31552] netlink: 'syz.2.8518': attribute type 1 has an invalid length. [ 1297.969018][T31554] syz.0.8520 (31554): drop_caches: 2 [ 1298.008777][T31552] 8021q: adding VLAN 0 to HW filter on device bond40 [ 1298.073217][T31556] veth77: entered promiscuous mode [ 1298.162908][ T30] kauditd_printk_skb: 9429 callbacks suppressed [ 1298.162921][ T30] audit: type=1400 audit(2000001104.980:1862222): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1298.261597][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1298.271074][T31552] vlan1: entered allmulticast mode [ 1298.280029][ T5484] audit: audit_lost=128907 audit_rate_limit=0 audit_backlog_limit=64 [ 1298.293560][T31561] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1298.302459][T31552] bond40: entered allmulticast mode [ 1298.308802][T31561] audit: audit_lost=128908 audit_rate_limit=0 audit_backlog_limit=64 [ 1298.324457][T31562] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1298.325290][ T30] audit: type=1400 audit(2000001104.980:1862223): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1298.363312][ T5484] audit: backlog limit exceeded [ 1298.363843][T31561] audit: backlog limit exceeded [ 1298.374861][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1298.455566][T31561] bridge0: entered allmulticast mode [ 1299.176924][T31578] syz.1.8527 (31578): drop_caches: 2 [ 1299.402957][T31588] syz.1.8532 (31588): drop_caches: 2 [ 1299.694186][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.700496][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1301.500948][T31632] netlink: 'syz.1.8546': attribute type 1 has an invalid length. [ 1301.636018][T31632] 8021q: adding VLAN 0 to HW filter on device bond56 [ 1301.699671][T31638] syz.2.8550 (31638): drop_caches: 2 [ 1301.736468][T31632] veth119: entered promiscuous mode [ 1301.749346][T31633] vlan4: entered allmulticast mode [ 1301.756357][T31633] bond56: entered allmulticast mode [ 1302.480555][T31655] __nla_validate_parse: 126 callbacks suppressed [ 1302.480567][T31655] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8553'. [ 1302.619291][T31658] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8556'. [ 1303.169916][ T5484] audit_log_start: 9689 callbacks suppressed [ 1303.169932][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1303.183030][ T5484] audit: audit_lost=129108 audit_rate_limit=0 audit_backlog_limit=64 [ 1303.191254][ T30] audit: type=1400 audit(2000001109.970:1871318): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1303.216166][ T30] audit: type=1400 audit(2000001109.970:1871319): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1303.237577][ T30] audit: type=1400 audit(2000001109.970:1871320): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1303.263106][ T5484] audit: backlog limit exceeded [ 1303.268548][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1303.272423][ T30] audit: type=1400 audit(2000001109.970:1871321): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1303.276256][ T5484] audit: audit_lost=129109 audit_rate_limit=0 audit_backlog_limit=64 [ 1303.305882][ T5484] audit: backlog limit exceeded [ 1303.667870][T31673] syz.1.8561 (31673): drop_caches: 2 [ 1303.779124][T31681] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8559'. [ 1303.940209][T31685] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8563'. [ 1304.984347][T31696] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8569'. [ 1305.004132][T31694] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8568'. [ 1305.532834][T31710] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8567'. [ 1305.830252][T31716] netlink: 'syz.1.8573': attribute type 1 has an invalid length. [ 1305.942748][T31719] syz.3.8574 (31719): drop_caches: 2 [ 1306.009021][T31716] 8021q: adding VLAN 0 to HW filter on device bond57 [ 1306.138234][T31721] veth121: entered promiscuous mode [ 1306.171155][T31716] vlan4: entered allmulticast mode [ 1306.189976][T31716] bond57: entered allmulticast mode [ 1307.273368][T31746] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8583'. [ 1307.344692][T31750] bridge0: entered allmulticast mode [ 1307.558678][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.646576][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.664356][T31764] syz.1.8586 (31764): drop_caches: 2 [ 1307.670669][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.682955][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.693044][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.703162][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.712263][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.721282][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.742393][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1307.751905][T31758] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8587'. [ 1308.189146][ T30] kauditd_printk_skb: 15033 callbacks suppressed [ 1308.189161][ T30] audit: type=1400 audit(2000001114.990:1879773): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1308.202078][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1308.239500][ T5824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1308.247597][T31774] netlink: 'syz.3.8592': attribute type 1 has an invalid length. [ 1308.255585][ T5824] audit: audit_lost=131304 audit_rate_limit=0 audit_backlog_limit=64 [ 1308.255599][ T5484] audit: audit_lost=131305 audit_rate_limit=0 audit_backlog_limit=64 [ 1308.272420][ T5484] audit: backlog limit exceeded [ 1308.277416][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1308.278572][ T5824] audit: backlog limit exceeded [ 1308.292587][T31776] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1308.299101][T31776] audit: audit_lost=131306 audit_rate_limit=0 audit_backlog_limit=64 [ 1308.318075][T31774] veth93: entered promiscuous mode [ 1309.772129][T31811] syz.2.8606 (31811): drop_caches: 2 [ 1309.980211][T31813] veth135: entered promiscuous mode [ 1310.241452][T31818] syz.3.8605 (31818): drop_caches: 2 [ 1310.772905][T31834] netlink: 'syz.2.8613': attribute type 1 has an invalid length. [ 1311.005497][T31834] 8021q: adding VLAN 0 to HW filter on device bond41 [ 1311.270403][T31834] veth79: entered promiscuous mode [ 1311.381705][T31834] vlan1: entered allmulticast mode [ 1311.386857][T31834] bond41: entered allmulticast mode [ 1312.280551][T31867] netlink: 'syz.3.8626': attribute type 1 has an invalid length. [ 1312.333727][T31867] 8021q: adding VLAN 0 to HW filter on device bond47 [ 1312.360840][T31875] syz.4.8623 (31875): drop_caches: 2 [ 1312.481340][T31867] veth95: entered promiscuous mode [ 1312.591934][T31867] vlan1: entered allmulticast mode [ 1312.682428][T31867] bond47: entered allmulticast mode [ 1313.197285][ T30] kauditd_printk_skb: 8240 callbacks suppressed [ 1313.197299][ T30] audit: type=1400 audit(2000001120.010:1887735): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1313.290914][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1313.297066][T31889] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1313.311408][T31890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1313.317956][T31889] audit: audit_lost=131400 audit_rate_limit=0 audit_backlog_limit=64 [ 1313.337598][T31890] audit: audit_lost=131401 audit_rate_limit=0 audit_backlog_limit=64 [ 1313.339596][ T5484] audit: audit_lost=131402 audit_rate_limit=0 audit_backlog_limit=64 [ 1313.361567][T31889] audit: backlog limit exceeded [ 1313.365949][ T30] audit: type=1400 audit(2000001120.040:1887736): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1313.430888][T31890] audit: backlog limit exceeded [ 1313.787262][T31896] __nla_validate_parse: 163 callbacks suppressed [ 