last executing test programs: 6m24.246089244s ago: executing program 4 (id=381): syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000400)={0x2c, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, &(0x7f0000000340)={0x14, &(0x7f0000000200)={0x20, 0x10, 0xae, {0xae, 0x2, "1527f31323ed452900e10c58c16f9cafaf385b1981c70ab32151976d68f93ba997fcb69c54fa5d9798398988ee8f25cdcb06f0b1d22ed2b82a74afac87276cf33cb87305df6be0ac0127195e0ffef15030bf6052beb596d7a36cc7c9a4609e4d8da169902ae49c9049a6ea04b2d43a36ee32a3c6e08bdef19f7bb7dc488fbdcff707a30301ae1d338eff9cc41fa0440e4084212370f3b0599e9badc6d8a7970fb688d2c7f73f918f4ad39e6a"}}, &(0x7f00000002c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x424}}}, &(0x7f00000010c0)={0x44, &(0x7f0000000e80)={0x40, 0x16}, 0x0, &(0x7f0000000f40)={0x0, 0x8, 0x1, 0x7f}, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x20, 0x84, 0x2, "6cc5"}, &(0x7f0000001080)={0x20, 0x85, 0x3, "547e98"}}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000040)=0x3, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0201, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) sendto(r1, &(0x7f0000000140)="050000007a19b90c9daaeca1b1ec5719af0abbb83b0514127c8b417386b5c7cc0f676b6dac18222d5bf3b8b98708a136ddca61719a13016d", 0x38, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x40045010, &(0x7f0000000080)=0x8079) write$dsp(r0, &(0x7f0000000040)="c7", 0x1) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000001140)=0x80) 6m23.574338373s ago: executing program 4 (id=385): r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000001c0)=0x2, 0x4) sendmsg$key(r1, &(0x7f00000014c0)={0x2, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="02180300140000000000000000000000050005006c0000000a004e2000000003fe8000000000000000000000000000111b43000000000000080012004909f27e0100000000000000060000000000000000000000000000007f000001000000000000000000000000fc01000000000000000000000000000005000600008000000a"], 0xa0}}, 0x0) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, &(0x7f0000000180)=[{0x2, 0x2, {0x2, 0x0, 0x2}, {0x0, 0x0, 0x1}, 0x1, 0xff}], 0x20) r3 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1e7d, 0x2db4, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x4}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x3}}}}}]}}]}}, 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_control_io$cdc_ncm(0xffffffffffffffff, 0x0, &(0x7f0000000740)={0x44, &(0x7f0000000180)={0x60, 0x10, 0x2, "e342"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r3, &(0x7f0000000040)={0x2c, &(0x7f0000000180)=ANY=[@ANYBLOB="0021ac"], 0x0, 0x0, 0x0, 0x0}, 0x0) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) 6m20.00779271s ago: executing program 4 (id=400): r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x1a3, 0x655c, 0x4, 0x40, 0x7fffffff, 0x7fffffff, 0x80, 0xffffffff, 0x1}}}}]}, 0x58}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newtfilter={0x40, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r1, {}, {}, {0x8, 0x9}}, [@filter_kind_options=@f_u32={{0x5}, {0x14, 0x2, [@TCA_U32_DIVISOR={0x8, 0x4, 0x43}, @TCA_U32_HASH={0x8, 0x2, 0x1}]}}]}, 0x40}}, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000004c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0xc77, 0x7fffffff}}]}}]}, 0x48}}, 0x0) 6m19.669160667s ago: executing program 4 (id=403): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[], &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) r6 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r3, r5}, 0x10) bpf$ITER_CREATE(0x1d, &(0x7f0000000040)={r6, 0x7}, 0x8) 6m19.588271823s ago: executing program 4 (id=404): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x2b38094, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfsd\x00', 0x10, 0x0) chroot(&(0x7f0000000180)='./file0\x00') umount2(0x0, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x10) mkdir(0x0, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x40049366, 0x0) 6m19.417942086s ago: executing program 4 (id=405): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x2, r2}) r3 = landlock_create_ruleset(&(0x7f0000000000)={0x4040, 0x0, 0x2}, 0x18, 0x0) landlock_restrict_self(r3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) fcntl$setown(r0, 0x8, r4) truncate(&(0x7f0000000140)='./file0\x00', 0x9) 6m3.854383786s ago: executing program 32 (id=405): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r0, 0x400, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x2, r2}) r3 = landlock_create_ruleset(&(0x7f0000000000)={0x4040, 0x0, 0x2}, 0x18, 0x0) landlock_restrict_self(r3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) fcntl$setown(r0, 0x8, r4) truncate(&(0x7f0000000140)='./file0\x00', 0x9) 6m3.419886916s ago: executing program 0 (id=476): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="01000000054000000900000084"], 0x48) 6m2.067616902s ago: executing program 0 (id=477): setgroups(0xffffffffffffff1a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x14008, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xc, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x75}, [@map_idx_val={0x18, 0xf, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0xb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x78f55855, 0x0, 0x0, 0x0, 0xfa48}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x7}, @alu={0x7, 0x1, 0x5, 0xa, 0x4, 0xffffffffffffffe0, 0xc}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000032140)=""/102344, 0x18fc8, 0x4000c2a) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000340)={'security\x00', 0x0, [0x4, 0x6, 0x1, 0x40, 0x7]}, &(0x7f0000000200)=0x54) 6m0.039297428s ago: executing program 0 (id=488): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_devices(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e0306003c5c980128846360864666702c1ffe80"], 0xffdd) 5m58.352936835s ago: executing program 0 (id=493): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, 0x0, 0x0) open(0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x0) 5m57.918013804s ago: executing program 0 (id=494): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x1, 0x2, 0x0, 0xfbff, 0x8, "008ef14ba278887cb0baba08431799317e6324"}) r3 = dup(r2) write$UHID_INPUT(r3, &(0x7f0000001040)={0x18, {"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", 0x100d}}, 0xfffffdef) 5m56.629757486s ago: executing program 0 (id=500): socket$inet6(0xa, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r4, @ANYBLOB="00000000000000001800120008000100736974000c0002000800020006"], 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="50000000100001042dbd7000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="0000000000000000300012800800010073697400240002800600100002000000", @ANYBLOB="08000100f9ae8aa7b2d5"], 0x50}}, 0x0) 5m56.163326838s ago: executing program 33 (id=500): socket$inet6(0xa, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={0x0, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(r3, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="380000001000050700bbc0000000010007000000", @ANYRES32=r4, @ANYBLOB="00000000000000001800120008000100736974000c0002000800020006"], 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="50000000100001042dbd7000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="0000000000000000300012800800010073697400240002800600100002000000", @ANYBLOB="08000100f9ae8aa7b2d5"], 0x50}}, 0x0) 27.862882294s ago: executing program 1 (id=2691): r0 = socket$qrtr(0x2a, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'wlan1\x00'}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x3, 0x6576, 0xd}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e85000000070000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket$netlink(0x10, 0x3, 0x4) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r1, 0x100000000) 26.579998581s ago: executing program 1 (id=2696): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1d, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @lsm=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2af, @void, @value}, 0x94) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) r1 = syz_io_uring_setup(0x88f, &(0x7f00000001c0)={0x0, 0xaee2, 0x10, 0xffffffff, 0x16}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) socket$xdp(0x2c, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r4, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) listen(0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x47f6, 0x0, 0x0, 0x0, 0x0) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, 0x0, 0x8000000000000003, {}, 0x2}, 0x18) 25.305012711s ago: executing program 1 (id=2705): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x311200, 0x0) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) writev(r4, &(0x7f0000000080)=[{&(0x7f0000001740)='9', 0x1}], 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r4, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) 24.399584744s ago: executing program 1 (id=2710): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg(r1, &(0x7f0000006540)=[{{&(0x7f0000000800)=@ieee802154={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0102}}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000880)="03e4", 0x2}], 0x1}}], 0x1, 0x20004884) chdir(&(0x7f0000000140)='./bus\x00') mkdir(&(0x7f0000000300)='./bus\x00', 0x0) rename(0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r2, &(0x7f0000000040)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @null}, 0x1c) connect$rose(r2, &(0x7f0000000240)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @null}, 0x1c) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/custom0\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000200)={0x6c, 0x0, &(0x7f0000000280)=[@increfs={0x40046304, 0x2}, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000140)={@fda={0x66646185, 0x2, 0x0, 0x18}, @fda={0x66646185, 0x9, 0x1, 0x33}, @ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/84, 0x54, 0x0, 0x3c}}, &(0x7f00000001c0)={0x0, 0x20, 0x40}}}, @enter_looper, @clear_death, @dead_binder_done], 0xb8, 0x0, &(0x7f0000000300)="7a1d4ca199a5db58b90f4247538e6c19f85dad7abacca953dd5285631e24ddec01da6a56d014e556f57d6ca1a778599f47879fa357cef24c322b5056b1242670a4f8b61b7dfc967d7ac8eda8fb72591744de3f6a670db6de5519ec4178d235e745ed951f72db83da08e3814e35b1fadcfd2b1e5bf0280044d0e7043d605c8641ad5dbb4157eeade6859c8b7b094e9f9ec2d253998a2240f6b1bae7f18a1c5bc6e588744f2f887cf5d573a252f4e6a25884be6018beb632d4"}) 24.007945769s ago: executing program 1 (id=2713): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$peekuser(0x3, r0, 0x200) openat$vmci(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000000300)=""/102376, 0x18fe8) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x0, 0x8, @mcast2}, {0xa, 0x0, 0x7, @remote}, r3}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) 23.296000097s ago: executing program 1 (id=2716): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$inet6(0xa, 0x3, 0x7) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x6) socket$alg(0x26, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00'}) 22.543046006s ago: executing program 34 (id=2716): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r0, 0x400000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$inet6(0xa, 0x3, 0x7) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x6) socket$alg(0x26, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00'}) 9.465762121s ago: executing program 6 (id=2754): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) chdir(0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = userfaultfd(0x801) madvise(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xe) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f0000000180), 0xc06620, 0x4) 9.454112762s ago: executing program 2 (id=2755): socket$inet_mptcp(0x2, 0x1, 0x106) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) preadv(r0, 0x0, 0x0, 0x1, 0xa) r4 = socket(0x2b, 0x1, 0x1) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000180)={@private0, 0x8000000, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000180)={@loopback={0x600}, 0x8000000, 0x0, 0xff, 0x0, 0x4}, 0x20) 9.443693973s ago: executing program 3 (id=2756): r0 = socket$inet(0x2, 0x3, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$packet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, 0x0, 0x4000) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r3, 0x70, &(0x7f0000000300)=[@in6={0xa, 0x4e23, 0x0, @local, 0x9}, @in6={0xa, 0x4e21, 0x8e38, @private1={0xfc, 0x1, '\x00', 0x1}, 0x101}, @in6={0xa, 0x4e20, 0x5, @empty, 0x8ad}, @in6={0xa, 0x4e23, 0xd, @loopback, 0x4}]}, &(0x7f0000000140)=0x10) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) syz_io_uring_complete(0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) ioctl$VIDIOC_S_INPUT(0xffffffffffffffff, 0xc0045627, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r4, 0x84, 0x7f, &(0x7f0000000040)="020000000d80ffff", 0x8) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) 9.406868394s ago: executing program 5 (id=2757): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000349000/0xa000)=nil, 0xa000, 0x0, 0x0) r5 = syz_open_dev$cec(&(0x7f0000000000), 0xffffffffffffffff, 0x0) ioctl$CEC_DQEVENT(r5, 0xc0506107, 0x0) io_uring_setup(0x4fc4, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x38, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x14, 0x18, 0xa, 0x101, 0xb00, 0x0, {0x1}}], {0x14, 0x10}}, 0x94}}, 0x0) 7.745691744s ago: executing program 6 (id=2758): socketpair$unix(0x1, 0x5, 0x0, 0x0) socket(0xa, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x41, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0xc) socket(0x1d, 0x2, 0x6) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x2000000000000001) read$msr(0xffffffffffffffff, &(0x7f0000002700)=""/102392, 0x18ff8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x3f8, 0x0, 0x32}, 0x9c) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x13d, 0x0, 0xd6e}}) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0xa, 0xfffe, 0x101, 0x4}}) socket(0x27, 0x3, 0x2000) r2 = dup(0xffffffffffffffff) read$msr(r2, &(0x7f0000000040)=""/57, 0x39) 7.743376151s ago: executing program 2 (id=2759): r0 = socket$rds(0x15, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r5 = socket$inet(0x2, 0x802, 0x1) connect$inet(r5, &(0x7f0000002780)={0x2, 0x4e22, @remote}, 0x10) io_uring_register$IORING_UNREGISTER_RING_FDS(0xffffffffffffffff, 0x15, &(0x7f0000000b00)=[{0x7, 0x1, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000080)=""/159, 0x9f}, {&(0x7f0000000140)=""/94, 0x5e}, {&(0x7f00000001c0)=""/213, 0xd5}, {&(0x7f00000002c0)=""/242, 0xf2}, {&(0x7f00000003c0)=""/180, 0xb4}, {&(0x7f0000000480)=""/10, 0xa}, {&(0x7f00000004c0)=""/225, 0xe1}], &(0x7f0000000640)=[0x9]}, {0x4, 0x1, 0x0, &(0x7f0000000940)=[{&(0x7f0000000680)=""/143, 0x8f}, {&(0x7f0000000740)=""/23, 0x17}, {&(0x7f0000000780)=""/237, 0xed}, {&(0x7f0000000880)=""/179, 0xb3}], &(0x7f0000000980)=[0x80000000]}, {0x1, 0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000009c0)=""/162, 0xa2}], &(0x7f0000000ac0)=[0xd94a, 0x7dcaf84c, 0x0, 0x7, 0x58a6]}], 0x3) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x7, 0x0, 0xa0) 7.699979763s ago: executing program 3 (id=2760): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 7.699371097s ago: executing program 5 (id=2761): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x1) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000002700)=""/102392, 0x18ff8) recvmmsg(0xffffffffffffffff, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000003e00)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r2, 0x3b81, &(0x7f00000000c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_ADD_RESERVED(r2, 0x3ba0, &(0x7f00000003c0)={0x48, 0xc, r3, 0x0, 0x0, 0x200000000}) ioctl$IOMMU_IOAS_MAP$PAGES(r2, 0x3b85, &(0x7f0000000000)={0x28, 0x6, r3, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x4000}) r4 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r4, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x0) 5.958929905s ago: executing program 6 (id=2762): socketpair$unix(0x1, 0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r3, 0x0, 0x30004001) r4 = syz_open_dev$cec(&(0x7f0000000000), 0xffffffffffffffff, 0x0) ioctl$CEC_DQEVENT(r4, 0xc0506107, 0x0) ioctl$CEC_DQEVENT(r4, 0xc0506107, 0x0) ioctl$IOC_PR_PREEMPT(r4, 0x40046109, &(0x7f0000000040)={0xd0, 0xfffffffffffffffe}) writev(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1) 5.955802296s ago: executing program 2 (id=2763): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x82401, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000840), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mknodat$null(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1, 0x103) ioctl$KVM_GET_PIT(r2, 0x4048aec9, &(0x7f0000000080)) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) timer_create(0x8, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r5 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4020ae46, &(0x7f0000000080)={0x1, 0x0, 0x0, r5}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) 5.935371637s ago: executing program 3 (id=2764): mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2, 0xc3072, 0xffffffffffffffff, 0x200000) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) migrate_pages(r0, 0x5, &(0x7f0000000040)=0x9, &(0x7f0000000080)=0x272) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0xc804) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000000) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x7, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000002c0), 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setrlimit(0x0, &(0x7f0000000180)={0x52e7e4b5, 0xcf}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ptrace(0x10, r3) r4 = fsopen(&(0x7f0000000000)='ocfs2\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) ptrace$poke(0x5, r3, &(0x7f0000000080), 0x0) 5.933486013s ago: executing program 5 (id=2765): r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x7) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, 0x0) socket$nl_route(0x10, 0x3, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000600)=@bridge_getneigh={0x20, 0x1e, 0xb7b6511a36acb75d}, 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000540)={@default, @default, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 4.10089864s ago: executing program 6 (id=2766): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) syz_io_uring_setup(0x10e, 0x0, 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r6}, &(0x7f00000006c0), &(0x7f0000000700)=r5}, 0x20) recvmsg$unix(r5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x2301) shutdown(r4, 0x0) 4.087392073s ago: executing program 2 (id=2767): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) getsockopt(r2, 0x1, 0x6, &(0x7f0000000300)=""/137, &(0x7f0000000140)=0x89) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r4 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r4, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(r4, 0x0) sendto$inet6(r4, &(0x7f0000000100)="bc", 0x1, 0x4, &(0x7f00000000c0)={0xa, 0x4e20, 0x8, @loopback, 0x1}, 0x1c) close(r4) 4.085277705s ago: executing program 3 (id=2768): ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open(0x0, 0x64842, 0x22) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$clear(0x3, 0xfffffffffffffffd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, 0x0, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x3, @broadcast, 'vxcan1\x00'}}, 0x1e) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xa, 0x4, 0x6, 0xff, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f0000000980)='system_u:object_r:netutils_exec_t:s0\x00', 0xf, 0x0) 4.081482727s ago: executing program 5 (id=2769): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000640)=@allocspi={0x11c, 0x16, 0x401, 0x0, 0x0, {{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in6=@mcast1, 0x0, 0xfd1, 0x0, 0x2, 0x2, 0x0, 0x0, 0xc}, {@in6=@mcast1, 0x0, 0x33}, @in=@private=0xa010101, {0x0, 0x0, 0x0, 0xfff, 0x8000000000000000, 0x80000001}, {0x101, 0x0, 0x1000, 0x800}, {0x4, 0x2, 0x402}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x94}, 0x0, 0x4ad}, [@lifetime_val={0x24, 0x9, {0x1, 0x0, 0x8000000000000000, 0x40}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20040080}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = syz_io_uring_setup(0x5838, &(0x7f0000000400)={0x0, 0x707b, 0x800, 0x4, 0x8}, &(0x7f0000000340), &(0x7f0000000140)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x42, 0x0, &(0x7f0000000200)) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) io_uring_enter(r2, 0x3516, 0x0, 0x4, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), 0xffffffffffffffff) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x4ca31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600a00, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 2.121801795s ago: executing program 6 (id=2770): creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006380)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f}}, 0x50) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040)={0x400, 0x2004, 0x6, 0x3}, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x35, 0x1, 0x8, 0x0, 0x0) 2.120359942s ago: executing program 2 (id=2771): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r2, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) listen(r2, 0x0) ioctl$sock_TIOCOUTQ(r2, 0x5411, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 2.118328642s ago: executing program 3 (id=2772): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x30dd3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x18801, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x1027, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_default\x00', &(0x7f0000002b40), 0x24, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/wireless\x00') listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/25, 0x19) sendmsg$NFT_BATCH(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) socket(0x18, 0x800, 0x8000) 2.0556612s ago: executing program 5 (id=2773): r0 = openat$iommufd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x80000100008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) pread64(r3, &(0x7f00000001c0)=""/102399, 0x18fff, 0x200) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) write(0xffffffffffffffff, 0x0, 0x97) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) 33.551188ms ago: executing program 6 (id=2774): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000540), 0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_kvm_add_vcpu$x86(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f00000004c0)=""/102392, 0x18ff8) r1 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000040)={0x0, 0x20, &(0x7f0000002580)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="140000002500010000000000f100000006"], 0x14}], 0x1, 0x0, 0x0, 0x400048c0}, 0x0) syz_open_dev$MSR(&(0x7f00000001c0), 0x2, 0x0) syz_usb_connect(0x6, 0x116, &(0x7f0000032680)=ANY=[@ANYBLOB="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"], 0x0) 20.480618ms ago: executing program 2 (id=2775): syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) bind$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1817c1, 0x0) mount$nfs4(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x2, &(0x7f0000000040)=ANY=[@ANYBLOB]) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcd) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000240)={0x3, @bcast, 0xee00}) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000000)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0xee01}) 5.050679ms ago: executing program 3 (id=2776): openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0\x00', 0x0}) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000000680)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f00000009c0)=""/4090, 0xffa}], 0x1}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv4_deladdr={0x2c, 0x15, 0x1, 0xfffffffd, 0x0, {0x2, 0x18, 0x0, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'veth0\x00'}]}, 0x2c}}, 0x0) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x14, r4, 0x1, 0x80000}, 0x14}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_int(r5, 0x0, 0x31, &(0x7f0000000040)=0x3, 0x4) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newaddr={0x20, 0x14, 0x503, 0x800000, 0x25dfdbff, {0x2, 0x18, 0x56, 0xff, r8}, [@IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x20}, 0x1, 0x0, 0x0, 0xc090}, 0x48006) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x4e21, @empty=0x7f000000}}) 0s ago: executing program 5 (id=2777): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000500)=ANY=[@ANYBLOB="200000000d147de52abd7000ffdbdf25080003000100000f080001"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x50) r1 = dup(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r1, 0x8924, 0x0) io_uring_enter(r1, 0x119d, 0x252, 0xa, &(0x7f0000000080)={[0x3]}, 0x8) r2 = socket$inet(0x2, 0xa, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x406, r2) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000040)=0x1, 0x4) signalfd(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) io_uring_register$IORING_REGISTER_NAPI(0xffffffffffffffff, 0x1b, 0x0, 0x1) r4 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r4, 0x0) accept4(r4, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='xfrm0\x00', 0x10) mlock(&(0x7f0000ff5000/0x4000)=nil, 0x4000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYRESDEC=r1], 0x0, 0x32, 0x57, 0x1, 0x1, 0x0, @void, @value}, 0x28) kernel console output (not intermixed with test programs): batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 210.686963][ T8362] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.697985][ T8362] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.706877][ T8362] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.715889][ T8362] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 211.201937][ T8409] netlink: 'syz.3.741': attribute type 1 has an invalid length. [ 211.233539][ T8409] 8021q: adding VLAN 0 to HW filter on device bond1 [ 211.323873][ T8411] netlink: 8 bytes leftover after parsing attributes in process `syz.3.741'. [ 211.655376][ T8409] veth3: entered promiscuous mode [ 211.665740][ T8409] bond1: (slave veth3): Enslaving as an active interface with a down link [ 211.778655][ T8411] ip6gretap1: entered allmulticast mode [ 211.818452][ T8411] bond1: (slave ip6gretap1): making interface the new active one [ 211.827257][ T8411] ip6gretap1: entered promiscuous mode [ 211.842854][ T8411] bond1: (slave ip6gretap1): Enslaving as an active interface with an up link [ 212.161609][ T8434] can0: slcan on pts0. [ 212.961864][ T8431] can0 (unregistered): slcan off pts0. [ 213.409888][ T30] kauditd_printk_skb: 1610 callbacks suppressed [ 213.409903][ T30] audit: type=1400 audit(1749064769.722:2832): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.493302][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.497922][ T30] audit: type=1400 audit(1749064769.752:2833): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.504913][ T8473] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.523918][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 213.527420][ T5484] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 213.534610][ T5818] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 213.552183][ T30] audit: type=1400 audit(1749064769.752:2834): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 213.579368][ T5818] audit: backlog limit exceeded [ 213.591866][ T5484] audit: backlog limit exceeded [ 213.926794][ T8482] netlink: 'syz.5.764': attribute type 10 has an invalid length. [ 213.953397][ T8482] netlink: 40 bytes leftover after parsing attributes in process `syz.5.764'. [ 214.039171][ T8482] team0: Port device geneve0 added [ 216.055912][ T8540] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 216.062577][ T8540] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 216.125353][ T8540] vhci_hcd vhci_hcd.0: Device attached [ 216.310249][ T824] vhci_hcd: vhci_device speed not set [ 216.382176][ T8543] vhci_hcd: connection closed [ 216.410167][ T12] vhci_hcd: stop threads [ 216.426560][ T12] vhci_hcd: release socket [ 216.449367][ T12] vhci_hcd: disconnect device [ 217.049893][ T824] usb 35-1: new full-speed USB device number 2 using vhci_hcd [ 217.057470][ T824] usb 35-1: enqueue for inactive port 0 [ 217.149922][ T824] vhci_hcd: vhci_device speed not set [ 218.421737][ T30] kauditd_printk_skb: 3451 callbacks suppressed [ 218.421747][ T30] audit: type=1400 audit(1749064774.722:5888): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.453363][ T30] audit: type=1400 audit(1749064774.742:5889): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.474642][ T30] audit: type=1400 audit(1749064774.742:5890): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.496016][ T30] audit: type=1400 audit(1749064774.742:5891): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.564234][ T30] audit: type=1400 audit(1749064774.742:5892): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 218.592059][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.597291][ T8621] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.598586][ T5484] audit: audit_lost=136 audit_rate_limit=0 audit_backlog_limit=64 [ 218.616171][ T5484] audit: backlog limit exceeded [ 218.621174][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 219.746862][ T8655] netlink: 'syz.3.814': attribute type 4 has an invalid length. [ 219.820533][ T8658] netlink: 'syz.3.814': attribute type 4 has an invalid length. [ 220.489064][ T8675] netlink: 'syz.1.824': attribute type 1 has an invalid length. [ 220.557597][ T8675] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 220.634243][ T8675] bond1 (unregistering): (slave ip6gretap1): Releasing backup interface [ 220.659180][ T8675] bond1 (unregistering): Released all slaves [ 221.806370][ T8718] netlink: 'syz.5.841': attribute type 2 has an invalid length. [ 223.432447][ T30] kauditd_printk_skb: 5974 callbacks suppressed [ 223.432461][ T30] audit: type=1400 audit(1749064779.752:11821): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.462570][ T30] audit: type=1400 audit(1749064779.782:11822): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.521948][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 223.523123][ T5813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 223.528471][ T5484] audit: audit_lost=153 audit_rate_limit=0 audit_backlog_limit=64 [ 223.550197][ T5813] audit: audit_lost=154 audit_rate_limit=0 audit_backlog_limit=64 [ 223.553352][ T30] audit: type=1400 audit(1749064779.782:11823): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 223.579912][ T5484] audit: backlog limit exceeded [ 223.589670][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 223.597366][ T5484] audit: audit_lost=155 audit_rate_limit=0 audit_backlog_limit=64 [ 223.983996][ T8754] netlink: 4 bytes leftover after parsing attributes in process `syz.6.854'. [ 224.245829][ T8758] netlink: 12 bytes leftover after parsing attributes in process `syz.3.856'. [ 224.802834][ T5865] libceph: connect (1)[c::]:6789 error -101 [ 224.809024][ T5865] libceph: mon0 (1)[c::]:6789 connect error [ 224.940767][ T8760] ceph: No mds server is up or the cluster is laggy [ 225.928843][ T8750] bridge_slave_0: left allmulticast mode [ 225.957414][ T8750] bridge_slave_0: left promiscuous mode [ 225.969077][ T8750] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.011382][ T8750] bridge_slave_1: left allmulticast mode [ 226.017066][ T8750] bridge_slave_1: left promiscuous mode [ 226.031587][ T8750] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.074887][ T8750] bond0: (slave bond_slave_0): Releasing backup interface [ 226.123978][ T8750] bond0: (slave bond_slave_1): Releasing backup interface [ 226.564658][ T8750] team0: Port device team_slave_0 removed [ 226.607571][ T8750] team0: Port device team_slave_1 removed [ 226.629043][ T8750] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 226.636580][ T8750] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 226.651207][ T8750] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 226.658728][ T8750] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 226.781005][ T3529] ip6gretap1: left promiscuous mode [ 227.175543][ T8795] netlink: 'syz.6.869': attribute type 1 has an invalid length. [ 227.223761][ T8795] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 227.252661][ T8795] bond1 (unregistering): (slave ip6gretap1): Releasing backup interface [ 227.265797][ T8795] bond1 (unregistering): Released all slaves [ 228.157391][ T8836] netlink: 'syz.3.882': attribute type 1 has an invalid length. [ 228.369800][ T8836] bond2: (slave ip6gretap2): Enslaving as a backup interface with an up link [ 228.440503][ T30] kauditd_printk_skb: 14729 callbacks suppressed [ 228.440518][ T30] audit: type=1400 audit(1749064784.752:19669): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 228.490536][ T8836] bond2 (unregistering): (slave ip6gretap2): Releasing backup interface [ 