last executing test programs: 9.564452152s ago: executing program 4 (id=3499): socket$inet_tcp(0x2, 0x1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f00000000c0)=0x7) ptrace$ARCH_FORCE_TAGGED_SVA(0x1e, r1, 0x0, 0x4004) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) fallocate(0xffffffffffffffff, 0x3, 0x80007, 0x8000c60) r4 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000001100), 0x2, 0x0) writev(r4, 0x0, 0x0) ptrace$peek(0x1, r1, 0x0) prlimit64(0x0, 0x2, &(0x7f0000000080)={0x268c, 0xffffffffffffffff}, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) prlimit64(0x0, 0x2, 0x0, &(0x7f0000000000)) setrlimit(0xf, &(0x7f00000000c0)={0x4, 0x1}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000000020101040000311a5f9b86a8dd43000aaf4d198008000100"], 0x20}, 0x1, 0x0, 0x0, 0x24000084}, 0x20044804) 8.629097584s ago: executing program 4 (id=3503): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mkdir(0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x36, &(0x7f0000000480)=ANY=[], 0x8) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x2000, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='batadv0\x00', 0x10) close(0xffffffffffffffff) syz_emit_vhci(&(0x7f0000000280)=@HCI_EVENT_PKT={0x4, @HCI_EV_VENDOR={{0xff, 0x1}, "02"}}, 0x4) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x172f, 0x34, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x2}}}}]}}]}}, 0x0) 8.09828666s ago: executing program 1 (id=3506): r0 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) open_tree(0xffffffffffffffff, 0x0, 0x89901) io_uring_register$IORING_REGISTER_PBUF_RING(0xffffffffffffffff, 0x16, 0x0, 0x1) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x5, 0x0, 0x1, {0x0, 0xea60}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "3fae8a9ad451a727"}}, 0x48}}, 0x0) lseek(0xffffffffffffffff, 0x101, 0x1) getdents64(0xffffffffffffffff, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 7.447792693s ago: executing program 2 (id=3508): r0 = syz_open_dev$vbi(&(0x7f0000000000), 0x0, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000040)={0x0, 0x2, 0x9}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, 0x0) bind$inet(r1, &(0x7f0000001c00)={0x2, 0x4e23, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000001bc0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000300)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x4, 0x0}}]}, &(0x7f0000000540)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, 0x0, 0x0) write$binfmt_misc(r1, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x52, 0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETMODE(r5, 0x4b45, 0xff00) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000200)=@get={0x1, 0x0, 0x9}) unshare(0x4000400) 7.347886204s ago: executing program 2 (id=3509): socket$kcm(0x10, 0x0, 0x10) openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x89}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000300)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0x2b}, {0x3, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x4, 0x78, 0x1, "92022b", 0x3}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xca, 0xf, 0x80, "a0d70d", 0x7}, {@any, 0x8, 0x5, 0xa2, "3b35e8", 0x6}]}}}, 0x2e) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) preadv(r4, &(0x7f0000000200)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000100)=""/42, 0x2a}, {&(0x7f0000000500)=""/197, 0xc5}], 0x4, 0x4, 0x3) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003fc0), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r5, 0xc0044d08, &(0x7f0000000040)=0x45) 7.102203572s ago: executing program 2 (id=3510): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prlimit64(0x0, 0xe, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_clone(0x8000, 0x0, 0xfffffffffffffe7e, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, r1, 0x1, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r3, 0x560e, &(0x7f0000000000)) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000040)={0x9, 0x2, 0x1000, 0x5}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) ioctl$EXT4_IOC_GETFSUUID(0xffffffffffffffff, 0x8008662c, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x11d0}, 0x1, 0x0, 0x0, 0xc084}, 0x24000000) syz_open_dev$tty20(0xc, 0x4, 0x1) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000080)={0x7fffffff}) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x58, 0x10, 0x403, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x74, r4, 0x800, 0x55007}, [@IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x28, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}, @IFLA_BR_MCAST_HASH_ELASTICITY={0x8}, @IFLA_BR_MCAST_QUERY_RESPONSE_INTVL={0xc, 0x22, 0x6}, @IFLA_BR_NF_CALL_IPTABLES={0x5, 0x24, 0x1}]}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x0) 6.874420295s ago: executing program 2 (id=3513): openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0xee31b000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) listen(r4, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r5, 0x0, 0x0) r6 = accept(r3, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r6, 0x0, 0x10) r7 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r7, 0x3b81, &(0x7f0000000680)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r7, 0x3ba0, &(0x7f0000000740)={0x48, 0x2, r8, 0x0, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MD_CHECK_MAP(r7, 0x3ba0, &(0x7f0000000800)={0x48, 0x3, r9, 0x0, 0x1004000, 0x1000, &(0x7f0000ffc000)}) 6.862890625s ago: executing program 1 (id=3515): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x20000, 0x0, 0x27}, &(0x7f00000000c0)=0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock2(&(0x7f0000658000/0x4000)=nil, 0x4000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fsopen(&(0x7f0000000240)='cgroup2\x00', 0x0) syz_open_dev$amidi(&(0x7f00000006c0), 0x3e0, 0x123e81) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="640000000206030004000000000000000000000005000100070000000900020073797a30000000001400078005001500040000000800124000000000050005000a000000050004000000000015000300686173683a69702c706f72742c6e6574"], 0x64}}, 0x10000) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x166) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x2, 0x0, "954f3b91f54aa78eb1ffb374125cd8327f0e152670040f301c1428c4a8511a8be8955942b32b934c23581ae7ac9b12d3215964a4d640754c467c41f36b02a24b627d26ed282dbd5b496e33585ea60e5e"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x22, 0x0, "43cad7b04bde5bbd8035d89034a56bad61a87c614899a37c5d0d7da4d7fc948375f3593dbd21eb7618ffb4ff4984e01eedc37998dd16526edb40eaadabe6cd2bd9f9dfeade7787ea64309c01ae05fb70"}, 0xd8) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r6 = syz_open_dev$video4linux(&(0x7f0000010300), 0xffff, 0x161742) ioctl$VIDIOC_SUBDEV_S_FMT(r6, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x101b, 0x0, 0x0, 0x6, 0x2, 0x1}}) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x85c3}}) 6.801919836s ago: executing program 3 (id=3516): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_io_uring_setup(0xbb, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0x4}, &(0x7f0000000000), &(0x7f0000000100)) io_uring_enter(r2, 0x92, 0x0, 0x0, 0x0, 0xffffffffffffffb6) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0xee31b000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r5, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x10) r6 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r6, 0x3b81, &(0x7f0000000680)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r6, 0x3ba0, &(0x7f0000000740)={0x48, 0x2, r7, 0x0, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MD_CHECK_MAP(r6, 0x3ba0, &(0x7f0000000800)={0x48, 0x3, r8, 0x0, 0x1004000, 0x1000, &(0x7f0000ffc000)}) ioctl$IOMMU_HWPT_SET_DIRTY_TRACKING(r6, 0x3b8b, &(0x7f00000000c0)={0x10, 0x1, r8}) 6.606718964s ago: executing program 3 (id=3517): socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001280), 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000002c0)={0x14, 0x10, 0x3, 0xb, 0x4, 0x2, 0x3, 0x84, 0x1}) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) r3 = syz_io_uring_setup(0x315b, &(0x7f0000000080)={0x0, 0xcfca, 0x1040, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000180), &(0x7f0000000040)) r4 = syz_io_uring_setup(0x891, &(0x7f0000000140)={0x0, 0x8c36, 0x80, 0x2, 0xbfdffdfc}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r4, 0x47f6, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r3, 0xc, 0x0, 0x0) sendmmsg$inet6(r2, 0x0, 0x0, 0x10) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) socket(0x1e, 0x5, 0x0) 5.417819238s ago: executing program 4 (id=3518): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) fsopen(0x0, 0x0) ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000240)={0x1, @raw_data="a425e2f1a54d24f14e56323160608d70566e425a6c36af37b33fac9d31c8a9c7044410d324b03e044e454d2092a62fea8f13441431ce248bfc73a6726ee61ba491d15d8f392ff66fe0b17f0e11f5d2367d5593205ab1efa97d40619a553e7da2518125b850a186ef691daa55c9e50ffaf6ddc25220ded32aeba4524cec1afbd17abba1d15ea05e97ed3dcad452db6e08a991e2c78b057f55de7fdeba7411ce65700c0a1ad7946ff7c355db87566e3e5abb7a37a06731ed19ddfa970bb58a27fd9fa194c092730319"}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$UI_ABS_SETUP(r5, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) write$uinput_user_dev(r5, &(0x7f0000000380)={'syz0\x00', {0xff, 0x6, 0x7fff, 0x8d5}, 0x2, [0x10000, 0xeba, 0x7, 0x9, 0x8, 0x1, 0x6, 0x7ff, 0x54, 0x7fffdfff, 0x6, 0xc, 0x8, 0x9, 0x9, 0xfffffff7, 0x7, 0x40000, 0x842, 0x26, 0x2, 0x0, 0x3ff, 0xfffffff4, 0x1, 0xda6, 0x3, 0xa7, 0x4, 0x2, 0x9, 0x76c9, 0x200, 0x1, 0x1, 0x1, 0x7, 0x80009, 0x1000f, 0xb, 0x9, 0x7ffffffc, 0x9, 0xb50, 0x0, 0x800, 0x3, 0x2000, 0x7, 0xfffffffe, 0xfffffffa, 0x8, 0x24, 0x7fff, 0x8, 0x1, 0x200, 0x0, 0x0, 0x7f, 0x9652, 0x2d5, 0x149, 0x1], [0x266ac, 0xfffffff9, 0x4, 0x3, 0x8e, 0x7, 0x80000001, 0x9, 0x4, 0x85, 0x0, 0x7, 0x6, 0x8001, 0x6, 0x8, 0x2, 0x5, 0xb, 0x7ff, 0x7ff, 0x5, 0x9, 0xc00, 0x89, 0x7ff, 0x0, 0x1, 0x10000, 0x9, 0x9, 0x4d26, 0x10000, 0x8, 0x1, 0x7, 0xfffffffc, 0x4, 0x4c, 0x9, 0x8, 0x5, 0xe66, 0x8, 0x2, 0x81, 0x4b, 0x7d, 0x6, 0xb, 0x4, 0x9, 0x1, 0x8d1, 0x100008fd, 0x1, 0xe0, 0x8e, 0x10001, 0x4, 0x401, 0x8000ade, 0x7f, 0x9], [0x8396, 0x7, 0x10000, 0x9, 0x8000, 0x1, 0x9, 0xe, 0x8, 0xff, 0x0, 0x400, 0x1000, 0x9, 0x6e, 0x8001, 0x7, 0x3, 0x6, 0x5, 0x2, 0xcb, 0x2, 0x3, 0x0, 0x2, 0x8001, 0xc, 0x5, 0xb0f, 0x1e, 0x1, 0x800, 0xffff, 0x9, 0x3, 0xfffffffe, 0xfc, 0x4, 0xe, 0x464b, 0x6, 0x2e7, 0x7ff, 0x1ff, 0x6, 0x7f, 0x2, 0x7fffffff, 0xfffffffe, 0x4, 0xffff, 0xd5d, 0xa0c787d, 0xffffff4e, 0x9, 0x4, 0x40, 0x3, 0x0, 0x1fc1, 0x9, 0x1, 0x6], [0x10000010, 0x7, 0x9, 0x2, 0xa5e, 0xfe, 0xff, 0x6, 0x80000000, 0x0, 0xe, 0x2, 0x4, 0x7, 0x7, 0x0, 0xfffffffd, 0x7ff, 0xdaa, 0x4, 0x3, 0x103, 0x6, 0xcc, 0x6, 0x4000400, 0xffffffff, 0xfffffffb, 0x40, 0x80000004, 0x4, 0x7, 0xfff, 0x4, 0x9, 0x0, 0x9, 0x1, 0x0, 0x7, 0x8ac1, 0x3, 0x1, 0x80000002, 0x80040002, 0xff, 0x6, 0x3, 0xfffff801, 0xffefffff, 0x37d, 0xfffffff8, 0xd, 0x7, 0xd, 0x8, 0x6eaf, 0x0, 0x8, 0x5e02, 0x2, 0x3, 0x5, 0x400]}, 0x45c) ioctl$UI_DEV_CREATE(r5, 0x5501) shutdown(r4, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @rand_addr=0x64010101}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x7a, &(0x7f0000000340)={r6, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x84, &(0x7f00000008c0)={0x0, @in={{0x2, 0x4e24, @empty}}, 0x6, 0x3}, 0x90) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010007000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000048000000090a010400000000000000000100000008000a40000000000900020073797a32000000000900010073797a3000000000080005400000001f0c00098008000140000000075c0000000e0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003"], 0xec}}, 0x0) 5.365536138s ago: executing program 1 (id=3519): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x282, 0x0) r3 = dup(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000007, 0x38011, r3, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sendfile(r3, r2, 0x0, 0x40008) setsockopt$MRT6_INIT(0xffffffffffffffff, 0x29, 0xc8, 0x0, 0x0) ioctl$KVM_CAP_SPLIT_IRQCHIP(0xffffffffffffffff, 0x4068aea3, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020800000100"], 0x18}}, 0x0) io_setup(0x30, &(0x7f0000000600)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000640)={'#! ', '', [{0x20, '/dev/kvm\x00'}, {0x20, '#\'[#($'}, {0x20, '{\xe2'}, {0x20, ']{)\xbb&!\x9d\xb6'}, {0x20, '\xa7\xb1\xc6\xed\x98\bX\xf3\xa0\x9bm\xa8\xf9'}, {0x20, ']-}!]-\\@'}, {0x20, '#! '}], 0xa, "3fb00f1e366121d1024e58cedd0680fdb3c84425e08f71550acc744bb8fc96ed8bc3c2bad49333dd5fbe42b02491b615af994a1bb3056203336d51f082cbd88de8e1fd40173e37c3962c370a856e612e0ea707c90e403692accc34ec523e31a4d5a1bfa8d2c75c097c31b2fbdc3ff0f48e0c2decda1daf5414bff2a91573ccb681931b616cb98a44487b1ae0d8bed1bcbbb4d461d27dab"}, 0xd3) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x2) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) 5.281848668s ago: executing program 3 (id=3520): socket$kcm(0x10, 0x0, 0x10) openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x89}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000300)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0x2b}, {0x3, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x4, 0x78, 0x1, "92022b", 0x3}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xca, 0xf, 0x80, "a0d70d", 0x7}, {@any, 0x8, 0x5, 0xa2, "3b35e8", 0x6}]}}}, 0x2e) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000100)=""/42, 0x2a}, {&(0x7f0000000500)=""/197, 0xc5}], 0x4, 0x4, 0x3) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003fc0), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r4, 0xc0044d08, &(0x7f0000000040)=0x45) 5.122348358s ago: executing program 3 (id=3521): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) shutdown(r1, 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r2 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi3\x00', 0x2000, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='.\x00', 0x5000009) r3 = add_key$user(&(0x7f0000000380), &(0x7f0000000000), &(0x7f0000000400)='_', 0x1, 0xfffffffffffffffe) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000280), 0x22802, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0xd) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r5, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000200), &(0x7f00000005c0)={'syz', 0x0}, &(0x7f0000000440)="e06c4ae7ef7136ce15087f80c205000000c78f7fefa3eda16e95fad0cf9d141135fe43773acde83cfdb8378694577d07acf73a59c43552d0de4c8d3c24a579f98b8710", 0x43, 0xfffffffffffffffd) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140), 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x100) ioctl$COMEDI_INSN(r2, 0x8028640c, &(0x7f0000000000)={0x4000000, 0x92ff, 0x0, 0x0, 0x80000000}) setxattr$security_selinux(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000240)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, 0x0, 0x0) 4.961538207s ago: executing program 0 (id=3522): epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x10000, 0x1, 0x8000000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) epoll_create1(0x0) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000003e000701feffffff00000000017c0000040042800c00018006000600800a0000200002801c000380"], 0x44}, 0x1, 0x0, 0x0, 0x40040c0}, 0xc000) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000000540), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x5) setsockopt$inet_tcp_int(r3, 0x6, 0x19, &(0x7f00000001c0)=0x1, 0x4) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r3, &(0x7f0000004980)=[{{&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="b9cd14c222ee3c0cb001829a8681ed391da1a71d8d", 0x63}], 0x1}}], 0x1, 0x20008000) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000080)=@ccm_128={{0x303}, "f1a0f9fff9e440b4", "881aae83544dfa6412f91b9057e3f415", "9dca43b6", "9ecb592c6ee49fbd"}, 0x28) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) r4 = socket$netlink(0x10, 0x3, 0x10) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/50, 0x32}, {&(0x7f0000000280)=""/203, 0xcb}, {0x0}, {&(0x7f00000003c0)=""/235, 0xeb}, {0x0}, {&(0x7f00000005c0)=""/234, 0xea}], 0x6) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 3.660871486s ago: executing program 3 (id=3523): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) syz_open_dev$video4linux(0x0, 0x8, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000500)=0x1, r4, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x0, @loopback}, {0xa, 0x4e20, 0x0, @mcast1, 0xfffffffd}, r4, 0x40000}}, 0x48) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYBLOB="0100000000000000000001000500050007000000000008000900"], 0x5c}, 0x1, 0x6c}, 0x0) ioctl$EVIOCRMFF(r2, 0x4004550e, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_dev$dri(0x0, 0x1, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x48) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000004a40)=ANY=[@ANYBLOB="c0260000410007010000000007000000027c00000400fc80a72601"], 0x26c0}}, 0x4010) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/timers\x00', 0x0, 0x0) sendfile(r5, r7, 0x0, 0x20000023896) 3.529252234s ago: executing program 0 (id=3524): truncate(&(0x7f0000000100)='./file1\x00', 0x20fdfffffe) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x8b}, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r2) r3 