1313.787275][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1313.846560][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1313.855901][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1313.865304][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1313.937735][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.061700][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.062919][T31907] syz.3.8633 (31907): drop_caches: 2 [ 1314.164286][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.175698][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.185822][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.194780][T31896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8633'. [ 1314.423345][T31920] netlink: 'syz.3.8641': attribute type 1 has an invalid length. [ 1314.594774][T31920] 8021q: adding VLAN 0 to HW filter on device bond48 [ 1314.639303][T31920] vlan1: entered allmulticast mode [ 1314.644718][T31920] bond48: entered allmulticast mode [ 1315.766583][T31939] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1316.102156][T31948] syz.4.8649 (31948): drop_caches: 2 [ 1318.140580][T32004] syz.4.8671 (32004): drop_caches: 2 [ 1318.213101][ T30] kauditd_printk_skb: 11340 callbacks suppressed [ 1318.213116][ T30] audit: type=1400 audit(2000001125.030:1893478): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.226150][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.252422][T32014] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.259255][T32014] audit: audit_lost=133269 audit_rate_limit=0 audit_backlog_limit=64 [ 1318.269111][T32014] audit: backlog limit exceeded [ 1318.278741][ T5829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.292173][ T5484] audit: audit_lost=133270 audit_rate_limit=0 audit_backlog_limit=64 [ 1318.303772][T32014] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1318.312263][ T30] audit: type=1400 audit(2000001125.030:1893479): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1318.315677][ T5829] audit: audit_lost=133271 audit_rate_limit=0 audit_backlog_limit=64 [ 1318.623638][T32020] syz.4.8675 (32020): drop_caches: 2 [ 1319.868596][T32034] __nla_validate_parse: 463 callbacks suppressed [ 1319.868613][T32034] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8681'. [ 1320.092556][T32045] netlink: 12 bytes leftover after parsing attributes in process `syz.0.8684'. [ 1320.144167][T32045] veth137: entered promiscuous mode [ 1321.272170][T32056] bridge0: entered allmulticast mode [ 1321.957049][T32071] syz.3.8694 (32071): drop_caches: 2 [ 1322.019909][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.044278][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.084523][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.099493][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.124707][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.135253][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.146132][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.197483][T32073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8695'. [ 1322.200807][T32081] syz.2.8695 (32081): drop_caches: 2 [ 1322.587344][T32087] syz.1.8700 (32087): drop_caches: 2 [ 1323.220627][ T30] kauditd_printk_skb: 47642 callbacks suppressed [ 1323.220643][ T30] audit: type=1400 audit(2000001130.030:1902307): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1323.378186][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.387206][ T30] audit: type=1400 audit(2000001130.040:1902308): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1323.430902][ T5484] audit: audit_lost=146210 audit_rate_limit=0 audit_backlog_limit=64 [ 1323.476904][T32108] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.485847][ T5484] audit: backlog limit exceeded [ 1323.495168][T32108] audit: audit_lost=146211 audit_rate_limit=0 audit_backlog_limit=64 [ 1323.503431][T32104] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.510209][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1323.515340][ T30] audit: type=1400 audit(2000001130.040:1902309): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1324.249439][T32121] syz.2.8713 (32121): drop_caches: 2 [ 1325.728691][T32162] __nla_validate_parse: 166 callbacks suppressed [ 1325.728702][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1325.837854][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1325.871753][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1325.960076][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.022242][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.024687][T32171] syz.1.8729 (32171): drop_caches: 2 [ 1326.077218][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.126837][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.137870][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.147081][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1326.292885][T32162] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8729'. [ 1327.607985][T32214] syz.1.8746 (32214): drop_caches: 2 [ 1328.236037][ T30] kauditd_printk_skb: 11857 callbacks suppressed [ 1328.236054][ T30] audit: type=1400 audit(2000001135.050:1908660): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1328.353057][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.395391][ T5484] audit: audit_lost=148048 audit_rate_limit=0 audit_backlog_limit=64 [ 1328.414426][T32238] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.427427][ T5824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.438926][T32239] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.448988][ T5484] audit: backlog limit exceeded [ 1328.458247][T32238] audit: audit_lost=148049 audit_rate_limit=0 audit_backlog_limit=64 [ 1328.469575][T32228] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1328.476253][T32239] audit: audit_lost=148050 audit_rate_limit=0 audit_backlog_limit=64 [ 1329.484295][T32261] bridge0: trying to set multicast startup query interval below minimum, setting to 100 (1000ms) [ 1329.505314][T32263] syz.2.8763 (32263): drop_caches: 2 [ 1329.686683][T32269] syz.0.8765 (32269): drop_caches: 2 [ 1330.476883][T32286] syz.2.8772 (32286): drop_caches: 2 [ 1330.557924][T32287] bridge0: entered allmulticast mode [ 1330.802554][T32293] __nla_validate_parse: 353 callbacks suppressed [ 1330.802565][T32293] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8775'. [ 1330.947399][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.050196][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.071480][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.102562][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.146904][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.152082][T32303] syz.3.8776 (32303): drop_caches: 2 [ 1331.310627][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.389892][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.415612][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.430001][T32297] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8776'. [ 1331.975874][T32324] syz.0.8783 (32324): drop_caches: 2 [ 1332.184364][T32334] 8021q: adding VLAN 0 to HW filter on device bond58 [ 1332.254723][T32337] veth97: entered promiscuous mode [ 1332.328937][T32334] veth123: entered promiscuous mode [ 1332.340937][T32338] vlan4: entered allmulticast mode [ 1332.353366][T32338] bond58: entered allmulticast mode [ 1333.240786][ T30] kauditd_printk_skb: 8358 callbacks suppressed [ 1333.240801][ T30] audit: type=1400 audit(2000001140.060:1915075): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1333.283016][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.291193][ T5484] audit: audit_lost=148699 audit_rate_limit=0 audit_backlog_limit=64 [ 1333.309243][ T5484] audit: backlog limit exceeded [ 1333.318380][T32362] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.335199][T32363] syz.1.8795 (32363): drop_caches: 2 [ 1333.337669][T32362] audit: audit_lost=148700 