228.522218][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 228.528734][ T5484] audit: audit_lost=2450 audit_rate_limit=0 audit_backlog_limit=64 [ 228.548732][ T8849] audit: audit_backlog=65 > audit_backlog_limit=64 [ 228.551385][ T30] audit: type=1400 audit(1749064784.752:19670): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 228.579859][ T5484] audit: backlog limit exceeded [ 228.583895][ T8849] audit: audit_lost=2451 audit_rate_limit=0 audit_backlog_limit=64 [ 228.585257][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 228.609683][ T8836] bond2 (unregistering): Released all slaves [ 228.618568][ T5484] audit: audit_lost=2452 audit_rate_limit=0 audit_backlog_limit=64 [ 228.637049][ T8853] audit: audit_backlog=65 > audit_backlog_limit=64 [ 228.948413][ T8863] netlink: 12 bytes leftover after parsing attributes in process `syz.5.893'. [ 230.556627][ T8893] netlink: 'syz.2.906': attribute type 1 has an invalid length. [ 230.982429][ T8893] bond3: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 231.036960][ T8908] bond3 (unregistering): (slave ip6gretap1): Releasing backup interface [ 231.083479][ T8908] bond3 (unregistering): Released all slaves [ 233.085088][ T8943] netlink: 52 bytes leftover after parsing attributes in process `syz.5.926'. [ 233.451661][ T30] kauditd_printk_skb: 8697 callbacks suppressed [ 233.451677][ T30] audit: type=1400 audit(1749064789.762:27548): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.493471][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 233.500798][ T8952] audit: audit_backlog=65 > audit_backlog_limit=64 [ 233.507308][ T8952] audit: audit_lost=2726 audit_rate_limit=0 audit_backlog_limit=64 [ 233.649848][ T5484] audit: audit_lost=2727 audit_rate_limit=0 audit_backlog_limit=64 [ 233.670265][ T8907] syz.6.909 (8907): drop_caches: 1 [ 233.674072][ T5484] audit: backlog limit exceeded [ 233.680544][ T8952] audit: backlog limit exceeded [ 233.707428][ T30] audit: type=1400 audit(1749064789.762:27549): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 233.719181][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 233.720670][ T5813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 234.136065][ T5864] Process accounting resumed [ 234.191114][ T8967] Process accounting resumed [ 235.488387][ T9005] netlink: 4 bytes leftover after parsing attributes in process `syz.5.948'. [ 237.877982][ T9068] netlink: 12 bytes leftover after parsing attributes in process `syz.6.972'. [ 238.460396][ T30] kauditd_printk_skb: 7697 callbacks suppressed [ 238.460412][ T30] audit: type=1400 audit(1749064794.782:34565): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 238.475417][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.498609][ T5484] audit: audit_lost=2956 audit_rate_limit=0 audit_backlog_limit=64 [ 238.509126][ T5484] audit: backlog limit exceeded [ 238.515474][ T5813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.523756][ T9082] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.524083][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 238.541730][ T5813] audit: audit_lost=2957 audit_rate_limit=0 audit_backlog_limit=64 [ 238.549797][ T5484] audit: audit_lost=2958 audit_rate_limit=0 audit_backlog_limit=64 [ 238.553409][ T9082] audit: audit_lost=2959 audit_rate_limit=0 audit_backlog_limit=64 [ 241.165286][ T9145] netlink: 'syz.1.1001': attribute type 1 has an invalid length. [ 241.380528][ T9145] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1001'. [ 241.382527][ T9149] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 241.480246][ T9149] netdevsim netdevsim1 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 241.533818][ T9149] netdevsim netdevsim1 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 241.587286][ T9149] netdevsim netdevsim1 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 241.658239][ T9149] bond1: (slave geneve2): making interface the new active one [ 241.734738][ T9149] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 242.010735][ T9176] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 242.010735][ T9176] The task syz.5.1010 (9176) triggered the difference, watch for misbehavior. [ 243.097970][ T9200] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1020'. [ 243.158066][ T9200] sit0: Master is either lo or non-ether device [ 243.469896][ T30] kauditd_printk_skb: 8938 callbacks suppressed [ 243.469911][ T30] audit: type=1400 audit(1749064799.782:43156): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.534735][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 243.539112][ T30] audit: type=1400 audit(1749064799.792:43157): avc: denied { map_create } for pid=9217 comm="syz.6.1029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.572434][ T5484] audit: audit_lost=3075 audit_rate_limit=0 audit_backlog_limit=64 [ 243.589057][ T30] audit: type=1400 audit(1749064799.792:43158): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.599926][ T5484] audit: backlog limit exceeded [ 243.640141][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 243.643322][ T30] audit: type=1400 audit(1749064799.792:43159): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 243.658718][ T5484] audit: audit_lost=3076 audit_rate_limit=0 audit_backlog_limit=64 [ 243.680996][ T9223] audit: audit_backlog=65 > audit_backlog_limit=64 [ 244.632615][ T9249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9249 comm=syz.3.1043 [ 244.743845][ T9249] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1043'. [ 245.138632][ T9266] xt_policy: too many policy elements [ 246.756038][ T9302] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1062'. [ 247.439281][ T9316] trusted_key: encrypted_key: hex blob is missing [ 247.477850][ T9320] netlink: 'syz.2.1069': attribute type 10 has an invalid length. [ 247.518006][ T9320] veth1_macvtap: left promiscuous mode [ 247.550574][ T9320] team0: Device veth1_macvtap failed to register rx_handler [ 248.480624][ T30] kauditd_printk_skb: 11130 callbacks suppressed [ 248.480640][ T30] audit: type=1400 audit(1749064804.792:50033): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.545131][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.562200][ T5484] audit: audit_lost=4496 audit_rate_limit=0 audit_backlog_limit=64 [ 248.579904][ T30] audit: type=1400 audit(1749064804.792:50034): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 248.601716][ T5484] audit: backlog limit exceeded [ 248.613027][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.619534][ T7452] audit: audit_lost=4497 audit_rate_limit=0 audit_backlog_limit=64 [ 248.632111][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.638710][ T5484] audit: audit_lost=4498 audit_rate_limit=0 audit_backlog_limit=64 [ 248.648049][ T7452] audit: backlog limit exceeded [ 248.819378][ T9360] netlink: 'syz.2.1084': attribute type 10 has an invalid length. [ 248.831700][ T9360] bond0: (slave wlan1): Opening slave failed [ 250.935442][ T5862] libceph: connect (1)[c::]:6789 error -101 [ 250.941602][ T5862] libceph: mon0 (1)[c::]:6789 connect error [ 251.026224][ T9397] ceph: No mds server is up or the cluster is laggy [ 251.401048][ T5864] page_pool_release_retry() stalled pool shutdown: id 36, 2 inflight 60 sec [ 251.512489][ T9414] bridge_slave_0: left allmulticast mode [ 251.543077][ T9414] bridge_slave_0: left promiscuous mode [ 251.559070][ T9414] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.610651][ T9417] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1103'. [ 251.661618][ T9414] bridge_slave_1: left allmulticast mode [ 251.682101][ T9414] bridge_slave_1: left promiscuous mode [ 251.706655][ T9414] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.768081][ T9414] bond0: (slave bond_slave_0): Releasing backup interface [ 251.821089][ T9414] bond0: (slave bond_slave_1): Releasing backup interface [ 251.911250][ T9414] team0: Port device team_slave_0 removed [ 251.956611][ T9414] team0: Port device team_slave_1 removed [ 251.984340][ T9414] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 252.013647][ T9414] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 252.034713][ T9414] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 252.054224][ T9414] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 252.097124][ T9414] team0: Port device geneve0 removed [ 252.857749][ T9453] Option 'D' to dns_resolver key: bad/missing value [ 253.490025][ T30] kauditd_printk_skb: 8545 callbacks suppressed [ 253.490040][ T30] audit: type=1400 audit(1749064809.802:58222): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 253.516506][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 253.544221][ T5484] audit: audit_lost=4618 audit_rate_limit=0 audit_backlog_limit=64 [ 253.559546][ T7332] audit: audit_backlog=65 > audit_backlog_limit=64 [ 253.576473][ T9465] audit: audit_backlog=65 > audit_backlog_limit=64 [ 253.586365][ T5484] audit: backlog limit exceeded [ 253.598528][ T9465] audit: audit_lost=4619 audit_rate_limit=0 audit_backlog_limit=64 [ 253.609947][ T7332] audit: audit_lost=4620 audit_rate_limit=0 audit_backlog_limit=64 [ 253.617878][ T7332] audit: backlog limit exceeded [ 253.621102][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 253.817003][ T9475] xt_CT: No such helper "pptp" [ 254.035710][ T9482] IPVS: set_ctl: invalid protocol: 50 172.20.20.170:20001 [ 254.702051][ T9498] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1132'. [ 254.744609][ T9498] netlink: 'syz.1.1132': attribute type 7 has an invalid length. [ 254.822224][ T9498] netlink: 'syz.1.1132': attribute type 8 has an invalid length. [ 254.852136][ T9498] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1132'. [ 254.890640][ T9498] ip6gretap0: entered promiscuous mode [ 254.897068][ T9498] syz_tun: entered promiscuous mode [ 254.918906][ T9498] erspan0: entered promiscuous mode [ 255.164669][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.171036][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.026531][ T9530] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1146'. [ 258.033468][ T9575] netlink: 'syz.2.1165': attribute type 2 has an invalid length. [ 258.505117][ T30] kauditd_printk_skb: 8841 callbacks suppressed [ 258.505133][ T30] audit: type=1400 audit(2000000004.610:66659): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.570390][ T30] audit: type=1400 audit(2000000004.650:66660): avc: denied { prog_load } for pid=9585 comm="syz.6.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 258.600944][ T30] audit: type=1400 audit(2000000004.660:66661): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.624102][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 258.629883][ T30] audit: type=1400 audit(2000000004.660:66662): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 258.682148][ T5484] audit: audit_lost=4756 audit_rate_limit=0 audit_backlog_limit=64 [ 258.704420][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 258.721181][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 258.728027][ T7452] audit: audit_lost=4757 audit_rate_limit=0 audit_backlog_limit=64 [ 258.741518][ T30] audit: type=1400 audit(2000000004.660:66663): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 261.536345][ T9628] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.589985][ T9628] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.630044][ T9628] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.772281][ T9628] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.143483][ T9652] mkiss: ax0: crc mode is auto. [ 262.298818][ T9666] netlink: 'syz.2.1196': attribute type 1 has an invalid length. [ 262.327557][ T9666] bond3: entered promiscuous mode [ 262.333138][ T9666] bond3: entered allmulticast mode [ 262.377641][ T9666] geneve2: entered allmulticast mode [ 262.414683][ T9666] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.447093][ T9666] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.488741][ T9673] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1196'. [ 262.519946][ T9666] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.558213][ T9666] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.623647][ T9666] bond3: (slave geneve2): making interface the new active one [ 262.655823][ T9666] geneve2: entered promiscuous mode [ 262.683432][ T9666] bond3: (slave geneve2): Enslaving as an active interface with an up link [ 263.509981][ T30] kauditd_printk_skb: 6534 callbacks suppressed [ 263.509995][ T30] audit: type=1400 audit(2000000009.630:72687): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.549686][ T30] audit: type=1400 audit(2000000009.630:72688): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.573682][ T30] audit: type=1400 audit(2000000009.630:72689): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.597295][ T30] audit: type=1400 audit(2000000009.630:72690): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.598003][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 263.628046][ T30] audit: type=1400 audit(2000000009.630:72691): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 263.661623][ T9691] audit: audit_backlog=65 > audit_backlog_limit=64 [ 263.671393][ T9691] audit: audit_lost=4928 audit_rate_limit=0 audit_backlog_limit=64 [ 263.694004][ T9691] audit: backlog limit exceeded [ 263.705343][ T30] audit: type=1400 audit(2000000009.630:72692): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 264.521256][ T9701] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1208'. [ 264.967304][ T9718] netlink: 'syz.1.1214': attribute type 1 has an invalid length. [ 265.094357][ T9718] bond2 (unregistering): Released all slaves [ 265.854160][ T9739] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1222'. [ 266.300437][ T9747] netlink: 28 bytes leftover after parsing attributes in process `syz.6.1226'. [ 266.320996][ T9747] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1226'. [ 267.838933][ T9783] netlink: 'syz.6.1241': attribute type 1 has an invalid length. [ 267.984021][ T9788] bond2: entered promiscuous mode [ 267.991557][ T9788] 8021q: adding VLAN 0 to HW filter on device bond2 [ 267.999722][ T9788] bond1: (slave bond2): making interface the new active one [ 268.009775][ T9788] bond1: (slave bond2): Enslaving as an active interface with an up link [ 268.154548][ T9792] veth0_vlan: entered allmulticast mode [ 268.258835][ T9793] veth0_vlan: left promiscuous mode [ 268.321627][ T9793] veth0_vlan: entered promiscuous mode [ 268.485557][ T9773] syz.3.1236 (9773): drop_caches: 2 [ 268.521691][ T30] kauditd_printk_skb: 9989 callbacks suppressed [ 268.521704][ T30] audit: type=1400 audit(2000000014.640:80412): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.559000][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 268.561592][ T9801] audit: audit_backlog=65 > audit_backlog_limit=64 [ 268.585387][ T5484] audit: audit_lost=5686 audit_rate_limit=0 audit_backlog_limit=64 [ 268.588251][ T5813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 268.605199][ T5484] audit: backlog limit exceeded [ 268.614067][ T9801] audit: audit_lost=5687 audit_rate_limit=0 audit_backlog_limit=64 [ 268.615395][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 268.622269][ T30] audit: type=1400 audit(2000000014.640:80413): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.622314][ T30] audit: type=1400 audit(2000000014.640:80414): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 268.642796][ T9801] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1247'. [ 269.048833][ T9819] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1255'. [ 269.125324][ T9819] bond0: (slave syz_tun): Releasing backup interface [ 269.453241][ T9831] xt_CT: You must specify a L4 protocol and not use inversions on it [ 270.182001][ T9851] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1266'. [ 270.446058][ T9862] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1272'. [ 273.274444][ T9924] snd_dummy snd_dummy.0: control 0:0:0:syz0:7 is already present [ 273.599904][ T30] kauditd_printk_skb: 8889 callbacks suppressed [ 273.600047][ T30] audit: type=1400 audit(2000000019.510:89056): avc: denied { create } for pid=9925 comm="syz.3.