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, [0x0]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r2, 0xc06864b8, &(0x7f00000001c0)={0x0, 0xae, 0x3ff, 0x20203252, 0x0, [r4], [0x2b8]}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0xfffffffffffffc8e) r5 = syz_open_dev$admmidi(&(0x7f00000000c0), 0xb897, 0x8100) fcntl$getown(r5, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) r6 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r6, &(0x7f0000032680)=""/102392, 0x18ff8) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0xffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, 0x0, 0x0, 0x1}, {{@in=@rand_addr=0x64010102, 0x2000000, 0x33}, 0x0, @in6=@loopback, 0x0, 0x3, 0x0, 0xb7, 0x0, 0x8000000}}, 0xe8) sendmmsg(r1, &(0x7f0000007fc0), 0x800001d, 0x0) 3.182573225s ago: executing program 4 (id=3525): socket(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x2008c014) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000002240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000002200)='net/netstat\x00') r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x3, @private1, 0x7}}}, 0x3a) read$FUSE(r2, &(0x7f00000001c0)={0x2020}, 0x2020) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) munmap(&(0x7f000045e000/0x1000)=nil, 0x1000) mremap(&(0x7f0000dde000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000bb3000/0x1000)=nil) mremap(&(0x7f00006bd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000721000/0x4000)=nil) munmap(&(0x7f0000a88000/0x1000)=nil, 0x1000) munmap(&(0x7f000060f000/0x4000)=nil, 0x4000) madvise(&(0x7f0000492000/0x2000)=nil, 0x2000, 0x12) munmap(&(0x7f0000694000/0x3000)=nil, 0x3000) mremap(&(0x7f00007b2000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000968000/0x3000)=nil) madvise(&(0x7f0000a30000/0x3000)=nil, 0x3000, 0x10) 2.766308198s ago: executing program 0 (id=3526): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x4a301, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8d11}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'\x00', 0x400}) write$tun(r0, &(0x7f0000000240)={@val={0x0, 0x1c}, @void, @mpls}, 0x4) 2.617826805s ago: executing program 0 (id=3527): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000040000d9e9e9e9f9ff04ff040500000000000000fc26bf97509909eb000900d3d2573bb66b790ce35af09e9b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x19, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1316}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400010bce) r3 = syz_open_dev$MSR(&(0x7f0000000380), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11000000040000000400000022"], 0x48) r6 = socket(0x2c, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r5, &(0x7f0000000140), &(0x7f0000000080)=@udp=r6}, 0x20) close_range(r4, 0xffffffffffffffff, 0x0) r7 = fsmount(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) shutdown(r4, 0x1) fchdir(r7) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000003f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20}, 0x15) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f0000002340)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x48) bpf$BPF_PROG_DETACH(0x1c, &(0x7f0000000000)={@cgroup=r8, r8, 0x2f, 0x2020, 0x4}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xd, 0x4, 0x8000, 0x0, 0x4, 0xffffffffffffffff, 0x7098, '\x00', 0x0, r8, 0x4, 0x5, 0x2}, 0x50) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_loaded', 0x88600, 0x0) 2.559951783s ago: executing program 2 (id=3528): openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r2 = fsopen(&(0x7f00000001c0)='devpts\x00', 0x0) r3 = socket$inet(0xa, 0x801, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) sendto$inet(r4, &(0x7f00000002c0)="cc", 0x1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000200)='x', 0x1, 0x4000050, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x4}, 0x8) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0xf) fsconfig$FSCONFIG_SET_FLAG(r2, 0x0, &(0x7f0000000040)='ro\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f00000004c0), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200003f, 0x28011, r5, 0x0) setpriority(0x2, 0x0, 0x6) 2.552257608s ago: executing program 0 (id=3529): r0 = open(&(0x7f00000002c0)='./bus\x00', 0x14927e, 0x8) write$cgroup_int(r0, &(0x7f00000000c0)=0xfff, 0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x8000000004) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) socket$netlink(0x10, 0x3, 0x8000000004) writev(r5, &(0x7f0000000180)=[{&(0x7f0000000700)="580000001400add427323b472545b45602117fffffff81000e220e2280007f000001e801000500000000003a", 0x2c}], 0x1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r7 = add_key(&(0x7f0000000000)='big_key\x00', 0x0, &(0x7f0000000240)="956d9a3d", 0x4, 0xfffffffffffffffe) keyctl$read(0xb, r7, &(0x7f0000001300)=""/4096, 0x1000) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(r1, 0x1, 0x4d, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x0) 1.568793636s ago: executing program 4 (id=3530): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x20000, 0x0, 0x27}, &(0x7f00000000c0)=0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock2(&(0x7f0000658000/0x4000)=nil, 0x4000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) fsopen(&(0x7f0000000240)='cgroup2\x00', 0x0) syz_open_dev$amidi(&(0x7f00000006c0), 0x3e0, 0x123e81) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="640000000206030004000000000000000000000005000100070000000900020073797a30000000001400078005001500040000000800124000000000050005000a000000050004000000000015000300686173683a69702c706f72742c6e6574"], 0x64}}, 0x10000) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x166) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x0, 0x2, 0x0, "954f3b91f54aa78eb1ffb374125cd8327f0e152670040f301c1428c4a8511a8be8955942b32b934c23581ae7ac9b12d3215964a4d640754c467c41f36b02a24b627d26ed282dbd5b496e33585ea60e5e"}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x22, 0x0, "43cad7b04bde5bbd8035d89034a56bad61a87c614899a37c5d0d7da4d7fc948375f3593dbd21eb7618ffb4ff4984e01eedc37998dd16526edb40eaadabe6cd2bd9f9dfeade7787ea64309c01ae05fb70"}, 0xd8) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r6 = syz_open_dev$video4linux(&(0x7f0000010300), 0xffff, 0x161742) ioctl$VIDIOC_SUBDEV_S_FMT(r6, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x101b, 0x0, 0x0, 0x6, 0x2, 0x1}}) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x4, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) syz_io_uring_submit(r2, 0x0, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x85c3}}) 1.568130552s ago: executing program 1 (id=3540): mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) 1.498841002s ago: executing program 1 (id=3531): socket$kcm(0x10, 0x0, 0x10) openat$udambuf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2) socket$pppl2tp(0x18, 0x1, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x6, 0x89}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000300)=@HCI_EVENT_PKT={0x4, @inquiry_info={{0x2, 0x2b}, {0x3, [{@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x4, 0x78, 0x1, "92022b", 0x3}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xca, 0xf, 0x80, "a0d70d", 0x7}, {@any, 0x8, 0x5, 0xa2, "3b35e8", 0x6}]}}}, 0x2e) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) preadv(r3, &(0x7f0000000200)=[{&(0x7f0000000140)=""/142, 0x8e}, {&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000100)=""/42, 0x2a}, {&(0x7f0000000500)=""/197, 0xc5}], 0x4, 0x4, 0x3) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000003fc0), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r4, 0xc0044d08, &(0x7f0000000040)=0x45) 1.328145185s ago: executing program 3 (id=3532): ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000180)=0x70) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) quotactl_fd$Q_SYNC(0xffffffffffffffff, 0xffffffff80000100, 0x0, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffc}, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc02864cf, &(0x7f00000001c0)={0x0, 0x0, {}, {0xee00}}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x30e1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x2, 0x80805, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503, 0x40}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ENCODING_SA={0x5, 0x6, 0x7f}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2004d808}, 0x24044810) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="eaa9a5c43208", @remote, @link_local, @broadcast}}}}, 0x0) sendmmsg$inet6(r2, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x173b2a7e, @remote, 0x19}, 0x1c, 0x0, 0x0, &(0x7f00000020c0)=ANY=[@ANYBLOB="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"], 0x590}}], 0x1, 0x28048005) writev(r2, &(0x7f0000000240)=[{&(0x7f00000036c0)="7d29dbe640bf9136", 0x8}, {&(0x7f00000002c0)="7794aa6fde076f17baebfa46123089f865ef3bb07dfb50afbd9267b1954a9ca90be5b079e13fe10a25256b8e5ada738172399dcfd5157ada26a10314f3dc7fbb570fc1471d8a6d885f70b055abd40ade42d87be1abcae749139f1834b139d1f565a4c412f5b68471ede406d4dcc46e7059c7a88c491cc851ef509b81699d73d64ef0178d20bee18f8334f7218b458a11fe195c8a77be928e3295f874761fd42bec042564e485d332e5e458415d92c9d84dd552f3a23be3f0d11d471a", 0xbc}, {&(0x7f0000002680)="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", 0x4fd}], 0x3) 1.081303198s ago: executing program 1 (id=3533): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) ptrace$PTRACE_SETSIGMASK(0x420b, r2, 0x8, &(0x7f00000001c0)={[0x7037da47]}) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x1) r6 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) r7 = dup(r6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r7, 0x2000) shmat(0x0, &(0x7f0000ff1000/0x3000)=nil, 0x400c) r8 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(r7, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6f, &(0x7f0000000100)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5cc2000090780000f704496cf8120a1e32bafc5b597fa95e6e62aa48b82442559eaf6007000000be9a2faaa75e880103000000000000005b1c26644de2ff84a972"], 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r8, 0x3ba0, &(0x7f0000000740)={0x48, 0x2, 0x0, 0x0, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MD_CHECK_MAP(r8, 0x3ba0, &(0x7f0000000800)={0x48, 0x3, r9, 0x0, 0x0, 0x0, &(0x7f0000000200)}) open_by_handle_at(r3, &(0x7f0000000140)=ANY=[@ANYRESHEX, @ANYRES32=r4], 0x10000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) ioctl$KVM_PRE_FAULT_MEMORY(r5, 0xc040aed5, &(0x7f00000000c0)={0xf000, 0x118000}) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 1.064155267s ago: executing program 2 (id=3534): openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000300), 0x40100001, 0x189002) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x4, &(0x7f0000000100)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) madvise(&(0x7f0000248000/0x4000)=nil, 0x4000, 0x9) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getgroups(0x1, &(0x7f0000001080)=[0xffffffffffffffff]) keyctl$setperm(0x5, 0x0, 0x30925) keyctl$KEYCTL_MOVE(0x3, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f00000003c0)='id_resolver\x00', 0x0, &(0x7f0000019200)="916159469e1c5cb0977bd3cb88f01b4caece0fcbe473ba3a1ad6b6895081f08e2cd302defa944fbbe783c1e5a779326709ea7d411b1e38f2a73cdadca99afa48f01ddf4a209b0eb88db582bcde4e3c74950fd8c5448a1580e6e50ad8e7f6abdb0cfbedd3d828901d6dea45041afa96b57e08f88f48ce6e40aa95b5fbfa657913c15d85e5bf22021c60f55df50d04b66797eb88fcf3f145826406b5ebc5d73234cc2950aab8a1c73e6e15df387a4bc38b94adccab5bc72b3a5db850d7ca9468aa1e8e670fcbcd3369747e35de776c568a", 0xd0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x10, 0x2}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000380)={&(0x7f00000000c0)=[0x0], 0x1}) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r5, 0x4b72, &(0x7f0000003340)={0x1, 0x0, 0x1f, 0x1f, 0x19e, &(0x7f0000002f40)}) 453.931612ms ago: executing program 4 (id=3535): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d00000004"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x402000, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r3, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r3, &(0x7f0000000080)="b1", 0x1, 0x400c0d4, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f0000000040)={0x0, 0x200}, 0x8) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x840}, 0x4040080) unshare(0x64000600) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) 0s ago: executing program 0 (id=3536): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mmap(&(0x7f00000fe000/0xd000)=nil, 0xd000, 0x1000005, 0xd2952, 0xffffffffffffffff, 0xfffff000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r5 = fsopen(&(0x7f00000003c0)='gfs2meta\x00', 0x1) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), 0x0) close(r5) ioctl$TUNSETIFF(r4, 0x400454ca, 0x0) ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000080)=0xa) setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) kernel console output (not intermixed with test programs): blank_simulate: vblank timer overrun [ 594.675712][ T5516] audit: audit_lost=30815 audit_rate_limit=0 audit_backlog_limit=64 [ 594.765090][T13588] vxcan3: entered promiscuous mode [ 596.945850][T13628] (unnamed net_device) (uninitialized): (slave batadv0): Device is not our slave [ 596.955261][T13628] (unnamed net_device) (uninitialized): option active_slave: invalid value (batadv0) [ 599.611342][ T30] kauditd_printk_skb: 3552 callbacks suppressed [ 599.611359][ T30] audit: type=1400 audit(1757456001.036:249278): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 599.656840][ T30] audit: type=1400 audit(1757456001.036:249279): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 599.760922][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 599.775420][ T30] audit: type=1400 audit(1757456001.036:249280): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.120086][T13666] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.126709][T13666] audit: audit_lost=30972 audit_rate_limit=0 audit_backlog_limit=64 [ 600.135146][ T5516] audit: audit_lost=30973 audit_rate_limit=0 audit_backlog_limit=64 [ 600.141252][ T30] audit: type=1400 audit(1757456001.036:249281): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 600.169298][ T5516] audit: backlog limit exceeded [ 600.169314][ T30] audit: type=1400 audit(1757456001.036:249282): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 602.200358][T13698] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2284'. [ 602.259848][T13701] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2284'. [ 602.289814][T13701] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2284'. [ 602.327101][T13701] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2284'. [ 602.354907][T13701] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2284'. [ 603.126810][T13716] netlink: 'syz.4.2289': attribute type 10 has an invalid length. [ 603.165774][T13716] mac80211_hwsim hwsim11 wlan1: left allmulticast mode [ 603.348253][T13716] bond0: (slave wlan1): Opening slave failed [ 604.621058][ T30] kauditd_printk_skb: 6303 callbacks suppressed [ 604.621074][ T30] audit: type=1400 audit(1757456006.056:253719): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 604.670903][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 604.682148][ T5516] audit: audit_lost=31596 audit_rate_limit=0 audit_backlog_limit=64 [ 604.692486][ T5516] audit: backlog limit exceeded [ 604.698967][ T30] audit: type=1400 audit(1757456006.056:253720): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 604.721183][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 604.727739][ T5516] audit: audit_lost=31597 audit_rate_limit=0 audit_backlog_limit=64 [ 604.778631][T13734] audit: audit_backlog=65 > audit_backlog_limit=64 [ 604.787627][ T5516] audit: backlog limit exceeded [ 604.792859][T13734] audit: audit_lost=31598 audit_rate_limit=0 audit_backlog_limit=64 [ 608.461252][T13790] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2309'. [ 608.523952][T13790] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2309'. [ 609.106427][T13795] netlink: 48 bytes leftover after parsing attributes in process `syz.3.2312'. [ 609.656858][ T30] kauditd_printk_skb: 3868 callbacks suppressed [ 609.656876][ T30] audit: type=1400 audit(1757456010.996:256896): avc: denied { mounton } for pid=13797 comm="syz.1.2311" path="/438/bus" dev="tmpfs" ino=2298 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 609.762653][ T30] audit: type=1400 audit(1757456010.996:256897): avc: denied { prog_load } for pid=13797 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 609.804779][ T30] audit: type=1400 audit(1757456010.996:256898): avc: denied { prog_load } for pid=13797 comm="syz.1.2311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 609.830719][ T30] audit: type=1400 audit(1757456010.986:256895): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 609.855490][ T30] audit: type=1400 audit(1757456011.186:256899): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 609.879555][ T30] audit: type=1400 audit(1757456011.186:256900): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 609.932698][ T30] audit: type=1400 audit(1757456011.186:256901): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 