audit_rate_limit=0 audit_backlog_limit=64 [ 1333.342668][T32365] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.355448][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1333.358596][T32362] audit: backlog limit exceeded [ 1333.368262][ T30] audit: type=1400 audit(2000001140.060:1915076): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1334.168871][T32381] syz.1.8802 (32381): drop_caches: 2 [ 1335.556234][T32412] bridge0: entered allmulticast mode [ 1336.470811][T32424] __nla_validate_parse: 269 callbacks suppressed [ 1336.470822][T32424] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8816'. [ 1336.730204][T32427] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8817'. [ 1338.244464][T32460] syz.4.8827 (32460): drop_caches: 2 [ 1338.250806][ T30] kauditd_printk_skb: 12227 callbacks suppressed [ 1338.250818][ T30] audit: type=1400 audit(2000001145.070:1922023): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1338.293804][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.303703][ T30] audit: type=1400 audit(2000001145.100:1922024): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1338.339801][ T5484] audit: audit_lost=150462 audit_rate_limit=0 audit_backlog_limit=64 [ 1338.359501][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.368313][ T5484] audit: backlog limit exceeded [ 1338.383547][ T5812] audit: audit_lost=150463 audit_rate_limit=0 audit_backlog_limit=64 [ 1338.383651][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.406432][ T5829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1338.409390][ T30] audit: type=1400 audit(2000001145.100:1922025): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1338.496382][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.508255][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.522320][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.557533][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.578744][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.588770][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.601683][T32464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8828'. [ 1338.614036][T32473] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8830'. [ 1338.638022][T32475] syz.1.8828 (32475): drop_caches: 2 [ 1340.649601][T32519] netlink: 'syz.0.8848': attribute type 1 has an invalid length. [ 1340.845407][T32519] 8021q: adding VLAN 0 to HW filter on device bond67 [ 1340.968377][T32532] veth139: entered promiscuous mode [ 1341.066269][T32519] vlan4: entered allmulticast mode [ 1341.077980][T32519] bond67: entered allmulticast mode [ 1341.976801][T32556] syz.4.8860 (32556): drop_caches: 2 [ 1342.216399][T32561] __nla_validate_parse: 93 callbacks suppressed [ 1342.216416][T32561] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8862'. [ 1342.283242][T32566] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8864'. [ 1342.385336][T32566] veth117: entered promiscuous mode [ 1342.514085][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.557896][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.569438][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.579398][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.631383][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.633997][T32585] syz.3.8869 (32585): drop_caches: 2 [ 1342.668494][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.683017][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1342.712321][T32581] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8869'. [ 1343.262925][ T30] kauditd_printk_skb: 13051 callbacks suppressed [ 1343.262940][ T30] audit: type=1400 audit(2000001150.080:1934310): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1343.274319][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.305655][ T5484] audit: audit_lost=150720 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.315796][ T5484] audit: backlog limit exceeded [ 1343.336248][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.349213][ T30] audit: type=1400 audit(2000001150.080:1934311): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1343.388839][ T5484] audit: audit_lost=150721 audit_rate_limit=0 audit_backlog_limit=64 [ 1343.392199][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.405832][ T5484] audit: backlog limit exceeded [ 1343.412111][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1343.805241][T32615] syz.1.8880 (32615): drop_caches: 2 [ 1347.237198][T32691] netlink: 'syz.1.8907': attribute type 1 has an invalid length. [ 1347.333524][T32691] 8021q: adding VLAN 0 to HW filter on device bond59 [ 1347.380784][T32691] veth125: entered promiscuous mode [ 1347.406880][T32691] vlan4: entered allmulticast mode [ 1347.419244][T32691] bond59: entered allmulticast mode [ 1347.814204][T32711] netlink: 'syz.4.8914': attribute type 1 has an invalid length. [ 1347.884773][T32711] veth119: entered promiscuous mode [ 1348.033336][T32720] __nla_validate_parse: 87 callbacks suppressed [ 1348.033353][T32720] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8917'. [ 1348.233180][T32725] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8919'. [ 1348.270253][ T30] kauditd_printk_skb: 9373 callbacks suppressed [ 1348.270269][ T30] audit: type=1400 audit(2000001155.090:1943396): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.281072][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1348.298157][ T30] audit: type=1400 audit(2000001155.090:1943397): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.304631][ T5484] audit: audit_lost=150819 audit_rate_limit=0 audit_backlog_limit=64 [ 1348.340886][ T30] audit: type=1400 audit(2000001155.090:1943398): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.341082][ T5484] audit: backlog limit exceeded [ 1348.371338][ T30] audit: type=1400 audit(2000001155.090:1943399): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.371810][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1348.395497][ T30] audit: type=1400 audit(2000001155.090:1943400): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1348.400925][T32725] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1348.607442][T32730] syz.4.8921 (32730): drop_caches: 2 [ 1348.686331][T32732] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8922'. [ 1349.355625][T32746] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8927'. [ 1349.413441][T32748] netlink: 20 bytes leftover after parsing attributes in process `syz.0.8928'. [ 1349.473759][T32750] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8929'. [ 1349.785615][T32761] syz.2.8932 (32761): drop_caches: 2 [ 1350.432221][ T308] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8938'. [ 1351.294909][ T323] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8943'. [ 1351.811143][ T339] netlink: 'syz.3.8951': attribute type 1 has an invalid length. [ 1351.877819][ T339] 8021q: adding VLAN 0 to HW filter on device bond49 [ 1351.939265][ T339] veth99: entered promiscuous mode [ 1351.986626][ T339] vlan1: entered allmulticast mode [ 1352.005874][ T339] bond49: entered allmulticast mode [ 1352.218128][ T351] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8954'. [ 1352.236751][ T355] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8956'. [ 1352.262187][ T355] syz.4.8956 (355): drop_caches: 2 [ 1352.670407][ T362] veth121: entered promiscuous mode [ 1353.294720][ T30] kauditd_printk_skb: 12523 callbacks suppressed [ 1353.294736][ T30] audit: type=1400 audit(2000001160.110:1953796): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1353.353655][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1353.382156][ T5484] audit: audit_lost=151530 audit_rate_limit=0 audit_backlog_limit=64 [ 1353.382655][ T377] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1353.398588][ T5829] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1353.402355][ T30] audit: type=1400 audit(2000001160.110:1953797): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1353.427585][ T5484] audit: backlog limit exceeded [ 1353.441154][ T380] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1353.447671][ T380] audit: audit_lost=151531 audit_rate_limit=0 audit_backlog_limit=64 [ 1353.458268][ T381] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1353.535898][ T383] __nla_validate_parse: 96 callbacks suppressed [ 1353.535913][ T383] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8964'. [ 1356.581497][ T442] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8989'. [ 1358.300767][ T30] kauditd_printk_skb: 8262 callbacks suppressed [ 1358.300778][ T30] audit: type=1400 audit(2000001165.120:1961243): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1358.373154][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.394935][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1358.402754][ T30] audit: type=1400 audit(2000001165.150:1961244): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1358.433060][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.444154][ T5484] audit: audit_lost=151805 audit_rate_limit=0 audit_backlog_limit=64 [ 1358.459957][ T5484] audit: backlog limit exceeded [ 1358.465913][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.476698][ T486] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1358.506989][ T486] audit: audit_lost=151806 audit_rate_limit=0 audit_backlog_limit=64 [ 1358.515371][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1358.539031][ T5484] audit: audit_lost=151807 audit_rate_limit=0 audit_backlog_limit=64 [ 1358.543101][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1358.557935][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.592609][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.593975][ T487] syz.1.9004 (487): drop_caches: 2 [ 1358.619686][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.826711][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.878931][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.919864][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1358.958340][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1359.089907][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1359.116602][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1359.132100][ T483] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9004'. [ 1360.456013][ T528] syz.2.9020 (528): drop_caches: 2 [ 1361.122937][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.135346][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1361.404570][ T557] netlink: 'syz.0.9030': attribute type 1 has an invalid length. [ 1361.484607][ T557] 8021q: adding VLAN 0 to HW filter on device bond68 [ 1361.552788][ T563] veth141: entered promiscuous mode [ 1361.568187][ T559] syz.1.9031 (559): drop_caches: 2 [ 1361.593703][ T565] vlan4: entered allmulticast mode [ 1361.608282][ T565] bond68: entered allmulticast mode [ 1361.772458][ T571] syz.3.9034 (571): drop_caches: 2 [ 1361.826770][ T573] syz.1.9036 (573): drop_caches: 2 [ 1363.309781][ T30] kauditd_printk_skb: 11504 callbacks suppressed [ 1363.309820][ T30] audit: type=1400 audit(2000001170.120:1968923): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1363.323252][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1363.364448][ T5484] audit: audit_lost=153083 audit_rate_limit=0 audit_backlog_limit=64 [ 1363.374668][ T611] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1363.376985][ T5484] audit: backlog limit exceeded [ 1363.389345][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1363.397747][ T5484] audit: audit_lost=153084 audit_rate_limit=0 audit_backlog_limit=64 [ 1363.399420][ T611] audit: audit_lost=153085 audit_rate_limit=0 audit_backlog_limit=64 [ 1363.407357][ T5484] audit: backlog limit exceeded [ 1363.424739][ T611] audit: backlog limit exceeded [ 1364.162574][ T634] netlink: 'syz.3.9060': attribute type 1 has an invalid length. [ 1364.422094][ T634] 8021q: adding VLAN 0 to HW filter on device bond50 [ 1364.587260][ T634] veth101: entered promiscuous mode [ 1364.694272][ T634] vlan1: entered allmulticast mode [ 1364.823901][ T634] bond50: entered allmulticast mode [ 1365.572619][ T668] __nla_validate_parse: 450 callbacks suppressed [ 1365.572630][ T668] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9071'. [ 1366.532584][ T680] veth103: entered promiscuous mode [ 1366.595536][ T684] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9078'. [ 1368.323788][ T30] kauditd_printk_skb: 8033 callbacks suppressed [ 1368.323823][ T30] audit: type=1400 audit(2000001175.140:1975454): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.386722][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1368.399171][ T737] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1368.405612][ T5484] audit: audit_lost=153587 audit_rate_limit=0 audit_backlog_limit=64 [ 1368.415423][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1368.423106][ T30] audit: type=1400 audit(2000001175.170:1975455): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.423151][ T30] audit: type=1400 audit(2000001175.170:1975456): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.423188][ T30] audit: type=1400 audit(2000001175.170:1975457): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.423226][ T30] audit: type=1400 audit(2000001175.170:1975458): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.423272][ T30] audit: type=1400 audit(2000001175.170:1975459): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1368.438936][ T739] netlink: 'syz.4.9097': attribute type 1 has an invalid length. [ 1368.602065][ T740] veth123: entered promiscuous mode [ 1368.819249][ T739] 8021q: adding VLAN 0 to HW filter on device bond57 [ 1369.125696][ T740] vlan2: entered allmulticast mode [ 1369.132786][ T740] bond57: entered allmulticast mode [ 1369.329249][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.398935][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.426734][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.477192][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.528570][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.564593][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.580198][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1369.584503][ T772] syz.1.9107 (772): drop_caches: 2 [ 1369.616038][ T769] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9107'. [ 1370.348041][ T801] netlink: 'syz.0.9115': attribute type 1 has an invalid length. [ 1370.690771][ T801] 8021q: adding VLAN 0 to HW filter on device bond69 [ 1370.785591][ T803] veth143: entered promiscuous mode [ 1370.832130][ T797] vlan4: entered allmulticast mode [ 1370.849325][ T797] bond69: entered allmulticast mode [ 1372.255952][ T850] syz.0.9134 (850): drop_caches: 2 [ 1372.504366][ T857] __nla_validate_parse: 87 callbacks suppressed [ 1372.504382][ T857] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9137'. [ 1372.968867][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.019073][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.030365][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.069898][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.093964][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.105426][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.114835][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.117513][ T873] syz.1.9142 (873): drop_caches: 2 [ 1373.166624][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.175933][ T871] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9142'. [ 1373.329976][ T30] kauditd_printk_skb: 10528 callbacks suppressed [ 1373.329992][ T30] audit: type=1400 audit(2000001180.150:1982989): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1373.385375][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1373.394078][ T5814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1373.412067][ T5484] audit: audit_lost=154588 audit_rate_limit=0 audit_backlog_limit=64 [ 1373.421656][ T5814] audit: audit_lost=154589 audit_rate_limit=0 audit_backlog_limit=64 [ 1373.438853][ T5484] audit: backlog limit exceeded [ 1373.447383][ T5814] audit: backlog limit exceeded [ 1373.462021][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1373.490292][ T876] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1373.500777][ T878] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1374.730978][ T922] netlink: 'syz.0.9157': attribute type 1 has an invalid length. [ 1374.771466][ T922] 8021q: adding VLAN 0 to HW filter on device bond70 [ 1374.875768][ T922] veth145: entered promiscuous mode [ 1374.929833][ T922] vlan4: entered allmulticast mode [ 1374.935144][ T922] bond70: entered allmulticast mode [ 1377.123337][ T984] syz.2.9174 (984): drop_caches: 2 [ 1377.928772][ T1017] __nla_validate_parse: 89 callbacks suppressed [ 1377.928783][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1377.955716][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1377.973368][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.003715][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.027306][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.038550][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.055040][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.065133][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.068823][ T1029] syz.1.9185 (1029): drop_caches: 2 [ 1378.098458][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.107694][ T1017] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9185'. [ 1378.345157][ T30] kauditd_printk_skb: 7936 callbacks suppressed [ 1378.345172][ T30] audit: type=1400 audit(2000001185.160:1990146): avc: denied { read write } for pid=5829 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1378.413217][ T30] audit: type=1400 audit(2000001185.200:1990147): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1378.451724][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1378.467218][ T5484] audit: audit_lost=154851 audit_rate_limit=0 audit_backlog_limit=64 [ 1378.471755][ T1035] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1378.475583][ T5484] audit: backlog limit exceeded [ 1378.507990][ T1035] audit: audit_lost=154852 audit_rate_limit=0 audit_backlog_limit=64 [ 1378.509920][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1378.530085][ T30] audit: type=1400 audit(2000001185.200:1990148): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1378.554142][ T1038] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1382.911201][ T1156] syz.0.9228 (1156): drop_caches: 2 [ 1383.350259][ T30] kauditd_printk_skb: 10736 callbacks suppressed [ 1383.350275][ T30] audit: type=1400 audit(2000001190.170:1996758): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1383.400593][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1383.407550][ T5484] audit: audit_lost=156229 audit_rate_limit=0 audit_backlog_limit=64 [ 1383.418681][ T30] audit: type=1400 audit(2000001190.170:1996759): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1383.446086][ T5484] audit: backlog limit exceeded [ 1383.456698][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1383.466254][ T5484] audit: audit_lost=156230 audit_rate_limit=0 audit_backlog_limit=64 [ 1383.474645][ T30] audit: type=1400 audit(2000001190.190:1996760): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1383.509027][ T5484] audit: backlog limit exceeded [ 1383.514452][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1383.762923][ T1181] __nla_validate_parse: 86 callbacks suppressed [ 1383.762940][ T1181] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9233'. [ 1384.625091][ T1196] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9240'. [ 1385.134441][ T1208] syz.0.9245 (1208): drop_caches: 2 [ 1386.304307][ T1243] netlink: 'syz.2.9254': attribute type 1 has an invalid length. [ 1386.346397][ T1243] 8021q: adding VLAN 0 to HW filter on device bond42 [ 1386.382014][ T1243] netlink: 28 bytes leftover after parsing attributes in process `syz.2.9254'. [ 1386.838801][ T1248] veth81: entered promiscuous mode [ 1387.037815][ T1251] vlan1: entered allmulticast mode [ 1387.064150][ T1251] bond42: entered allmulticast mode [ 1387.791289][ T1272] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9263'. [ 1387.796997][ T1267] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9262'. [ 1388.345917][ T1283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9268'. [ 1388.355019][ T1283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9268'. [ 1388.365415][ T1283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9268'. [ 1388.375007][ T30] kauditd_printk_skb: 17639 callbacks suppressed [ 1388.375020][ T30] audit: type=1400 audit(2000001195.190:2005362): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.405085][ T1283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9268'. [ 1388.414583][ T30] audit: type=1400 audit(2000001195.190:2005363): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.446435][ T1283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9268'. [ 1388.450561][ T1290] syz.2.9268 (1290): drop_caches: 2 [ 1388.462817][ T30] audit: type=1400 audit(2000001195.190:2005364): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.502340][ T30] audit: type=1400 audit(2000001195.190:2005365): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.527629][ T30] audit: type=1400 audit(2000001195.190:2005366): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.619255][ T30] audit: type=1400 audit(2000001195.190:2005367): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.630730][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1388.643401][ T30] audit: type=1400 audit(2000001195.190:2005368): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1388.681937][ T5484] audit: audit_lost=159244 audit_rate_limit=0 audit_backlog_limit=64 [ 1388.716045][ T5814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1389.124765][ T1309] __nla_validate_parse: 81 callbacks suppressed [ 1389.124781][ T1309] netlink: 20 bytes leftover after parsing attributes in process `syz.3.9274'. [ 1391.160737][ T1363] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9293'. [ 1391.646677][ T1374] netlink: 'syz.1.9298': attribute type 1 has an invalid length. [ 1391.796853][ T1374] 8021q: adding VLAN 0 to HW filter on device bond60 [ 1391.924046][ T1379] veth127: entered promiscuous mode [ 1391.974371][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1391.998440][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.008503][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.021772][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.032182][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.043894][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.055239][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.078856][ T1385] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9302'. [ 1392.097918][ T1371] vlan4: entered allmulticast mode [ 1392.105137][ T1371] bond60: entered allmulticast mode [ 1392.124068][ T1387] syz.4.9302 (1387): drop_caches: 2 [ 1393.379899][ T30] kauditd_printk_skb: 11477 callbacks suppressed [ 1393.379914][ T30] audit: type=1400 audit(2000001200.190:2014371): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1393.444842][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1393.451580][ T1423] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1393.458128][ T1423] audit: audit_lost=160070 audit_rate_limit=0 audit_backlog_limit=64 [ 1393.486281][ T1423] audit: backlog limit exceeded [ 1393.491327][ T30] audit: type=1400 audit(2000001200.190:2014372): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1393.496953][ T5484] audit: audit_lost=160071 audit_rate_limit=0 audit_backlog_limit=64 [ 1393.515984][ T30] audit: type=1400 audit(2000001200.190:2014373): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1393.547422][ T1423] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1393.554079][ T1423] audit: audit_lost=160072 audit_rate_limit=0 audit_backlog_limit=64 [ 1394.248234][ T1438] 8021q: adding VLAN 0 to HW filter on device bond51 [ 1394.307624][ T1441] veth105: entered promiscuous mode [ 1394.420594][ T1443] __nla_validate_parse: 92 callbacks suppressed [ 1394.420611][ T1443] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9320'. [ 1394.462425][ T1438] vlan1: entered allmulticast mode [ 1394.470006][ T1438] bond51: entered allmulticast mode [ 1394.797316][ T1451] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9323'. [ 1395.742922][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.752016][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.766997][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.819954][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.872539][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.881833][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.897268][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.906424][ T1470] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9329'. [ 1395.938734][ T1476] syz.3.9329 (1476): drop_caches: 2 [ 1398.359871][ T1525] syz.2.9348 (1525): drop_caches: 2 [ 1398.393515][ T30] kauditd_printk_skb: 11074 callbacks suppressed [ 1398.393531][ T30] audit: type=1400 audit(2000001205.210:2024642): avc: denied { read } for pid=1522 comm="syz.4.9349" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1398.463076][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1398.487701][ T5484] audit: audit_lost=160341 audit_rate_limit=0 audit_backlog_limit=64 [ 1398.496608][ T30] audit: type=1400 audit(2000001205.240:2024643): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1398.531467][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1398.549938][ T5484] audit: backlog limit exceeded [ 1398.552884][ T5824] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1398.555087][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1398.572949][ T5484] audit: audit_lost=160342 audit_rate_limit=0 audit_backlog_limit=64 [ 1398.578514][ T5822] audit: audit_lost=160343 audit_rate_limit=0 audit_backlog_limit=64 [ 1400.982505][ T1596] netlink: 'syz.0.9373': attribute type 1 has an invalid length. [ 1401.004570][ T1598] __nla_validate_parse: 167 callbacks suppressed [ 1401.004588][ T1598] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9372'. [ 1401.059051][ T1599] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9373'. [ 1401.079829][ T1599] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9373'. [ 1401.123872][ T1596] 8021q: adding VLAN 0 to HW filter on device bond71 [ 1401.149192][ T1599] veth147: entered promiscuous mode [ 1401.223893][ T1594] vlan4: entered allmulticast mode [ 1401.229110][ T1594] bond71: entered allmulticast mode [ 1402.174825][ T1618] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9380'. [ 1403.276599][ T1645] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9389'. [ 1403.404790][ T30] kauditd_printk_skb: 11200 callbacks suppressed [ 1403.404805][ T30] audit: type=1400 audit(2000001210.210:2034694): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1403.434699][ T30] audit: type=1400 audit(2000001210.230:2034695): avc: denied { read write } for pid=1644 comm="syz.0.9389" name="raw-gadget" dev="devtmpfs" ino=821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1403.465885][ T30] audit: type=1400 audit(2000001210.230:2034696): avc: denied { write } for pid=1644 comm="syz.0.9389" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=0 [ 1403.500825][ T30] audit: type=1400 audit(2000001210.250:2034697): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1403.545502][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1403.554261][ T1653] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1403.560965][ T1653] audit: audit_lost=160727 audit_rate_limit=0 audit_backlog_limit=64 [ 1403.569104][ T5484] audit: audit_lost=160728 audit_rate_limit=0 audit_backlog_limit=64 [ 1403.608387][ T1653] audit: backlog limit exceeded [ 1403.614393][ T5484] audit: backlog limit exceeded [ 1403.788815][ T1656] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9393'. [ 1405.215761][ T1692] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9403'. [ 1405.534164][ T1699] netlink: 'syz.3.9405': attribute type 1 has an invalid length. [ 1405.588777][ T1703] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9405'. [ 1405.622709][ T1704] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9407'. [ 1405.652395][ T1699] 8021q: adding VLAN 0 to HW filter on device bond52 [ 1405.702552][ T1703] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9405'. [ 1405.755878][ T1705] veth107: entered promiscuous mode [ 1405.961633][ T1699] vlan1: entered allmulticast mode [ 1405.978340][ T1699] bond52: entered allmulticast mode [ 1406.217073][ T1716] netlink: 20 bytes leftover after parsing attributes in process `syz.0.9411'. [ 1407.933403][ T1752] netlink: 20 bytes leftover after parsing attributes in process `syz.3.9423'. [ 1407.978657][ T1755] veth149: entered promiscuous mode [ 1408.362221][ T1763] 8021q: adding VLAN 0 to HW filter on device bond61 [ 1408.412028][ T30] kauditd_printk_skb: 9095 callbacks suppressed [ 1408.412044][ T30] audit: type=1400 audit(2000001215.220:2043073): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1408.470119][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1408.487456][ T5484] audit: audit_lost=160969 audit_rate_limit=0 audit_backlog_limit=64 [ 1408.487657][ T1766] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1408.496605][ T5484] audit: backlog limit exceeded [ 1408.510515][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1408.517024][ T5484] audit: audit_lost=160970 audit_rate_limit=0 audit_backlog_limit=64 [ 1408.525498][ T5484] audit: backlog limit exceeded [ 1408.531487][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1408.539768][ T5484] audit: audit_lost=160971 audit_rate_limit=0 audit_backlog_limit=64 [ 1408.552399][ T1763] veth129: entered promiscuous mode [ 1408.810547][ T1771] netlink: 'syz.0.9430': attribute type 1 has an invalid length. [ 1408.901124][ T1771] 8021q: adding VLAN 0 to HW filter on device bond72 [ 1408.910647][ T1774] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9430'. [ 1408.919512][ T1774] netlink: 4 bytes leftover after parsing attributes in process `syz.0.9430'. [ 1408.975458][ T1771] veth151: entered promiscuous mode [ 1409.158716][ T1771] vlan4: entered allmulticast mode [ 1409.221386][ T1771] bond72: entered allmulticast mode [ 1409.423338][ T1785] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9433'. [ 1410.317433][ T1805] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9441'. [ 1412.063700][ T1852] syz.4.9455 (1852): drop_caches: 2 [ 1412.208128][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.226861][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.237906][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.254194][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.278051][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.296288][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.317387][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.358741][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.367817][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.396702][ T1846] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9455'. [ 1412.843788][ T1864] syz.1.9461 (1864): drop_caches: 2 [ 1413.146163][ T1872] veth125: entered promiscuous mode [ 1413.423850][ T30] kauditd_printk_skb: 12308 callbacks suppressed [ 1413.423865][ T30] audit: type=1400 audit(2000001220.240:2052754): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1413.456505][ T30] audit: type=1400 audit(2000001220.270:2052755): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1413.481290][ T30] audit: type=1400 audit(2000001220.270:2052756): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1413.509030][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1413.515979][ T5484] audit: audit_lost=161848 audit_rate_limit=0 audit_backlog_limit=64 [ 1413.524850][ T5484] audit: backlog limit exceeded [ 1413.542650][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1413.549513][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1413.550394][ T5812] audit: audit_lost=161849 audit_rate_limit=0 audit_backlog_limit=64 [ 1413.557458][ T5484] audit: audit_lost=161850 audit_rate_limit=0 audit_backlog_limit=64 [ 1413.666300][ T1888] netlink: 'syz.3.9469': attribute type 1 has an invalid length. [ 1413.852900][ T1888] 8021q: adding VLAN 0 to HW filter on device bond53 [ 1414.038814][ T1887] veth109: entered promiscuous mode [ 1414.123587][ T1889] vlan1: entered allmulticast mode [ 1414.133440][ T1889] bond53: entered allmulticast mode [ 1415.214049][ T1914] veth127: entered promiscuous mode [ 1416.868177][ T1955] netlink: 'syz.3.9487': attribute type 1 has an invalid length. [ 1416.932071][ T1955] 8021q: adding VLAN 0 to HW filter on device bond54 [ 1417.088009][ T1961] veth131: entered promiscuous mode [ 1417.115560][ T1952] veth111: entered promiscuous mode [ 1417.156609][ T1955] vlan1: entered allmulticast mode [ 1417.179124][ T1955] bond54: entered allmulticast mode [ 1418.034014][ T1986] netlink: 'syz.2.9498': attribute type 1 has an invalid length. [ 1418.117949][ T1986] 8021q: adding VLAN 0 to HW filter on device bond43 [ 1418.250482][ T1985] veth83: entered promiscuous mode [ 1418.432240][ T30] kauditd_printk_skb: 11534 callbacks suppressed [ 1418.432256][ T30] audit: type=1400 audit(2000001225.250:2060803): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1418.451716][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1418.467689][ T1994] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1418.474460][ T1994] audit: audit_lost=163013 audit_rate_limit=0 audit_backlog_limit=64 [ 1418.483596][ T1994] audit: backlog limit exceeded [ 1418.487763][ T1985] vlan1: entered allmulticast mode [ 1418.492001][ T5484] audit: audit_lost=163014 audit_rate_limit=0 audit_backlog_limit=64 [ 1418.500418][ T30] audit: type=1400 audit(2000001225.250:2060804): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1418.515058][ T5484] audit: backlog limit exceeded [ 1418.523208][ T1995] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1418.528012][ T1985] bond43: entered allmulticast mode [ 1418.549075][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1418.664204][ T1995] __nla_validate_parse: 185 callbacks suppressed [ 1418.664223][ T1995] netlink: 20 bytes leftover after parsing attributes in process `syz.3.9500'. [ 1420.787311][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.822240][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.832045][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.868374][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.904014][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.914298][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.923470][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.934295][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1420.943265][ T2045] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9518'. [ 1421.036790][ T2049] syz.3.9518 (2049): drop_caches: 2 [ 1422.102355][ T2073] netlink: 'syz.2.9527': attribute type 1 has an invalid length. [ 1422.261474][ T2073] 8021q: adding VLAN 0 to HW filter on device bond44 [ 1422.393294][ T2084] veth85: entered promiscuous mode [ 1422.426569][ T2085] vlan1: entered allmulticast mode [ 1422.436802][ T2085] bond44: entered allmulticast mode [ 1422.562431][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.568750][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 1423.447501][ T30] kauditd_printk_skb: 9084 callbacks suppressed [ 1423.447517][ T30] audit: type=1400 audit(2000001230.260:2069321): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1423.507471][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1423.508693][ T2117] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1423.508788][ T30] audit: type=1400 audit(2000001230.260:2069322): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1423.532891][ T5484] audit: audit_lost=163205 audit_rate_limit=0 audit_backlog_limit=64 [ 1423.550368][ T2117] audit: audit_lost=163206 audit_rate_limit=0 audit_backlog_limit=64 [ 1423.558593][ T2117] audit: backlog limit exceeded [ 1423.585259][ T5484] audit: backlog limit exceeded [ 1423.604250][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1423.615330][ T2119] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1425.554557][ T2162] netlink: 'syz.3.9557': attribute type 1 has an invalid length. [ 1425.707216][ T2169] __nla_validate_parse: 79 callbacks suppressed [ 1425.707233][ T2169] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9558'. [ 1425.888114][ T2162] 8021q: adding VLAN 0 to HW filter on device bond55 [ 1426.046898][ T2170] veth113: entered promiscuous mode [ 1426.118163][ T2176] vlan1: entered allmulticast mode [ 1426.126840][ T2176] bond55: entered allmulticast mode [ 1427.276877][ T2199] netlink: 'syz.4.9570': attribute type 1 has an invalid length. [ 1427.377822][ T2199] 8021q: adding VLAN 0 to HW filter on device bond58 [ 1427.476235][ T2211] netlink: 'syz.2.9573': attribute type 1 has an invalid length. [ 1427.517552][ T2211] 8021q: adding VLAN 0 to HW filter on device bond45 [ 1427.626835][ T2202] veth129: entered promiscuous mode [ 1427.751272][ T2199] vlan2: entered allmulticast mode [ 1427.788245][ T2199] bond58: entered allmulticast mode [ 1427.897986][ T2211] veth87: entered promiscuous mode [ 1427.992673][ T2218] vlan1: entered allmulticast mode [ 1428.031676][ T2218] bond45: entered allmulticast mode [ 1428.449808][ T30] kauditd_printk_skb: 9480 callbacks suppressed [ 1428.449824][ T30] audit: type=1400 audit(2000001235.260:2078181): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1428.484971][ T30] audit: type=1400 audit(2000001235.270:2078182): avc: denied { execmem } for pid=2234 comm="syz.1.9580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1428.507452][ T30] audit: type=1400 audit(2000001235.290:2078183): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1428.534222][ T30] audit: type=1400 audit(2000001235.290:2078184): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1428.598190][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1428.621095][ T5484] audit: audit_lost=163415 audit_rate_limit=0 audit_backlog_limit=64 [ 1428.634445][ T5822] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1428.646813][ T5484] audit: backlog limit exceeded [ 1428.647924][ T2238] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1428.662040][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1429.865563][ T2266] netlink: 'syz.0.9590': attribute type 1 has an invalid length. [ 1430.013454][ T2277] netlink: 20 bytes leftover after parsing attributes in process `syz.2.9592'. [ 1430.098707][ T2266] 8021q: adding VLAN 0 to HW filter on device bond73 [ 1430.188424][ T2274] veth153: entered promiscuous