last executing test programs: 40.192014278s ago: executing program 3 (id=833): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x3, 0x2, 0x6, 0xfffa}, 0x3a, [0x8000, 0x3, 0xf, 0x8, 0x80, 0x2, 0x3, 0x7f, 0x20000006, 0x20000000, 0x6, 0x5f, 0x9, 0x5, 0xffff2d37, 0xffffff01, 0x6, 0x3, 0x0, 0x5, 0x4, 0x0, 0x7, 0x3c1b, 0x1, 0x24, 0xd, 0x1, 0x0, 0xffffffff, 0xe661, 0x4, 0x7, 0x3, 0x8, 0x4c74, 0x80000000, 0x242, 0x3, 0xc, 0x0, 0x8071, 0x7, 0x6, 0xffffffff, 0x7, 0x5, 0x3e, 0x8f, 0x6, 0x6, 0x0, 0x5, 0x4, 0x8, 0x3ff, 0x80, 0x0, 0x5, 0x6, 0x8, 0x4, 0x1, 0x40], [0x10000007, 0x9, 0x8000012d, 0x8004, 0x5, 0xfffffff3, 0x129432e2, 0xc8, 0xf9, 0xe, 0x2bf, 0x1, 0x9, 0xfffffffc, 0x4, 0x10001, 0x0, 0x5, 0x2f, 0xe, 0x6, 0x78, 0xea4, 0x0, 0x4, 0x7, 0x7fff, 0x6, 0x400, 0x401, 0x6, 0x1, 0xff, 0x5, 0x1000005, 0x5f31, 0x1000d, 0x4e0, 0x2, 0x4, 0xb, 0x4, 0x9, 0x4, 0xd, 0xffff8001, 0x47, 0x8000, 0x1, 0xfe000000, 0xfffe, 0x2, 0x4, 0x9, 0x3, 0x3, 0x9, 0x1, 0x3, 0x3, 0xbc45, 0x3, 0x42, 0x3], [0x5, 0x408, 0x4, 0x5, 0xfffffffe, 0x100, 0x8d2, 0x9, 0x5, 0x7fff, 0x0, 0x5, 0x8, 0x4, 0x5, 0x5, 0x0, 0x1ef, 0x2, 0x8, 0x86, 0x3, 0x303c, 0x3e7, 0xb, 0xc, 0x2, 0x2, 0x3, 0x20000008, 0x4, 0x6d01, 0x6, 0x38, 0x800003, 0x200, 0x83, 0x3, 0x4, 0x2950bfaf, 0x1000, 0xa2, 0x7, 0xa9, 0x5, 0x6, 0xac8, 0xbf, 0x4002, 0x3, 0x7ff, 0x12b, 0x4, 0x1, 0xa, 0x0, 0x5, 0x1c, 0x120000, 0x3, 0x1, 0x80a2ed, 0x4, 0x25], [0x9, 0xbb33, 0x7, 0xb, 0x5, 0x938, 0x6, 0x6, 0x0, 0xb9, 0xce7, 0x1ff, 0x2, 0x57, 0x5, 0x3, 0x101, 0x10000, 0x9, 0x7fff, 0xffff, 0xa620, 0x1, 0x78b, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x16, 0xffffffff, 0x80000000, 0x5, 0x4, 0xc8, 0x1, 0xfffff000, 0x5, 0x3, 0x7e, 0x100, 0x9602, 0x7, 0xaf, 0x8, 0x6, 0x226, 0x5, 0x5, 0x8, 0x30b1d693, 0xa1f, 0xf44, 0x7, 0x1, 0x6c1b, 0x0, 0x4, 0x5, 0xb1e, 0xd7, 0x200, 0xffff343e, 0xfff]}, 0x45c) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a0000205e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000800000000000000000000000000000700000000000000000000000000000000000000000000000300000000000000070000000000000000000000000000000000000000000000e02700000000000000000000000000002d00000000000000000000000000000084010500"], 0x23c}, 0x1, 0x0, 0x3000000}, 0x0) 40.191720008s ago: executing program 3 (id=834): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="1000", @ANYRES16=r1, @ANYBLOB="99742dbd7000fbdbdf2515000000400001802c0004001400010002004e200a01010100000000000000001400020002004e20ac14143800000000000000000d0001007564703a73797a3200000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x2400c000) 40.05341175s ago: executing program 3 (id=836): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="c00000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000007000000c00028005000100"], 0xc0}}, 0x0) 39.879563873s ago: executing program 3 (id=840): openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x20081, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000000)=@ethtool_sset_info={0x37, 0x5}}) syz_open_dev$usbfs(0x0, 0x204, 0x84642) socket$netlink(0x10, 0x3, 0x0) r1 = getpid() r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_INPUT2(r2, &(0x7f0000000040), 0x6) r3 = syz_pidfd_open(r1, 0x0) setns(r3, 0x24020000) mount$bind(0x0, 0x0, 0x0, 0x2125099, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x8000, &(0x7f0000000200)={0x7, 0x0, 0x80000}, 0x20) mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000280), 0x200000, &(0x7f0000000380)=ANY=[@ANYBLOB='max=00000000000000000000002,stats=global,stats=']) 39.844207914s ago: executing program 3 (id=841): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a000020", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000800000000000000000000000000000700000000000000000000000000000000000700000000000300000000000000070000000000000000000000000000000000000000000000e02700000000000000000000000000002d00000000000000000000000000000084010500ac1414bb000000000000000000000000000000006c00000000000000ac14142c000000000000000000000000000000000000560000000000fdffffff01000000ac14141000"/199], 0x23c}}, 0x0) 39.619803587s ago: executing program 3 (id=842): syz_usb_connect$cdc_ecm(0x2, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000200)={'macsec0\x00', &(0x7f0000000100)=@ethtool_rxnfc={0x2d, 0x12, 0x1, {0xb, @ah_ip6_spec={@private2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x8, 0x5}, {0x0, @local, 0x2, 0x1ff, [0xfffffff9, 0x6]}, @tcp_ip4_spec={@empty, @loopback, 0x4e23, 0x4e20, 0x7f}, {0x0, @random="4f3c2f53f685", 0xb28d, 0x3, [0x401]}, 0xfffffffffffff200, 0xe}}}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x2ad67) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x13, r0, 0xad090000) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}, 0x9}, 0x1c) sendmmsg$unix(r1, &(0x7f0000007b80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2404c054}}], 0x1, 0x2000c080) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)='g-', 0x2}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) read(r0, &(0x7f0000000700)=""/4096, 0x1000) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x2e000, 0x34, 0x2}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'wlan0\x00', 0x400}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000006c0)={'bridge_slave_0\x00', 0x600}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=0x0) prlimit64(r5, 0xb, &(0x7f00000002c0)={0x3, 0x1bb}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r6, 0x0, 0x40, &(0x7f0000000080)="8c5d7b87b32ecae06ac8cfe890364ab911d8c33439477a7591f6914e91c6821ee7163f8ae1896184d48797997716158aad89f66dd67480ce8ff178ef748cfcdcf54127d5ff95cbcaebf10a3b7cddafa2c0fa6aa2eaef0d457680203c02d0c623", 0x60) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000240)={0x8, 0x800}) 28.258994368s ago: executing program 2 (id=868): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a000020", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000800000000000000000000000000000700000000000000000000000003000000000000000000000300000000000000070000000000000000000000000000000000000000000000e02700000000000000000000000000002d00000000000000000000000000000084010500ac1414bb000000000000000000000000000000006c00000000000000ac14142c000000000000000000000000000000000000560000000000fdffffff01000000ac14141000"/199], 0x23c}}, 0x0) 23.35020135s ago: executing program 2 (id=871): r0 = syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000640)=ANY=[@ANYBLOB="12010000090000402505a8a440000102030109021b00010100000009040000020701010009050102"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000000)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x20, 0x0, 0xfffffffffffffc4a}}) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) syz_open_dev$char_usb(0xc, 0xb4, 0x2000000) r2 = syz_usb_connect(0x0, 0x10b, &(0x7f0000000480)=ANY=[@ANYBLOB="12010002251c0420e60f0097709e010203010902f900010c06b0090904550e064ae415ff720231ab3564c97e162b239bec655fb158c7cd4a30af41a50dffc77e01ef79365ddedc1de9aae68ff166b7895b2ffe28f15c14439ad0ad1903ece4daa95db6dd65ae37c5fb057aa2a3174aa5e402f86015bd34d389ac84922816b1a0ddc90b779488d4f150f1a8a4e4a9af1e8c4d33e3814ab60259f51694e3a20809050bce20000e030707250183077f00090501100002400703072501800600000725015c0602000905000c400005f90b072501837f04000905090308000e090007250182fb03000725018008ef02090500000002060606072501804604000725018209760109050800200004"], &(0x7f00000002c0)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x300, 0x1, 0x7, 0x5, 0x10, 0x4}, 0x148, &(0x7f0000000780)={0x5, 0xf, 0x148, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0xc, "31302c5e70554d9f223390bc0530efd8"}, @generic={0xa8, 0x10, 0x4, "fca969f9ec2a5ad708bf432acc4738c16ec8246c9330092039d297d13094c53f8c7623ed39aca3b30bb2d506f88c3d3fc61aec1c01a56694f875fca40e5faae799be779f02abfeb394bdb179a32ca7ca2b822f7937341eba447ad09838be340eafe425e76fae64be74bc9e8b2dd82fd0e33f01568bc47d5575f16983d064f2e780bb2ebbeb4973f9ae07fc0a0f5a7823e785a65c49a7df6eb8facda068dc6a7f17c0644444"}, @generic={0x67, 0x10, 0x1, "6198ee25c27817eb5fedef0253944b8a1ad20344ed939724455669c7c20fccdb6dd4e86f3d6bdb7503e8275d719fb753e354f9f0344b0caefd300b810dac82cdbc6f8cb0edda8e1071a840a81ff92aa1ba3dde130447a623f73c4a5bf5f54023f8676157"}, @ssp_cap={0x20, 