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 273.652960][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 273.661730][ T30] audit: type=1400 audit(2000000019.750:89057): avc: denied { read write } for pid=7332 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 273.714255][ T9930] audit: audit_backlog=65 > audit_backlog_limit=64 [ 273.721339][ T9930] audit: audit_lost=5771 audit_rate_limit=0 audit_backlog_limit=64 [ 273.726624][ T5484] audit: audit_lost=5772 audit_rate_limit=0 audit_backlog_limit=64 [ 273.729263][ T9930] audit: backlog limit exceeded [ 273.766854][ T5484] audit: backlog limit exceeded [ 273.782290][ T30] audit: type=1400 audit(2000000019.750:89058): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 273.819287][ T30] audit: type=1400 audit(2000000019.750:89059): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 275.527490][ T9965] netlink: 44 bytes leftover after parsing attributes in process `syz.5.1306'. [ 275.555694][ T9963] netlink: 44 bytes leftover after parsing attributes in process `syz.5.1306'. [ 276.903925][ T9991] netlink: 'syz.6.1311': attribute type 10 has an invalid length. [ 277.069533][ T9991] 8021q: adding VLAN 0 to HW filter on device bond0 [ 277.189344][ T9991] team0: Port device bond0 added [ 278.611481][ T30] kauditd_printk_skb: 10933 callbacks suppressed [ 278.611495][ T30] audit: type=1400 audit(2000000024.730:95061): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 278.657935][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.664913][ T5484] audit: audit_lost=7417 audit_rate_limit=0 audit_backlog_limit=64 [ 278.672765][T10023] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.686669][ T5484] audit: backlog limit exceeded [ 278.691481][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.698013][ T5818] audit: audit_lost=7418 audit_rate_limit=0 audit_backlog_limit=64 [ 278.700022][T10025] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.706009][T10023] audit: audit_lost=7419 audit_rate_limit=0 audit_backlog_limit=64 [ 278.712659][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 278.805229][T10029] netlink: 'syz.1.1328': attribute type 4 has an invalid length. [ 278.959538][T10034] netlink: 'syz.1.1328': attribute type 4 has an invalid length. [ 280.725541][T10078] xt_CT: No such helper "snmp_trap" [ 281.027526][T10083] netlink: 'syz.1.1349': attribute type 39 has an invalid length. [ 281.441792][T10094] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 281.448301][T10094] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 281.531206][T10094] vhci_hcd vhci_hcd.0: Device attached [ 281.563503][T10095] vhci_hcd: connection closed [ 281.566685][ T36] vhci_hcd: stop threads [ 281.575957][ T36] vhci_hcd: release socket [ 281.589227][ T36] vhci_hcd: disconnect device [ 282.877787][T10106] trusted_key: encrypted_key: key user:syz not found [ 283.621976][ T30] kauditd_printk_skb: 8695 callbacks suppressed [ 283.621991][ T30] audit: type=1400 audit(2000000029.730:103454): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.675291][ T30] audit: type=1400 audit(2000000029.740:103455): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.698170][ T30] audit: type=1400 audit(2000000029.740:103456): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.723760][ T30] audit: type=1400 audit(2000000029.740:103457): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.747096][ T30] audit: type=1400 audit(2000000029.740:103458): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.771301][T10150] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.777863][T10150] audit: audit_lost=7521 audit_rate_limit=0 audit_backlog_limit=64 [ 283.778926][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.788328][ T30] audit: type=1400 audit(2000000029.740:103459): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 283.820001][T10150] audit: backlog limit exceeded [ 288.630057][ T30] kauditd_printk_skb: 6904 callbacks suppressed [ 288.630072][ T30] audit: type=1400 audit(2000000034.750:109693): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 288.741862][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 288.764611][ T5484] audit: audit_lost=7746 audit_rate_limit=0 audit_backlog_limit=64 [ 288.775100][ T30] audit: type=1400 audit(2000000034.780:109694): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 289.219585][T10232] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.229677][ T5484] audit: backlog limit exceeded [ 289.245463][T10234] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.249964][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.253253][T10232] audit: audit_lost=7747 audit_rate_limit=0 audit_backlog_limit=64 [ 289.268783][ T5484] audit: audit_lost=7748 audit_rate_limit=0 audit_backlog_limit=64 [ 291.393152][T10267] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 291.784961][T10287] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1420'. [ 291.990763][T10293] syz.3.1421 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 291.991658][T10287] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1420'. [ 293.089064][T10333] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1438'. [ 293.542382][T10345] netlink: 2048 bytes leftover after parsing attributes in process `syz.5.1441'. [ 293.569518][T10345] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1441'. [ 293.643930][ T30] kauditd_printk_skb: 6972 callbacks suppressed [ 293.643942][ T30] audit: type=1400 audit(2000000039.760:116156): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.699412][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 293.717028][T10350] audit: audit_backlog=65 > audit_backlog_limit=64 [ 293.724854][ T30] audit: type=1400 audit(2000000039.760:116157): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.725783][ T5484] audit: audit_lost=7919 audit_rate_limit=0 audit_backlog_limit=64 [ 293.758378][T10350] audit: audit_lost=7920 audit_rate_limit=0 audit_backlog_limit=64 [ 293.774637][ T30] audit: type=1400 audit(2000000039.760:116158): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.782771][T10350] audit: backlog limit exceeded [ 293.801242][ T5484] audit: backlog limit exceeded [ 293.808696][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 295.948977][T10403] netlink: 'syz.5.1465': attribute type 1 has an invalid length. [ 296.241302][T10407] netlink: 'syz.1.1466': attribute type 10 has an invalid length. [ 296.257030][T10403] 8021q: adding VLAN 0 to HW filter on device bond1 [ 296.267688][T10407] team0: Device ipvlan1 failed to register rx_handler [ 296.671099][T10429] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 297.571367][T10448] netlink: 28 bytes leftover after parsing attributes in process `syz.5.1482'. [ 297.587391][T10448] netlink: 36 bytes leftover after parsing attributes in process `syz.5.1482'. [ 298.688025][ T30] kauditd_printk_skb: 8694 callbacks suppressed [ 298.688078][ T30] audit: type=1400 audit(2000000044.800:122613): avc: denied { prog_load } for pid=10468 comm="syz.1.1491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 298.770043][ T30] audit: type=1400 audit(2000000044.800:122614): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.786642][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.797926][ T30] audit: type=1400 audit(2000000044.800:122615): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 298.820071][T10471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.826571][T10471] audit: audit_lost=8668 audit_rate_limit=0 audit_backlog_limit=64 [ 298.837749][T10471] audit: backlog limit exceeded [ 298.845237][T10471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.851720][ T7332] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.851733][ T7332] audit: audit_lost=8669 audit_rate_limit=0 audit_backlog_limit=64 [ 300.305852][T10503] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1501'. [ 300.348126][T10503] netlink: 'syz.2.1501': attribute type 5 has an invalid length. [ 300.377494][T10503] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1501'. [ 300.416947][T10503] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 256 - 0 [ 300.438212][T10503] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 256 - 0 [ 300.447768][T10503] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 256 - 0 [ 300.463689][T10503] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 256 - 0 [ 300.477105][T10503] geneve3: entered promiscuous mode [ 300.483210][T10503] geneve3: entered allmulticast mode [ 303.690667][ T30] kauditd_printk_skb: 7246 callbacks suppressed [ 303.690684][ T30] audit: type=1400 audit(2000000049.800:129446): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.732855][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.747988][ T5484] audit: audit_lost=8809 audit_rate_limit=0 audit_backlog_limit=64 [ 303.759659][ T5484] audit: backlog limit exceeded [ 303.767132][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.779557][ T5484] audit: audit_lost=8810 audit_rate_limit=0 audit_backlog_limit=64 [ 303.814514][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 303.821863][ T30] audit: type=1400 audit(2000000049.810:129447): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 303.846531][ T5484] audit: backlog limit exceeded [ 303.850210][ T5826] audit: audit_lost=8811 audit_rate_limit=0 audit_backlog_limit=64 [ 303.891727][T10569] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 303.899249][T10569] IPv6: NLM_F_CREATE should be set when creating new route [ 303.906508][T10569] IPv6: NLM_F_CREATE should be set when creating new route [ 305.397505][T10595] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 306.496293][T10616] x_tables: unsorted underflow at hook 3 [ 307.067644][T10620] netlink: 'syz.6.1540': attribute type 1 has an invalid length. [ 307.344350][T10620] 8021q: adding VLAN 0 to HW filter on device bond3 [ 307.449346][T10623] veth3: entered promiscuous mode [ 307.482803][T10629] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1542'. [ 307.487436][T10623] bond3: (slave veth3): Enslaving as an active interface with a down link [ 307.568663][T10624] vlan2: entered allmulticast mode [ 307.568711][T10630] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1542'. [ 307.602307][T10624] bond3: entered allmulticast mode [ 307.625367][T10624] bond3: (slave vlan2): the slave hw address is in use by the bond; couldn't find a slave with a free hw address to give it (this should not have happened) [ 307.940984][T10638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=10638 comm=syz.5.1544 [ 308.699863][ T30] kauditd_printk_skb: 9167 callbacks suppressed [ 308.699877][ T30] audit: type=1400 audit(2000000054.810:137423): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.715166][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.760660][T10647] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.771108][ T5484] audit: audit_lost=9209 audit_rate_limit=0 audit_backlog_limit=64 [ 308.779078][ T5484] audit: backlog limit exceeded [ 308.780136][T10647] audit: audit_lost=9210 audit_rate_limit=0 audit_backlog_limit=64 [ 308.788064][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 308.822183][ T30] audit: type=1400 audit(2000000054.810:137424): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 308.839867][T10647] audit: backlog limit exceeded [ 308.879898][ T5484] audit: audit_lost=9211 audit_rate_limit=0 audit_backlog_limit=64 [ 309.661950][T10662] netlink: 'syz.3.1553': attribute type 10 has an invalid length. [ 311.588733][T10693] veth0_vlan: entered allmulticast mode [ 311.638162][T10693] veth0_vlan: left promiscuous mode [ 311.689664][T10693] veth0_vlan: entered promiscuous mode [ 311.944022][T10701] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1568'. [ 312.206838][T10708] netlink: 'syz.3.1571': attribute type 10 has an invalid length. [ 313.709819][ T30] kauditd_printk_skb: 8444 callbacks suppressed [ 313.709835][ T30] audit: type=1400 audit(2000000059.820:145635): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 313.718275][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.744191][ T5484] audit: audit_lost=9290 audit_rate_limit=0 audit_backlog_limit=64 [ 313.752328][ T5484] audit: backlog limit exceeded [ 313.757280][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.778088][T10729] audit: audit_backlog=65 > audit_backlog_limit=64 [ 313.815819][T10729] audit: audit_lost=9291 audit_rate_limit=0 audit_backlog_limit=64 [ 313.827847][ T5484] audit: audit_lost=9292 audit_rate_limit=0 audit_backlog_limit=64 [ 313.839961][T10729] audit: backlog limit exceeded [ 313.917484][ T30] audit: type=1400 audit(2000000059.820:145636): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 314.502571][T10742] snd_dummy snd_dummy.0: control 0:0:0:syz0:7 is already present [ 314.772388][T10753] IPVS: set_ctl: invalid protocol: 50 172.20.20.170:20001 [ 316.613767][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.644193][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.722232][ T30] kauditd_printk_skb: 7395 callbacks suppressed [ 318.722247][ T30] audit: type=1400 audit(2000000064.830:151827): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.743714][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 318.783078][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 318.797936][ T5826] audit: audit_lost=9694 audit_rate_limit=0 audit_backlog_limit=64 [ 318.809608][ T5484] audit: audit_lost=9695 audit_rate_limit=0 audit_backlog_limit=64 [ 318.812006][ T5826] audit: backlog limit exceeded [ 318.820824][ T30] audit: type=1400 audit(2000000064.840:151828): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.847254][ T30] audit: type=1400 audit(2000000064.840:151829): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.868746][ T30] audit: type=1400 audit(2000000064.840:151830): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 318.925201][ T5484] audit: backlog limit exceeded [ 320.852452][T10842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=10842 comm=syz.5.1614 [ 321.134661][T10847] mkiss: ax0: crc mode is auto. [ 323.781862][ T30] kauditd_printk_skb: 4693 callbacks suppressed [ 323.781879][ T30] audit: type=1400 audit(2000000069.820:155783): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.835661][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.843422][ T5484] audit: audit_lost=9943 audit_rate_limit=0 audit_backlog_limit=64 [ 323.851479][ T30] audit: type=1400 audit(2000000069.930:155784): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 323.879808][ T5484] audit: backlog limit exceeded [ 323.890926][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.904144][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.905343][ T5484] audit: audit_lost=9944 audit_rate_limit=0 audit_backlog_limit=64 [ 323.930341][T10901] audit: audit_backlog=65 > audit_backlog_limit=64 [ 323.936893][ T5826] audit: audit_lost=9945 audit_rate_limit=0 audit_backlog_limit=64 [ 325.058048][T10904] syz.3.1636 (10904): drop_caches: 2 [ 328.280964][T10991] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 328.433520][T10996] batman_adv: batadv0: Adding interface: dummy0 [ 328.483196][T10996] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 328.559193][T10996] batman_adv: batadv0: Interface activated: dummy0 [ 328.742666][T11002] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1670'. [ 328.810007][ T30] kauditd_printk_skb: 9175 callbacks suppressed [ 328.810016][ T30] audit: type=1400 audit(2000000074.930:160861): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 328.893014][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.901108][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 328.921458][ T5484] audit: audit_lost=11312 audit_rate_limit=0 audit_backlog_limit=64 [ 328.934048][ T7452] audit: audit_lost=11313 audit_rate_limit=0 audit_backlog_limit=64 [ 328.962351][ T5484] audit: backlog limit exceeded [ 328.972480][ T7452] audit: backlog limit exceeded [ 328.977358][ T30] audit: type=1400 audit(2000000074.950:160862): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 329.022484][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 329.043023][ T5484] audit: audit_lost=11314 audit_rate_limit=0 audit_backlog_limit=64 [ 329.555151][T11016] batadv_slave_0: entered promiscuous mode [ 330.162254][ T1099] Bluetooth: Error in BCSP hdr checksum [ 330.421593][ T1099] Bluetooth: Error in BCSP hdr checksum [ 330.540391][T11040] ecryptfs_validate_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 330.632909][T11040] Error validating options; rc = [-22] [ 330.700972][ T3529] Bluetooth: Error in BCSP hdr checksum [ 330.951241][ T3529] Bluetooth: Error in BCSP hdr checksum [ 331.060839][T11043] bridge3: entered promiscuous mode [ 331.397704][T11047] sp0: Synchronizing with TNC [ 331.429878][T11048] sp0: Found TNC [ 331.962942][ T5821] Bluetooth: hci2: command 0x1003 tx timeout [ 331.969065][ T5817] Bluetooth: hci2: Opcode 0x1003 failed: -110 [ 