609.947482][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 609.972180][T13808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 609.980956][ T5516] audit: audit_lost=31830 audit_rate_limit=0 audit_backlog_limit=64 [ 611.805973][T13837] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2320'. [ 611.886866][T13837] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2320'. [ 613.400294][T13861] lo speed is unknown, defaulting to 1000 [ 614.630154][ T51] Bluetooth: hci4: unexpected event for opcode 0x203e [ 614.675130][ T30] kauditd_printk_skb: 3959 callbacks suppressed [ 614.675143][ T30] audit: type=1400 audit(1757456016.106:260024): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 614.703679][ T30] audit: type=1400 audit(1757456016.106:260025): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 614.748937][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.766450][T13878] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.773084][ T30] audit: type=1400 audit(1757456016.106:260026): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 614.795078][ T5516] audit: audit_lost=32110 audit_rate_limit=0 audit_backlog_limit=64 [ 614.807036][T13878] audit: audit_lost=32111 audit_rate_limit=0 audit_backlog_limit=64 [ 614.827779][T13880] audit: audit_backlog=65 > audit_backlog_limit=64 [ 614.834397][T13880] audit: audit_lost=32112 audit_rate_limit=0 audit_backlog_limit=64 [ 614.842706][T13880] audit: backlog limit exceeded [ 615.536560][T13886] bridge4: entered promiscuous mode [ 615.847472][T13896] netlink: 48 bytes leftover after parsing attributes in process `syz.4.2333'. [ 617.065601][T13911] lo speed is unknown, defaulting to 1000 [ 618.694911][T13938] netlink: 'syz.3.2345': attribute type 1 has an invalid length. [ 618.853475][T13938] 8021q: adding VLAN 0 to HW filter on device bond5 [ 618.943501][T13941] ip6tnl1: entered allmulticast mode [ 619.077468][T13941] 8021q: adding VLAN 0 to HW filter on device bond5 [ 619.124356][T13941] bond5: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 619.139631][T13941] bond5: (slave ip6tnl1): Error -95 calling set_mac_address [ 619.701791][ T30] kauditd_printk_skb: 2708 callbacks suppressed [ 619.701832][ T30] audit: type=1400 audit(1757456020.996:262478): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 619.807275][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.815658][T13955] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.822593][ T5516] audit: audit_lost=32198 audit_rate_limit=0 audit_backlog_limit=64 [ 619.833707][ T30] audit: type=1400 audit(1757456021.066:262479): avc: denied { create } for pid=13945 comm="syz.0.2347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 619.836934][T13955] audit: audit_lost=32199 audit_rate_limit=0 audit_backlog_limit=64 [ 619.885982][ T5516] audit: backlog limit exceeded [ 619.914226][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.921516][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.922031][T13955] audit: backlog limit exceeded [ 622.883517][T13995] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2364'. [ 623.742100][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 623.748835][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 624.706873][ T30] kauditd_printk_skb: 6060 callbacks suppressed [ 624.706888][ T30] audit: type=1400 audit(1757456026.136:267864): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 625.006629][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 625.019718][ T5516] audit: audit_lost=32426 audit_rate_limit=0 audit_backlog_limit=64 [ 625.035784][ T30] audit: type=1400 audit(1757456026.266:267865): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 625.259022][ T5516] audit: backlog limit exceeded [ 625.277740][T14028] audit: audit_backlog=65 > audit_backlog_limit=64 [ 625.287666][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 625.318764][ T5516] audit: audit_lost=32427 audit_rate_limit=0 audit_backlog_limit=64 [ 625.522807][T14028] audit: audit_lost=32428 audit_rate_limit=0 audit_backlog_limit=64 [ 625.531436][ T30] audit: type=1400 audit(1757456026.296:267866): avc: denied { name_bind } for pid=14024 comm="syz.1.2371" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 626.585543][T14043] bridge4: entered promiscuous mode [ 626.848952][T14051] snd_dummy snd_dummy.0: control 0:8388608:0:syz0:524289 is already present [ 627.980285][ T51] Bluetooth: hci4: connection err: -111 [ 629.716836][ T30] kauditd_printk_skb: 7407 callbacks suppressed [ 629.716851][ T30] audit: type=1400 audit(1757456031.146:271642): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 629.816046][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 629.841145][ T5516] audit: audit_lost=33639 audit_rate_limit=0 audit_backlog_limit=64 [ 629.854089][ T30] audit: type=1400 audit(1757456031.146:271643): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 629.889122][T14082] audit: audit_backlog=65 > audit_backlog_limit=64 [ 629.895772][ T5516] audit: backlog limit exceeded [ 629.901935][T14082] audit: audit_lost=33640 audit_rate_limit=0 audit_backlog_limit=64 [ 629.912138][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 629.921613][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 629.927600][ T5516] audit: audit_lost=33641 audit_rate_limit=0 audit_backlog_limit=64 [ 632.612568][T14107] netlink: 'syz.3.2390': attribute type 21 has an invalid length. [ 632.620694][T14107] netlink: 156 bytes leftover after parsing attributes in process `syz.3.2390'. [ 633.063575][T14115] bridge6: entered promiscuous mode [ 634.547154][ T5866] libceph: connect (1)[c::]:6789 error -101 [ 634.553190][ T5866] libceph: mon0 (1)[c::]:6789 connect error [ 634.776825][ T30] kauditd_printk_skb: 4409 callbacks suppressed [ 634.776836][ T30] audit: type=1400 audit(1757456036.176:276049): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 634.809115][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 634.815604][ T5516] audit: audit_lost=33643 audit_rate_limit=0 audit_backlog_limit=64 [ 634.825338][T13573] libceph: connect (1)[c::]:6789 error -101 [ 634.834498][T13573] libceph: mon0 (1)[c::]:6789 connect error [ 634.843796][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 634.846059][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 634.891269][ T5846] audit: audit_lost=33644 audit_rate_limit=0 audit_backlog_limit=64 [ 634.897236][ T5516] audit: backlog limit exceeded [ 634.900881][ T5846] audit: backlog limit exceeded [ 634.909101][T14128] ceph: No mds server is up or the cluster is laggy [ 634.917232][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 634.919152][ T30] audit: type=1400 audit(1757456036.176:276050): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 635.411837][T14149] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(6) [ 635.418376][T14149] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 635.439192][T14149] vhci_hcd vhci_hcd.0: Device attached [ 635.676886][ T5866] usb 41-1: new high-speed USB device number 3 using vhci_hcd [ 635.732788][T14151] vhci_hcd: connection closed [ 635.758448][ T1164] vhci_hcd: stop threads [ 635.844730][ T1164] vhci_hcd: release socket [ 635.858950][ T1164] vhci_hcd: disconnect device [ 637.337950][T14172] macvlan1: entered promiscuous mode [ 637.408526][T14172] ipvlan0: entered promiscuous mode [ 637.449229][T14172] ipvlan0: left promiscuous mode [ 637.482457][T14172] macvlan1: left promiscuous mode [ 637.598137][T14178] netlink: 'syz.1.2408': attribute type 1 has an invalid length. [ 637.832349][T14169] netlink: 'syz.4.2406': attribute type 21 has an invalid length. [ 637.895978][T14178] 8021q: adding VLAN 0 to HW filter on device bond3 [ 637.919048][T14181] ip6tnl1: entered allmulticast mode [ 637.968335][T14181] 8021q: adding VLAN 0 to HW filter on device bond3 [ 637.976480][T14181] bond3: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 638.004756][T14181] bond3: (slave ip6tnl1): Error -95 calling set_mac_address [ 638.138739][T14169] netlink: 156 bytes leftover after parsing attributes in process `syz.4.2406'. [ 639.912237][ T30] kauditd_printk_skb: 4887 callbacks suppressed [ 639.912252][ T30] audit: type=1400 audit(1757456041.346:279569): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 639.953072][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 639.966941][ T5516] audit: audit_lost=34102 audit_rate_limit=0 audit_backlog_limit=64 [ 639.989496][ T5516] audit: backlog limit exceeded [ 639.997744][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.018956][T14220] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.041836][ T5516] audit: audit_lost=34103 audit_rate_limit=0 audit_backlog_limit=64 [ 640.053116][ T30] audit: type=1400 audit(1757456041.346:279570): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 640.101862][ T5516] audit: backlog limit exceeded [ 640.119537][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.819746][T14229] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 640.937074][ T5866] vhci_hcd: vhci_device speed not set [ 642.577755][T14258] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 643.011216][T14269] PKCS8: Unsupported PKCS#8 version [ 644.098800][T14279] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14279 comm=syz.1.2435 [ 644.694488][ T5866] libceph: connect (1)[c::]:6789 error -101 [ 644.702387][ T5866] libceph: mon0 (1)[c::]:6789 connect error [ 645.014173][ T5866] libceph: connect (1)[c::]:6789 error -101 [ 645.026928][ T5866] libceph: mon0 (1)[c::]:6789 connect error [ 645.067212][ T30] kauditd_printk_skb: 9957 callbacks suppressed [ 645.067223][ T30] audit: type=1400 audit(1757456046.246:282387): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 645.104597][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.207798][ T5516] audit: audit_lost=36485 audit_rate_limit=0 audit_backlog_limit=64 [ 645.231772][ T5516] audit: backlog limit exceeded [ 645.241362][ T30] audit: type=1400 audit(1757456046.246:282388): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 645.262900][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.278881][ T5516] audit: audit_lost=36486 audit_rate_limit=0 audit_backlog_limit=64 [ 645.324496][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.347171][ T5516] audit: backlog limit exceeded [ 645.352103][ T5846] audit: audit_lost=36487 audit_rate_limit=0 audit_backlog_limit=64 [ 645.429725][T14286] ceph: No mds server is up or the cluster is laggy [ 645.833032][T14293] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2437'. [ 646.317609][T14301] team0: Device gtp1 is of different type [ 646.844666][T14305] 8021q: adding VLAN 0 to HW filter on device bond2 [ 648.732845][T14342] IPv6: NLM_F_CREATE should be specified when creating new route [ 649.651580][T14350] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2454'. [ 649.902186][T14354] vlan3: entered allmulticast mode [ 649.921735][T14354] bond0: entered allmulticast mode [ 650.093894][ T30] kauditd_printk_skb: 6133 callbacks suppressed [ 650.093910][ T30] audit: type=1400 audit(1757456051.496:288281): avc: denied { bpf } for pid=14352 comm="syz.2.2457" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 650.137882][T14354] bond_slave_0: entered allmulticast mode [ 650.185637][T14354] bond_slave_1: entered allmulticast mode [ 650.202991][ T30] audit: type=1400 audit(1757456051.496:288282): avc: denied { create } for pid=14352 comm="syz.2.2457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 650.556161][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 650.566333][ T5516] audit: audit_lost=36568 audit_rate_limit=0 audit_backlog_limit=64 [ 650.582942][ T5516] audit: backlog limit exceeded [ 650.600206][ T30] audit: type=1400 audit(1757456051.496:288283): avc: denied { create } for pid=14352 comm="syz.2.2457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 650.622356][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 650.713889][ T5516] audit: audit_lost=36569 audit_rate_limit=0 audit_backlog_limit=64 [ 650.722171][ T5516] audit: backlog limit exceeded [ 650.728603][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 650.750217][T14368] netlink: 'syz.0.2459': attribute type 10 has an invalid length. [ 650.828879][T14368] bond0: (slave netdevsim0): Releasing backup interface [ 650.932802][T14368] team0: Port device netdevsim0 added [ 651.732425][T14379] kernel profiling enabled (shift: 7) [ 653.367678][T14405] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2469'. [ 653.379379][T14405] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2469'. [ 655.096946][ T30] kauditd_printk_skb: 3891 callbacks suppressed [ 655.096959][ T30] audit: type=1400 audit(1757456056.506:291267): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 655.224764][ T30] audit: type=1400 audit(1757456056.536:291268): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 655.293065][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 655.319318][T14437] audit: audit_backlog=65 > audit_backlog_limit=64 [ 655.332409][T14437] audit: audit_lost=36873 audit_rate_limit=0 audit_backlog_limit=64 [ 655.341130][ T5516] audit: audit_lost=36874 audit_rate_limit=0 audit_backlog_limit=64 [ 655.360691][ T5516] audit: backlog limit exceeded [ 655.370821][T14437] audit: backlog limit exceeded [ 655.374102][ T30] audit: type=1400 audit(1757456056.536:291269): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 655.399645][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 656.060417][T14442] lo speed is unknown, defaulting to 1000 [ 656.513160][T14454] geneve2: entered promiscuous mode [ 656.523025][T14454] geneve2: entered allmulticast mode [ 659.963488][T14486] lo speed is unknown, defaulting to 1000 [ 660.478523][ T30] kauditd_printk_skb: 7971 callbacks suppressed [ 660.478539][ T30] audit: type=1400 audit(1757456061.536:295549): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 660.658660][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 660.676878][ T5516] audit: audit_lost=38106 audit_rate_limit=0 audit_backlog_limit=64 [ 660.699435][ T5516] audit: backlog limit exceeded [ 660.704347][ T30] audit: type=1400 audit(1757456061.916:295550): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 660.726066][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 660.763015][ T5516] audit: audit_lost=38107 audit_rate_limit=0 audit_backlog_limit=64 [ 660.768035][T14491] audit: audit_backlog=65 > audit_backlog_limit=64 [ 660.777599][T14491] audit: audit_lost=38108 audit_rate_limit=0 audit_backlog_limit=64 [ 660.785605][T14491] audit: backlog limit exceeded [ 662.548463][T14512] netlink: 'syz.3.2497': attribute type 4 has an invalid length. [ 665.489024][ T30] kauditd_printk_skb: 7640 callbacks suppressed [ 665.489036][ T30] audit: type=1400 audit(1757456066.926:301042): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 665.534343][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 665.548372][ T5516] audit: audit_lost=38825 audit_rate_limit=0 audit_backlog_limit=64 [ 665.556627][ T30] audit: type=1400 audit(1757456066.956:301043): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 665.746819][ T5516] audit: backlog limit exceeded [ 665.776901][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 665.803885][ T5516] audit: audit_lost=38826 audit_rate_limit=0 audit_backlog_limit=64 [ 665.815242][ T30] audit: type=1400 audit(1757456066.956:301044): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 665.856900][ T5516] audit: backlog limit exceeded [ 665.867175][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 669.661011][ T9405] libceph: connect (1)[c::]:6789 error -101 [ 669.667342][ T9405] libceph: mon0 (1)[c::]:6789 connect error [ 669.752015][T14600] ceph: No mds server is up or the cluster is laggy [ 669.976938][ T9405] libceph: connect (1)[c::]:6789 error -101 [ 669.982946][ T9405] libceph: mon0 (1)[c::]:6789 connect error [ 670.496987][ T30] kauditd_printk_skb: 8683 callbacks suppressed [ 670.497105][ T30] audit: type=1400 audit(1757456071.936:309447): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 670.718590][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 670.769149][ T5516] audit: audit_lost=38921 audit_rate_limit=0 audit_backlog_limit=64 [ 670.825211][ T30] audit: type=1400 audit(1757456071.936:309448): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 670.846634][ T5516] audit: backlog limit exceeded [ 670.858007][T14621] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2523'. [ 670.976062][ T30] audit: type=1400 audit(1757456071.936:309449): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.024705][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 671.026688][ T30] audit: type=1400 audit(1757456071.936:309450): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 671.094752][T14624] audit: audit_backlog=65 > audit_backlog_limit=64 [ 671.108398][T14624] audit: audit_lost=38922 audit_rate_limit=0 audit_backlog_limit=64 [ 673.655133][T14646] lo speed is unknown, defaulting to 1000 [ 673.669215][T14651] bridge0: entered promiscuous mode [ 673.701378][T14651] macsec1: entered promiscuous mode [ 673.714995][T14651] bridge0: port 1(macsec1) entered blocking state [ 673.735066][T14651] bridge0: port 1(macsec1) entered disabled state [ 673.772060][T14651] macsec1: entered allmulticast mode [ 673.778587][T14651] bridge0: entered allmulticast mode [ 673.820558][T14651] macsec1: left allmulticast mode [ 673.826642][T14651] bridge0: left allmulticast mode [ 673.850126][T14651] bridge0: left promiscuous mode [ 675.377680][ T6546] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 20001 - 0 [ 675.391291][ T6546] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 20001 - 0 [ 675.415518][ T6546] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 20001 - 0 [ 675.515139][ T30] kauditd_printk_skb: 6148 callbacks suppressed [ 675.515155][ T30] audit: type=1400 audit(1757456076.876:314903): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.543423][ T6167] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 20001 - 0 [ 675.547108][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 675.569121][ T30] audit: type=1400 audit(1757456076.876:314904): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.590567][ T30] audit: type=1400 audit(1757456076.876:314905): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.590969][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 675.617017][ T30] audit: type=1400 audit(1757456076.876:314906): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.639658][ T30] audit: type=1400 audit(1757456076.876:314907): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.661654][ T30] audit: type=1400 audit(1757456076.876:314908): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.909314][T14671] ceph: No mds server is up or the cluster is laggy [ 675.920612][ T30] audit: type=1400 audit(1757456076.876:314909): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 675.928416][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 676.014043][T14677] audit: audit_backlog=65 > audit_backlog_limit=64 [ 676.020828][ T30] audit: type=1400 audit(1757456076.926:314910): avc: denied { create } for pid=14670 comm="syz.0.2538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 676.331342][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 676.406961][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 680.340385][T14748] batman_adv: batadv0: Adding interface: dummy0 [ 680.346900][T14748] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 680.405292][T14748] batman_adv: batadv0: Interface activated: dummy0 [ 680.526532][ T5516] audit_log_start: 5738 callbacks suppressed [ 680.526542][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 680.547901][ T30] audit: type=1400 audit(1757456081.946:319304): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 680.570061][ T5516] audit: audit_lost=39604 audit_rate_limit=0 audit_backlog_limit=64 [ 680.597135][ T5516] audit: backlog limit exceeded [ 680.609007][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 680.636373][ T5516] audit: audit_lost=39605 audit_rate_limit=0 audit_backlog_limit=64 [ 680.650260][ T30] audit: type=1400 audit(1757456081.946:319305): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 680.668457][ T5516] audit: backlog limit exceeded [ 680.687203][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 680.703906][ T5516] audit: audit_lost=39606 audit_rate_limit=0 audit_backlog_limit=64 [ 682.571097][T14779] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2564'. [ 685.257223][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.263600][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 685.527361][ T30] kauditd_printk_skb: 7437 callbacks suppressed [ 685.527372][ T30] audit: type=1400 audit(1757456086.966:323202): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 685.560119][T14813] netlink: 'syz.2.2572': attribute type 10 has an invalid length. [ 685.568669][T14813] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2572'. [ 685.621057][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.633906][T14813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.647448][ T5516] audit: audit_lost=40787 audit_rate_limit=0 audit_backlog_limit=64 [ 685.669229][ T5516] audit: backlog limit exceeded [ 685.675520][ T30] audit: type=1400 audit(1757456086.986:323203): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 685.698422][T14813] audit: audit_lost=40788 audit_rate_limit=0 audit_backlog_limit=64 [ 685.699700][T14814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.723178][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 685.736387][T14814] audit: audit_lost=40789 audit_rate_limit=0 audit_backlog_limit=64 [ 686.951849][T14829] lo speed is unknown, defaulting to 1000 [ 690.569263][ T30] kauditd_printk_skb: 8215 callbacks suppressed [ 690.569278][ T30] audit: type=1400 audit(1757456092.006:326879): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 690.656559][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 690.671211][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 690.809118][ T5846] audit: audit_lost=42303 audit_rate_limit=0 audit_backlog_limit=64 [ 690.856842][ T5516] audit: audit_lost=42304 audit_rate_limit=0 audit_backlog_limit=64 [ 690.868773][ T5846] audit: backlog limit exceeded [ 690.877331][ T5516] audit: backlog limit exceeded [ 690.976486][ T30] audit: type=1400 audit(1757456092.006:326880): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 691.023190][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 691.035179][ T5516] audit: audit_lost=42305 audit_rate_limit=0 audit_backlog_limit=64 [ 692.085618][T14861] netlink: 'syz.0.2580': attribute type 21 has an invalid length. [ 692.093643][T14861] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2580'. [ 692.253887][T14860] netlink: 'syz.0.2580': attribute type 21 has an invalid length. [ 692.286097][T14860] netlink: 156 bytes leftover after parsing attributes in process `syz.0.2580'. [ 693.462144][ T51] Bluetooth: hci4: Malformed Event: 0x02 [ 695.589030][ T30] kauditd_printk_skb: 4261 callbacks suppressed [ 695.589045][ T30] audit: type=1400 audit(1757456097.026:329794): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 695.658544][ T30] audit: type=1400 audit(1757456097.056:329795): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 695.679924][ T30] audit: type=1400 audit(1757456097.056:329796): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 695.701146][ T30] audit: type=1400 audit(1757456097.056:329797): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 695.722394][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 695.722410][ T5516] audit: audit_lost=42755 audit_rate_limit=0 audit_backlog_limit=64 [ 695.722422][ T5516] audit: backlog limit exceeded [ 695.722469][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 695.722480][ T5516] audit: audit_lost=42756 audit_rate_limit=0 audit_backlog_limit=64 [ 695.722491][ T5516] audit: backlog limit exceeded [ 697.594450][T14962] lo speed is unknown, defaulting to 1000 [ 699.628163][T14984] gretap1: left promiscuous mode [ 699.753655][T14984] bridge4: left promiscuous mode [ 700.626897][ T30] kauditd_printk_skb: 3297 callbacks suppressed [ 700.626913][ T30] audit: type=1400 audit(1757456102.056:332858): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 700.636385][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 700.665818][ T5516] audit: audit_lost=42836 audit_rate_limit=0 audit_backlog_limit=64 [ 701.036819][ T5516] audit: backlog limit exceeded [ 701.052046][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 701.139462][ T5516] audit: audit_lost=42837 audit_rate_limit=0 audit_backlog_limit=64 [ 701.156115][ T5516] audit: backlog limit exceeded [ 701.171734][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 701.178825][ T30] audit: type=1400 audit(1757456102.066:332859): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 701.227372][ T5516] audit: audit_lost=42838 audit_rate_limit=0 audit_backlog_limit=64 [ 701.580437][T15008] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2615'. [ 701.591286][T15008] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2615'. [ 702.249573][T15015] bridge3: entered promiscuous mode [ 704.380163][T15030] lo speed is unknown, defaulting to 1000 [ 705.715116][ T30] kauditd_printk_skb: 1868 callbacks suppressed [ 705.715127][ T30] audit: type=1400 audit(1757456107.146:334727): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 705.799799][ T30] audit: type=1400 audit(1757456107.146:334728): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 705.874991][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 705.878989][ T30] audit: type=1400 audit(1757456107.146:334729): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 705.894533][ T5516] audit: audit_lost=42839 audit_rate_limit=0 audit_backlog_limit=64 [ 705.955560][ T5516] audit: backlog limit exceeded [ 705.965468][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 705.967111][T15055] audit: audit_backlog=65 > audit_backlog_limit=64 [ 705.989899][ T30] audit: type=1400 audit(1757456107.146:334730): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 705.999951][ T5516] audit: audit_lost=42840 audit_rate_limit=0 audit_backlog_limit=64 [ 706.516035][T15061] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2628'. [ 708.560835][T15086] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2632'. [ 708.570198][T15086] netlink: 16 bytes leftover after parsing attributes in process `syz.4.2632'. [ 708.830806][T15092] ptrace attach of ""[15093] was attempted by "./syz-executor exec"[15092] [ 710.716931][ T30] kauditd_printk_skb: 2968 callbacks suppressed [ 710.716971][ T30] audit: type=1400 audit(1757456112.156:337696): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 710.812155][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 710.899249][ T5516] audit: audit_lost=42842 audit_rate_limit=0 audit_backlog_limit=64 [ 710.915355][ T30] audit: type=1400 audit(1757456112.176:337697): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 711.097582][ T5516] audit: backlog limit exceeded [ 711.107664][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 711.115458][ T5516] audit: audit_lost=42843 audit_rate_limit=0 audit_backlog_limit=64 [ 711.161774][ T5516] audit: backlog limit exceeded [ 711.172857][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 711.192035][ T5516] audit: audit_lost=42844 audit_rate_limit=0 audit_backlog_limit=64 [ 711.505807][T13573] IPVS: starting estimator thread 0... [ 711.597816][T15114] IPVS: using max 46 ests per chain, 110400 per kthread [ 713.877582][T15136] geneve2: entered promiscuous mode [ 713.882839][T15136] geneve2: entered allmulticast mode [ 715.792515][ T30] kauditd_printk_skb: 3245 callbacks suppressed [ 715.792531][ T30] audit: type=1400 audit(1757456117.226:340621): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.015913][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.039416][ T5516] audit: audit_lost=42952 audit_rate_limit=0 audit_backlog_limit=64 [ 716.068733][ T30] audit: type=1400 audit(1757456117.256:340622): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.126769][ T5516] audit: backlog limit exceeded [ 716.137000][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.154564][ T5516] audit: audit_lost=42953 audit_rate_limit=0 audit_backlog_limit=64 [ 716.178632][ T5516] audit: backlog limit exceeded [ 716.186978][ T30] audit: type=1400 audit(1757456117.256:340623): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 716.215335][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 716.392198][T15159] bridge_slave_1: left allmulticast mode [ 716.424854][T15159] bridge_slave_1: left promiscuous mode [ 716.442827][T15159] bridge0: port 2(bridge_slave_1) entered disabled state [ 716.496252][T15159] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 717.054806][ T51] Bluetooth: hci4: unexpected event 0x09 length: 6 > 3 [ 718.470685][T15202] ip6gretap0: entered allmulticast mode [ 718.790821][T15202] bond0: (slave ip6gretap0): Error: Slave does not support XDP [ 719.430328][T15219] netlink: 88 bytes leftover after parsing attributes in process `syz.3.2669'. [ 719.478897][T15219] netlink: 'syz.3.2669': attribute type 21 has an invalid length. [ 719.490437][T15219] netlink: 128 bytes leftover after parsing attributes in process `syz.3.2669'. [ 719.501266][T15219] netlink: 'syz.3.2669': attribute type 4 has an invalid length. [ 719.516423][T15219] netlink: 3 bytes leftover after parsing attributes in process `syz.3.2669'. [ 719.584821][T15219] batadv1: entered promiscuous mode [ 719.604075][T15219] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 720.936846][ T30] kauditd_printk_skb: 10203 callbacks suppressed [ 720.936863][ T30] audit: type=1400 audit(1757456122.206:344852): avc: denied { write } for pid=15233 comm="syz.1.2674" name="001" dev="devtmpfs" ino=742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 720.973001][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 720.990875][ T5516] audit: audit_lost=44946 audit_rate_limit=0 audit_backlog_limit=64 [ 721.011934][ T5516] audit: backlog limit exceeded [ 721.028149][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 721.043437][ T5516] audit: audit_lost=44947 audit_rate_limit=0 audit_backlog_limit=64 [ 721.072354][ T30] audit: type=1400 audit(1757456122.356:344853): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 721.113815][ T5516] audit: backlog limit exceeded [ 721.158868][ T30] audit: type=1400 audit(1757456122.356:344854): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 721.184122][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.019970][T13573] IPVS: starting estimator thread 0... [ 724.116893][T15284] IPVS: using max 76 ests per chain, 182400 per kthread [ 724.990269][T15296] trusted_key: encrypted_key: insufficient parameters specified [ 726.015727][ T30] kauditd_printk_skb: 3357 callbacks suppressed [ 726.015743][ T30] audit: type=1400 audit(1757456127.446:347304): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.154553][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.200524][ T5516] audit: audit_lost=45251 audit_rate_limit=0 audit_backlog_limit=64 [ 726.208900][ T30] audit: type=1400 audit(1757456127.476:347305): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.244379][ T5516] audit: backlog limit exceeded [ 726.316320][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 726.323143][ T5516] audit: audit_lost=45252 audit_rate_limit=0 audit_backlog_limit=64 [ 726.337090][ T30] audit: type=1400 audit(1757456127.476:347306): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 726.369871][ T5516] audit: backlog limit exceeded [ 726.375125][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.018554][ T30] kauditd_printk_skb: 3688 callbacks suppressed [ 731.018745][ T30] audit: type=1400 audit(1757456132.446:350711): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.081847][ T30] audit: type=1400 audit(1757456132.446:350712): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.105451][ T30] audit: type=1400 audit(1757456132.446:350713): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.240176][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.240650][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 731.263756][ T5845] audit: audit_lost=45348 audit_rate_limit=0 audit_backlog_limit=64 [ 731.274470][ T5845] audit: backlog limit exceeded [ 731.290387][ T30] audit: type=1400 audit(1757456132.446:350714): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.313995][ T30] audit: type=1400 audit(1757456132.446:350715): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.340052][ T30] audit: type=1400 audit(1757456132.446:350716): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 731.698411][T15390] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2713'. [ 733.153287][T15403] netlink: 'syz.4.2718': attribute type 12 has an invalid length. [ 736.176413][ T30] kauditd_printk_skb: 5212 callbacks suppressed [ 736.176430][ T30] audit: type=1400 audit(1757456137.516:355859): avc: denied { prog_load } for pid=15428 comm="syz.3.