0x10, 0xa, 0x14, 0x5, 0xa, 0xf, 0x3, [0x3f, 0xc000, 0xff000f, 0x50, 0xa0c0]}]}, 0x3, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x807}}, {0xed, &(0x7f0000000900)=@string={0xed, 0x3, "4cec4fb49fd6704e40059661c354f10d6c187464e0b106baedd5c434d4f44a467a7a138a26d8bd19c2305d065746f11dce9fa302a2206b07fcf7620385b177970bf40bf4e647d76993e522499026a2a1ae887041981a6bf43a0184b3a157fd38270205b0ee60f9adcdfbe235fead2e5c76bca89335b148bb087e0e0fbd4626801f9af6d38671230e4d1e0416fc15f419fbc74b2fe253c5187da85b7ec42c496c9b653ffcb1466c23ae642bc9a284f6c0cec123f22b72bd8b5db41e4abbf729d0a015d063d215d0c49aa3c33a85c903f8d345d9495c44e3b3e946b934c4ecc4b2901c747c09adfefc6811bd"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x3409}}]}) syz_usb_control_io$uac1(r2, &(0x7f00000005c0)={0x14, &(0x7f0000000a00)={0x40, 0x2, 0xa5, {0xa5, 0x3, "f7933c34f02ba5266559c3daef4b4fd9298e7ab9c28c50e56c2a593851951cccc25bfe9f29a6bd98d378c991a6c3eaa621deb5a8073650f64f184ad21689568dd4b2b287455276ab5b2077414f02c4e323dbd726482df5576278be818f2572137b57c2544926df84757e61a9540748827b2997730655f674db51eef87acec4532627abf5168c0074112d72bb02c0ad8032e5f949e93afaad0bf41850a93fa416994f73"}}, &(0x7f0000000ac0)={0x0, 0x3, 0xd2, @string={0xd2, 0x3, "fec546863c15480839286ceeb14898b14d52271323ae14b2161ce360bdca395be429ccc9a4ab9e5c855d13bfef5fd40c4c03e3a4c22e998d82b85d608b89d7e0820390bae104d58984d6d3d7ec966e0a346de2a3fc8df0e7f1bf8c710ca1a28bd8a227075e62b9554fb8796c159de2d27afd305d3ce0d8f91339e2719dd856acd05f218c91787a9fd8c6f1011b10096b2258429321888a8cfe932427162ee677b90b0696fe64bbaa3d927ff0f3be151b63823abc989cee1398c3b2477589338bb825cdb08ffb3de6775b09c80f36fca4"}}}, &(0x7f0000000d40)={0x44, &(0x7f0000000680)={0x40, 0x30, 0x61, "c986547a3398df16496e6855c94817fd1384637796dee9520eb4b875192cd0b37d1f1cf69b1abbf158c814583169dfc4225ec176a01d43bf64184eb82788659c7f447be74bff556f996bbc454bce2b1cc648486aa16ff34ac44594300bcf37ce3c"}, &(0x7f0000000600)={0x0, 0xa, 0x1, 0x2}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x10}, &(0x7f0000000c00)={0x20, 0x81, 0x2, '13'}, &(0x7f0000000c40)={0x20, 0x82, 0x1, '&'}, &(0x7f0000000c80)={0x20, 0x83, 0x2, "351c"}, &(0x7f0000000cc0)={0x20, 0x84, 0x4, "99d4d7f2"}, &(0x7f0000000d00)={0x20, 0x85, 0x3, "13d91d"}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x1a1202, 0x0) pwrite64(r3, &(0x7f0000000100)="eb5bce93", 0x4, 0x7fffffffffffffff) syz_usb_connect$uac1(0x3, 0x71, &(0x7f0000000200)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x20, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x4, 0x4}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0x3, 0x8, 0x7, {0x7, 0x25, 0x1, 0x1, 0x53, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x8, 0x10, 0x3, {0x7, 0x25, 0x1, 0x83, 0xf, 0x5}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xc2, &(0x7f0000000300)=ANY=[@ANYBLOB="c203dcf415031387f7e998056d9140e12799abe18c976f0d8105e2f990f41f074f52319828d0718a120417b645cbaf0610e5d3f0a57425c788ba1faca8bbb24345da00c63a726a82837c36549325f3e72a6b8e96d2cf681b1f14fae55bd7740d2d15edfd0183240ea9e19ab9088c94a86ea9e29b152cd9445d7f5e15f7999a6bed099e22e35ddb5b17cae295c5e9716b7fa943c99bdb5a315e0d1abd4f26390a22ebd954ff72e7b9db778c7186aec57b76a44172b9f3ec245b7a8f2754e84f7de082"]}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x438}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0xf4ff}}, {0x0, 0x0}]}) syz_usb_connect$uac1(0x0, 0x8b, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x79, 0x3, 0x1, 0x1, 0x0, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x3, 0x8}, [@mixer_unit={0x9, 0x24, 0x4, 0x4, 0x0, "f91cafc0"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x40, 0x3, 0x0, 0x0, "4dff"}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0x7, 0x7f, 0x2, {0x7, 0x25, 0x1, 0x81, 0x2, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x4, 0x3, 0x5}]}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0xe, 0x58, 0x1, {0x7, 0x25, 0x1, 0x85, 0x4, 0x5}}}}}}}]}}, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) 20.601406826s ago: executing program 2 (id=874): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="020e000010"], 0x80}}, 0x4814) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) r4 = getpgid(0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) sendmsg$netlink(r3, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000880)=[{0x0, 0x790}], 0x1, &(0x7f0000000b00)=[@cred={{0x1c, 0x1, 0x2, {r4, r6, 0xee01}}}], 0x20, 0x40000}, 0x400c810) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) write$cgroup_devices(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="1b2308217f014f", @ANYRES16=0x0, @ANYRES16], 0xffdd) sendmmsg(r1, &(0x7f0000000180), 0x229ffa1c4ce5369, 0x0) recvmmsg(r1, &(0x7f0000000580)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, 0x0}, 0x6}], 0x2, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x100}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000500)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f00000001c0)={@fda={0x66646185, 0xfffffffffffffffd, 0x2, 0x36}, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x0, 0x33}, @flat=@binder={0x73622a85, 0x1100, 0x1}}, &(0x7f0000000280)={0x0, 0x20, 0x48}}, 0x10}], 0x0, 0x0, 0x0}) 16.796250319s ago: executing program 0 (id=875): openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_wakeup_irq', 0x42002, 0x843aefb762b5bc6b) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) write$cgroup_int(r0, &(0x7f00000001c0)=0x722, 0x12) r1 = syz_usb_connect(0x5, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x92, 0xec, 0xc6, 0x20, 0x5ac, 0x77c2, 0xeb3a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0xc4, 0x1, 0x2, 0xff, 0xfd, 0x1, 0x80, [], [{{0x9, 0x5, 0x2, 0x2, 0x210, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r1, &(0x7f0000000000)={0x14, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0003020000000203271953d48a14e829c767721d3e90a21d6f1513472bb0c65eab630633432fd0c10e03660558aa6e77f5961041ac735a51416697a7956d2c5525007f5881f8fb704eb3f0b9f2a3a010008937cce9f79ac5f2dd0230896d4e978cf2b86796b7"]}, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, &(0x7f0000000080)={0x1c, &(0x7f0000000a80)={0x0, 0xc, 0xffffffffffffff01, "bf47582ebdd0"}, 0x0, &(0x7f0000000c00)={0x0, 0x8, 0x1, 0x7}}) syz_usb_control_io$hid(r1, 0x0, 0x0) 16.612233272s ago: executing program 1 (id=876): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000000c0)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffed]}, 0x0, 0x8) r1 = gettid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x7, &(0x7f0000000000)={0x202b, 0x0, 0x4}) r3 = gettid() tkill(r3, 0x11) io_pgetevents(0x0, 0x9, 0x0, 0x0, 0x0, 0x0) r4 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00220f00000003a8407a730b93bf0280b3"], 0x0}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r5 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) r6 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x22052, r6, 0x2000) ioctl$HIDIOCGREPORT(r5, 0x400c4807, &(0x7f00000000c0)={0x3}) 13.950654627s ago: executing program 0 (id=877): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="c00000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400fe8000000000000000000000fff000000c00028005000100"], 0xc0}}, 0x0) 13.876603138s ago: executing program 1 (id=878): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="100000", @ANYRES16=r1, @ANYBLOB="99742dbd7000fbdbdf2515000000400001802c0004001400010002004e200a01010100000000000000001400020002004e20ac14143800000000000000000d0001007564703a73797a3200000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x2400c000) 11.620984716s ago: executing program 0 (id=879): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a000020", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000800000000000000000000000000000700000000000000000000000006000000000000000000000300000000000000070000000000000000000000000000000000000000000000e02700000000000000000000000000002d00000000000000000000000000000084010500ac1414bb000000000000000000000000000000006c00000000000000ac14142c000000000000000000000000000000000000560000000000fdffffff01000000ac14141000"/199], 0x23c}}, 0x0) 11.226240692s ago: executing program 1 (id=880): r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004c40)=[{{&(0x7f0000000140)={0xa, 0x4e22, 0x3, @loopback, 0xfffffff9}, 0x1c, 0x0, 0x0, &(0x7f00000017c0)=[@tclass={{0x14, 0x29, 0x43, 0xfffffffb}}, @flowinfo={{0x14, 0x29, 0xb, 0x80000000}}], 0x30}}], 0x1, 0x80040c4) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(r2, r2, 0x0) setresuid(0x0, 0x0, r2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x0, 'veth1\x00'}) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r3, 0x0, 0x1, &(0x7f0000000280)=0x1000000, 0x4) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') r5 = memfd_create(&(0x7f0000000240)='+\x8b\x8a\xa9\x16\x11\x91J\xbc+ \x18\x17\xc2:}\xa3\x9bO\xdd\xdf\xdf\x92\xd5\xed\xb4\x17\xe5\xd6\x9a\xb2\xd8\x9ba\xde\xb2.F\xc0\x99}|\xaf\xd3\x1d\x84[*_\x9f\x9d\xb0rYP\x1b\x9f \xe0\x9cgq\x103\x89\x11\x87Rv\x169\xdf\xe3>B\x04\x00\x00\x00W\xd3\xec\xfb\xdf?