332.309311][T11063] team0: Device gtp0 is of different type [ 333.105152][T11082] netlink: 'syz.3.1696': attribute type 27 has an invalid length. [ 333.820422][ T30] kauditd_printk_skb: 7207 callbacks suppressed [ 333.820437][ T30] audit: type=1400 audit(2000000079.930:167907): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.853793][ T30] audit: type=1400 audit(2000000079.940:167908): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.876281][ T30] audit: type=1400 audit(2000000079.940:167909): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.898795][ T30] audit: type=1400 audit(2000000079.940:167910): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 333.899011][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.939678][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 333.946910][ T7452] audit: audit_lost=11369 audit_rate_limit=0 audit_backlog_limit=64 [ 333.957812][ T5484] audit: audit_lost=11370 audit_rate_limit=0 audit_backlog_limit=64 [ 333.970136][ T7452] audit: backlog limit exceeded [ 333.975287][T11102] audit: audit_backlog=65 > audit_backlog_limit=64 [ 334.881825][T11119] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.1707'. [ 334.913175][T11117] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.1707'. [ 335.329397][T11128] team0: Port device bond0 removed [ 335.336314][T11128] batman_adv: batadv0: Interface deactivated: dummy0 [ 335.358020][T11128] batman_adv: batadv0: Removing interface: dummy0 [ 335.385792][T11128] bond1: (slave bond2): Releasing backup interface [ 335.399513][T11128] bond3: (slave veth3): Releasing active interface [ 335.636963][T11132] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11132 comm=syz.3.1711 [ 338.848345][ T30] kauditd_printk_skb: 8898 callbacks suppressed [ 338.848360][ T30] audit: type=1400 audit(2000000084.960:176776): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 338.911962][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.918529][ T5484] audit: audit_lost=11382 audit_rate_limit=0 audit_backlog_limit=64 [ 338.927110][ T5484] audit: backlog limit exceeded [ 338.932167][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.939013][ T5484] audit: audit_lost=11383 audit_rate_limit=0 audit_backlog_limit=64 [ 338.942546][T11212] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.947235][ T5484] audit: backlog limit exceeded [ 338.958633][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 338.965268][ T5484] audit: audit_lost=11384 audit_rate_limit=0 audit_backlog_limit=64 [ 339.851524][T11229] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11229 comm=syz.2.1747 [ 340.276490][T11232] serio: Serial port ptm0 [ 340.608713][T11256] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1756'. [ 340.642978][T11259] netlink: 'syz.2.1759': attribute type 1 has an invalid length. [ 340.790432][T11259] 8021q: adding VLAN 0 to HW filter on device bond4 [ 340.841081][T11269] ptrace attach of ""[11270] was attempted by "./syz-executor exec"[11269] [ 341.458852][T11285] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1768'. [ 341.468655][T11285] netem: unknown loss type 13 [ 341.474561][T11285] netem: change failed [ 342.507479][T11312] netlink: 'syz.3.1779': attribute type 4 has an invalid length. [ 342.559153][T11313] netlink: 'syz.3.1779': attribute type 4 has an invalid length. [ 343.748666][ T5862] IPVS: starting estimator thread 0... [ 343.789939][T11334] net_ratelimit: 98 callbacks suppressed [ 343.789949][T11334] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 343.850539][ T30] kauditd_printk_skb: 10343 callbacks suppressed [ 343.850552][ T30] audit: type=1400 audit(2000000089.970:183295): avc: denied { read } for pid=11337 comm="syz.6.1787" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=0 [ 343.850614][T11336] IPVS: using max 73 ests per chain, 175200 per kthread [ 343.963685][ T30] audit: type=1400 audit(2000000090.080:183296): avc: denied { read write } for pid=7452 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 344.046237][ T30] audit: type=1400 audit(2000000090.120:183297): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 344.146208][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 344.153100][ T5484] audit: audit_lost=12660 audit_rate_limit=0 audit_backlog_limit=64 [ 344.162386][ T5484] audit: backlog limit exceeded [ 344.167306][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 344.174241][ T5484] audit: audit_lost=12661 audit_rate_limit=0 audit_backlog_limit=64 [ 344.183314][ T5484] audit: backlog limit exceeded [ 344.188252][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 345.648349][T11371] netlink: 364 bytes leftover after parsing attributes in process `syz.6.1800'. [ 347.888577][T11413] netlink: 'syz.6.1814': attribute type 4 has an invalid length. [ 348.157397][T11418] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(5) [ 348.163929][T11418] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 348.200613][T11418] vhci_hcd vhci_hcd.0: Device attached [ 348.227291][T11417] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 348.469933][ T24] usb 46-1: SetAddress Request (2) to port 0 [ 348.500442][ T24] usb 46-1: new SuperSpeed USB device number 2 using vhci_hcd [ 348.862680][ T30] kauditd_printk_skb: 8269 callbacks suppressed [ 348.862694][ T30] audit: type=1400 audit(2000000094.980:191460): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.910605][T11419] vhci_hcd: connection reset by peer [ 348.917481][ T30] audit: type=1400 audit(2000000094.980:191461): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.941495][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 348.948342][ T36] vhci_hcd: stop threads [ 348.948476][ T30] audit: type=1400 audit(2000000094.980:191462): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.952917][ T36] vhci_hcd: release socket [ 348.974704][ T30] audit: type=1400 audit(2000000094.980:191463): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.978775][ T5484] audit: audit_lost=12698 audit_rate_limit=0 audit_backlog_limit=64 [ 349.008370][ T30] audit: type=1400 audit(2000000094.980:191464): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.030330][ T36] vhci_hcd: disconnect device [ 349.036613][ T30] audit: type=1400 audit(2000000094.980:191465): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 349.038409][ T5484] audit: backlog limit exceeded [ 349.058187][ T30] audit: type=1400 audit(2000000094.980:191466): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 352.715015][T11517] netlink: 20 bytes leftover after parsing attributes in process `syz.6.1851'. [ 353.561434][ T24] usb 46-1: device descriptor read/8, error -110 [ 353.869884][ T30] kauditd_printk_skb: 9066 callbacks suppressed [ 353.869898][ T30] audit: type=1400 audit(2000000099.980:200317): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 353.937039][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 353.944107][T11538] audit: audit_backlog=65 > audit_backlog_limit=64 [ 353.948922][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 353.957575][ T5484] audit: audit_lost=12771 audit_rate_limit=0 audit_backlog_limit=64 [ 353.968271][T11538] audit: audit_lost=12772 audit_rate_limit=0 audit_backlog_limit=64 [ 353.969861][ T30] audit: type=1400 audit(2000000099.990:200318): avc: denied { map_create } for pid=11534 comm="syz.6.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.989234][T11538] audit: backlog limit exceeded [ 353.995739][ T5818] audit: audit_lost=12773 audit_rate_limit=0 audit_backlog_limit=64 [ 354.003587][ T24] usb usb46-port1: attempt power cycle [ 354.008501][ T5484] audit: backlog limit exceeded [ 354.327705][T11548] netlink: 'syz.2.1864': attribute type 1 has an invalid length. [ 354.494812][T11548] bond5: entered promiscuous mode [ 354.512142][T11548] 8021q: adding VLAN 0 to HW filter on device bond5 [ 354.590752][ T24] usb usb46-port1: unable to enumerate USB device [ 354.611095][T11554] 8021q: adding VLAN 0 to HW filter on device bond5 [ 354.617989][T11554] bond5: (slave ip6gre1): The slave device specified does not support setting the MAC address [ 354.632793][T11554] bond5: (slave ip6gre1): Setting fail_over_mac to active for active-backup mode [ 354.653111][T11554] bond5: (slave ip6gre1): making interface the new active one [ 354.663544][T11554] ip6gre1: entered promiscuous mode [ 354.675221][T11554] bond5: (slave ip6gre1): Enslaving as an active interface with an up link [ 356.824025][T11599] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1880'. [ 356.866896][T11599] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 356.875980][T11599] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 356.884715][T11599] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 356.894998][T11599] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 358.883721][ T30] kauditd_printk_skb: 9149 callbacks suppressed [ 358.883736][ T30] audit: type=1400 audit(2000000105.000:208840): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.918880][ T30] audit: type=1400 audit(2000000105.000:208841): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.943594][ T30] audit: type=1400 audit(2000000105.000:208842): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.966286][ T30] audit: type=1400 audit(2000000105.000:208843): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 358.991121][ T30] audit: type=1400 audit(2000000105.000:208844): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 359.067720][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 359.083839][T11641] audit: audit_backlog=65 > audit_backlog_limit=64 [ 359.104228][ T5484] audit: audit_lost=12983 audit_rate_limit=0 audit_backlog_limit=64 [ 359.130071][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 359.136629][ T5826] audit: audit_lost=12984 audit_rate_limit=0 audit_backlog_limit=64 [ 361.160614][T11684] ALSA: mixer_oss: invalid OSS volume '' [ 362.689696][T11722] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1925'. [ 363.892315][ T30] kauditd_printk_skb: 12693 callbacks suppressed [ 363.892337][ T30] audit: type=1400 audit(2000000110.010:215687): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 363.987029][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 364.033346][ T5484] audit: audit_lost=14935 audit_rate_limit=0 audit_backlog_limit=64 [ 364.059237][ T5484] audit: backlog limit exceeded [ 364.192637][ T30] audit: type=1400 audit(2000000110.010:215688): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 364.408489][ T30] audit: type=1400 audit(2000000110.010:215689): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 364.434418][ T30] audit: type=1400 audit(2000000110.010:215690): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 364.462151][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 364.483087][T11734] audit: audit_backlog=65 > audit_backlog_limit=64 [ 364.489604][T11734] audit: audit_lost=14936 audit_rate_limit=0 audit_backlog_limit=64 [ 365.077638][T11753] netlink: 96 bytes leftover after parsing attributes in process `syz.5.1937'. [ 365.263020][T11762] TCP: tcp_parse_options: Illegal window scaling value 150 > 14 received [ 366.284296][ T24] libceph: connect (1)[c::]:6789 error -101 [ 366.290483][ T24] libceph: mon0 (1)[c::]:6789 connect error [ 366.323807][T11784] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 366.374213][T11778] ceph: No mds server is up or the cluster is laggy [ 368.899810][ T30] kauditd_printk_skb: 8145 callbacks suppressed [ 368.899825][ T30] audit: type=1400 audit(2000000115.010:222105): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 368.919111][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 368.936125][ T5484] audit: audit_lost=15514 audit_rate_limit=0 audit_backlog_limit=64 [ 368.944315][ T5484] audit: backlog limit exceeded [ 368.949388][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 368.977610][ T5484] audit: audit_lost=15515 audit_rate_limit=0 audit_backlog_limit=64 [ 368.994146][ T5484] audit: backlog limit exceeded [ 369.008008][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 369.024529][ T5484] audit: audit_lost=15516 audit_rate_limit=0 audit_backlog_limit=64 [ 369.028248][ T30] audit: type=1400 audit(2000000115.010:222106): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 372.163882][T11880] bridge0: entered allmulticast mode [ 373.915764][ T30] kauditd_printk_skb: 9720 callbacks suppressed [ 373.915774][ T30] audit: type=1400 audit(2000000120.030:228589): avc: denied { prog_load } for pid=11910 comm="syz.5.1990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 373.975668][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 373.988244][ T5484] audit: audit_lost=16596 audit_rate_limit=0 audit_backlog_limit=64 [ 374.002450][ T5484] audit: backlog limit exceeded [ 374.010098][ T30] audit: type=1400 audit(2000000120.030:228590): avc: denied { execmem } for pid=11910 comm="syz.5.1990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 374.031804][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 374.038453][ T5484] audit: audit_lost=16597 audit_rate_limit=0 audit_backlog_limit=64 [ 374.046850][ T5484] audit: backlog limit exceeded [ 374.054219][ T30] audit: type=1400 audit(2000000120.060:228591): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 374.088350][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.089198][T11937] xt_TPROXY: Can be used only with -p tcp or -p udp [ 375.183055][T11942] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2001'. [ 375.315557][T11944] x_tables: ip6_tables: TPROXY.1 target: invalid size 32 (kernel) != (user) 22 [ 378.050159][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.056666][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 378.920247][ T30] kauditd_printk_skb: 13125 callbacks suppressed [ 378.920263][ T30] audit: type=1400 audit(2000000125.040:238466): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 379.142059][ T30] audit: type=1400 audit(2000000125.040:238467): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 379.166388][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 379.176644][ T5484] audit: audit_lost=17682 audit_rate_limit=0 audit_backlog_limit=64 [ 379.184767][ T5484] audit: backlog limit exceeded [ 379.190407][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 379.198483][T12026] audit: audit_backlog=65 > audit_backlog_limit=64 [ 379.215380][ T5484] audit: audit_lost=17683 audit_rate_limit=0 audit_backlog_limit=64 [ 379.234955][ T5484] audit: backlog limit exceeded [ 379.236267][ T5813] audit: audit_backlog=65 > audit_backlog_limit=64 [ 381.596126][T12067] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2043'. [ 381.663013][T12067] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.671857][T12067] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.680547][T12067] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.689212][T12067] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 381.725187][T12067] vxlan0: entered promiscuous mode [ 383.299384][T12091] sp0: Synchronizing with TNC [ 383.800812][T12104] netlink: 'syz.2.2055': attribute type 6 has an invalid length. [ 383.930401][ T30] kauditd_printk_skb: 12141 callbacks suppressed [ 383.930416][ T30] audit: type=1400 audit(2000000130.050:247971): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.964397][ T30] audit: type=1400 audit(2000000130.080:247972): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 383.996832][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 384.004837][ T5484] audit: audit_lost=18564 audit_rate_limit=0 audit_backlog_limit=64 [ 384.013059][ T30] audit: type=1400 audit(2000000130.080:247973): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 384.036095][ T5484] audit: backlog limit exceeded [ 384.041254][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 384.047949][ T5484] audit: audit_lost=18565 audit_rate_limit=0 audit_backlog_limit=64 [ 384.057429][ T30] audit: type=1400 audit(2000000130.080:247974): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 384.079003][ T5484] audit: backlog limit exceeded [ 385.405736][T12135] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2070'. [ 386.402666][T12157] ecryptfs_validate_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 386.432599][T12157] Error validating options; rc = [-22] [ 387.820378][T12176] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 388.331554][T12187] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.338839][T12187] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.377897][T12187] bond0: left promiscuous mode [ 388.382781][T12187] bond_slave_0: left promiscuous mode [ 388.397951][T12187] bond_slave_1: left promiscuous mode [ 388.527132][T12192] hugetlbfs: syz.2.2087 (12192): Using mlock ulimits for SHM_HUGETLB is obsolete [ 388.591321][T12187] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 388.769484][T12187] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 388.852321][T12187] veth0_vlan: left allmulticast mode [ 388.940448][ T30] kauditd_printk_skb: 10228 callbacks suppressed [ 388.940462][ T30] audit: type=1400 audit(2000000135.050:253973): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 388.978174][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 388.994247][T12187] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.007232][T12187] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.027470][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.036336][T12200] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.043585][ T5484] audit: audit_lost=19976 audit_rate_limit=0 audit_backlog_limit=64 [ 389.052952][T12203] audit: audit_backlog=65 > audit_backlog_limit=64 [ 389.054294][T12187] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.059661][T12203] audit: audit_lost=19977 audit_rate_limit=0 audit_backlog_limit=64 [ 389.068610][T12200] audit: audit_lost=19978 audit_rate_limit=0 audit_backlog_limit=64 [ 389.077019][ T30] audit: type=1400 audit(2000000135.060:253974): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 389.086770][ T5484] audit: backlog limit exceeded [ 389.141828][T12187] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.184343][T12187] netdevsim netdevsim1 netdevsim0: left promiscuous mode [ 389.285963][T12187] netdevsim netdevsim1 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 389.325166][T12187] netdevsim netdevsim1 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 389.354338][T12187] netdevsim netdevsim1 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 389.377233][T12187] netdevsim netdevsim1 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 389.415841][T12187] bridge3: left promiscuous mode [ 389.439362][T12187] netdevsim netdevsim1 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 389.448933][T12187] netdevsim netdevsim1 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 389.459402][T12187] netdevsim netdevsim1 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 389.468677][T12187] netdevsim netdevsim1 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 389.504060][T12207] netdevsim netdevsim6 netdevsim0: entered promiscuous mode [ 389.518974][T12207] netdevsim netdevsim6 netdevsim0: entered allmulticast mode [ 389.627524][T12216] netlink: 'syz.1.2096': attribute type 1 has an invalid length. [ 389.819662][T12216] veth3: entered promiscuous mode [ 389.867901][T12216] bond2: (slave veth3): Enslaving as a backup interface with a down link [ 391.914455][T12268] team0: Device gtp0 is up. Set it down before adding it as a team port [ 393.950599][ T30] kauditd_printk_skb: 8015 callbacks suppressed [ 393.950614][ T30] audit: type=1400 audit(2000000140.060:260480): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 394.035895][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 394.053593][ T5484] audit: audit_lost=20482 audit_rate_limit=0 audit_backlog_limit=64 [ 394.094282][ T5484] audit: backlog limit exceeded [ 394.101280][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 394.108907][ T5484] audit: audit_lost=20483 audit_rate_limit=0 audit_backlog_limit=64 [ 394.117751][ T5484] audit: backlog limit exceeded [ 394.125238][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 394.131872][ T5484] audit: audit_lost=20484 audit_rate_limit=0 audit_backlog_limit=64 [ 394.141435][ T5484] audit: backlog limit exceeded [ 395.394279][T12318] serio: Serial port ptm1 [ 397.578515][T12360] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2138'. [ 398.962933][ T30] kauditd_printk_skb: 11747 callbacks suppressed [ 398.962949][ T30] audit: type=1400 audit(2000000145.070:268703): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 398.970791][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 399.015937][ T5484] audit: audit_lost=21660 audit_rate_limit=0 audit_backlog_limit=64 [ 399.029886][ T5484] audit: backlog limit exceeded [ 399.037021][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 399.044464][ T30] audit: type=1400 audit(2000000145.070:268704): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 399.049995][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 399.066063][ T5818] audit: audit_lost=21661 audit_rate_limit=0 audit_backlog_limit=64 [ 399.090492][ T5484] audit: audit_lost=21662 audit_rate_limit=0 audit_backlog_limit=64 [ 399.098478][ T5484] audit: backlog limit exceeded [ 399.800943][T12388] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2148'. [ 400.151623][T12390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12390 comm=syz.6.2149 [ 400.164584][T12390] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=12390 comm=syz.6.2149 [ 400.607658][T12398] ptrace attach of "./syz-executor exec"[5818] was attempted by " [ 400.656197][T12401] xt_nat: multiple ranges no longer supported [ 400.932633][T12405] dummy0: entered promiscuous mode [ 400.972258][T12405] dummy0: entered allmulticast mode [ 401.496813][T12421] bridge0: entered allmulticast mode [ 401.508713][T12421] bridge_slave_1: left allmulticast mode [ 401.521781][T12421] bridge_slave_1: left promiscuous mode [ 401.532349][T12421] bridge0: port 2(bridge_slave_1) entered disabled state [ 401.547153][T12421] bridge_slave_0: left allmulticast mode [ 401.586805][T12421] bridge_slave_0: left promiscuous mode [ 401.625339][T12421] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.504927][T12470] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2180'. [ 403.557133][T12466] ALSA: mixer_oss: invalid OSS volume '' [ 403.591840][T12470] bond0: (slave team0): Releasing backup interface [ 403.620306][T12470] bridge_slave_0: left allmulticast mode [ 403.626398][T12470] bridge_slave_0: left promiscuous mode [ 403.657073][T12470] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.694039][T12470] bridge_slave_1: left allmulticast mode [ 403.709905][T12470] bridge_slave_1: left promiscuous mode [ 403.715609][T12470] bridge0: port 2(bridge_slave_1) entered disabled state [ 403.834146][T12470] bond0: (slave bond_slave_0): Releasing backup interface [ 403.876288][T12470] bond0: (slave bond_slave_1): Releasing backup interface [ 403.907619][T12470] team0: Port device team_slave_0 removed [ 403.925843][T12470] team0: Port device team_slave_1 removed [ 403.932397][T12470] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 403.945120][T12470] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 403.956017][T12470] bond1: (slave ip6erspan0): Releasing active interface [ 403.969587][T12470] bond3: (slave geneve2): Releasing active interface [ 403.976509][ T30] kauditd_printk_skb: 13157 callbacks suppressed [ 403.976520][ T30] audit: type=1400 audit(2000000150.090:276818): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 403.985053][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 404.011597][T12483] audit: audit_backlog=65 > audit_backlog_limit=64 [ 404.018255][T12470] geneve2: left promiscuous mode [ 404.018273][T12483] audit: audit_lost=23344 audit_rate_limit=0 audit_backlog_limit=64 [ 404.023962][ T30] audit: type=1400 audit(2000000150.090:276819): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 404.031766][T12483] audit: backlog limit exceeded [ 404.056862][ T30] audit: type=1400 audit(2000000150.090:276820): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 404.057723][ T5484] audit: audit_lost=23345 audit_rate_limit=0 audit_backlog_limit=64 [ 404.088304][T12470] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.090094][ T5484] audit: backlog limit exceeded [ 404.112329][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 404.119241][T12470] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.132575][T12470] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.142904][T12470] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.159276][T12470] bond5: (slave ip6gre1): Releasing backup interface [ 404.167500][T12470] ip6gre1: left promiscuous mode [ 405.113852][T12498] netlink: 830 bytes leftover after parsing attributes in process `syz.2.2189'. [ 408.881333][T12581] CIFS: iocharset name too long [ 408.982540][ T30] kauditd_printk_skb: 9628 callbacks suppressed [ 408.982553][ T30] audit: type=1400 audit(2000000155.100:285367): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 409.043770][T12588] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2221'. [ 409.060230][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 409.072994][ T5484] audit: audit_lost=23707 audit_rate_limit=0 audit_backlog_limit=64 [ 409.085096][ T30] audit: type=1400 audit(2000000155.100:285368): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 409.106511][T12590] audit: audit_backlog=65 > audit_backlog_limit=64 [ 409.106526][T12590] audit: audit_lost=23708 audit_rate_limit=0 audit_backlog_limit=64 [ 409.106540][T12590] audit: backlog limit exceeded [ 409.107207][T12590] audit: audit_backlog=65 > audit_backlog_limit=64 [ 409.115276][ T5484] audit: backlog limit exceeded [ 409.140213][T12588] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2221'. [ 409.155776][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 413.992152][ T30] kauditd_printk_skb: 12909 callbacks suppressed [ 413.992167][ T30] audit: type=1400 audit(2000000160.110:292814): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 414.019458][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 414.046889][ T5484] audit: audit_lost=25531 audit_rate_limit=0 audit_backlog_limit=64 [ 414.076227][ T5484] audit: backlog limit exceeded [ 414.094802][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 414.117757][ T5484] audit: audit_lost=25532 audit_rate_limit=0 audit_backlog_limit=64 [ 414.163365][ T5484] audit: backlog limit exceeded [ 414.189253][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 414.220363][ T5484] audit: audit_lost=25533 audit_rate_limit=0 audit_backlog_limit=64 [ 414.254970][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 414.746380][T12695] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2256'. [ 414.953883][T12700] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2256'. [ 418.601184][T12749] mac80211_hwsim hwsim5 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 419.033464][ T30] kauditd_printk_skb: 6353 callbacks suppressed [ 419.033478][ T30] audit: type=1400 audit(2000000165.150:299021): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.094514][ T30] audit: type=1400 audit(2000000165.150:299022): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 419.238860][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 419.243671][T12764] audit: audit_backlog=65 > audit_backlog_limit=64 [ 419.245703][ T5484] audit: audit_lost=25583 audit_rate_limit=0 audit_backlog_limit=64 [ 419.262236][ T5484] audit: backlog limit exceeded [ 419.269854][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 419.282428][ T5484] audit: audit_lost=25584 audit_rate_limit=0 audit_backlog_limit=64 [ 419.282900][T12764] audit: audit_lost=25585 audit_rate_limit=0 audit_backlog_limit=64 [ 419.299332][ T30] audit: type=1400 audit(2000000165.150:299023): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 420.698429][T12799] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 424.039950][ T30] kauditd_printk_skb: 7179 callbacks suppressed [ 424.039965][ T30] audit: type=1400 audit(2000000684.157:305250): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 424.082662][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 424.094644][ T5484] audit: audit_lost=25903 audit_rate_limit=0 audit_backlog_limit=64 [ 424.105003][T12857] audit: audit_backlog=65 > audit_backlog_limit=64 [ 424.109860][ T5484] audit: backlog limit exceeded [ 424.116564][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 424.123905][ T5484] audit: audit_lost=25904 audit_rate_limit=0 audit_backlog_limit=64 [ 424.126561][T12857] audit: audit_lost=25905 audit_rate_limit=0 audit_backlog_limit=64 [ 424.131960][ T5484] audit: backlog limit exceeded [ 424.132037][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 424.611255][T12864] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 426.430560][T12898] batadv_slave_0: left promiscuous mode [ 426.459884][T12898] veth0_vlan: left allmulticast mode [ 426.473064][T12898] ip6erspan0: left promiscuous mode [ 426.483776][T12898] vlan2: left promiscuous mode [ 426.526562][T12898] vlan2: left allmulticast mode [ 426.532177][T12898] hsr_slave_1: left allmulticast mode [ 426.538114][T12898] bond3: left promiscuous mode [ 426.543434][T12898] bond3: left allmulticast mode [ 426.548599][T12898] geneve2: left allmulticast mode [ 426.737857][T12898] netdevsim netdevsim2 netdevsim0: unset [1, 1] type 2 family 0 port 256 - 0 [ 426.769974][T12898] netdevsim netdevsim2 netdevsim1: unset [1, 1] type 2 family 0 port 256 - 0 [ 427.225922][T12898] netdevsim netdevsim2 netdevsim2: unset [1, 1] type 2 family 0 port 256 - 0 [ 427.271991][T12898] netdevsim netdevsim2 netdevsim3: unset [1, 1] type 2 family 0 port 256 - 0 [ 427.332094][T12898] geneve3: left promiscuous mode [ 427.337520][T12898] geneve3: left allmulticast mode [ 427.596052][T12898] bond5: left promiscuous mode [ 429.059923][ T30] kauditd_printk_skb: 7055 callbacks suppressed [ 429.059941][ T30] audit: type=1400 audit(2000000689.107:311808): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 429.087601][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 429.094318][ T5484] audit: audit_lost=26072 audit_rate_limit=0 audit_backlog_limit=64 [ 429.106717][T12949] audit: audit_backlog=65 > audit_backlog_limit=64 [ 429.113494][T12949] audit: audit_lost=26073 audit_rate_limit=0 audit_backlog_limit=64 [ 429.125830][ T5484] audit: backlog limit exceeded [ 429.133725][T12949] audit: backlog limit exceeded [ 429.139048][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 429.146080][ T30] audit: type=1400 audit(2000000689.107:311809): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 429.225361][ T5484] audit: audit_lost=26074 audit_rate_limit=0 audit_backlog_limit=64 [ 429.956574][T12955] netdevsim netdevsim6 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.983714][T12955] netdevsim netdevsim6 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.160019][T12955] netdevsim netdevsim6 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.192880][T12955] netdevsim netdevsim6 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.271966][T12955] netdevsim netdevsim6 netdevsim0: left promiscuous mode [ 430.381193][T12955] netdevsim netdevsim6 netdevsim0: left allmulticast mode [ 430.876251][T12955] bond2: left promiscuous mode [ 430.894979][T12955] veth3: left promiscuous mode [ 431.021223][T12977] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2347'. [ 431.604166][T12996] netdevsim netdevsim6 netdevsim0: entered promiscuous mode [ 431.862132][T12998] netdevsim netdevsim5 netdevsim0: entered promiscuous mode [ 431.870380][T12998] netdevsim netdevsim5 netdevsim0: entered allmulticast mode [ 431.893044][T13000] netlink: 'syz.6.2367': attribute type 21 has an invalid length. [ 431.910007][T13000] netlink: 128 bytes leftover after parsing attributes in process `syz.6.2367'. [ 431.960336][T13000] netlink: 'syz.6.2367': attribute type 6 has an invalid length. [ 431.968367][T13000] netlink: 3 bytes leftover after parsing attributes in process `syz.6.2367'. [ 432.317952][T13012] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.325616][T13012] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.361812][T13012] dummy0: left promiscuous mode [ 432.367120][T13012] dummy0: left allmulticast mode [ 432.410816][T13012] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 432.422873][T13012] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 432.459060][T13012] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.468399][T13012] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.478856][T13012] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.487909][T13012] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.498120][T13012] netdevsim netdevsim3 netdevsim0: left promiscuous mode [ 432.513306][T13012] veth3: left promiscuous mode [ 432.518614][T13012] ip6gretap1: left allmulticast mode [ 432.535293][T13012] netdevsim netdevsim3 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 