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 736.307549][ T30] audit: type=1400 audit(1757456137.586:355860): avc: denied { execute } for pid=15428 comm="syz.3.2725" name="file0" dev="tmpfs" ino=2875 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 737.072247][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 737.089732][ T5516] audit: audit_lost=45373 audit_rate_limit=0 audit_backlog_limit=64 [ 737.091603][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 737.162793][ T5846] audit: audit_lost=45374 audit_rate_limit=0 audit_backlog_limit=64 [ 737.178419][ T5846] audit: backlog limit exceeded [ 737.188336][ T5516] audit: backlog limit exceeded [ 737.209856][ T30] audit: type=1400 audit(1757456137.606:355861): avc: denied { read write } for pid=5845 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 737.266781][ T30] audit: type=1400 audit(1757456137.466:355858): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 737.691899][T15453] ptrace attach of "./syz-executor exec"[5846] was attempted by "./syz-executor exec"[15453] [ 737.719871][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 737.725937][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 737.740628][T15450] ceph: No mds server is up or the cluster is laggy [ 741.189184][ T30] kauditd_printk_skb: 2569 callbacks suppressed [ 741.189197][ T30] audit: type=1400 audit(1757456142.626:358290): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 741.235388][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 741.246790][ T30] audit: type=1400 audit(1757456142.626:358291): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 741.269210][ T5516] audit: audit_lost=45422 audit_rate_limit=0 audit_backlog_limit=64 [ 741.286801][ T5516] audit: backlog limit exceeded [ 741.291751][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 741.298616][ T30] audit: type=1400 audit(1757456142.626:358292): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 741.321053][ T5516] audit: audit_lost=45423 audit_rate_limit=0 audit_backlog_limit=64 [ 741.330406][ T5516] audit: backlog limit exceeded [ 741.335492][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 742.484749][T13573] libceph: connect (1)[c::]:6789 error -101 [ 742.490783][T13573] libceph: mon0 (1)[c::]:6789 connect error [ 742.498494][T13573] libceph: connect (1)[c::]:6789 error -101 [ 742.504463][T13573] libceph: mon0 (1)[c::]:6789 connect error [ 742.515925][T15518] ceph: No mds server is up or the cluster is laggy [ 743.343230][T15537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15537 comm=syz.3.2750 [ 743.616303][T15551] netlink: 'syz.4.2751': attribute type 12 has an invalid length. [ 746.310141][ T30] kauditd_printk_skb: 4002 callbacks suppressed [ 746.310158][ T30] audit: type=1400 audit(1757456147.316:362290): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.627105][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.633409][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 746.636511][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 746.671348][ T30] audit: type=1400 audit(1757456147.316:362291): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.709308][ T30] audit: type=1400 audit(1757456147.316:362292): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.718823][ T5516] audit: audit_lost=45426 audit_rate_limit=0 audit_backlog_limit=64 [ 746.730736][ T30] audit: type=1400 audit(1757456147.316:362293): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.760153][ T30] audit: type=1400 audit(1757456147.316:362294): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 746.781685][ T30] audit: type=1400 audit(1757456147.336:362295): avc: denied { prog_load } for pid=15574 comm="syz.2.2760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 746.982192][ T30] audit: type=1400 audit(1757456147.806:362296): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 747.030458][ T30] audit: type=1400 audit(1757456147.806:362297): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.506750][ T30] kauditd_printk_skb: 3914 callbacks suppressed [ 751.506784][ T30] audit: type=1400 audit(1757456152.786:365005): avc: denied { create } for pid=15640 comm="syz.3.2777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 751.784988][ T30] audit: type=1400 audit(1757456153.136:365006): avc: denied { name_bind } for pid=15636 comm="syz.4.2776" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 751.832156][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 751.889668][T15651] audit: audit_backlog=65 > audit_backlog_limit=64 [ 751.896219][T15651] audit: audit_lost=45829 audit_rate_limit=0 audit_backlog_limit=64 [ 751.904284][T15651] audit: backlog limit exceeded [ 751.926313][ T5516] audit: audit_lost=45830 audit_rate_limit=0 audit_backlog_limit=64 [ 751.929605][T15637] audit: audit_backlog=65 > audit_backlog_limit=64 [ 751.967208][ T30] audit: type=1400 audit(1757456153.136:365007): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 751.978832][T15637] audit: audit_lost=45831 audit_rate_limit=0 audit_backlog_limit=64 [ 754.608885][T15686] bridge4: entered promiscuous mode [ 756.523107][ T30] kauditd_printk_skb: 4640 callbacks suppressed [ 756.523118][ T30] audit: type=1326 audit(1757456157.956:367912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15695 comm="syz.4.2788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f83feb85b67 code=0x7ffc0000 [ 756.581152][ T30] audit: type=1326 audit(1757456157.956:367913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15695 comm="syz.4.2788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f83feb2ada9 code=0x7ffc0000 [ 756.608815][ T30] audit: type=1326 audit(1757456157.956:367914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15695 comm="syz.4.2788" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f83feb8eba9 code=0x7ffc0000 [ 756.666314][ T30] audit: type=1400 audit(1757456157.996:367915): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 756.667330][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 756.690900][T15702] audit: audit_backlog=65 > audit_backlog_limit=64 [ 756.702863][T15702] audit: audit_lost=46410 audit_rate_limit=0 audit_backlog_limit=64 [ 756.711616][T15702] audit: backlog limit exceeded [ 756.726606][T15702] audit: audit_backlog=65 > audit_backlog_limit=64 [ 756.734576][T15702] audit: audit_lost=46411 audit_rate_limit=0 audit_backlog_limit=64 [ 757.891316][T15712] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 759.182739][T15737] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2797'. [ 759.192481][T15736] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2797'. [ 761.530386][ T30] kauditd_printk_skb: 6097 callbacks suppressed [ 761.530401][ T30] audit: type=1400 audit(1757456162.966:372732): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 761.627383][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 761.654157][ T30] audit: type=1400 audit(1757456162.966:372733): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 761.687014][ T5516] audit: audit_lost=46839 audit_rate_limit=0 audit_backlog_limit=64 [ 761.719518][ T5516] audit: backlog limit exceeded [ 761.757178][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 761.775006][ T30] audit: type=1400 audit(1757456163.006:372734): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 761.814614][ T5516] audit: audit_lost=46840 audit_rate_limit=0 audit_backlog_limit=64 [ 761.844668][ T5516] audit: backlog limit exceeded [ 761.854999][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 762.862034][T15785] bridge8: entered promiscuous mode [ 763.521564][T15793] lo speed is unknown, defaulting to 1000 [ 764.824900][T15804] geneve2: entered promiscuous mode [ 764.861245][T15804] geneve2: entered allmulticast mode [ 765.340144][T15811] netlink: 24 bytes leftover after parsing attributes in process `syz.4.2815'. [ 765.503389][T15815] netlink: 32 bytes leftover after parsing attributes in process `syz.4.2815'. [ 766.558401][ T30] kauditd_printk_skb: 5423 callbacks suppressed [ 766.558419][ T30] audit: type=1400 audit(1757456167.966:377952): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 766.622617][T15832] ptrace attach of ""[15833] was attempted by "./syz-executor exec"[15832] [ 766.693046][ T30] audit: type=1400 audit(1757456167.966:377953): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.436021][ T30] audit: type=1400 audit(1757456167.966:377954): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.482347][ T30] audit: type=1400 audit(1757456167.966:377955): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.716772][ T30] audit: type=1400 audit(1757456167.966:377956): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.821554][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 767.846145][ T5516] audit: audit_lost=46910 audit_rate_limit=0 audit_backlog_limit=64 [ 767.857694][ T30] audit: type=1400 audit(1757456167.966:377957): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 767.886245][ T5516] audit: backlog limit exceeded [ 767.899389][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.479998][ T59] Bluetooth: hci5: Frame reassembly failed (-84) [ 771.577559][ T30] kauditd_printk_skb: 1762 callbacks suppressed [ 771.577574][ T30] audit: type=1400 audit(1757456173.006:379637): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 771.622420][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.645347][ T5516] audit: audit_lost=46939 audit_rate_limit=0 audit_backlog_limit=64 [ 771.653621][ T5516] audit: backlog limit exceeded [ 771.658580][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.665352][ T5516] audit: audit_lost=46940 audit_rate_limit=0 audit_backlog_limit=64 [ 771.679909][ T5516] audit: backlog limit exceeded [ 771.686598][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.689137][T15890] audit: audit_backlog=65 > audit_backlog_limit=64 [ 771.701527][ T5516] audit: audit_lost=46941 audit_rate_limit=0 audit_backlog_limit=64 [ 773.507954][ T51] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 774.948845][T15924] bond0: (slave ip6gretap0): Error: Device can not be enslaved while up [ 775.301963][T15933] ip6erspan0: entered promiscuous mode [ 775.684919][T15944] ptrace attach of ""[15945] was attempted by "./syz-executor exec"[15944] [ 776.586993][ T30] kauditd_printk_skb: 2743 callbacks suppressed [ 776.587007][ T30] audit: type=1400 audit(1757456178.016:381976): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 776.628928][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 776.649117][ T5516] audit: audit_lost=47077 audit_rate_limit=0 audit_backlog_limit=64 [ 776.674530][ T30] audit: type=1400 audit(1757456178.016:381977): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 776.696765][ T5516] audit: backlog limit exceeded [ 776.706163][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 776.717536][T15956] audit: audit_backlog=65 > audit_backlog_limit=64 [ 776.731962][ T5516] audit: audit_lost=47078 audit_rate_limit=0 audit_backlog_limit=64 [ 776.745050][ T5516] audit: backlog limit exceeded [ 776.751340][T15956] audit: audit_lost=47079 audit_rate_limit=0 audit_backlog_limit=64 [ 778.121838][T15971] (unnamed net_device) (uninitialized): Removing last arp target with arp_interval on [ 778.337461][T15971] bond6: entered promiscuous mode [ 778.343601][T15971] bond6: entered allmulticast mode [ 778.349107][T15971] 8021q: adding VLAN 0 to HW filter on device bond6 [ 780.328109][T16001] netlink: 'syz.3.2871': attribute type 21 has an invalid length. [ 780.389290][T16001] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2871'. [ 781.656759][ T30] kauditd_printk_skb: 4217 callbacks suppressed [ 781.656775][ T30] audit: type=1400 audit(1757456183.067:386156): avc: denied { mounton } for pid=16018 comm="syz.4.2875" path="/580/file0" dev="tmpfs" ino=3111 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 781.758863][ T30] audit: type=1400 audit(1757456183.067:386157): avc: denied { mounton } for pid=16018 comm="syz.4.2875" path="/580/file0" dev="tmpfs" ino=3111 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 781.766452][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 781.836246][ T30] audit: type=1400 audit(1757456182.727:386155): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 781.856676][ T5516] audit: audit_lost=47093 audit_rate_limit=0 audit_backlog_limit=64 [ 781.865520][ T5516] audit: backlog limit exceeded [ 781.873656][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 781.880335][ T5516] audit: audit_lost=47094 audit_rate_limit=0 audit_backlog_limit=64 [ 781.888333][ T5516] audit: backlog limit exceeded [ 781.893425][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 782.759756][T16029] lo speed is unknown, defaulting to 1000 [ 783.146239][T16034] ceph: No mds server is up or the cluster is laggy [ 783.839841][T16031] netlink: 'syz.2.2877': attribute type 1 has an invalid length. [ 783.868687][T16031] bond3: entered promiscuous mode [ 783.885685][T16031] bond3: entered allmulticast mode [ 783.910252][T16029] bond3: (slave geneve2): making interface the new active one [ 784.072414][T16029] geneve2: entered promiscuous mode [ 784.092673][T16029] geneve2: entered allmulticast mode [ 784.241354][T16029] bond3: (slave geneve2): Enslaving as an active interface with an up link [ 784.268797][ T1093] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 784.277745][ T1093] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 784.302665][ T1093] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 784.342460][ T1093] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 784.527737][T16058] capability: warning: `syz.3.2884' uses 32-bit capabilities (legacy support in use) [ 784.703241][T16062] lo speed is unknown, defaulting to 1000 [ 786.665509][T16084] netlink: 'syz.0.2891': attribute type 29 has an invalid length. [ 786.673717][T16084] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2891'. [ 786.774776][ T30] kauditd_printk_skb: 9003 callbacks suppressed [ 786.774789][ T30] audit: type=1400 audit(1757456188.187:391952): avc: denied { write } for pid=16085 comm="syz.4.2890" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 786.836270][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 786.885420][T16088] audit: audit_backlog=65 > audit_backlog_limit=64 [ 786.896356][T16089] audit: audit_backlog=65 > audit_backlog_limit=64 [ 786.902984][T16089] audit: audit_lost=48165 audit_rate_limit=0 audit_backlog_limit=64 [ 786.911240][T16089] audit: backlog limit exceeded [ 786.929154][ T5516] audit: audit_lost=48166 audit_rate_limit=0 audit_backlog_limit=64 [ 786.937874][ T5516] audit: backlog limit exceeded [ 786.938430][T16088] audit: audit_lost=48167 audit_rate_limit=0 audit_backlog_limit=64 [ 786.942848][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 787.926707][ T5859] Bluetooth: hci5: sending frame failed (-49) [ 787.936045][ T51] Bluetooth: hci5: Opcode 0x1003 failed: -49 [ 791.780598][ T30] kauditd_printk_skb: 3900 callbacks suppressed [ 791.780674][ T30] audit: type=1400 audit(1757456193.200:395466): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 791.937443][ T30] audit: type=1400 audit(1757456193.210:395467): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 791.991716][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 792.026880][ T30] audit: type=1400 audit(1757456193.210:395468): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 792.104999][ T30] audit: type=1400 audit(1757456193.210:395469): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 792.151458][ T30] audit: type=1400 audit(1757456193.210:395470): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 792.176773][ T5516] audit: audit_lost=48297 audit_rate_limit=0 audit_backlog_limit=64 [ 792.193272][ T30] audit: type=1400 audit(1757456193.210:395471): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 792.251287][ T5516] audit: backlog limit exceeded [ 792.274395][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 796.786847][ T30] kauditd_printk_skb: 8223 callbacks suppressed [ 796.786863][ T30] audit: type=1400 audit(1757456198.219:400339): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.816044][ T30] audit: type=1400 audit(1757456198.219:400340): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.837811][ T30] audit: type=1400 audit(1757456198.219:400341): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.859508][ T30] audit: type=1400 audit(1757456198.219:400342): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.881267][ T30] audit: type=1400 audit(1757456198.219:400343): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.902762][ T30] audit: type=1400 audit(1757456198.219:400344): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.924990][ T30] audit: type=1400 audit(1757456198.219:400345): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.926353][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 796.949252][ T30] audit: type=1400 audit(1757456198.219:400346): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 796.952986][ T5516] audit: audit_lost=49417 audit_rate_limit=0 audit_backlog_limit=64 [ 799.010956][T16230] netlink: 36 bytes leftover after parsing attributes in process `syz.0.2927'. [ 799.209390][T16229] netlink: 'syz.3.2928': attribute type 4 has an invalid length. [ 800.478164][T16234] Process accounting resumed [ 801.827729][ T30] kauditd_printk_skb: 12452 callbacks suppressed [ 801.827745][ T30] audit: type=1400 audit(1757456203.261:412726): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.025657][ T30] audit: type=1400 audit(1757456203.261:412727): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.056746][ T30] audit: type=1400 audit(1757456203.261:412728): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 802.231430][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.257762][T16264] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.264284][T16264] audit: audit_lost=49442 audit_rate_limit=0 audit_backlog_limit=64 [ 802.291644][ T5516] audit: audit_lost=49443 audit_rate_limit=0 audit_backlog_limit=64 [ 802.312065][ T5845] audit: audit_backlog=65 > audit_backlog_limit=64 [ 802.331322][ T5516] audit: backlog limit exceeded [ 802.336225][T16264] audit: backlog limit exceeded [ 803.529346][T16283] bridge5: entered promiscuous mode [ 807.154628][ T30] kauditd_printk_skb: 8573 callbacks suppressed [ 807.154646][ T30] audit: type=1400 audit(1757456208.275:420928): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 807.239771][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.251921][ T5516] audit: audit_lost=49569 audit_rate_limit=0 audit_backlog_limit=64 [ 807.260323][ T5516] audit: backlog limit exceeded [ 