\xa2\x90+\xa4!\xb2\xf2\xff\x90\a\xc3\x12\xc4;\xffh\xf1x=\xb9c\xce\x03h\xdap\x88U\x1788\x82\xd7\xfd\x83\x00Sx\x91%\x99_\xfe\xd4c\x83\x86\x0f\xa4a-\xaf\x9e\xd9\xef\xe0)]\x00F\xfa\x03\xbc4\xc4\x9a\v\x03\x8b\xa4\xf3\x8f\xf4\"\'\xd3\a9\x14H}j&~\xe9\x16\x83o\xbd\xab\xcd[\xbd\xcb\x04\xfc\xe7\xe3\x9e?\x12\xf0\xf4\x83M3\xd88\x92?@\v\xe6\xd1\xd2\xe4\xde\xdaUeJ\x9fR\xd1`\xfa\xc8\v\xed\xfd\x0e\xc8\x89W\x847\x88\x82\x94\x14\xe33\xb7H\xc8b\xd6@3F#\xb7\x04C\x8dm\t\x16a\x0fI\xf4\xfe\xf8\x06j\x19Pz&\xb8\x0f\x98`W\xdb\xc6\"81A\xa4\x8bT\xf1\xcb\xab\xa3\t\xef\xdf&\x0e\xad\x03\x123.\xc2V\xaa\xd5\xf8\xde\x8aV\xa4p{\xcez\xa2\x92\xdb8*wLO\f\x97X\x05\x9a\xc2\xe8\x85\x9d\xcb\xc8\xf0\xc4\x01\x03\xe3?\x9f1\xf4\xfb\xa5y`KB\xdf\xae#\x94C\a\x04\xea\xccG\xf2\b\x8f\xf7\xb1\xe96\x90\xf5P\xa4\'\xce\xe3\xa24\x196\xc5Q\xa1K\x95\xd6\xfal\xe9\xd1\\\r&\xb2c\xb3\x8d\xa7\xb7\xa8\x03S\xbd\xdd\b{\xae\f\x10\xc2\xbb\xd0\xdd*\xa3\xb4\fJ\x00X\xab`N; LF\xa5D\xee\xdf\x7f\x80p\xf6o\x1c\xbdXR\xf2\xa0\x81a\xa1\xe1B\x93Xn\xaf\xfc\x05?\xab\xac\x91x\xa8#\xe1\xbeQ\xd1^\x9b\xb9)\xd3\n\xf7(3!\x18\b\xc0\xaampRl\xfdQ\x03\x8c\xd5\xe4\\\xed\x9a\xd1?\xd21\xc8\x90\x1dl|\xd1\x14\xbc3\xe0\x1e\x0e\xe6\x88Y\x99K\x93\x1c@_P\x8c\xc7\x9eZ\xb74KT:\x8a\xdbJ#w\x18\x14\x00\x93\x86\xa5wo\xf6M\xe7D\xf4*\xe3X\x1d\x19\x83\xa7w\xc7+7\x89s\xed\x8a\xd7O\xdd\rhh`\xc0\xa8$\x06pu\xa0\xd0L\x0ez@I\xb8\x83\xb2f\x93j\a0I\xc8l\xe5\x9b\x06\xb5\xac`d\xa3\xcf/\x14\x10\xab\xab\t\xec\xc1c\fA\xaf\x14\xef\xbap@*7\x86\xdf\',\x03Y\xb1$\xf0\xb5}\xf0\x82%)9`\x8f\x04\x85m\x80\xd2\xcf@\x06}\xea\xe7w`\xa5\x11\x9f\x9b\x9e\x8f\xb7cb\x1a\xe1\xcf\x87\x1c\\\xf5\xc21\xf7\x82C*\xd5;\x00\x00\x00\x00\x03\xba\xe3\xdc\x92\'\x8e\xd5\x7fG\xfd.\x91\x89T\x99t\xd4d,\xd5\x92O\xf1\xafT!Y\x8e\\\xac\xf7\x11R\x05p\x1a\"\r\xe9\xe5\x8b&\x0f\x8c\xfb\xef\xf8\xd5\x18\xde\xeb\xe5\x19\xdd\xebQ8\xc5iS+\x06D\x16\xfe\xf5.\xe5\v\x89\xb0\"\xa3M\xe9\x81\x11P\xdb\xc4\xc2y\x14\x04\x06\xf6\f\xb0\xecz\x8d`\xb5\x9b\xb43\xcc1\xa7\x9e\xa8\xb5\'\xc6MAe\x0f\xd1\xfcG\xc2/\xe8\xe9t\xcaQ\xf1\fI\x1chM\xc1\x92\xe3\xc3\x01M\xc8/\xefJ\xcb\xd0]\f\xff\xf5\x92\xce\x97Z\xea\xe8\x99\xfa\x96\xce\xa7\x02\xad\xa2\xce\x955\xeaNg\x02\xcd\xfd\x1a}.\xd3\"x\x89/8H\xc2\x93B\na)\x86\xa9U\xa0\xb7\x18\xfb\xe9\xd1\x97', 0x3) write$binfmt_misc(r5, &(0x7f0000000040)='RB9u_', 0x5) fcntl$addseals(r5, 0x409, 0x8) read$FUSE(r4, &(0x7f0000000980)={0x2020}, 0x2020) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f00000029c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000200)={{0x0, 0x3, 0x1000000002, 0x4, 0x6a7, 0x0, 0x4, 0x40c, 0x8000, 0x4, 0x9, 0xff, 0x7fff, 0xb, 0x4}, 0x28, [0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f00000039c0)={r6, r7, "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", "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"}) 8.704398134s ago: executing program 0 (id=881): mount$fuseblk(&(0x7f0000002440), &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x4000, 0x0) 8.477742018s ago: executing program 1 (id=882): r0 = syz_usb_connect$printer(0x0, 0x2d, &(0x7f0000000640)=ANY=[@ANYBLOB="12010000090000402505a8a440000102030109021b00010100000009040000020701010009050102"], 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000000)={0x34, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x20, 0x0, 0xfffffffffffffc4a}}) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000380)={'team_slave_0\x00', &(0x7f0000000200)=@ethtool_perm_addr}) syz_open_dev$char_usb(0xc, 0xb4, 0x2000000) r2 = syz_usb_connect(0x0, 0x10b, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)={0xa, &(0x7f00000000c0)={0xa, 0x6, 0x300, 0x1, 0x7, 0x5, 0x10, 0x4}, 0x148, &(0x7f0000000780)={0x5, 0xf, 0x148, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0xc, "31302c5e70554d9f223390bc0530efd8"}, @generic={0xa8, 0x10, 0x4, "fca969f9ec2a5ad708bf432acc4738c16ec8246c9330092039d297d13094c53f8c7623ed39aca3b30bb2d506f88c3d3fc61aec1c01a56694f875fca40e5faae799be779f02abfeb394bdb179a32ca7ca2b822f7937341eba447ad09838be340eafe425e76fae64be74bc9e8b2dd82fd0e33f01568bc47d5575f16983d064f2e780bb2ebbeb4973f9ae07fc0a0f5a7823e785a65c49a7df6eb8facda068dc6a7f17c0644444"}, @generic={0x67, 0x10, 0x1, "6198ee25c27817eb5fedef0253944b8a1ad20344ed939724455669c7c20fccdb6dd4e86f3d6bdb7503e8275d719fb753e354f9f0344b0caefd300b810dac82cdbc6f8cb0edda8e1071a840a81ff92aa1ba3dde130447a623f73c4a5bf5f54023f8676157"}, @ssp_cap={0x20, 0x10, 0xa, 0x14, 0x5, 0xa, 0xf, 0x3, [0x3f, 0xc000, 0xff000f, 0x50, 0xa0c0]}]}, 0x3, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x807}}, {0xed, &(0x7f0000000900)=@string={0xed, 0x3, "4cec4fb49fd6704e40059661c354f10d6c187464e0b106baedd5c434d4f44a467a7a138a26d8bd19c2305d065746f11dce9fa302a2206b07fcf7620385b177970bf40bf4e647d76993e522499026a2a1ae887041981a6bf43a0184b3a157fd38270205b0ee60f9adcdfbe235fead2e5c76bca89335b148bb087e0e0fbd4626801f9af6d38671230e4d1e0416fc15f419fbc74b2fe253c5187da85b7ec42c496c9b653ffcb1466c23ae642bc9a284f6c0cec123f22b72bd8b5db41e4abbf729d0a015d063d215d0c49aa3c33a85c903f8d345d9495c44e3b3e946b934c4ecc4b2901c747c09adfefc6811bd"}}, {0x4, &(0x7f0000000280)=@lang_id={0x4, 0x3, 0x3409}}]}) syz_usb_control_io$uac1(r2, &(0x7f00000005c0)={0x14, &(0x7f0000000a00)={0x40, 0x2, 0xa5, {0xa5, 0x3, "f7933c34f02ba5266559c3daef4b4fd9298e7ab9c28c50e56c2a593851951cccc25bfe9f29a6bd98d378c991a6c3eaa621deb5a8073650f64f184ad21689568dd4b2b287455276ab5b2077414f02c4e323dbd726482df5576278be818f2572137b57c2544926df84757e61a9540748827b2997730655f674db51eef87acec4532627abf5168c0074112d72bb02c0ad8032e5f949e93afaad0bf41850a93fa416994f73"}}, &(0x7f0000000ac0)={0x0, 0x3, 0xd2, @string={0xd2, 0x3, "fec546863c15480839286ceeb14898b14d52271323ae14b2161ce360bdca395be429ccc9a4ab9e5c855d13bfef5fd40c4c03e3a4c22e998d82b85d608b89d7e0820390bae104d58984d6d3d7ec966e0a346de2a3fc8df0e7f1bf8c710ca1a28bd8a227075e62b9554fb8796c159de2d27afd305d3ce0d8f91339e2719dd856acd05f218c91787a9fd8c6f1011b10096b2258429321888a8cfe932427162ee677b90b0696fe64bbaa3d927ff0f3be151b63823abc989cee1398c3b2477589338bb825cdb08ffb3de6775b09c80f36fca4"}}}, &(0x7f0000000d40)={0x44, &(0x7f0000000680)={0x40, 0x30, 0x61, "c986547a3398df16496e6855c94817fd1384637796dee9520eb4b875192cd0b37d1f1cf69b1abbf158c814583169dfc4225ec176a01d43bf64184eb82788659c7f447be74bff556f996bbc454bce2b1cc648486aa16ff34ac44594300bcf37ce3c"}, &(0x7f0000000600)={0x0, 0xa, 0x1, 0x2}, &(0x7f0000000bc0)={0x0, 0x8, 0x1, 0x10}, &(0x7f0000000c00)={0x20, 0x81, 0x2, '13'}, &(0x7f0000000c40)={0x20, 0x82, 0x1, '&'}, &(0x7f0000000c80)={0x20, 0x83, 0x2, "351c"}, &(0x7f0000000cc0)={0x20, 0x84, 0x4, "99d4d7f2"}, &(0x7f0000000d00)={0x20, 0x85, 0x3, "13d91d"}}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x1a1202, 0x0) pwrite64(r3, &(0x7f0000000100)="eb5bce93", 0x4, 0x7fffffffffffffff) syz_usb_connect$uac1(0x3, 0x71, &(0x7f0000000200)={{0x12, 0x1, 0x250, 0x0, 0x0, 0x0, 0xff, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x20, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x4, 0x4}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0x3, 0x8, 0x7, {0x7, 0x25, 0x1, 0x1, 0x53, 0x4}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3ff, 0x8, 0x10, 0x3, {0x7, 0x25, 0x1, 0x83, 0xf, 