432.544175][T13012] netdevsim netdevsim3 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 432.553048][T13012] netdevsim netdevsim3 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 432.561901][T13012] netdevsim netdevsim3 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 432.596453][T13012] vxlan0: left promiscuous mode [ 432.607216][T13008] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 432.614989][T13008] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 434.079006][ T30] kauditd_printk_skb: 7042 callbacks suppressed [ 434.079021][ T30] audit: type=1400 audit(2000000694.187:318263): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 434.192852][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 434.201481][T13041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 434.228934][ T5484] audit: audit_lost=26271 audit_rate_limit=0 audit_backlog_limit=64 [ 434.229995][T13045] audit: audit_backlog=65 > audit_backlog_limit=64 [ 434.244692][T13041] audit: audit_lost=26272 audit_rate_limit=0 audit_backlog_limit=64 [ 434.254934][T13045] audit: audit_lost=26273 audit_rate_limit=0 audit_backlog_limit=64 [ 434.257115][ T30] audit: type=1400 audit(2000000694.187:318264): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 434.269810][T13045] audit: backlog limit exceeded [ 434.284345][ T5484] audit: backlog limit exceeded [ 435.234462][T13076] netlink: 'syz.1.2385': attribute type 12 has an invalid length. [ 438.006554][T13130] netlink: 'syz.3.2403': attribute type 1 has an invalid length. [ 438.805219][T13149] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(5) [ 438.811758][T13149] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 438.891894][T13149] vhci_hcd vhci_hcd.0: Device attached [ 439.081541][ T30] kauditd_printk_skb: 8595 callbacks suppressed [ 439.081557][ T30] audit: type=1400 audit(2000000699.207:326652): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 439.162728][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 439.176981][ T5484] audit: audit_lost=26343 audit_rate_limit=0 audit_backlog_limit=64 [ 439.284506][ T24] usb 46-1: SetAddress Request (6) to port 0 [ 439.285367][T13154] audit: audit_backlog=65 > audit_backlog_limit=64 [ 439.294732][ T24] usb 46-1: new SuperSpeed USB device number 6 using vhci_hcd [ 439.306447][ T5484] audit: backlog limit exceeded [ 439.318203][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 439.319016][ T30] audit: type=1400 audit(2000000699.207:326653): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 439.348062][T13154] audit: audit_lost=26344 audit_rate_limit=0 audit_backlog_limit=64 [ 439.357276][ T5484] audit: audit_lost=26345 audit_rate_limit=0 audit_backlog_limit=64 [ 439.367361][ T30] audit: type=1400 audit(2000000699.207:326654): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 439.485492][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.491850][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.492518][T13150] vhci_hcd: connection reset by peer [ 439.515444][ T12] vhci_hcd: stop threads [ 439.531580][ T12] vhci_hcd: release socket [ 439.542395][ T12] vhci_hcd: disconnect device [ 442.794859][T13238] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2439'. [ 442.831473][T13238] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2439'. [ 444.094044][ T30] kauditd_printk_skb: 7216 callbacks suppressed [ 444.094059][ T30] audit: type=1400 audit(2000000704.207:332936): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 444.126050][T13260] syz.6.2459 (13260): drop_caches: 2 [ 444.175187][ T30] audit: type=1400 audit(2000000704.217:332937): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 444.175532][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 444.214168][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 444.229803][ T5818] audit: audit_lost=26657 audit_rate_limit=0 audit_backlog_limit=64 [ 444.236746][ T30] audit: type=1400 audit(2000000704.217:332938): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 444.267346][ T5818] audit: backlog limit exceeded [ 444.287547][ T5484] audit: audit_lost=26658 audit_rate_limit=0 audit_backlog_limit=64 [ 444.310757][ T5484] audit: backlog limit exceeded [ 444.315004][ T30] audit: type=1400 audit(2000000704.217:332939): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 444.360441][ T24] usb 46-1: device descriptor read/8, error -110 [ 444.761683][ T24] usb usb46-port1: attempt power cycle [ 445.332848][ T24] usb usb46-port1: unable to enumerate USB device [ 445.495272][T13299] netlink: 'syz.3.2464': attribute type 21 has an invalid length. [ 445.565396][T13299] IPv6: NLM_F_CREATE should be specified when creating new route [ 449.114759][ T30] kauditd_printk_skb: 10848 callbacks suppressed [ 449.114773][ T30] audit: type=1400 audit(2000000709.237:341094): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 449.286740][ T30] audit: type=1400 audit(2000000709.237:341095): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 449.435774][ T30] audit: type=1400 audit(2000000709.237:341096): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 449.478999][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 449.491165][T13360] audit: audit_backlog=65 > audit_backlog_limit=64 [ 449.497880][T13361] audit: audit_backlog=65 > audit_backlog_limit=64 [ 449.518015][ T5484] audit: audit_lost=27557 audit_rate_limit=0 audit_backlog_limit=64 [ 449.521116][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 449.532621][ T5484] audit: backlog limit exceeded [ 449.537671][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 449.687327][T13360] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 449.693860][T13360] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 449.770892][T13360] vhci_hcd vhci_hcd.0: Device attached [ 450.059863][ T824] usb 44-1: SetAddress Request (2) to port 0 [ 450.066275][ T824] usb 44-1: new SuperSpeed USB device number 2 using vhci_hcd [ 450.110452][T13364] vhci_hcd: connection closed [ 450.125481][ T12] vhci_hcd: stop threads [ 450.216028][ T12] vhci_hcd: release socket [ 450.220968][ T12] vhci_hcd: disconnect device [ 450.536501][T13378] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2484'. [ 450.597183][T13378] 8021q: adding VLAN 0 to HW filter on device team1 [ 452.588790][T13424] [U] : [ 452.591865][T13424] [U] [ 452.594562][T13424] [U] [ 452.597253][T13424] [U] [ 452.599951][T13424] [U] [ 452.602642][T13424] [U] [ 452.605335][T13424] [U] [ 452.608024][T13424] [U] [ 452.688384][T13424] [U] [ 452.691098][T13424] [U] [ 452.693794][T13424] [U] [ 452.696488][T13424] [U] [ 452.699184][T13424] [U] [ 452.701877][T13424] [U] [ 452.704567][T13424] [U] [ 452.707254][T13424] [U] [ 452.710919][T13424] [U] [ 452.713623][T13424] [U] [ 452.716312][T13424] [U] [ 452.719001][T13424] [U] [ 452.721696][T13424] [U] [ 452.724385][T13424] [U] [ 452.727077][T13424] [U] [ 452.729756][T13424] [U] [ 452.752788][T13424] [U] [ 452.755495][T13424] [U] [ 452.758204][T13424] [U] [ 452.760902][T13424] [U] [ 452.763593][T13424] [U] [ 452.766283][T13424] [U] [ 452.768974][T13424] [U] [ 452.771665][T13424] [U] [ 452.813490][T13424] [U] [ 452.816210][T13424] [U] [ 452.818906][T13424] [U] [ 452.821603][T13424] [U] [ 452.824297][T13424] [U] [ 452.826993][T13424] [U] [ 452.829683][T13424] [U] [ 452.832377][T13424] [U] [ 452.838377][T13424] [U] [ 452.841085][T13424] [U] [ 452.843779][T13424] [U] [ 452.846477][T13424] [U] [ 452.849170][T13424] [U] [ 452.851868][T13424] [U] [ 452.854565][T13424] [U] [ 452.857242][T13424] [U] [ 452.943850][T13424] [U] [ 452.946559][T13424] [U] [ 452.949236][T13424] [U] [ 452.951893][T13424] [U] [ 452.954554][T13424] [U] [ 452.957212][T13424] [U] [ 452.959872][T13424] [U] [ 452.962530][T13424] [U] [ 453.090984][T13424] [U] [ 453.093691][T13424] [U] [ 453.096357][T13424] [U] [ 453.099026][T13424] [U] [ 453.101683][T13424] [U] [ 453.104341][T13424] [U] [ 453.107006][T13424] [U] [ 453.109663][T13424] [U] [ 453.115964][T13424] [U] [ 453.118671][T13424] [U] [ 453.121363][T13424] [U] [ 453.124051][T13424] [U] [ 453.126737][T13424] [U] [ 453.129429][T13424] [U] [ 453.132121][T13424] [U] [ 453.134807][T13424] [U] [ 453.142261][T13424] [U] [ 453.144960][T13424] [U] [ 453.147649][T13424] [U] [ 453.150336][T13424] [U] [ 453.153024][T13424] [U] [ 453.155693][T13424] [U] [ 453.158353][T13424] [U] [ 453.161010][T13424] [U] [ 453.166087][T13424] [U] [ 453.168769][T13424] [U] [ 453.171439][T13424] [U] [ 453.174115][T13424] [U] [ 453.176783][T13424] [U] [ 453.179465][T13424] [U] [ 453.182133][T13424] [U] [ 453.184803][T13424] [U] [ 453.189686][T13424] [U] [ 453.192379][T13424] [U] [ 453.195064][T13424] [U] [ 453.197752][T13424] [U] [ 453.200440][T13424] [U] [ 453.203130][T13424] [U] [ 453.205818][T13424] [U] [ 453.208506][T13424] [U] [ 453.217866][T13424] [U] [ 453.220567][T13424] [U] [ 453.223256][T13424] [U] [ 453.225940][T13424] [U] [ 453.228624][T13424] [U] [ 453.231311][T13424] [U] [ 453.233996][T13424] [U] [ 453.236682][T13424] [U] [ 453.239563][T13424] [U] [ 453.242256][T13424] [U] [ 453.244934][T13424] [U] [ 453.247605][T13424] [U] [ 453.250274][T13424] [U] [ 453.252973][T13424] [U] [ 453.255641][T13424] [U] [ 453.258315][T13424] [U] [ 453.319961][T13424] [U] [ 453.322648][T13424] [U] [ 453.325306][T13424] [U] [ 453.327961][T13424] [U] [ 453.330617][T13424] [U] [ 453.333272][T13424] [U] [ 453.335925][T13424] [U] [ 453.338579][T13424] [U] [ 453.409968][T13424] [U] [ 453.412688][T13424] [U] [ 453.415377][T13424] [U] [ 453.418059][T13424] [U] [ 453.420732][T13424] [U] [ 453.423406][T13424] [U] [ 453.426073][T13424] [U] [ 453.450728][T13424] [U] [ 454.121205][ T30] kauditd_printk_skb: 4806 callbacks suppressed [ 454.121221][ T30] audit: type=1400 audit(2000000714.237:345745): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 454.151536][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.158341][T13443] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.169068][ T5484] audit: audit_lost=27612 audit_rate_limit=0 audit_backlog_limit=64 [ 454.171642][T13455] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.177124][ T5484] audit: backlog limit exceeded [ 454.194109][T13456] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.202580][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.202698][T13446] audit: audit_backlog=65 > audit_backlog_limit=64 [ 454.209107][T13456] audit: audit_lost=27613 audit_rate_limit=0 audit_backlog_limit=64 [ 455.268833][ T824] usb 44-1: device descriptor read/8, error -110 [ 455.670738][ T824] usb usb44-port1: attempt power cycle [ 455.816429][T13487] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2519'. [ 456.241089][ T824] usb usb44-port1: unable to enumerate USB device [ 458.302073][T13536] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2532'. [ 459.129936][ T30] kauditd_printk_skb: 13553 callbacks suppressed [ 459.129975][ T30] audit: type=1400 audit(2000000719.257:356050): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 459.176615][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 459.178656][T13555] audit: audit_backlog=65 > audit_backlog_limit=64 [ 459.184663][ T5484] audit: audit_lost=28698 audit_rate_limit=0 audit_backlog_limit=64 [ 459.199453][ T30] audit: type=1400 audit(2000000719.277:356051): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 459.211939][T13555] audit: audit_lost=28699 audit_rate_limit=0 audit_backlog_limit=64 [ 459.223398][ T5484] audit: backlog limit exceeded [ 459.233817][ T30] audit: type=1400 audit(2000000719.277:356052): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 459.263096][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 459.282353][ T5484] audit: audit_lost=28700 audit_rate_limit=0 audit_backlog_limit=64 [ 460.722225][T13573] netlink: 'syz.3.2548': attribute type 10 has an invalid length. [ 460.755013][T13573] bond0: (slave wlan1): Opening slave failed [ 464.173469][ T30] kauditd_printk_skb: 10953 callbacks suppressed [ 464.173483][ T30] audit: type=1400 audit(2000001237.292:363158): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 464.217326][ T30] audit: type=1400 audit(2000001237.322:363159): avc: denied { read write } for pid=7452 comm="syz-executor" name="loop6" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 464.251822][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 464.265290][ T5484] audit: audit_lost=29983 audit_rate_limit=0 audit_backlog_limit=64 [ 464.295602][ T5484] audit: backlog limit exceeded [ 464.298145][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 464.300768][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 464.316563][ T30] audit: type=1400 audit(2000001237.332:363160): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 464.324124][ T5826] audit: audit_lost=29984 audit_rate_limit=0 audit_backlog_limit=64 [ 464.348051][T13624] audit: audit_backlog=65 > audit_backlog_limit=64 [ 464.781315][T13633] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2569'. [ 466.794960][T13667] IPVS: lc: UDP 224.0.0.2:0 - no destination available [ 469.179974][ T30] kauditd_printk_skb: 7725 callbacks suppressed [ 469.179989][ T30] audit: type=1400 audit(2000001242.292:369513): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 469.235782][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 469.269842][ T5484] audit: audit_lost=30443 audit_rate_limit=0 audit_backlog_limit=64 [ 469.274306][ T30] audit: type=1400 audit(2000001242.292:369514): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 469.289886][ T5484] audit: backlog limit exceeded [ 469.313881][T13703] audit: audit_backlog=65 > audit_backlog_limit=64 [ 469.327211][ T30] audit: type=1400 audit(2000001242.292:369515): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 469.332779][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 469.364960][T13703] audit: audit_lost=30444 audit_rate_limit=0 audit_backlog_limit=64 [ 469.405677][ T5484] audit: audit_lost=30445 audit_rate_limit=0 audit_backlog_limit=64 [ 470.083822][T13716] netlink: 48 bytes leftover after parsing attributes in process `syz.6.2596'. [ 470.126977][T13716] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2596'. [ 470.518363][T13720] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2591'. [ 470.955795][T13734] xt_cgroup: invalid path, errno=-2 [ 471.004748][T13738] IPVS: sync thread started: state = BACKUP, mcast_ifn = vlan0, syncid = 3, id = 0 [ 474.195283][ T30] kauditd_printk_skb: 6966 callbacks suppressed [ 474.195298][ T30] audit: type=1400 audit(2000001247.312:374581): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 474.320408][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.345497][T13788] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.351565][ T5484] audit: audit_lost=31079 audit_rate_limit=0 audit_backlog_limit=64 [ 474.352042][T13788] audit: audit_lost=31080 audit_rate_limit=0 audit_backlog_limit=64 [ 474.369770][T13788] audit: backlog limit exceeded [ 474.370385][ T30] audit: type=1400 audit(2000001247.312:374582): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 474.384607][T13788] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.399767][ T5484] audit: backlog limit exceeded [ 474.407310][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 474.561153][T13794] trusted_key: encrypted_key: keyword 'load' not allowed when called from .update method [ 474.712062][T13796] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2620'. [ 475.107244][T13813] bridge_slave_0: left allmulticast mode [ 475.114111][T13813] bridge_slave_0: left promiscuous mode [ 475.148383][T13813] bridge0: port 1(bridge_slave_0) entered disabled state [ 475.199886][T13813] bridge_slave_1: left allmulticast mode [ 475.207334][T13813] bridge_slave_1: left promiscuous mode [ 475.217325][T13813] bridge0: port 2(bridge_slave_1) entered disabled state [ 475.257340][T13813] bond0: (slave bond_slave_0): Releasing backup interface [ 475.269475][T13813] bond0: (slave bond_slave_1): Releasing backup interface [ 475.281701][T13813] team0: Port device team_slave_0 removed [ 475.302600][T13813] team0: Port device team_slave_1 removed [ 475.317405][T13813] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 475.690449][T13813] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 475.756006][T13813] bond1: (slave veth3): Releasing active interface [ 475.793390][T13813] bond1: (slave veth3): the permanent HWaddr of slave - da:6f:53:65:2e:29 - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 475.878003][T13813] ip6gretap1: entered promiscuous mode [ 475.905887][T13813] bond1: (slave ip6gretap1): Releasing active interface [ 475.912897][T13813] ip6gretap1: left promiscuous mode [ 476.147495][T13824] netlink: 'syz.1.2631': attribute type 21 has an invalid length. [ 476.177099][T13824] netlink: 128 bytes leftover after parsing attributes in process `syz.1.2631'. [ 476.194580][T13824] netlink: 'syz.1.2631': attribute type 6 has an invalid length. [ 476.202495][T13824] netlink: 3 bytes leftover after parsing attributes in process `syz.1.2631'. [ 478.934302][T13860] netlink: 830 bytes leftover after parsing attributes in process `syz.5.2642'. [ 479.215499][ T30] kauditd_printk_skb: 3470 callbacks suppressed [ 479.215520][ T30] audit: type=1400 audit(2000001252.332:377743): avc: denied { prog_load } for pid=13863 comm="syz.3.