807.265336][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.330191][T16335] audit: audit_backlog=65 > audit_backlog_limit=64 [ 807.338671][T16335] audit: audit_lost=49570 audit_rate_limit=0 audit_backlog_limit=64 [ 807.347521][T16335] audit: backlog limit exceeded [ 807.352412][ T5516] audit: audit_lost=49571 audit_rate_limit=0 audit_backlog_limit=64 [ 807.416819][ T5516] audit: backlog limit exceeded [ 807.785607][T16344] netlink: 'syz.4.2961': attribute type 4 has an invalid length. [ 807.843442][T16344] netlink: 17 bytes leftover after parsing attributes in process `syz.4.2961'. [ 808.086588][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.100551][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 810.253586][T16376] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 810.260115][T16376] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 810.278946][T16376] vhci_hcd vhci_hcd.0: Device attached [ 810.480810][ T9402] vhci_hcd: vhci_device speed not set [ 810.536815][ T9402] usb 41-1: new full-speed USB device number 4 using vhci_hcd [ 810.579170][T16390] bridge7: entered promiscuous mode [ 811.835744][T16403] lo speed is unknown, defaulting to 1000 [ 812.043548][T16406] lo speed is unknown, defaulting to 1000 [ 812.157553][ T30] kauditd_printk_skb: 3795 callbacks suppressed [ 812.157567][ T30] audit: type=1400 audit(1757456213.585:423938): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 812.272075][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 812.274094][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 812.286904][ T5846] audit: audit_lost=49834 audit_rate_limit=0 audit_backlog_limit=64 [ 812.294985][ T30] audit: type=1400 audit(1757456213.595:423939): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 812.306754][ T5846] audit: backlog limit exceeded [ 812.328677][ T30] audit: type=1400 audit(1757456213.595:423940): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 812.340643][ T5516] audit: audit_lost=49835 audit_rate_limit=0 audit_backlog_limit=64 [ 812.350119][ T30] audit: type=1400 audit(1757456213.595:423941): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 812.388182][ T30] audit: type=1400 audit(1757456213.595:423942): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 816.065894][T16459] lo speed is unknown, defaulting to 1000 [ 817.114917][T16459] netlink: 'syz.3.2988': attribute type 2 has an invalid length. [ 817.169809][ T30] kauditd_printk_skb: 11682 callbacks suppressed [ 817.169818][ T30] audit: type=1400 audit(1757456218.605:427434): avc: denied { prog_load } for pid=16472 comm="syz.1.2990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 817.218150][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.234409][ T5516] audit: audit_lost=52566 audit_rate_limit=0 audit_backlog_limit=64 [ 817.254523][ T5516] audit: backlog limit exceeded [ 817.284356][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 817.313232][ T30] audit: type=1400 audit(1757456218.635:427435): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.375866][ T30] audit: type=1400 audit(1757456218.635:427436): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.385808][ T5516] audit: audit_lost=52567 audit_rate_limit=0 audit_backlog_limit=64 [ 817.435681][ T30] audit: type=1400 audit(1757456218.635:427437): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 817.465543][ T5516] audit: backlog limit exceeded [ 817.889383][T16483] ptrace attach of "./syz-executor exec"[5845] was attempted by "./syz-executor exec"[16483] [ 818.004917][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2996'. [ 818.059200][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2996'. [ 818.703723][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2996'. [ 819.013469][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2996'. [ 819.170014][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2996'. [ 821.007898][T16523] netlink: 'syz.3.3003': attribute type 4 has an invalid length. [ 821.019400][T16523] netlink: 'syz.3.3003': attribute type 4 has an invalid length. [ 821.032995][T16523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=16523 comm=syz.3.3003 [ 822.177096][ T5516] audit_log_start: 4111 callbacks suppressed [ 822.177110][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.190770][ T5516] audit: audit_lost=52786 audit_rate_limit=0 audit_backlog_limit=64 [ 822.200110][ T5516] audit: backlog limit exceeded [ 822.204994][ T30] audit: type=1400 audit(1757456223.585:430895): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 822.207072][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.240940][ T5516] audit: audit_lost=52787 audit_rate_limit=0 audit_backlog_limit=64 [ 822.263539][ T5516] audit: backlog limit exceeded [ 822.271048][T16539] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.384248][T16539] audit: audit_lost=52788 audit_rate_limit=0 audit_backlog_limit=64 [ 822.392371][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 822.980686][T16554] netlink: 'syz.3.3012': attribute type 4 has an invalid length. [ 822.991634][T16554] netlink: 17 bytes leftover after parsing attributes in process `syz.3.3012'. [ 823.845975][T16571] lo speed is unknown, defaulting to 1000 [ 825.998869][T16592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16592 comm=syz.0.3020 [ 826.455044][T16607] ip6erspan0: entered promiscuous mode [ 827.267457][ T30] kauditd_printk_skb: 6241 callbacks suppressed [ 827.267473][ T30] audit: type=1400 audit(1757456228.705:434768): avc: denied { execmem } for pid=16615 comm="syz.0.3027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 827.327865][ T30] audit: type=1400 audit(1757456228.425:434766): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 827.351790][ T30] audit: type=1400 audit(1757456228.705:434769): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 827.376069][ T30] audit: type=1400 audit(1757456228.705:434770): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 827.377165][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 827.414769][T16619] audit: audit_backlog=65 > audit_backlog_limit=64 [ 827.422535][T16619] audit: audit_lost=53579 audit_rate_limit=0 audit_backlog_limit=64 [ 827.432367][T16619] audit: backlog limit exceeded [ 827.456820][T16617] audit: audit_backlog=65 > audit_backlog_limit=64 [ 827.459373][ T30] audit: type=1400 audit(1757456228.705:434771): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 832.271744][T16682] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3042'. [ 832.288124][T16682] veth1: entered promiscuous mode [ 832.296675][T16682] netlink: 'syz.4.3042': attribute type 8 has an invalid length. [ 832.304399][T16682] A link change request failed with some changes committed already. Interface veth1 may have been left with an inconsistent configuration, please check. [ 832.352401][ T30] kauditd_printk_skb: 3170 callbacks suppressed [ 832.352418][ T30] audit: type=1400 audit(1757456233.695:437935): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 832.446884][ T30] audit: type=1400 audit(1757456233.695:437936): avc: denied { prog_load } for pid=16679 comm="syz.4.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 832.470174][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 832.476716][ T5516] audit: audit_lost=53583 audit_rate_limit=0 audit_backlog_limit=64 [ 832.484662][ T5516] audit: backlog limit exceeded [ 832.489644][ T30] audit: type=1400 audit(1757456233.695:437937): avc: denied { map_create } for pid=16679 comm="syz.4.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 832.509752][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 832.516868][ T5516] audit: audit_lost=53584 audit_rate_limit=0 audit_backlog_limit=64 [ 832.536457][ T5516] audit: backlog limit exceeded [ 832.541580][ T30] audit: type=1400 audit(1757456233.695:437938): avc: denied { create } for pid=16679 comm="syz.4.3042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 835.210184][T16722] netlink: 36 bytes leftover after parsing attributes in process `syz.3.3052'. [ 835.384173][T16728] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3056'. [ 837.429593][ T30] kauditd_printk_skb: 5801 callbacks suppressed [ 837.429609][ T30] audit: type=1400 audit(1757456238.767:441520): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 837.509662][ T30] audit: type=1400 audit(1757456238.767:441521): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 837.533543][ T30] audit: type=1400 audit(1757456238.767:441522): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 837.615964][ T30] audit: type=1400 audit(1757456238.767:441523): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 837.627452][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 837.663816][ T5516] audit: audit_lost=54325 audit_rate_limit=0 audit_backlog_limit=64 [ 837.669181][ T30] audit: type=1400 audit(1757456238.767:441524): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 837.710914][ T5516] audit: backlog limit exceeded [ 837.723231][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 837.730771][T16753] audit: audit_backlog=65 > audit_backlog_limit=64 [ 838.439888][T16761] lo speed is unknown, defaulting to 1000 [ 840.606670][T16801] trusted_key: encrypted_key: key user:syz not found [ 841.850073][T16814] netlink: 'syz.4.3081': attribute type 1 has an invalid length. [ 841.962248][T16814] 8021q: adding VLAN 0 to HW filter on device bond6 [ 841.976983][T16816] bond6: (slave geneve2): making interface the new active one [ 841.985383][T16816] bond6: (slave geneve2): Enslaving as an active interface with an up link [ 841.998514][ T988] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 842.016448][ T988] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 842.025258][ T988] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 842.037239][ T988] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 842.173774][T16823] lo speed is unknown, defaulting to 1000 [ 842.438627][ T30] kauditd_printk_skb: 6391 callbacks suppressed [ 842.438643][ T30] audit: type=1400 audit(1757456243.857:447042): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 842.454586][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 842.490237][ T5516] audit: audit_lost=54618 audit_rate_limit=0 audit_backlog_limit=64 [ 842.506108][ T30] audit: type=1400 audit(1757456243.867:447043): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 842.512577][ T5516] audit: backlog limit exceeded [ 842.675748][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 842.682594][ T5516] audit: audit_lost=54619 audit_rate_limit=0 audit_backlog_limit=64 [ 842.692043][ T5516] audit: backlog limit exceeded [ 842.721358][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 842.731929][ T5516] audit: audit_lost=54620 audit_rate_limit=0 audit_backlog_limit=64 [ 844.510658][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 844.517350][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 844.644076][T16857] ceph: No mds server is up or the cluster is laggy [ 845.300497][T16869] netlink: 'syz.4.3094': attribute type 4 has an invalid length. [ 845.345911][T16869] netlink: 17 bytes leftover after parsing attributes in process `syz.4.3094'. [ 847.447661][ T30] kauditd_printk_skb: 3358 callbacks suppressed [ 847.447676][ T30] audit: type=1400 audit(1757456248.877:450272): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 847.685496][ T30] audit: type=1400 audit(1757456248.877:450273): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 847.717371][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 847.726138][T16907] audit: audit_backlog=65 > audit_backlog_limit=64 [ 847.806816][T16907] audit: audit_lost=54664 audit_rate_limit=0 audit_backlog_limit=64 [ 847.814824][T16907] audit: backlog limit exceeded [ 847.827313][ T30] audit: type=1400 audit(1757456248.877:450274): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 847.846657][ T5516] audit: audit_lost=54665 audit_rate_limit=0 audit_backlog_limit=64 [ 847.878658][ T5516] audit: backlog limit exceeded [ 847.879336][T16907] audit: audit_backlog=65 > audit_backlog_limit=64 [ 847.892004][T16908] netlink: 'syz.0.3106': attribute type 12 has an invalid length. [ 848.069899][T16914] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3111'. [ 849.093622][T16934] netlink: 36 bytes leftover after parsing attributes in process `syz.1.3115'. [ 850.962997][T16962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=58721 sclass=netlink_route_socket pid=16962 comm=syz.0.3122 [ 850.979145][T16963] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3123'. [ 851.321172][T16960] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.3123'. [ 852.457001][ T30] kauditd_printk_skb: 4381 callbacks suppressed [ 852.457015][ T30] audit: type=1400 audit(1757456253.887:454375): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 852.513558][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 852.531229][ T5516] audit: audit_lost=54760 audit_rate_limit=0 audit_backlog_limit=64 [ 852.543679][ T30] audit: type=1400 audit(1757456253.887:454376): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 852.605790][T16979] audit: audit_backlog=65 > audit_backlog_limit=64 [ 852.627127][ T5516] audit: backlog limit exceeded [ 852.639214][T16983] audit: audit_backlog=65 > audit_backlog_limit=64 [ 852.650764][T16979] audit: audit_lost=54761 audit_rate_limit=0 audit_backlog_limit=64 [ 852.655896][T16983] audit: audit_lost=54762 audit_rate_limit=0 audit_backlog_limit=64 [ 852.659092][T16982] audit: audit_backlog=65 > audit_backlog_limit=64 [ 853.612375][T17003] netlink: 88 bytes leftover after parsing attributes in process `syz.0.3135'. [ 853.678300][T17000] ip6erspan0: entered promiscuous mode [ 853.732269][T17003] netlink: 'syz.0.3135': attribute type 21 has an invalid length. [ 853.741345][T17003] netlink: 128 bytes leftover after parsing attributes in process `syz.0.3135'. [ 853.920198][T17003] netlink: 'syz.0.3135': attribute type 4 has an invalid length. [ 853.951026][T17003] netlink: 3 bytes leftover after parsing attributes in process `syz.0.3135'. [ 854.075344][T17003] batadv1: entered promiscuous mode [ 854.083033][T17003] 8021q: adding VLAN 0 to HW filter on device batadv1 [ 855.169185][T17024] ALSA: mixer_oss: invalid OSS volume 'SPEAKE' [ 857.466905][ T30] kauditd_printk_skb: 6656 callbacks suppressed [ 857.466921][ T30] audit: type=1400 audit(1757456258.887:460882): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 857.506038][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 857.541348][ T30] audit: type=1400 audit(1757456258.897:460883): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 857.614378][ T30] audit: type=1400 audit(1757456258.897:460884): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 857.633721][ T5516] audit: audit_lost=54813 audit_rate_limit=0 audit_backlog_limit=64 [ 857.656186][ T5516] audit: backlog limit exceeded [ 857.666714][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 857.686494][ T5516] audit: audit_lost=54814 audit_rate_limit=0 audit_backlog_limit=64 [ 857.745792][T17054] audit: audit_backlog=65 > audit_backlog_limit=64 [ 857.779639][T17054] audit: audit_lost=54815 audit_rate_limit=0 audit_backlog_limit=64 [ 860.615341][T17096] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3164'. [ 860.824579][T17101] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3165'. [ 861.185201][T17103] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3165'. [ 862.476731][ T30] kauditd_printk_skb: 5633 callbacks suppressed [ 862.476747][ T30] audit: type=1400 audit(1757456263.897:464464): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 862.499852][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 862.562732][ T5516] audit: audit_lost=55500 audit_rate_limit=0 audit_backlog_limit=64 [ 862.654752][ T5516] audit: backlog limit exceeded [ 862.672608][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 862.675998][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 862.735715][ T30] audit: type=1400 audit(1757456263.907:464465): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 862.877050][ T5846] audit: audit_lost=55501 audit_rate_limit=0 audit_backlog_limit=64 [ 862.986078][ T5846] audit: backlog limit exceeded [ 862.988890][ T30] audit: type=1400 audit(1757456263.907:464466): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 863.783840][T17142] lo speed is unknown, defaulting to 1000 [ 867.606729][ T30] kauditd_printk_skb: 3412 callbacks suppressed [ 867.606745][ T30] audit: type=1400 audit(1757456268.867:467877): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 867.672232][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 867.686683][ T5516] audit: audit_lost=55503 audit_rate_limit=0 audit_backlog_limit=64 [ 867.695378][ T5516] audit: backlog limit exceeded [ 867.702493][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 867.704978][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 867.712683][ T30] audit: type=1400 audit(1757456268.907:467878): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 867.737276][ T5516] audit: audit_lost=55504 audit_rate_limit=0 audit_backlog_limit=64 [ 867.745241][ T5516] audit: backlog limit exceeded [ 867.790248][T17189] audit: audit_backlog=65 > audit_backlog_limit=64 [ 868.127580][T17191] bond0: (slave