0x5}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x4, [{0xc2, &(0x7f0000000300)=ANY=[@ANYBLOB="c203dcf415031387f7e998056d9140e12799abe18c976f0d8105e2f990f41f074f52319828d0718a120417b645cbaf0610e5d3f0a57425c788ba1faca8bbb24345da00c63a726a82837c36549325f3e72a6b8e96d2cf681b1f14fae55bd7740d2d15edfd0183240ea9e19ab9088c94a86ea9e29b152cd9445d7f5e15f7999a6bed099e22e35ddb5b17cae295c5e9716b7fa943c99bdb5a315e0d1abd4f26390a22ebd954ff72e7b9db778c7186aec57b76a44172b9f3ec245b7a8f2754e84f7de082"]}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0x438}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0xf4ff}}, {0x0, 0x0}]}) syz_usb_connect$uac1(0x0, 0x8b, &(0x7f0000000100)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x79, 0x3, 0x1, 0x1, 0x0, 0x4, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x3, 0x8}, [@mixer_unit={0x9, 0x24, 0x4, 0x4, 0x0, "f91cafc0"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0xa, 0x24, 0x2, 0x1, 0x40, 0x3, 0x0, 0x0, "4dff"}]}, {{0x9, 0x5, 0x1, 0x9, 0x200, 0x7, 0x7f, 0x2, {0x7, 0x25, 0x1, 0x81, 0x2, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@as_header={0x7, 0x24, 0x1, 0x4, 0x3, 0x5}]}, {{0x9, 0x5, 0x82, 0x9, 0x20, 0xe, 0x58, 0x1, {0x7, 0x25, 0x1, 0x85, 0x4, 0x5}}}}}}}]}}, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) 8.415382019s ago: executing program 2 (id=883): write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x3, 0x2, 0x6, 0xfffa}, 0x3a, [0x8000, 0x3, 0xf, 0x8, 0x80, 0x2, 0x3, 0x7f, 0x20000006, 0x20000000, 0x6, 0x5f, 0x9, 0x5, 0xffff2d37, 0xffffff01, 0x6, 0x3, 0x0, 0x5, 0x4, 0x0, 0x7, 0x3c1b, 0x1, 0x24, 0xd, 0x1, 0x0, 0xffffffff, 0xe661, 0x4, 0x7, 0x3, 0x8, 0x4c74, 0x80000000, 0x242, 0x3, 0xc, 0x0, 0x8071, 0x7, 0x6, 0xffffffff, 0x7, 0x5, 0x3e, 0x8f, 0x6, 0x6, 0x0, 0x5, 0x4, 0x8, 0x3ff, 0x80, 0x0, 0x5, 0x6, 0x8, 0x4, 0x1, 0x40], [0x10000007, 0x9, 0x8000012d, 0x8004, 0x5, 0xfffffff3, 0x129432e2, 0xc8, 0xf9, 0xe, 0x2bf, 0x1, 0x9, 0xfffffffc, 0x4, 0x10001, 0x0, 0x5, 0x2f, 0xe, 0x6, 0x78, 0xea4, 0x0, 0x4, 0x7, 0x7fff, 0x6, 0x400, 0x401, 0x6, 0x1, 0xff, 0x5, 0x1000005, 0x5f31, 0x1000d, 0x4e0, 0x2, 0x4, 0xb, 0x4, 0x9, 0x4, 0xd, 0xffff8001, 0x47, 0x8000, 0x1, 0xfe000000, 0xfffe, 0x2, 0x4, 0x9, 0x3, 0x3, 0x9, 0x1, 0x3, 0x3, 0xbc45, 0x3, 0x42, 0x3], [0x5, 0x408, 0x4, 0x5, 0xfffffffe, 0x100, 0x8d2, 0x9, 0x5, 0x7fff, 0x0, 0x5, 0x8, 0x4, 0x5, 0x5, 0x0, 0x1ef, 0x2, 0x8, 0x86, 0x3, 0x303c, 0x3e7, 0xb, 0xc, 0x2, 0x2, 0x3, 0x20000008, 0x4, 0x6d01, 0x6, 0x38, 0x800003, 0x200, 0x83, 0x3, 0x4, 0x2950bfaf, 0x1000, 0xa2, 0x7, 0xa9, 0x5, 0x6, 0xac8, 0xbf, 0x4002, 0x3, 0x7ff, 0x12b, 0x4, 0x1, 0xa, 0x0, 0x5, 0x1c, 0x120000, 0x3, 0x1, 0x80a2ed, 0x4, 0x25], [0x9, 0xbb33, 0x7, 0xb, 0x5, 0x938, 0x6, 0x6, 0x0, 0xb9, 0xce7, 0x1ff, 0x2, 0x57, 0x5, 0x3, 0x101, 0x10000, 0x9, 0x7fff, 0xffff, 0xa620, 0x1, 0x78b, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x16, 0xffffffff, 0x80000000, 0x5, 0x4, 0xc8, 0x1, 0xfffff000, 0x5, 0x3, 0x7e, 0x100, 0x9602, 0x7, 0xaf, 0x8, 0x6, 0x226, 0x5, 0x5, 0x8, 0x30b1d693, 0xa1f, 0xf44, 0x7, 0x1, 0x6c1b, 0x0, 0x4, 0x5, 0xb1e, 0xd7, 0x200, 0xffff343e, 0xfff]}, 0x45c) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a0000205e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000800000000000000000000000000000700000000000000000000000000000000000000000000000300000000000000070000000000000000000000000000000000000000000000e02700000000000000000000000000002d00000000000000000000000000000084010500"], 0x23c}, 0x1, 0x0, 0x100000000000000}, 0x0) 6.116942368s ago: executing program 0 (id=884): r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="020000150100000000000000040000000000000010000100000000002000000000000000"], 0x24, 0x3) getxattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RESEND(r2, &(0x7f0000000380)={0x14}, 0x14) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$poke(0x5, r3, &(0x7f0000000000), 0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000003) unshare(0x44040200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000000)={'raw\x00', 0x0, [0x4, 0x5cf2e066, 0x0, 0x8, 0xfff]}, &(0x7f0000000080)=0x54) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000100)='+).&$&{$\xf1}($\x91+@{\x00', 0x0, r1) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_GET_FROZEN_INFO(r5, 0xc00c620f, &(0x7f0000000040)) fremovexattr(r5, &(0x7f00000000c0)=@random={'trusted.', '/dev/ashmem\x00'}) mkdir(&(0x7f0000000540)='./file0\x00', 0x108) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={[{@subsystem='cpuset'}, {@subsystem='memory'}, {@subsystem='cpuacct'}]}) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) mmap(&(0x7f0000fee000/0xf000)=nil, 0xf000, 0x0, 0x11, r0, 0x0) 5.97776458s ago: executing program 1 (id=885): openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_wakeup_irq', 0x42002, 0x843aefb762b5bc6b) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) write$cgroup_int(r0, &(0x7f00000001c0)=0x722, 0x12) r1 = syz_usb_connect(0x5, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x92, 0xec, 0xc6, 0x20, 0x5ac, 0x77c2, 0xeb3a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x20, 0x0, [{{0x9, 0x4, 0xc4, 0x1, 0x2, 0xff, 0xfd, 0x1, 0x80, [], [{{0x9, 0x5, 0x2, 0x2, 0x210, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io$uac1(r1, &(0x7f0000000000)={0x14, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0003020000000203271953d48a14e829c767721d3e90a21d6f1513472bb0c65eab630633432fd0c10e03660558aa6e77f5961041ac735a51416697a7956d2c5525007f5881f8fb704eb3f0b9f2a3a010008937cce9f79ac5f2dd0230896d4e978cf2b86796b748229851d598a98d8f4480eb059ab61fc914056f7b3a7482ca75c2ea4b4a2ac711294aa472dd325c64c3ec4a2421696b1a5b15"]}, 0x0) syz_usb_control_io$cdc_ecm(r1, 0x0, &(0x7f0000000080)={0x1c, &(0x7f0000000a80)={0x0, 0xc, 0xffffffffffffff01, "bf47582ebdd0"}, 0x0, &(0x7f0000000c00)={0x0, 0x8, 0x1, 0x7}}) syz_usb_control_io$hid(r1, 0x0, 0x0) 5.838044222s ago: executing program 2 (id=886): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f00000000c0)) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffed]}, 0x0, 0x8) r1 = gettid() r2 = getpid() rt_tgsigqueueinfo(r2, r1, 0x7, &(0x7f0000000000)={0x202b, 0x0, 0x4}) r3 = gettid() tkill(r3, 0x11) io_pgetevents(0x0, 0x9, 0x0, 0x0, 0x0, &(0x7f0000000640)={0x0}) r4 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00220f00000003a8407a730b93bf0280b3"], 0x0}, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) r5 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) r6 = openat$rnullb(0xffffffffffffff9c, &(0x7f0000001140), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000001, 0x22052, r6, 0x2000) ioctl$HIDIOCGREPORT(r5, 0x400c4807, &(0x7f00000000c0)={0x3}) 2.339754141s ago: executing program 1 (id=887): syz_usb_connect$cdc_ncm(0x0, 0x8f, &(0x7f0000000580)=ANY=[@ANYBLOB="12010000020000102505a1a440000102030109027d00020100010009040098620001020d00ff816cbe00052406"], 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c020000190001000000000000000000e00000020000000000000000000000000000000000000000000000000000000000000003000000000a0000205e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x23c}}, 0x0) 1.164379071s ago: executing program 2 (id=888): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="100000", @ANYRES16=r1, @ANYBLOB="99742dbd7000fbdbdf2515000000400001802c0004001400010002004e200a01010100000000000000001400020002004e20ac14143800000000000000000d0001007564703a73797a3200000000"], 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x2400c000) 0s ago: executing program 0 (id=889): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="c00000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400fe800000000000000000000084ff00000c00028005000100"], 0xc0}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.183' (ED25519) to the list of known hosts. [ 19.197410][ T267] cgroup: Unknown subsys name 'net' [ 19.197688][ T36] audit: type=1400 audit(1750866465.650:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.201288][ T36] audit: type=1400 audit(1750866465.650:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.201424][ T267] cgroup: Unknown subsys name 'devices' [ 19.204175][ T36] audit: type=1400 audit(1750866465.650:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.342199][ T267] cgroup: Unknown subsys name 'hugetlb' [ 19.347818][ T267] cgroup: Unknown subsys name 'rlimit' [ 19.520758][ T36] audit: type=1400 audit(1750866465.980:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.544033][ T36] audit: type=1400 audit(1750866465.980:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.552285][ T283] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.569006][ T36] audit: type=1400 audit(1750866465.980:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.600469][ T36] audit: type=1400 audit(1750866466.040:70): avc: denied { relabelto } for pid=283 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.607571][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.626073][ T36] audit: type=1400 audit(1750866466.040:71): avc: denied { write } for pid=283 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.660165][ T36] audit: type=1400 audit(1750866466.060:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.685734][ T36] audit: type=1400 audit(1750866466.060:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.924221][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.931353][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.938407][ T288] bridge_slave_0: entered allmulticast mode [ 20.944786][ T288] bridge_slave_0: entered promiscuous mode [ 20.963962][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.971022][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.978048][ T288] bridge_slave_1: entered allmulticast mode [ 20.984317][ T288] bridge_slave_1: entered promiscuous mode [ 21.018848][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.026095][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.033199][ T289] bridge_slave_0: entered allmulticast mode [ 21.039335][ T289] bridge_slave_0: entered promiscuous mode [ 21.051861][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.058902][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.065993][ T290] bridge_slave_0: entered allmulticast mode [ 21.072244][ T290] bridge_slave_0: entered promiscuous mode [ 21.078597][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.085650][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.092721][ T290] bridge_slave_1: entered allmulticast mode [ 21.098959][ T290] bridge_slave_1: entered promiscuous mode [ 21.104979][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.112017][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.119060][ T289] bridge_slave_1: entered allmulticast mode [ 21.125368][ T289] bridge_slave_1: entered promiscuous mode [ 21.237128][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.244231][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.251440][ T291] bridge_slave_0: entered allmulticast mode [ 21.257618][ T291] bridge_slave_0: entered promiscuous mode [ 21.274283][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.281434][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.288497][ T291] bridge_slave_1: entered allmulticast mode [ 21.294806][ T291] bridge_slave_1: entered promiscuous mode [ 21.330547][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.337606][ T288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.344895][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.351932][ T288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.382292][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.389337][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.396598][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.403628][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.430756][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.437822][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.445110][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.452144][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.466891][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.473964][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.481257][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.488272][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.509283][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.516832][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.524161][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.531421][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.538580][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.545797][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.553591][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.561088][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.572241][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.579276][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.601756][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.608828][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.617704][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.624761][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.642105][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.649146][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.669809][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.676888][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.684665][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.691715][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.699474][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.706535][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.727197][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.734265][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.759712][ T290] veth0_vlan: entered promiscuous mode [ 21.768418][ T291] veth0_vlan: entered promiscuous mode [ 21.786702][ T289] veth0_vlan: entered promiscuous mode [ 21.798379][ T290] veth1_macvtap: entered promiscuous mode [ 21.810526][ T288] veth0_vlan: entered promiscuous mode [ 21.819352][ T291] veth1_macvtap: entered promiscuous mode [ 21.833669][ T288] veth1_macvtap: entered promiscuous mode [ 21.844221][ T289] veth1_macvtap: entered promiscuous mode [ 21.879389][ T290] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 21.935513][ T312] tipc: Enabling of bearer rejected, media not registered [ 21.987070][ T324] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 22.006764][ T324] cgroup2: Unknown parameter 'memo¶aë°$“6¹lb_accounting' [ 22.031807][ T324] rust_binder: Error while translating object. [ 22.031853][ T324] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: EINVAL } [ 22.038036][ T324] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:6 [ 22.063693][ T326] rust_binder: Write failure EINVAL in pid:2 [ 22.190276][ T306] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 22.210401][ T307] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 22.350260][ T306] usb 2-1: Using ep0 maxpacket: 16 [ 22.356505][ T306] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 22.366788][ T306] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 8 [ 22.376509][ T307] usb 1-1: Using ep0 maxpacket: 32 [ 22.382412][ T306] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 22.391708][ T306] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 22.399760][ T307] usb 1-1: config 0 has an invalid interface number: 196 but max is 0 [ 22.408015][ T306] usb 2-1: SerialNumber: syz [ 22.412674][ T307] usb 1-1: config 0 has no interface number 0 [ 22.418746][ T307] usb 1-1: config 0 interface 196 altsetting 1 bulk endpoint 0x2 has invalid maxpacket 528 [ 22.420253][ T64] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 22.430210][ T306] usb 2-1: rejected 1 configuration due to insufficient available bus power [ 22.445270][ T307] usb 1-1: config 0 interface 196 has no altsetting 0 [ 22.452242][ T306] usb 2-1: no configuration chosen from 1 choice [ 22.461042][ T307] usb 1-1: New USB device found, idVendor=05ac, idProduct=77c2, bcdDevice=eb.3a [ 22.470094][ T307] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 22.478126][ T307] usb 1-1: Product: syz [ 22.482344][ T307] usb 1-1: Manufacturer: syz [ 22.486932][ T307] usb 1-1: SerialNumber: syz [ 22.492260][ T307] usb 