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.615356][ T30] audit: type=1400 audit(2000001252.452:377744): avc: denied { read write } for pid=7332 comm="syz-executor" name="loop5" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 479.728155][ T30] audit: type=1400 audit(2000001252.702:377745): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 479.755461][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.762861][ T5484] audit: audit_lost=31185 audit_rate_limit=0 audit_backlog_limit=64 [ 479.776003][ T5484] audit: backlog limit exceeded [ 479.899295][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 479.917947][ T5826] audit: audit_lost=31186 audit_rate_limit=0 audit_backlog_limit=64 [ 479.926770][ T30] audit: type=1400 audit(2000001252.702:377746): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 479.935476][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 481.392062][T13893] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 483.355510][T13919] netlink: 20 bytes leftover after parsing attributes in process `syz.6.2662'. [ 484.414738][ T30] kauditd_printk_skb: 1054 callbacks suppressed [ 484.414750][ T30] audit: type=1400 audit(2000001257.242:378786): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.463609][ T30] audit: type=1400 audit(2000001257.242:378787): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.629853][ T30] audit: type=1400 audit(2000001257.242:378788): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.719390][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 484.741616][ T30] audit: type=1400 audit(2000001257.252:378789): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.830145][ T5484] audit: audit_lost=31192 audit_rate_limit=0 audit_backlog_limit=64 [ 484.854114][ T5484] audit: backlog limit exceeded [ 484.864110][ T30] audit: type=1400 audit(2000001257.282:378790): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 484.954777][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 484.977680][T13945] audit: audit_backlog=65 > audit_backlog_limit=64 [ 486.594491][T13961] mkiss: ax0: crc mode is auto. [ 487.812327][T13980] netlink: 'syz.3.2680': attribute type 21 has an invalid length. [ 487.857272][T13980] netlink: 128 bytes leftover after parsing attributes in process `syz.3.2680'. [ 487.887600][T13980] netlink: 'syz.3.2680': attribute type 6 has an invalid length. [ 487.895503][T13980] netlink: 3 bytes leftover after parsing attributes in process `syz.3.2680'. [ 489.420911][ T30] kauditd_printk_skb: 1246 callbacks suppressed [ 489.420926][ T30] audit: type=1400 audit(2000001262.542:380033): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 489.493294][ T30] audit: type=1400 audit(2000001262.572:380034): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 489.597471][ T30] audit: type=1400 audit(2000001262.572:380035): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 489.635688][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.644299][ T30] audit: type=1400 audit(2000001262.572:380036): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 489.667809][ T5484] audit: audit_lost=31195 audit_rate_limit=0 audit_backlog_limit=64 [ 489.697141][ T5484] audit: backlog limit exceeded [ 489.729262][ T5826] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.743962][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 489.763082][ T5484] audit: audit_lost=31196 audit_rate_limit=0 audit_backlog_limit=64 [ 490.082447][T14010] libceph: resolve '½@½Ée2²âOAq§¨­cz' (ret=-3): failed [ 490.353837][T14018] netlink: 'syz.5.2694': attribute type 21 has an invalid length. [ 490.361738][T14018] netlink: 128 bytes leftover after parsing attributes in process `syz.5.2694'. [ 490.371030][T14018] netlink: 'syz.5.2694': attribute type 6 has an invalid length. [ 490.402376][T14018] netlink: 3 bytes leftover after parsing attributes in process `syz.5.2694'. [ 494.161917][ T5818] syz_tun (unregistering): left promiscuous mode [ 494.631575][ T30] kauditd_printk_skb: 1214 callbacks suppressed [ 494.631590][ T30] audit: type=1400 audit(2000001267.742:381233): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.729792][ T30] audit: type=1400 audit(2000001267.742:381234): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.802364][ T30] audit: type=1400 audit(2000001267.742:381235): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.899980][ T30] audit: type=1400 audit(2000001267.742:381236): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 494.987282][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.991678][ T7452] audit: audit_backlog=65 > audit_backlog_limit=64 [ 494.993951][ T30] audit: type=1400 audit(2000001267.742:381237): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 495.030686][ T5484] audit: audit_lost=31203 audit_rate_limit=0 audit_backlog_limit=64 [ 495.038673][ T5484] audit: backlog limit exceeded [ 495.045948][T14083] audit: audit_backlog=65 > audit_backlog_limit=64 [ 499.363199][T14131] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 499.369740][T14131] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 499.405723][T14131] vhci_hcd vhci_hcd.0: Device attached [ 499.640592][ T30] kauditd_printk_skb: 2164 callbacks suppressed [ 499.640607][ T30] audit: type=1400 audit(2000001272.762:383389): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.670289][ T5865] usb 44-1: SetAddress Request (6) to port 0 [ 499.677036][ T5865] usb 44-1: new SuperSpeed USB device number 6 using vhci_hcd [ 499.702356][ T30] audit: type=1400 audit(2000001272.792:383390): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.749964][ T30] audit: type=1400 audit(2000001272.792:383391): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.765839][T14132] vhci_hcd: connection reset by peer [ 499.790584][ T12] vhci_hcd: stop threads [ 499.795429][ T12] vhci_hcd: release socket [ 499.802929][ T30] audit: type=1400 audit(2000001272.792:383392): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.806031][ T12] vhci_hcd: disconnect device [ 499.842302][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 499.848799][ T5484] audit: audit_lost=31209 audit_rate_limit=0 audit_backlog_limit=64 [ 499.854148][ T30] audit: type=1400 audit(2000001272.792:383393): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.858263][ T5484] audit: backlog limit exceeded [ 499.884437][ T30] audit: type=1400 audit(2000001272.792:383394): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 499.888678][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 500.922703][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.931790][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 504.651715][ T30] kauditd_printk_skb: 2862 callbacks suppressed [ 504.651732][ T30] audit: type=1400 audit(2000001277.772:386255): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.732489][ T30] audit: type=1400 audit(2000001277.772:386256): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.761979][ T5865] usb 44-1: device descriptor read/8, error -110 [ 504.771715][ T30] audit: type=1400 audit(2000001277.772:386257): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.821846][ T30] audit: type=1400 audit(2000001277.772:386258): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.826142][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 504.853183][ T5484] audit: audit_lost=31211 audit_rate_limit=0 audit_backlog_limit=64 [ 504.853284][ T30] audit: type=1400 audit(2000001277.772:386259): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.863522][ T5484] audit: backlog limit exceeded [ 504.883166][ T30] audit: type=1400 audit(2000001277.772:386260): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 504.896896][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 505.172480][ T5865] usb usb44-port1: attempt power cycle [ 505.242911][T14183] wg2: entered promiscuous mode [ 505.248608][T14183] wg2: entered allmulticast mode [ 505.750720][ T5865] usb usb44-port1: unable to enumerate USB device [ 509.659754][ T30] kauditd_printk_skb: 2321 callbacks suppressed [ 509.659771][ T30] audit: type=1400 audit(2000001282.772:388580): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.694660][ T30] audit: type=1400 audit(2000001282.782:388581): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.720972][ T30] audit: type=1400 audit(2000001282.782:388582): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.746625][ T30] audit: type=1400 audit(2000001282.782:388583): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.772877][ T30] audit: type=1400 audit(2000001282.782:388584): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.777234][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 509.798672][ T30] audit: type=1400 audit(2000001282.782:388585): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 509.801980][ T5484] audit: audit_lost=31213 audit_rate_limit=0 audit_backlog_limit=64 [ 509.831243][ T5484] audit: backlog limit exceeded [ 509.837708][ T30] audit: type=1400 audit(2000001282.782:388586): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.672814][ T30] kauditd_printk_skb: 3402 callbacks suppressed [ 514.672829][ T30] audit: type=1400 audit(2000001287.792:391926): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.705648][ T30] audit: type=1400 audit(2000001287.792:391927): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.731644][ T30] audit: type=1400 audit(2000001287.792:391928): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.756967][ T30] audit: type=1400 audit(2000001287.792:391929): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.782769][ T30] audit: type=1400 audit(2000001287.792:391930): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.788458][ T5484] audit: audit_backlog=65 > audit_backlog_limit=64 [ 514.808499][ T30] audit: type=1400 audit(2000001287.792:391931): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.811492][ T5484] audit: audit_lost=31235 audit_rate_limit=0 audit_backlog_limit=64 [ 514.836757][ T30] audit: type=1400 audit(2000001287.792:391932): avc: denied { read } for pid=5484 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 514.840713][ T5484] audit: backlog limit exceeded [ 518.667462][ T1099] Oops: general protection fault, probably for non-canonical address 0xdffffc001fffe000: 0000 [#1] SMP KASAN NOPTI [ 518.679547][ T1099] KASAN: probably user-memory-access in range [0x00000000ffff0000-0x00000000ffff0007] [ 518.689087][ T1099] CPU: 0 UID: 0 PID: 1099 Comm: kworker/u8:6 Not tainted 6.15.0-syzkaller-11802-g1af80d00e1e0 #0 PREEMPT(full) [ 518.700889][ T1099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 518.710943][ T1099] Workqueue: netns cleanup_net [ 518.715713][ T1099] RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 [ 518.721261][ T1099] Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 3e 55 88 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 [ 518.740867][ T1099] RSP: 0018:ffffc90004067308 EFLAGS: 00010206 [ 518.746926][ T1099] RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a33c19b [ 518.754891][ T1099] RDX: ffff888028444880 RSI: ffffffff8a33c122 RDI: 0000000000000005 [ 518.762855][ T1099] RBP: ffff88802af2f800 R08: 0000000000000005 R09: 0000000000000000 [ 518.770807][ T1099] R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 [ 518.778763][ T1099] R13: ffffed10055e5f02 R14: ffff88802af2f828 R15: 0000000000000001 [ 518.786726][ T1099] FS: 0000000000000000(0000) GS:ffff888124765000(0000) knlGS:0000000000000000 [ 518.795809][ T1099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 518.802376][ T1099] CR2: 00002000002e5030 CR3: 000000002a0c0000 CR4: 00000000003526f0 [ 518.810329][ T1099] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 518.818277][ T1099] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 518.826227][ T1099] Call Trace: [ 518.829485][ T1099] [ 518.832400][ T1099] mld_clear_delrec+0xfb/0x640 [ 518.837152][ T1099] ipv6_mc_destroy_dev+0x49/0x690 [ 518.842156][ T1099] ? __local_bh_enable_ip+0xa4/0x120 [ 518.847426][ T1099] addrconf_ifdown.isra.0+0x13ef/0x1a90 [ 518.852959][ T1099] ? __pfx_addrconf_ifdown.isra.0+0x10/0x10 [ 518.858840][ T1099] ? tls_dev_event+0xfd/0x10b0 [ 518.863588][ T1099] addrconf_notify+0x220/0x19e0 [ 518.868423][ T1099] ? ip6mr_device_event+0x1bc/0x230 [ 518.873608][ T1099] notifier_call_chain+0xbc/0x410 [ 518.878621][ T1099] ? __pfx_addrconf_notify+0x10/0x10 [ 518.883889][ T1099] call_netdevice_notifiers_info+0xbe/0x140 [ 518.889764][ T1099] unregister_netdevice_many_notify+0xf9a/0x26f0 [ 518.896073][ T1099] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 518.902814][ T1099] ? __pfx___might_resched+0x10/0x10 [ 518.908086][ T1099] ? rcu_is_watching+0x12/0xc0 [ 518.912837][ T1099] ? nsim_destroy+0xfc/0x5d0 [ 518.917411][ T1099] ? __pfx___mutex_lock+0x10/0x10 [ 518.922414][ T1099] ? net_passive_dec+0xaa/0x1e0 [ 518.927246][ T1099] unregister_netdevice_queue+0x305/0x3f0 [ 518.932948][ T1099] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 518.939171][ T1099] nsim_destroy+0x197/0x5d0 [ 518.943660][ T1099] __nsim_dev_port_del+0x189/0x240 [ 518.948757][ T1099] nsim_dev_reload_destroy+0x10a/0x4d0 [ 518.954202][ T1099] nsim_dev_reload_down+0x6e/0xd0 [ 518.959210][ T1099] devlink_reload+0x1a1/0x7c0 [ 518.963871][ T1099] ? __pfx_devlink_reload+0x10/0x10 [ 518.969052][ T1099] devlink_pernet_pre_exit+0x1a0/0x2b0 [ 518.974500][ T1099] ? __pfx_devlink_pernet_pre_exit+0x10/0x10 [ 518.980463][ T1099] ? up_write+0x1b2/0x520 [ 518.984771][ T1099] ? kobject_put+0xab/0x5a0 [ 518.989254][ T1099] ? __pfx_devlink_pernet_pre_exit+0x10/0x10 [ 518.995219][ T1099] ops_undo_list+0x187/0xab0 [ 518.999801][ T1099] ? __pfx_ops_undo_list+0x10/0x10 [ 519.004905][ T1099] ? __local_bh_enable_ip+0xa4/0x120 [ 519.010180][ T1099] cleanup_net+0x408/0x890 [ 519.014583][ T1099] ? __pfx_cleanup_net+0x10/0x10 [ 519.019528][ T1099] ? rcu_is_watching+0x12/0xc0 [ 519.024285][ T1099] process_one_work+0x9cf/0x1b70 [ 519.029204][ T1099] ? __pfx_toggle_allocation_gate+0x10/0x10 [ 519.035087][ T1099] ? __pfx_process_one_work+0x10/0x10 [ 519.040458][ T1099] ? assign_work+0x1a0/0x250 [ 519.045029][ T1099] worker_thread+0x6c8/0xf10 [ 519.049604][ T1099] ? __kthread_parkme+0x19e/0x250 [ 519.054619][ T1099] ? __pfx_worker_thread+0x10/0x10 [ 519.059716][ T1099] kthread+0x3c5/0x780 [ 519.063773][ T1099] ? __pfx_kthread+0x10/0x10 [ 519.068345][ T1099] ? rcu_is_watching+0x12/0xc0 [ 519.073094][ T1099] ? __pfx_kthread+0x10/0x10 [ 519.077663][ T1099] ret_from_fork+0x5d4/0x6f0 [ 519.082242][ T1099] ? __pfx_kthread+0x10/0x10 [ 519.086810][ T1099] ret_from_fork_asm+0x1a/0x30 [ 519.091564][ T1099] [ 519.094576][ T1099] Modules linked in: [ 519.098874][ T1099] ---[ end trace 0000000000000000 ]--- [ 519.115041][ T1099] RIP: 0010:ip6_mc_clear_src+0x89/0x5a0 [ 519.132589][ T1099] Code: 49 bc 00 00 00 00 00 fc ff df 48 8d 45 10 49 89 c5 48 89 04 24 49 c1 ed 03 4d 01 e5 eb 32 e8 3e 55 88 f7 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 80 04 00 00 4c 8b 3b 48 8d 7b 30 48 89 de e8 [ 519.132614][ T1099] RSP: 0018:ffffc90004067308 EFLAGS: 00010206 [ 519.132627][ T1099] RAX: 000000001fffe000 RBX: 00000000ffff0000 RCX: ffffffff8a33c19b [ 519.132637][ T1099] RDX: ffff888028444880 RSI: ffffffff8a33c122 RDI: 0000000000000005 [ 519.132646][ T1099] RBP: ffff88802af2f800 R08: 0000000000000005 R09: 0000000000000000 [ 519.132655][ T1099] R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 [ 519.132665][ T1099] R13: ffffed10055e5f02 R14: ffff88802af2f828 R15: 0000000000000001 [ 519.132674][ T1099] FS: 0000000000000000(0000) GS:ffff888124865000(0000) knlGS:0000000000000000 [ 519.132690][ T1099] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 519.132700][ T1099] CR2: 0000200000404030 CR3: 0000000034f3f000 CR4: 00000000003526f0 [ 519.132711][ T1099] Kernel panic - not syncing: Fatal exception [ 519.132917][ T1099] Kernel Offset: disabled