bond0): Error: Device is in use and cannot be enslaved [ 869.509248][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.515516][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 872.437210][T17264] mkiss: ax0: crc mode is auto. [ 872.618095][ T30] kauditd_printk_skb: 5777 callbacks suppressed [ 872.618105][ T30] audit: type=1400 audit(1757456274.047:471801): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 872.669563][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.687460][ T5516] audit: audit_lost=56124 audit_rate_limit=0 audit_backlog_limit=64 [ 872.699435][ T30] audit: type=1400 audit(1757456274.077:471802): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 872.821128][ T5516] audit: backlog limit exceeded [ 872.828083][T17268] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.828371][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 872.844607][T17268] audit: audit_lost=56125 audit_rate_limit=0 audit_backlog_limit=64 [ 872.854687][ T5516] audit: audit_lost=56126 audit_rate_limit=0 audit_backlog_limit=64 [ 872.865773][ T30] audit: type=1400 audit(1757456274.077:471803): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 873.560369][T17281] ptrace attach of "./syz-executor exec"[5847] was attempted by "./syz-executor exec"[17281] [ 874.483652][T17296] netlink: 'syz.1.3214': attribute type 12 has an invalid length. [ 876.446762][T17327] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3224'. [ 876.510644][T17327] netlink: 32 bytes leftover after parsing attributes in process `syz.3.3224'. [ 877.237912][T17340] ptrace attach of "./syz-executor exec"[5844] was attempted by "./syz-executor exec"[17340] [ 877.632079][ T30] kauditd_printk_skb: 4838 callbacks suppressed [ 877.632112][ T30] audit: type=1400 audit(1757456279.063:475122): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 877.780363][ T30] audit: type=1400 audit(1757456279.073:475123): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 877.899540][ T30] audit: type=1400 audit(1757456279.073:475124): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 877.908834][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 878.142570][ T30] audit: type=1400 audit(1757456279.073:475125): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 878.191286][ T5516] audit: audit_lost=56633 audit_rate_limit=0 audit_backlog_limit=64 [ 878.386670][ T5516] audit: backlog limit exceeded [ 878.403369][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 878.424255][ T5516] audit: audit_lost=56634 audit_rate_limit=0 audit_backlog_limit=64 [ 878.448850][ T30] audit: type=1400 audit(1757456279.073:475126): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 879.287035][T17362] lo speed is unknown, defaulting to 1000 [ 879.609142][T17364] lo speed is unknown, defaulting to 1000 [ 882.572723][T17415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17415 comm=syz.1.3245 [ 882.656865][ T30] kauditd_printk_skb: 3311 callbacks suppressed [ 882.656881][ T30] audit: type=1400 audit(1757456284.083:477984): avc: denied { read write } for pid=17412 comm="syz.1.3245" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 882.998063][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 883.079971][ T30] audit: type=1400 audit(1757456284.083:477985): avc: denied { mounton } for pid=17412 comm="syz.1.3245" path="/621/file0" dev="tmpfs" ino=3269 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 883.145043][ T5516] audit: audit_lost=56786 audit_rate_limit=0 audit_backlog_limit=64 [ 883.169444][T17419] audit: audit_backlog=65 > audit_backlog_limit=64 [ 883.181103][ T5516] audit: backlog limit exceeded [ 883.190966][T17419] audit: audit_lost=56787 audit_rate_limit=0 audit_backlog_limit=64 [ 883.195785][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 883.226129][ T5516] audit: audit_lost=56788 audit_rate_limit=0 audit_backlog_limit=64 [ 883.234373][T17419] audit: backlog limit exceeded [ 883.295013][T17419] netlink: 'syz.3.3246': attribute type 10 has an invalid length. [ 883.306678][T17419] netlink: 40 bytes leftover after parsing attributes in process `syz.3.3246'. [ 883.435647][T17419] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 884.610994][T17436] netlink: 'syz.1.3249': attribute type 4 has an invalid length. [ 884.732654][T17441] netlink: 'syz.1.3249': attribute type 4 has an invalid length. [ 884.755675][T17436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=17436 comm=syz.1.3249 [ 887.786761][ T30] kauditd_printk_skb: 3046 callbacks suppressed [ 887.786778][ T30] audit: type=1400 audit(1757456289.125:480974): avc: denied { create } for pid=17471 comm="syz.4.3258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 887.837874][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 887.850037][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 887.860006][ T5846] audit: audit_lost=56808 audit_rate_limit=0 audit_backlog_limit=64 [ 887.868288][ T5516] audit: audit_lost=56809 audit_rate_limit=0 audit_backlog_limit=64 [ 887.876269][ T5846] audit: backlog limit exceeded [ 887.883737][ T30] audit: type=1400 audit(1757456289.125:480975): avc: denied { create } for pid=17471 comm="syz.4.3258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 887.905020][ T5516] audit: backlog limit exceeded [ 887.911896][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 887.941029][ T5516] audit: audit_lost=56810 audit_rate_limit=0 audit_backlog_limit=64 [ 888.115505][T17484] netlink: 72 bytes leftover after parsing attributes in process `syz.3.3263'. [ 890.884495][T17525] netlink: 12 bytes leftover after parsing attributes in process `syz.4.3275'. [ 891.601289][T17542] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3279'. [ 892.803050][ T30] kauditd_printk_skb: 4925 callbacks suppressed [ 892.803061][ T30] audit: type=1400 audit(1757456294.235:484946): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 893.042807][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 893.071368][ T5846] audit: audit_backlog=65 > audit_backlog_limit=64 [ 893.082783][ T5516] audit: audit_lost=57129 audit_rate_limit=0 audit_backlog_limit=64 [ 893.086953][ T30] audit: type=1400 audit(1757456294.275:484947): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 893.113257][ T5846] audit: audit_lost=57130 audit_rate_limit=0 audit_backlog_limit=64 [ 893.121449][ T5516] audit: backlog limit exceeded [ 893.121692][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 893.136834][ T5846] audit: backlog limit exceeded [ 893.158535][ T5516] audit: audit_lost=57131 audit_rate_limit=0 audit_backlog_limit=64 [ 894.656558][T17579] netlink: 'syz.0.3290': attribute type 10 has an invalid length. [ 894.664585][T17579] netlink: 40 bytes leftover after parsing attributes in process `syz.0.3290'. [ 894.691730][T17579] team0: Device lo is loopback device. Loopback devices can't be added as a team port [ 894.730658][T17579] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 896.945039][T17623] lo speed is unknown, defaulting to 1000 [ 897.838428][ T30] kauditd_printk_skb: 7546 callbacks suppressed [ 897.838442][ T30] audit: type=1400 audit(1757456299.275:489169): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 897.939738][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 897.964262][T17636] audit: audit_backlog=65 > audit_backlog_limit=64 [ 897.978208][ T30] audit: type=1400 audit(1757456299.275:489170): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 897.985650][ T5516] audit: audit_lost=58240 audit_rate_limit=0 audit_backlog_limit=64 [ 898.069476][ T30] audit: type=1400 audit(1757456299.275:489171): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 898.101077][T17636] audit: audit_lost=58241 audit_rate_limit=0 audit_backlog_limit=64 [ 898.171440][T17636] audit: backlog limit exceeded [ 898.266744][ T30] audit: type=1400 audit(1757456299.275:489172): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 898.291023][ T5516] audit: backlog limit exceeded [ 902.846980][ T30] kauditd_printk_skb: 5546 callbacks suppressed [ 902.846995][ T30] audit: type=1400 audit(1757456304.285:493843): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 902.911555][ T30] audit: type=1400 audit(1757456304.315:493844): avc: denied { create } for pid=17692 comm="syz.2.3321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 902.913311][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 902.982060][ T30] audit: type=1400 audit(1757456304.315:493845): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 903.027411][ T5516] audit: audit_lost=58534 audit_rate_limit=0 audit_backlog_limit=64 [ 903.049929][ T5516] audit: backlog limit exceeded [ 903.059199][ T30] audit: type=1400 audit(1757456304.315:493846): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 903.076405][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 903.098920][ T5516] audit: audit_lost=58535 audit_rate_limit=0 audit_backlog_limit=64 [ 903.123303][ T30] audit: type=1400 audit(1757456304.315:493847): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 903.486325][T17699] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3323'. [ 905.062113][T17722] macsec0: entered promiscuous mode [ 905.099183][T17722] macsec0: entered allmulticast mode [ 905.113430][T17722] veth1_macvtap: entered allmulticast mode [ 906.258567][T17736] netlink: 'syz.1.3342': attribute type 21 has an invalid length. [ 906.266659][T17736] netlink: 156 bytes leftover after parsing attributes in process `syz.1.3342'. [ 906.279355][T17736] netlink: 'syz.1.3342': attribute type 21 has an invalid length. [ 906.287531][T17736] netlink: 156 bytes leftover after parsing attributes in process `syz.1.3342'. [ 908.105586][T17755] netlink: 5 bytes leftover after parsing attributes in process `syz.3.3336'. [ 908.138965][ T30] kauditd_printk_skb: 7499 callbacks suppressed [ 908.138975][ T30] audit: type=1400 audit(1757456309.165:497020): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 908.183272][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 908.194318][ T5516] audit: audit_lost=59978 audit_rate_limit=0 audit_backlog_limit=64 [ 908.203058][ T30] audit: type=1400 audit(1757456309.165:497021): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 908.228418][ T5516] audit: backlog limit exceeded [ 908.233556][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 908.242790][T17755] 0ªX¹¦D: renamed from macvtap0 [ 908.279342][ T5516] audit: audit_lost=59979 audit_rate_limit=0 audit_backlog_limit=64 [ 908.287614][ T30] audit: type=1400 audit(1757456309.165:497022): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 908.320599][ T5516] audit: backlog limit exceeded [ 908.325614][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 908.337523][T17755] 0ªX¹¦D: entered allmulticast mode [ 908.342825][T17755] veth0_macvtap: entered allmulticast mode [ 908.361962][T17755] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 909.563015][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 909.569394][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 909.958001][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 910.138003][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 910.268194][T17773] ceph: No mds server is up or the cluster is laggy [ 912.328630][T17822] (unnamed net_device) (uninitialized): option downdelay: invalid value (18446744073709551609) [ 912.425592][T17822] (unnamed net_device) (uninitialized): option downdelay: allowed values 0 - 2147483647 [ 913.149071][ T30] kauditd_printk_skb: 7240 callbacks suppressed [ 913.149086][ T30] audit: type=1400 audit(1757456314.575:502956): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 913.246693][ T30] audit: type=1400 audit(1757456314.575:502957): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 913.249267][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 913.346788][ T30] audit: type=1400 audit(1757456314.575:502958): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 913.349613][ T5516] audit: audit_lost=60416 audit_rate_limit=0 audit_backlog_limit=64 [ 913.418803][ T5516] audit: backlog limit exceeded [ 913.423948][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 913.426679][ T30] audit: type=1400 audit(1757456314.575:502959): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 913.460876][ T5516] audit: audit_lost=60417 audit_rate_limit=0 audit_backlog_limit=64 [ 913.482037][ T5516] audit: backlog limit exceeded [ 915.231661][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 915.237968][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 915.703819][ T5964] libceph: connect (1)[c::]:6789 error -101 [ 915.726421][ T5964] libceph: mon0 (1)[c::]:6789 connect error [ 915.891848][T17860] ceph: No mds server is up or the cluster is laggy [ 916.754454][T17874] netlink: 'syz.4.3373': attribute type 1 has an invalid length. [ 916.990854][T17878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17878 comm=syz.4.3373 [ 916.995500][T17874] 8021q: adding VLAN 0 to HW filter on device bond7 [ 917.175054][T17875] bond7: (slave veth15): Enslaving as an active interface with a down link [ 917.789490][T17900] netlink: 'syz.3.3377': attribute type 12 has an invalid length. [ 918.254959][ T30] kauditd_printk_skb: 4355 callbacks suppressed [ 918.254971][ T30] audit: type=1400 audit(1757456319.685:506697): avc: denied { create } for pid=17901 comm="syz.2.3380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 918.431787][ T30] audit: type=1400 audit(1757456319.715:506698): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 918.462293][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 918.470973][ T5516] audit: audit_lost=60624 audit_rate_limit=0 audit_backlog_limit=64 [ 918.479758][ T5516] audit: backlog limit exceeded [ 918.485325][T17906] audit: audit_backlog=65 > audit_backlog_limit=64 [ 918.492008][T17906] audit: audit_lost=60625 audit_rate_limit=0 audit_backlog_limit=64 [ 918.501818][T17906] audit: backlog limit exceeded [ 918.506877][ T30] audit: type=1400 audit(1757456319.715:506699): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 918.530119][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 921.884599][T17943] netlink: 'syz.1.3390': attribute type 10 has an invalid length. [ 921.921496][T17943] batman_adv: batadv0: Adding interface: team0 [ 921.921514][T17943] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 921.921538][T17943] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 921.924952][T17943] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3390'. [ 922.021508][ C1] vkms_vblank_simulate: vblank timer overrun [ 923.274488][ T30] kauditd_printk_skb: 3857 callbacks suppressed [ 923.274504][ T30] audit: type=1400 audit(1757456324.525:510087): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.463255][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.476794][ T5516] audit: audit_lost=60783 audit_rate_limit=0 audit_backlog_limit=64 [ 923.484874][ T5516] audit: backlog limit exceeded [ 923.490150][ T30] audit: type=1400 audit(1757456324.735:510088): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 923.531140][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.545029][ T5516] audit: audit_lost=60784 audit_rate_limit=0 audit_backlog_limit=64 [ 923.562004][ T5516] audit: backlog limit exceeded [ 923.580393][T17961] audit: audit_backlog=65 > audit_backlog_limit=64 [ 923.591082][ T30] audit: type=1400 audit(1757456324.735:510089): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 924.739695][T17974] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3396'. [ 928.288094][ T30] kauditd_printk_skb: 5009 callbacks suppressed [ 928.288108][ T30] audit: type=1400 audit(1757456329.725:514623): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 928.347078][ T30] audit: type=1400 audit(1757456329.725:514624): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 928.413628][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 928.516825][ T5516] audit: audit_lost=60944 audit_rate_limit=0 audit_backlog_limit=64 [ 928.876753][ T5516] audit: backlog limit exceeded [ 928.886732][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 928.893274][ T30] audit: type=1400 audit(1757456329.725:514625): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 928.945797][ T5516] audit: audit_lost=60945 audit_rate_limit=0 audit_backlog_limit=64 [ 928.980563][T18044] audit: audit_backlog=65 > audit_backlog_limit=64 [ 928.989268][ T5516] audit: backlog limit exceeded [ 930.931645][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 930.938052][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 932.580258][T18097] netlink: 'syz.2.3432': attribute type 4 has an invalid length. [ 933.350069][ T30] kauditd_printk_skb: 4571 callbacks suppressed [ 933.350084][ T30] audit: type=1400 audit(1757456334.735:518940): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 933.408644][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 933.426562][ T5516] audit: audit_lost=61032 audit_rate_limit=0 audit_backlog_limit=64 [ 933.440314][ T30] audit: type=1400 audit(1757456334.775:518941): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 933.464159][ T5516] audit: backlog limit exceeded [ 933.473784][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 933.485102][ T5516] audit: audit_lost=61033 audit_rate_limit=0 