1-1: config 0 descriptor?? [ 22.497495][ T316] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 22.580546][ T64] usb 4-1: Using ep0 maxpacket: 32 [ 22.586803][ T64] usb 4-1: config 0 has an invalid interface number: 196 but max is 0 [ 22.595024][ T64] usb 4-1: config 0 has no interface number 0 [ 22.601145][ T64] usb 4-1: config 0 interface 196 altsetting 1 bulk endpoint 0x2 has invalid maxpacket 528 [ 22.611168][ T64] usb 4-1: config 0 interface 196 has no altsetting 0 [ 22.619248][ T64] usb 4-1: New USB device found, idVendor=05ac, idProduct=77c2, bcdDevice=eb.3a [ 22.628344][ T64] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 22.636362][ T64] usb 4-1: Product: syz [ 22.640549][ T64] usb 4-1: Manufacturer: syz [ 22.645131][ T64] usb 4-1: SerialNumber: syz [ 22.650665][ T64] usb 4-1: config 0 descriptor?? [ 22.656005][ T335] raw-gadget.2 gadget.3: fail, usb_ep_enable returned -22 [ 22.847255][ T345] netlink: 12 bytes leftover after parsing attributes in process `syz.2.12'. [ 22.908033][ T307] ipheth 1-1:0.196: ipheth_get_macaddr: usb_control_msg: short packet: 0 bytes [ 22.917159][ T307] ipheth 1-1:0.196: probe with driver ipheth failed with error -22 [ 23.066129][ T64] ipheth 4-1:0.196: ipheth_get_macaddr: usb_control_msg: -32 [ 23.073780][ T64] ipheth 4-1:0.196: probe with driver ipheth failed with error -32 [ 23.083292][ T64] usb 4-1: USB disconnect, device number 2 [ 23.090622][ T336] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 23.114511][ T31] usb 1-1: USB disconnect, device number 2 [ 23.220300][ T336] usb 3-1: device descriptor read/64, error -71 [ 23.460304][ T336] usb 3-1: device descriptor read/64, error -71 [ 23.580893][ T348] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:18 [ 23.710319][ T336] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 23.850272][ T336] usb 3-1: device descriptor read/64, error -71 [ 23.900289][ T307] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 24.051368][ T307] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 24.061300][ T307] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 24.070958][ T307] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 24.085025][ T307] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 24.094112][ T307] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 24.102166][ T307] usb 1-1: Product: syz [ 24.106306][ T307] usb 1-1: Manufacturer: syz [ 24.110399][ T336] usb 3-1: device descriptor read/64, error -71 [ 24.111150][ T307] usb 1-1: SerialNumber: syz [ 24.123504][ T307] hub 1-1:1.0: bad descriptor, ignoring hub [ 24.129414][ T307] hub 1-1:1.0: probe with driver hub failed with error -5 [ 24.220332][ T336] usb usb3-port1: attempt power cycle [ 24.323992][ T307] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 3 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 24.433496][ T36] kauditd_printk_skb: 63 callbacks suppressed [ 24.433513][ T36] audit: type=1400 audit(1750866470.890:137): avc: denied { read } for pid=366 comm="syz.3.20" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 24.462695][ T36] audit: type=1400 audit(1750866470.890:138): avc: denied { open } for pid=366 comm="syz.3.20" path="/dev/rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 24.485729][ T36] audit: type=1400 audit(1750866470.910:139): avc: denied { ioctl } for pid=366 comm="syz.3.20" path="/dev/rnullb0" dev="devtmpfs" ino=31 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 24.510298][ T36] audit: type=1400 audit(1750866470.930:140): avc: denied { create } for pid=368 comm="syz.3.21" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 24.536211][ T36] audit: type=1400 audit(1750866470.930:141): avc: denied { read append } for pid=368 comm="syz.3.21" name="file0" dev="tmpfs" ino=68 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 24.558982][ T36] audit: type=1400 audit(1750866470.930:142): avc: denied { open } for pid=368 comm="syz.3.21" path="/9/file0" dev="tmpfs" ino=68 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 24.581048][ T336] usb 3-1: new high-speed USB device number 4 using dummy_hcd [ 24.588799][ T36] audit: type=1400 audit(1750866470.950:143): avc: denied { name_bind } for pid=368 comm="syz.3.21" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 24.610256][ T36] audit: type=1400 audit(1750866470.990:144): avc: denied { read write } for pid=362 comm="syz.0.18" name="lp0" dev="devtmpfs" ino=444 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:printer_device_t tclass=chr_file permissive=1 [ 24.633536][ T36] audit: type=1400 audit(1750866470.990:145): avc: denied { open } for pid=362 comm="syz.0.18" path="/dev/usb/lp0" dev="devtmpfs" ino=444 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:printer_device_t tclass=chr_file permissive=1 [ 24.657721][ T336] usb 3-1: device descriptor read/8, error -71 [ 24.664168][ T36] audit: type=1400 audit(1750866471.120:146): avc: denied { unlink } for pid=291 comm="syz-executor" name="file0" dev="tmpfs" ino=68 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 24.792260][ T336] usb 3-1: device descriptor read/8, error -71 [ 24.900415][ T306] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 24.963669][ T10] usb 2-1: USB disconnect, device number 2 [ 25.050257][ T306] usb 4-1: Using ep0 maxpacket: 32 [ 25.050412][ T336] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 25.056493][ T306] usb 4-1: config 0 has an invalid interface number: 196 but max is 0 [ 25.072032][ T306] usb 4-1: config 0 has no interface number 0 [ 25.078102][ T306] usb 4-1: config 0 interface 196 altsetting 1 bulk endpoint 0x2 has invalid maxpacket 528 [ 25.088141][ T306] usb 4-1: config 0 interface 196 has no altsetting 0 [ 25.091239][ T336] usb 3-1: device descriptor read/8, error -71 [ 25.096417][ T306] usb 4-1: New USB device found, idVendor=05ac, idProduct=77c2, bcdDevice=eb.3a [ 25.111556][ T306] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 25.119532][ T306] usb 4-1: Product: syz [ 25.123770][ T306] usb 4-1: Manufacturer: syz [ 25.128393][ T306] usb 4-1: SerialNumber: syz [ 25.133729][ T306] usb 4-1: config 0 descriptor?? [ 25.139045][ T372] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 25.230265][ T363] usb 1-1: reset high-speed USB device number 3 using dummy_hcd [ 25.231242][ T336] usb 3-1: device descriptor read/8, error -71 [ 25.348880][ T306] ipheth 4-1:0.196: ipheth_get_macaddr: usb_control_msg: -71 [ 25.350305][ T336] usb usb3-port1: unable to enumerate USB device [ 25.356522][ T306] ipheth 4-1:0.196: probe with driver ipheth failed with error -71 [ 25.372638][ T306] usb 4-1: USB disconnect, device number 3 [ 25.851255][ T389] ======================================================= [ 25.851255][ T389] WARNING: The mand mount option has been deprecated and [ 25.851255][ T389] and is ignored by this kernel. Remove the mand [ 25.851255][ T389] option from the mount to silence this warning. [ 25.851255][ T389] ======================================================= [ 25.887085][ T389] SELinux: security_context_str_to_sid (sytem_uÝGй) failed with errno=-22 [ 25.933755][ T395] can0: slcan on ttyS3. [ 25.982499][ T393] can0 (unregistered): slcan off ttyS3. [ 26.418194][ T412] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'. [ 26.981855][ T31] usb 1-1: USB disconnect, device number 3 [ 27.002106][ T31] usblp0: removed [ 29.440240][ T36] kauditd_printk_skb: 30542 callbacks suppressed [ 29.440255][ T36] audit: type=1400 audit(1750866475.900:30662): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 29.446708][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 29.467984][ T36] audit: type=1400 audit(1750866475.900:30663): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 29.474849][ T148] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 29.495707][ T36] audit: type=1400 audit(1750866475.900:30664): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 29.503405][ T148] audit: backlog limit exceeded [ 29.524625][ T36] audit: type=1400 audit(1750866475.900:30665): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 