mode [ 1430.226149][ T2276] vlan4: entered allmulticast mode [ 1430.236781][ T2276] bond73: entered allmulticast mode [ 1430.268223][ T2276] BUG: MAX_LOCKDEP_KEYS too low! [ 1430.273181][ T2276] turning off the locking correctness validator. [ 1430.279504][ T2276] CPU: 1 UID: 0 PID: 2276 Comm: syz.0.9590 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full) [ 1430.279530][ T2276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1430.279542][ T2276] Call Trace: [ 1430.279549][ T2276] [ 1430.279556][ T2276] dump_stack_lvl+0x116/0x1f0 [ 1430.279588][ T2276] register_lock_class+0x419/0x4c0 [ 1430.279620][ T2276] __lock_acquire+0xa6/0x1c90 [ 1430.279649][ T2276] ? synchronize_rcu_expedited+0x3b9/0x460 [ 1430.279670][ T2276] lock_acquire+0x179/0x350 [ 1430.279696][ T2276] ? dev_reset_queue+0xa9/0x1d0 [ 1430.279723][ T2276] _raw_spin_lock_bh+0x33/0x40 [ 1430.279745][ T2276] ? dev_reset_queue+0xa9/0x1d0 [ 1430.279770][ T2276] dev_reset_queue+0xa9/0x1d0 [ 1430.279796][ T2276] dev_deactivate_many+0x4e5/0xd50 [ 1430.279826][ T2276] ? __pfx_dev_deactivate_many+0x10/0x10 [ 1430.279856][ T2276] __dev_close_many+0x150/0x770 [ 1430.279877][ T2276] ? __pfx___dev_close_many+0x10/0x10 [ 1430.279897][ T2276] ? exp_funnel_lock+0x363/0x3c0 [ 1430.279923][ T2276] ? __pfx_exp_funnel_lock+0x10/0x10 [ 1430.279951][ T2276] dev_close_many+0x233/0x630 [ 1430.279969][ T2276] ? __pfx___might_resched+0x10/0x10 [ 1430.279993][ T2276] ? __pfx_dev_close_many+0x10/0x10 [ 1430.280013][ T2276] ? synchronize_rcu_expedited+0x28e/0x460 [ 1430.280030][ T2276] ? __pfx_synchronize_rcu_expedited+0x10/0x10 [ 1430.280050][ T2276] netif_close+0x17f/0x230 [ 1430.280068][ T2276] ? __pfx_netif_close+0x10/0x10 [ 1430.280090][ T2276] dev_close+0xaa/0x240 [ 1430.280106][ T2276] bond_enslave+0x14e8/0x60b0 [ 1430.280132][ T2276] ? __pfx_bond_enslave+0x10/0x10 [ 1430.280154][ T2276] ? nlmsg_notify+0xac/0x220 [ 1430.280173][ T2276] ? nlmsg_notify+0x11e/0x220 [ 1430.280190][ T2276] ? rtmsg_ifinfo+0x174/0x1a0 [ 1430.280210][ T2276] ? __pfx___dev_change_flags+0x10/0x10 [ 1430.280235][ T2276] ? register_vlan_dev+0xd6/0x940 [ 1430.280255][ T2276] ? __pfx_bond_enslave+0x10/0x10 [ 1430.280276][ T2276] do_set_master+0x40c/0x730 [ 1430.280300][ T2276] ? rtnl_configure_link+0xc0/0x280 [ 1430.280324][ T2276] rtnl_newlink+0xd63/0x2000 [ 1430.280360][ T2276] ? __pfx_rtnl_newlink+0x10/0x10 [ 1430.280388][ T2276] ? find_held_lock+0x2b/0x80 [ 1430.280411][ T2276] ? avc_has_perm_noaudit+0x117/0x3b0 [ 1430.280432][ T2276] ? avc_has_perm_noaudit+0x149/0x3b0 [ 1430.280451][ T2276] ? cred_has_capability.isra.0+0x193/0x2f0 [ 1430.280482][ T2276] ? find_held_lock+0x2b/0x80 [ 1430.280502][ T2276] ? __pfx_rtnl_newlink+0x10/0x10 [ 1430.280529][ T2276] ? __pfx_rtnl_newlink+0x10/0x10 [ 1430.280554][ T2276] ? rtnetlink_rcv_msg+0x93a/0xe90 [ 1430.280581][ T2276] ? __pfx_rtnl_newlink+0x10/0x10 [ 1430.280607][ T2276] rtnetlink_rcv_msg+0x95b/0xe90 [ 1430.280635][ T2276] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1430.280665][ T2276] ? __lock_acquire+0x622/0x1c90 [ 1430.280693][ T2276] netlink_rcv_skb+0x155/0x420 [ 1430.280711][ T2276] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1430.280739][ T2276] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1430.280761][ T2276] ? netlink_deliver_tap+0x1ae/0xd30 [ 1430.280778][ T2276] ? is_vmalloc_addr+0x86/0xa0 [ 1430.280802][ T2276] netlink_unicast+0x53d/0x7f0 [ 1430.280822][ T2276] ? __pfx_netlink_unicast+0x10/0x10 [ 1430.280844][ T2276] netlink_sendmsg+0x8d1/0xdd0 [ 1430.280863][ T2276] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1430.280885][ T2276] ____sys_sendmsg+0xa95/0xc70 [ 1430.280905][ T2276] ? copy_msghdr_from_user+0x10a/0x160 [ 1430.280931][ T2276] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1430.280953][ T2276] ? __pfx_futex_wake_mark+0x10/0x10 [ 1430.280973][ T2276] ___sys_sendmsg+0x134/0x1d0 [ 1430.280998][ T2276] ? __pfx____sys_sendmsg+0x10/0x10 [ 1430.281022][ T2276] ? __lock_acquire+0x622/0x1c90 [ 1430.281059][ T2276] __sys_sendmsg+0x16d/0x220 [ 1430.281086][ T2276] ? __pfx___sys_sendmsg+0x10/0x10 [ 1430.281111][ T2276] ? __x64_sys_futex+0x1e0/0x4c0 [ 1430.281143][ T2276] do_syscall_64+0xcd/0x4c0 [ 1430.281172][ T2276] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1430.281190][ T2276] RIP: 0033:0x7f4e0198e929 [ 1430.281206][ T2276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1430.281224][ T2276] RSP: 002b:00007f4e027b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1430.281243][ T2276] RAX: ffffffffffffffda RBX: 00007f4e01bb6240 RCX: 00007f4e0198e929 [ 1430.281255][ T2276] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 1430.281266][ T2276] RBP: 00007f4e01a10b39 R08: 0000000000000000 R09: 0000000000000000 [ 1430.281277][ T2276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1430.281288][ T2276] R13: 0000000000000000 R14: 00007f4e01bb6240 R15: 00007ffe556afbd8 [ 1430.281304][ T2276] [ 1430.286327][ T2285] netlink: 'syz.1.9595': attribute type 1 has an invalid length. [ 1430.869034][ T2285] 8021q: adding VLAN 0 to HW filter on device bond62 [ 1430.926306][ T2289] vlan4: entered allmulticast mode [ 1430.938186][ T2289] bond62: entered allmulticast mode [ 1433.459739][ T30] kauditd_printk_skb: 34356 callbacks suppressed [ 1433.459754][ T30] audit: type=1400 audit(2000001240.270:2108326): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.485774][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1433.488219][ T30] audit: type=1400 audit(2000001240.280:2108327): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.494111][ T5484] audit: audit_lost=164822 audit_rate_limit=0 audit_backlog_limit=64 [ 1433.515150][ T30] audit: type=1400 audit(2000001240.280:2108328): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.515187][ T30] audit: type=1400 audit(2000001240.280:2108329): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.515216][ T30] audit: type=1400 audit(2000001240.280:2108330): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.515244][ T30] audit: type=1400 audit(2000001240.280:2108331): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1433.525849][ T5484] audit: backlog limit exceeded [ 1433.572487][ T30] audit: type=1400 audit(2000001240.280:2108332): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1438.470681][ T30] kauditd_printk_skb: 48095 callbacks suppressed [ 1438.470692][ T30] audit: type=1400 audit(2000001245.290:2155000): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1438.485906][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1438.499679][ T30] audit: type=1400 audit(2000001245.290:2155001): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1438.504968][ T5484] audit: audit_lost=165299 audit_rate_limit=0 audit_backlog_limit=64 [ 1438.529612][ T30] audit: type=1400 audit(2000001245.290:2155002): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1438.534343][ T5484] audit: backlog limit exceeded [ 1438.534691][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1438.534702][ T5484] audit: audit_lost=165300 audit_rate_limit=0 audit_backlog_limit=64 [ 1438.534714][ T5484] audit: backlog limit exceeded [ 1438.534778][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 VM DIAGNOSIS: Warning: Permanently added '10.128.1.55' (ED25519) to the list of known hosts. root@10.128.1.55: Permission denied (publickey,password,keyboard-interactive). failed to run ["ssh" "-p" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "IdentitiesOnly=yes" "-o" "BatchMode=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "root@10.128.1.55" "cat" "/proc/lockdep_stats" "/proc/lockdep" "/proc/lockdep_chains"]: exit status 255 Warning: Permanently added '10.128.1.55' (ED25519) to the list of known hosts. root@10.128.1.55: Permission denied (publickey,password,keyboard-interactive).