audit_backlog_limit=64 [ 933.502628][ T5516] audit: backlog limit exceeded [ 933.508406][ T30] audit: type=1400 audit(1757456334.775:518942): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 933.770051][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 934.893240][T18126] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3442'. [ 935.173341][T18126] netlink: 32 bytes leftover after parsing attributes in process `syz.0.3442'. [ 935.186079][T18136] netlink: 'syz.3.3444': attribute type 8 has an invalid length. [ 938.019259][T18161] netlink: 'syz.2.3451': attribute type 10 has an invalid length. [ 938.029725][T18161] team0: Device hsr_slave_0 failed to register rx_handler [ 938.142056][T18161] IPv6: NLM_F_CREATE should be specified when creating new route [ 938.543283][ T5516] audit_log_start: 3630 callbacks suppressed [ 938.543297][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 938.568568][T18172] audit: audit_backlog=65 > audit_backlog_limit=64 [ 938.595406][ T30] audit: type=1400 audit(1757456339.945:522317): avc: denied { prog_load } for pid=18168 comm="syz.2.3454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 938.622195][T18172] audit: audit_lost=61120 audit_rate_limit=0 audit_backlog_limit=64 [ 938.630866][T18172] audit: backlog limit exceeded [ 938.635741][ T5516] audit: audit_lost=61121 audit_rate_limit=0 audit_backlog_limit=64 [ 938.649750][T18169] audit: audit_backlog=65 > audit_backlog_limit=64 [ 938.656282][T18169] audit: audit_lost=61122 audit_rate_limit=0 audit_backlog_limit=64 [ 938.669212][ T30] audit: type=1400 audit(1757456339.785:522316): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 938.696705][ T30] audit: type=1400 audit(1757456339.955:522318): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 939.379349][T18192] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 939.458244][T18192] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 939.478763][T18192] batman_adv: batadv0: Interface deactivated: dummy0 [ 939.485661][T18192] batman_adv: batadv0: Removing interface: dummy0 [ 939.505596][T18192] bond0: (slave batadv0): Releasing backup interface [ 939.534847][T18191] mac80211_hwsim hwsim5 wlan1: entered allmulticast mode [ 939.547569][T18191] batman_adv: batadv0: Removing interface: dummy0 [ 939.554877][T18191] bond0: (slave batadv0): Releasing backup interface [ 939.562370][T18191] bridge_slave_0: left allmulticast mode [ 939.569082][T18191] bridge_slave_0: left promiscuous mode [ 939.587081][T18191] bridge0: port 1(bridge_slave_0) entered disabled state [ 939.607093][T18195] netlink: 'syz.3.3461': attribute type 10 has an invalid length. [ 939.620571][T18191] bond0: (slave bond_slave_0): Releasing backup interface [ 939.673468][T18191] bond0: (slave bond_slave_1): Releasing backup interface [ 939.694131][T18191] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 939.705662][T18191] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 939.831753][T18191] batman_adv: batadv0: Removing interface: wlan0 [ 939.842900][T18191] bond1: (slave gretap1): Releasing active interface [ 939.854450][T18191] bond3: (slave ip6gretap2): Releasing backup interface [ 939.863590][T18191] bond3: (slave ip6gretap2): the permanent HWaddr of slave - f6:8b:09:56:bf:0c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 939.963553][T18191] bond3: (slave macvlan2): Removing an active aggregator [ 939.971991][T18191] bond3: (slave macvlan2): Releasing backup interface [ 940.018803][T18197] lo speed is unknown, defaulting to 1000 [ 940.167650][T18195] mac80211_hwsim hwsim5 wlan1: left allmulticast mode [ 940.224077][T18195] bond0: (slave wlan1): refused to change device type [ 941.564332][T18223] netlink: 'syz.1.3468': attribute type 10 has an invalid length. [ 941.711785][T18223] netlink: 'syz.1.3468': attribute type 10 has an invalid length. [ 941.824667][T18223] netlink: 2 bytes leftover after parsing attributes in process `syz.1.3468'. [ 941.849024][T18223] team0: entered promiscuous mode [ 941.870949][T18223] 8021q: adding VLAN 0 to HW filter on device team0 [ 941.898160][T18223] batman_adv: batadv0: Interface activated: team0 [ 942.031702][T18223] batman_adv: batadv0: Interface deactivated: team0 [ 942.060265][T18223] batman_adv: batadv0: Removing interface: team0 [ 942.137492][T18223] bridge0: port 1(team0) entered blocking state [ 942.149439][T18223] bridge0: port 1(team0) entered disabled state [ 942.165932][T18223] team0: entered allmulticast mode [ 943.556851][ T30] kauditd_printk_skb: 4482 callbacks suppressed [ 943.556866][ T30] audit: type=1400 audit(1757456344.975:524585): avc: denied { mounton } for pid=18231 comm="syz.0.3470" path="/700/bus" dev="tmpfs" ino=3721 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 943.627169][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 943.646464][T18242] audit: audit_backlog=65 > audit_backlog_limit=64 [ 943.653047][T18242] audit: audit_lost=61861 audit_rate_limit=0 audit_backlog_limit=64 [ 943.662808][T18242] audit: backlog limit exceeded [ 943.692178][ T5516] audit: audit_lost=61862 audit_rate_limit=0 audit_backlog_limit=64 [ 943.700467][ T30] audit: type=1400 audit(1757456344.975:524586): avc: denied { mac_admin } for pid=18231 comm="syz.0.3470" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 943.722531][ T5516] audit: backlog limit exceeded [ 943.728961][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 943.735679][ T5516] audit: audit_lost=61863 audit_rate_limit=0 audit_backlog_limit=64 [ 945.074532][T18261] trusted_key: encrypted_key: key user:syz not found [ 948.573543][ T30] kauditd_printk_skb: 6539 callbacks suppressed [ 948.573558][ T30] audit: type=1400 audit(1757456350.005:527969): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 948.610667][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 948.617779][ T5516] audit: audit_lost=62916 audit_rate_limit=0 audit_backlog_limit=64 [ 948.627406][ T5516] audit: backlog limit exceeded [ 948.632416][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 948.685179][ T5516] audit: audit_lost=62917 audit_rate_limit=0 audit_backlog_limit=64 [ 948.693541][ T30] audit: type=1400 audit(1757456350.005:527970): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 948.715607][ T5516] audit: backlog limit exceeded [ 948.721033][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 948.733202][T18305] audit: audit_backlog=65 > audit_backlog_limit=64 [ 948.972180][T18313] netlink: 'syz.0.3493': attribute type 4 has an invalid length. [ 948.992773][T18313] netlink: 17 bytes leftover after parsing attributes in process `syz.0.3493'. [ 949.416973][T18329] mmap: syz.4.3499 (18329): VmData 37601280 exceed data ulimit 9868. Update limits or use boot option ignore_rlimit_data. [ 951.809045][T18366] bridge8: the hash_elasticity option has been deprecated and is always 16 [ 953.594624][ T30] kauditd_printk_skb: 5685 callbacks suppressed [ 953.594635][ T30] audit: type=1400 audit(1757456355.025:533221): avc: denied { create } for pid=18392 comm="syz.3.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 953.717705][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 953.735033][ T5516] audit: audit_lost=63064 audit_rate_limit=0 audit_backlog_limit=64 [ 953.751749][ T30] audit: type=1400 audit(1757456355.025:533222): avc: denied { create } for pid=18392 comm="syz.3.3520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 953.802446][ T5516] audit: backlog limit exceeded [ 953.812698][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 953.851612][ T5516] audit: audit_lost=63065 audit_rate_limit=0 audit_backlog_limit=64 [ 954.386634][ T5516] audit: backlog limit exceeded [ 954.407461][ T30] audit: type=1400 audit(1757456355.025:533223): avc: denied { write } for pid=18392 comm="syz.3.3520" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 954.416862][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 958.591487][T18450] lo speed is unknown, defaulting to 1000 [ 958.597371][ T30] kauditd_printk_skb: 3480 callbacks suppressed [ 958.597384][ T30] audit: type=1400 audit(1757456360.025:535759): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 958.682685][ T30] audit: type=1400 audit(1757456360.105:535760): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 958.757253][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 958.764927][ T30] audit: type=1400 audit(1757456360.105:535761): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 958.806065][ T5516] audit: audit_lost=63381 audit_rate_limit=0 audit_backlog_limit=64 [ 958.846500][ T5516] audit: backlog limit exceeded [ 958.860235][ T30] audit: type=1400 audit(1757456360.105:535762): avc: denied { read } for pid=5516 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 958.873835][ T5516] audit: audit_backlog=65 > audit_backlog_limit=64 [ 959.034007][ T5516] audit: audit_lost=63382 audit_rate_limit=0 audit_backlog_limit=64 [ 959.051388][ T5516] audit: backlog limit exceeded [ 959.078506][ T31] INFO: task kworker/0:11:9402 blocked for more than 143 seconds. [ 959.088880][ T31] Not tainted syzkaller #0 [ 959.123691][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 959.563221][ T31] task:kworker/0:11 state:D stack:26504 pid:9402 tgid:9402 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 959.624561][ T31] Workqueue: usb_hub_wq hub_event [ 959.653565][ T31] Call Trace: [ 959.757207][ T31] [ 959.775901][ T31] __schedule+0x1190/0x5de0 [ 959.781505][ T31] ? __pfx___schedule+0x10/0x10 [ 959.786490][ T31] ? find_held_lock+0x2b/0x80 [ 959.792255][ T31] ? schedule+0x2d7/0x3a0 [ 959.799332][ T31] schedule+0xe7/0x3a0 [ 959.803614][ T31] usb_kill_urb+0x253/0x320 [ 959.809051][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 959.814482][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 959.821774][ T31] ? lockdep_init_map_type+0xd0/0x280 [ 959.828337][ T31] usb_start_wait_urb+0x250/0x4b0 [ 959.834036][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 959.840744][ T31] ? __asan_memset+0x23/0x50 [ 959.845384][ T31] usb_control_msg+0x326/0x4a0 [ 959.851067][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 959.856388][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 959.863524][ T31] hub_port_init+0x690/0x3a70 [ 959.869656][ T31] hub_event+0x2ce1/0x4fe0 [ 959.874328][ T31] ? __pfx_hub_event+0x10/0x10 [ 959.881433][ T31] ? pool_move_batch+0x290/0x290 [ 959.889238][ T31] ? rcu_is_watching+0x12/0xc0 [ 959.895387][ T31] process_one_work+0x9cc/0x1b70 [ 959.903146][ T31] ? __pfx_hcd_resume_work+0x10/0x10 [ 959.911079][ T31] ? __pfx_process_one_work+0x10/0x10 [ 959.921188][ T31] ? assign_work+0x1a0/0x250 [ 959.925767][ T31] worker_thread+0x6c8/0xf10 [ 959.971651][ T31] ? __pfx_worker_thread+0x10/0x10 [ 960.074110][ T31] kthread+0x3c2/0x780 [ 960.163555][ T31] ? __pfx_kthread+0x10/0x10 [ 960.188522][ T31] ? rcu_is_watching+0x12/0xc0 [ 960.222555][ T31] ? __pfx_kthread+0x10/0x10 [ 960.246848][ T31] ret_from_fork+0x5d4/0x6f0 [ 960.251450][ T31] ? __pfx_kthread+0x10/0x10 [ 960.260103][ T31] ret_from_fork_asm+0x1a/0x30 [ 960.264892][ T31] [ 960.268633][ T31] [ 960.268633][ T31] Showing all locks held in the system: [ 960.276390][ T31] 1 lock held by kauditd/30: [ 960.284514][ T31] 1 lock held by khungtaskd/31: [ 960.289987][ T31] #0: ffffffff8e5c1260 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 960.302844][ T31] 3 locks held by dhcpcd/5516: [ 960.308279][ T31] 2 locks held by getty/5608: [ 960.312987][ T31] #0: ffff88803211c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 960.325863][ T31] #1: ffffc900036bb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 960.336651][ T31] 5 locks held by kworker/u8:13/6546: [ 960.342011][ T31] 5 locks held by kworker/0:11/9402: [ 960.351208][ T31] #0: ffff88801cebc548 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 960.362177][ T31] #1: ffffc90010117d10 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 960.377762][ T31] #2: ffff88802b306198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x4fe0 [ 960.388694][ T31] #3: ffff88802b3b1518 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2981/0x4fe0 [ 960.400355][ T31] #4: ffff88802afb6e68 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x29aa/0x4fe0 [ 960.412288][ T31] [ 960.414606][ T31] ============================================= [ 960.414606][ T31] [ 960.424658][ T31] NMI backtrace for cpu 0 [ 960.424669][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 960.424688][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 960.424698][ T31] Call Trace: [ 960.424703][ T31] [ 960.424709][ T31] dump_stack_lvl+0x116/0x1f0 [ 960.424733][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 960.424748][ T31] ? _raw_spin_unlock_irqrestore+0x61/0x80 [ 960.424768][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 960.424796][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 960.424815][ T31] watchdog+0xf0e/0x1260 [ 960.424838][ T31] ? __pfx_watchdog+0x10/0x10 [ 960.424855][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 960.424877][ T31] ? __kthread_parkme+0x19e/0x250 [ 960.424903][ T31] ? __pfx_watchdog+0x10/0x10 [ 960.424919][ T31] kthread+0x3c2/0x780 [ 960.424936][ T31] ? __pfx_kthread+0x10/0x10 [ 960.424951][ T31] ? rcu_is_watching+0x12/0xc0 [ 960.424976][ T31] ? __pfx_kthread+0x10/0x10 [ 960.424994][ T31] ret_from_fork+0x5d4/0x6f0 [ 960.425009][ T31] ? __pfx_kthread+0x10/0x10 [ 960.425025][ T31] ret_from_fork_asm+0x1a/0x30 [ 960.425056][ T31] [ 960.425061][ T31] Sending NMI from CPU 0 to CPUs 1: [ 960.547189][ C1] NMI backtrace for cpu 1 [ 960.547202][ C1] CPU: 1 UID: 0 PID: 6167 Comm: kworker/u8:12 Not tainted syzkaller #0 PREEMPT(full) [ 960.547218][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 960.547227][ C1] Workqueue: bat_events batadv_nc_worker [ 960.547244][ C1] RIP: 0010:rcu_is_watching+0x60/0xc0 [ 960.547262][ C1] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 75 5c 48 03 1c ed 60 0e f6 8d 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 0f b6 14 02 <48> 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 24 8b 03 c1 e8 02 [ 960.547274][ C1] RSP: 0018:ffffc9000be17a98 EFLAGS: 00000a06 [ 960.547283][ C1] RAX: dffffc0000000000 RBX: ffff8880b85332a8 RCX: 0000000000000002 [ 960.547291][ C1] RDX: 0000000000000000 RSI: ffffffff8c162d00 RDI: ffffffff8df60e68 [ 960.547299][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 960.547307][ C1] R10: 0000000000000400 R11: 0000000000000000 R12: 0000000000000000 [ 960.547314][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 960.547321][ C1] FS: 0000000000000000(0000) GS:ffff8881247b5000(0000) knlGS:0000000000000000 [ 960.547335][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 960.547343][ C1] CR2: 000055557138e5c8 CR3: 000000006da65000 CR4: 00000000003526f0 [ 960.547351][ C1] Call Trace: [ 960.547355][ C1] [ 960.547360][ C1] lock_acquire+0x2cd/0x350 [ 960.547380][ C1] ? batadv_nc_worker+0x895/0x1030 [ 960.547394][ C1] batadv_nc_worker+0x16a/0x1030 [ 960.547406][ C1] ? batadv_nc_worker+0x159/0x1030 [ 960.547419][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 960.547435][ C1] ? __pfx_batadv_nc_worker+0x10/0x10 [ 960.547450][ C1] ? rcu_is_watching+0x12/0xc0 [ 960.547466][ C1] process_one_work+0x9cc/0x1b70 [ 960.547483][ C1] ? __pfx_bond_arp_monitor+0x10/0x10 [ 960.547498][ C1] ? __pfx_process_one_work+0x10/0x10 [ 960.547514][ C1] ? assign_work+0x1a0/0x250 [ 960.547526][ C1] worker_thread+0x6c8/0xf10 [ 960.547542][ C1] ? __kthread_parkme+0x19e/0x250 [ 960.547559][ C1] ? __pfx_worker_thread+0x10/0x10 [ 960.547572][ C1] kthread+0x3c2/0x780 [ 960.547584][ C1] ? __pfx_kthread+0x10/0x10 [ 960.547596][ C1] ? rcu_is_watching+0x12/0xc0 [ 960.547610][ C1] ? __pfx_kthread+0x10/0x10 [ 960.547622][ C1] ret_from_fork+0x5d4/0x6f0 [ 960.547633][ C1] ? __pfx_kthread+0x10/0x10 [ 960.547645][ C1] ret_from_fork_asm+0x1a/0x30 [ 960.547665][ C1] [ 960.548430][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 960.789514][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) [ 960.798600][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 960.808632][ T31] Call Trace: [ 960.811889][ T31] [ 960.814796][ T31] dump_stack_lvl+0x3d/0x1f0 [ 960.819371][ T31] vpanic+0x6e8/0x7a0 [ 960.823338][ T31] ? __pfx_vpanic+0x10/0x10 [ 960.827825][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 960.833791][ T31] panic+0xca/0xd0 [ 960.837496][ T31] ? __pfx_panic+0x10/0x10 [ 960.841893][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 960.847249][ T31] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 960.853377][ T31] ? watchdog+0xd78/0x1260 [ 960.857772][ T31] ? watchdog+0xd6b/0x1260 [ 960.862166][ T31] watchdog+0xd89/0x1260 [ 960.866387][ T31] ? __pfx_watchdog+0x10/0x10 [ 960.871040][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 960.876220][ T31] ? __kthread_parkme+0x19e/0x250 [ 960.881229][ T31] ? __pfx_watchdog+0x10/0x10 [ 960.885885][ T31] kthread+0x3c2/0x780 [ 960.889931][ T31] ? __pfx_kthread+0x10/0x10 [ 960.894499][ T31] ? rcu_is_watching+0x12/0xc0 [ 960.899241][ T31] ? __pfx_kthread+0x10/0x10 [ 960.903807][ T31] ret_from_fork+0x5d4/0x6f0 [ 960.908370][ T31] ? __pfx_kthread+0x10/0x10 [ 960.912934][ T31] ret_from_fork_asm+0x1a/0x30 [ 960.917686][ T31] [ 960.920865][ T31] Kernel Offset: disabled [ 960.925158][ T31] Rebooting in 86400 seconds..