29.529602][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 29.550571][ T36] audit: type=1400 audit(1750866475.900:30666): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 29.556960][ T148] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 34.757061][ T36] kauditd_printk_skb: 58502 callbacks suppressed [ 34.757077][ T36] audit: type=1400 audit(1750866480.913:89168): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.763105][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 34.763609][ T36] audit: type=1400 audit(1750866480.913:89169): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.784524][ T148] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 34.791278][ T36] audit: type=1400 audit(1750866480.913:89170): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.812153][ T148] audit: backlog limit exceeded [ 34.819954][ T36] audit: type=1400 audit(1750866480.913:89171): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.841211][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 34.845851][ T36] audit: type=1400 audit(1750866480.913:89172): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 34.866734][ T148] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 38.312921][ T867] FAULT_INJECTION: forcing a failure. [ 38.312921][ T867] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 38.326576][ T867] CPU: 1 UID: 0 PID: 867 Comm: syz.1.236 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 38.326605][ T867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 38.326622][ T867] Call Trace: [ 38.326628][ T867] [ 38.326635][ T867] __dump_stack+0x21/0x30 [ 38.326665][ T867] dump_stack_lvl+0x10c/0x190 [ 38.326685][ T867] ? __cfi_dump_stack_lvl+0x10/0x10 [ 38.326706][ T867] dump_stack+0x19/0x20 [ 38.326724][ T867] should_fail_ex+0x3d9/0x530 [ 38.326745][ T867] should_fail+0xf/0x20 [ 38.326764][ T867] should_fail_usercopy+0x1e/0x30 [ 38.326785][ T867] _copy_to_user+0x24/0xa0 [ 38.326807][ T867] simple_read_from_buffer+0xed/0x160 [ 38.326826][ T867] proc_fail_nth_read+0x19e/0x210 [ 38.326844][ T867] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 38.326862][ T867] ? bpf_lsm_file_permission+0xd/0x20 [ 38.326882][ T867] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 38.326899][ T867] vfs_read+0x278/0xb60 [ 38.326920][ T867] ? __cfi_vfs_read+0x10/0x10 [ 38.326939][ T867] ? __kasan_check_write+0x18/0x20 [ 38.326959][ T867] ? mutex_lock+0x92/0x1c0 [ 38.326979][ T867] ? __cfi_mutex_lock+0x10/0x10 [ 38.326998][ T867] ? __fget_files+0x2c5/0x340 [ 38.327045][ T867] ksys_read+0x141/0x250 [ 38.327065][ T867] ? __cfi_ksys_read+0x10/0x10 [ 38.327086][ T867] ? __kasan_check_read+0x15/0x20 [ 38.327106][ T867] __x64_sys_read+0x7f/0x90 [ 38.327126][ T867] x64_sys_call+0x2638/0x2ee0 [ 38.327147][ T867] do_syscall_64+0x58/0xf0 [ 38.327162][ T867] ? clear_bhb_loop+0x50/0xa0 [ 38.327189][ T867] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 38.327208][ T867] RIP: 0033:0x7f24a038d33c [ 38.327228][ T867] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 38.327242][ T867] RSP: 002b:00007f249e9f7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 38.327268][ T867] RAX: ffffffffffffffda RBX: 00007f24a05b5fa0 RCX: 00007f24a038d33c [ 38.327281][ T867] RDX: 000000000000000f RSI: 00007f249e9f70a0 RDI: 0000000000000003 [ 38.327293][ T867] RBP: 00007f249e9f7090 R08: 0000000000000000 R09: 0000000000000000 [ 38.327305][ T867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 38.327316][ T867] R13: 0000000000000000 R14: 00007f24a05b5fa0 R15: 00007ffca47ebca8 [ 38.327331][ T867] [ 40.113020][ T36] kauditd_printk_skb: 61727 callbacks suppressed [ 40.113081][ T36] audit: type=1400 audit(1750866485.908:135920): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.143421][ T36] audit: type=1400 audit(1750866485.908:135921): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.165177][ T36] audit: type=1400 audit(1750866485.908:135922): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.186679][ T36] audit: type=1400 audit(1750866485.917:135923): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.187515][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 40.208284][ T36] audit: type=1400 audit(1750866485.917:135924): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.216230][ T148] audit: audit_lost=5007 audit_rate_limit=0 audit_backlog_limit=64 [ 40.237448][ T36] audit: type=1400 audit(1750866485.917:135925): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 40.243820][ T148] audit: backlog limit exceeded [ 40.265277][ T36] audit: type=1400 audit(1750866485.917:135926): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 41.065469][ T986] geneve1: tun_chr_ioctl cmd 1074025672 [ 41.071723][ T986] geneve1: ignored: set checksum enabled [ 42.231032][ T1056] netlink: 328 bytes leftover after parsing attributes in process `syz.2.319'. [ 42.241984][ T1056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=1056 comm=syz.2.319 [ 45.469044][ T36] kauditd_printk_skb: 53851 callbacks suppressed [ 45.469061][ T36] audit: type=1400 audit(1750866490.922:188725): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.475115][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.475510][ T36] audit: type=1400 audit(1750866490.931:188726): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.496983][ T148] audit: audit_lost=5359 audit_rate_limit=0 audit_backlog_limit=64 [ 45.514146][ T36] audit: type=1400 audit(1750866490.931:188727): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.524923][ T148] audit: backlog limit exceeded [ 45.533241][ T36] audit: type=1400 audit(1750866490.931:188728): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.553969][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 45.558846][ T36] audit: type=1400 audit(1750866490.931:188729): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 45.579820][ T148] audit: audit_lost=5360 audit_rate_limit=0 audit_backlog_limit=64 [ 46.216708][ T1232] sit0: entered promiscuous mode [ 46.223553][ T1232] netlink: 'syz.3.386': attribute type 1 has an invalid length. [ 46.231770][ T1232] netlink: 9 bytes leftover after parsing attributes in process `syz.3.386'. [ 46.379666][ T1242] Zero length message leads to an empty skb [ 46.389390][ T1242] >: renamed from veth0_vlan (while UP) [ 49.704886][ T1358] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=1358 comm=syz.1.436 [ 50.113909][ T1382] capability: warning: `syz.2.447' uses deprecated v2 capabilities in a way that may be insecure [ 50.825533][ T36] kauditd_printk_skb: 55456 callbacks suppressed [ 50.825548][ T36] audit: type=1400 audit(1750866495.945:243582): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 50.832047][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.832063][ T148] audit: audit_lost=5562 audit_rate_limit=0 audit_backlog_limit=64 [ 50.832073][ T148] audit: backlog limit exceeded [ 50.832132][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.860084][ T36] audit: type=1400 audit(1750866495.945:243583): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 50.865581][ T148] audit: audit_lost=5563 audit_rate_limit=0 audit_backlog_limit=64 [ 50.880576][ T1424] audit: audit_backlog=65 > audit_backlog_limit=64 [ 50.883028][ T148] audit: backlog limit exceeded [ 50.905624][ T36] audit: type=1400 audit(1750866495.945:243584): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.269596][ T1445] netlink: 'syz.1.471': attribute type 46 has an invalid length. [ 51.290645][ T1445] netlink: 44 bytes leftover after parsing attributes in process `syz.1.471'. [ 52.192248][ T1472] x_tables: arp_tables: NFLOG.0 target: invalid size 80 (kernel) != (user) 0 [ 54.143991][ T1541] can0: slcan on ttyS3. [ 54.478477][ T1595] tc_dump_action: action bad kind [ 54.511701][ T1597] syzkaller0: entered promiscuous mode [ 54.517732][ T1597] syzkaller0: entered allmulticast mode [ 54.707403][ T1604] syzkaller0: entered allmulticast mode [ 54.886402][ T1633] bridge0: port 3(veth0_to_bridge) entered blocking state [ 54.898156][ T1633] bridge0: port 3(veth0_to_bridge) entered disabled state [ 54.909538][ T1633] veth0_to_bridge: entered allmulticast mode [ 54.916332][ T1633] veth0_to_bridge: entered promiscuous mode [ 54.922988][ T1633] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 54.943239][ T1633] bridge0: port 3(veth0_to_bridge) entered blocking state [ 54.950503][ T1633] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 54.976346][ T1644] syz.0.543 uses obsolete (PF_INET,SOCK_PACKET) [ 55.011826][ T1653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1653 comm=syz.0.545 [ 55.773206][ T1686] netlink: 'syz.3.556': attribute type 4 has an invalid length. [ 55.782259][ T1686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1686 comm=syz.3.556 [ 55.974866][ T1707] netlink: 'syz.0.565': attribute type 63 has an invalid length. [ 55.982896][ T1707] netlink: 5 bytes leftover after parsing attributes in process `syz.0.565'. [ 56.181028][ T36] kauditd_printk_skb: 55979 callbacks suppressed [ 56.181044][ T36] audit: type=1400 audit(1750866501.944:296661): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.187828][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.209032][ T36] audit: type=1400 audit(1750866501.944:296662): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.215652][ T148] audit: audit_lost=6532 audit_rate_limit=0 audit_backlog_limit=64 [ 56.239716][ T36] audit: type=1400 audit(1750866501.944:296663): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.245146][ T148] audit: backlog limit exceeded [ 56.271423][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.273243][ T36] audit: type=1400 audit(1750866501.953:296664): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.281032][ T148] audit: audit_lost=6533 audit_rate_limit=0 audit_backlog_limit=64 [ 56.313274][ T148] audit: backlog limit exceeded [ 56.920383][ T1769] tc_dump_action: action bad kind [ 56.947972][ T1771] tc_dump_action: action bad kind [ 58.644708][ T1840] netlink: 'syz.2.610': attribute type 4 has an invalid length. [ 58.666776][ T1840] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.610'. [ 59.783943][ T1809] Bluetooth: hci0: command 0x1003 tx timeout [ 59.791565][ T52] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 61.537342][ T36] kauditd_printk_skb: 25971 callbacks suppressed [ 61.537359][ T36] audit: type=1400 audit(1750866506.948:316498): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.584040][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.599862][ T148] audit: audit_lost=8580 audit_rate_limit=0 audit_backlog_limit=64 [ 61.614943][ T36] audit: type=1400 audit(1750866506.948:316499): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.636200][ T148] audit: backlog limit exceeded [ 61.646055][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.658044][ T148] audit: audit_lost=8581 audit_rate_limit=0 audit_backlog_limit=64 [ 61.667389][ T148] audit: backlog limit exceeded [ 61.672308][ T36] audit: type=1400 audit(1750866506.948:316500): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 61.694748][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 61.918810][ T2005] FAULT_INJECTION: forcing a failure. [ 61.918810][ T2005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 61.954102][ T2005] CPU: 0 UID: 0 PID: 2005 Comm: syz.1.677 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 61.954131][ T2005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 61.954141][ T2005] Call Trace: [ 61.954147][ T2005] [ 61.954155][ T2005] __dump_stack+0x21/0x30 [ 61.954182][ T2005] dump_stack_lvl+0x10c/0x190 [ 61.954202][ T2005] ? __cfi_dump_stack_lvl+0x10/0x10 [ 61.954224][ T2005] dump_stack+0x19/0x20 [ 61.954243][ T2005] should_fail_ex+0x3d9/0x530 [ 61.954264][ T2005] should_fail+0xf/0x20 [ 61.954286][ T2005] should_fail_usercopy+0x1e/0x30 [ 61.954307][ T2005] _copy_from_user+0x22/0xb0 [ 61.954330][ T2005] memdup_user+0x81/0x180 [ 61.954349][ T2005] ? strndup_user+0x40/0xd0 [ 61.954366][ T2005] strndup_user+0x6c/0xd0 [ 61.954383][ T2005] __se_sys_mount+0x9f/0x480 [ 61.954404][ T2005] ? ksys_write+0x1ef/0x250 [ 61.954426][ T2005] ? __x64_sys_mount+0xf0/0xf0 [ 61.954448][ T2005] __x64_sys_mount+0xc3/0xf0 [ 61.954469][ T2005] x64_sys_call+0x2021/0x2ee0 [ 61.954491][ T2005] do_syscall_64+0x58/0xf0 [ 61.954507][ T2005] ? clear_bhb_loop+0x50/0xa0 [ 61.954528][ T2005] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 61.954547][ T2005] RIP: 0033:0x7f24a038e929 [ 61.954562][ T2005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 61.954577][ T2005] RSP: 002b:00007f249e9f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 61.954597][ T2005] RAX: ffffffffffffffda RBX: 00007f24a05b5fa0 RCX: 00007f24a038e929 [ 61.954610][ T2005] RDX: 0000200000000100 RSI: 0000200000000000 RDI: 0000200000002440 [ 61.954624][ T2005] RBP: 00007f249e9f7090 R08: 0000000000000000 R09: 0000000000000000 [ 61.954635][ T2005] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000001 [ 61.954647][ T2005] R13: 0000000000000000 R14: 00007f24a05b5fa0 R15: 00007ffca47ebca8 [ 61.954662][ T2005] [ 66.893127][ T36] kauditd_printk_skb: 40014 callbacks suppressed [ 66.893143][ T36] audit: type=1400 audit(1750866511.971:346772): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 66.927308][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 66.934082][ T148] audit: audit_lost=11830 audit_rate_limit=0 audit_backlog_limit=64 [ 66.942304][ T36] audit: type=1400 audit(1750866511.999:346773): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 66.964584][ T148] audit: backlog limit exceeded [ 66.970376][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 66.977075][ T148] audit: audit_lost=11831 audit_rate_limit=0 audit_backlog_limit=64 [ 66.985297][ T36] audit: type=1400 audit(1750866511.999:346774): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.007188][ T148] audit: backlog limit exceeded [ 67.012366][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.207343][ T2047] can0 (unregistered): slcan off ttyS3. [ 68.219680][ T2094] slcan: can't register candev [ 69.031105][ C1] sched: DL replenish lagged too much [ 69.088307][ T2117] kernel profiling enabled (shift: 63) [ 69.097863][ T2117] profiling shift: 63 too large [ 69.107627][ T2117] kernel profiling enabled (shift: 0) [ 72.249067][ T36] kauditd_printk_skb: 34127 callbacks suppressed [ 72.249083][ T36] audit: type=1400 audit(1750866516.985:380137): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.292075][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.298674][ T148] audit: audit_lost=12088 audit_rate_limit=0 audit_backlog_limit=64 [ 72.306991][ T148] audit: backlog limit exceeded [ 72.312006][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.319602][ T148] audit: audit_lost=12089 audit_rate_limit=0 audit_backlog_limit=64 [ 72.327785][ T148] audit: backlog limit exceeded [ 72.332853][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.339613][ T148] audit: audit_lost=12090 audit_rate_limit=0 audit_backlog_limit=64 [ 72.347838][ T148] audit: backlog limit exceeded [ 72.938314][ T2197] can0: slcan on ttyS3. [ 74.928412][ T2249] FAULT_INJECTION: forcing a failure. [ 74.928412][ T2249] name failslab, interval 1, probability 0, space 0, times 0 [ 74.955711][ T2249] CPU: 0 UID: 0 PID: 2249 Comm: syz.1.776 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 74.955740][ T2249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 74.955750][ T2249] Call Trace: [ 74.955756][ T2249] [ 74.955763][ T2249] __dump_stack+0x21/0x30 [ 74.955788][ T2249] dump_stack_lvl+0x10c/0x190 [ 74.955808][ T2249] ? __cfi_dump_stack_lvl+0x10/0x10 [ 74.955828][ T2249] ? pointer+0xdd0/0xdd0 [ 74.955852][ T2249] dump_stack+0x19/0x20 [ 74.955870][ T2249] should_fail_ex+0x3d9/0x530 [ 74.955891][ T2249] should_failslab+0xac/0x100 [ 74.955916][ T2249] __kmalloc_node_track_caller_noprof+0x68/0x440 [ 74.955938][ T2249] ? sidtab_sid2str_get+0x139/0x370 [ 74.955963][ T2249] kmemdup_noprof+0x31/0x80 [ 74.955983][ T2249] sidtab_sid2str_get+0x139/0x370 [ 74.956007][ T2249] security_sid_to_context_core+0x30d/0x5d0 [ 74.956030][ T2249] security_sid_to_context+0x2e/0x50 [ 74.956051][ T2249] avc_audit_post_callback+0x107/0x780 [ 74.956070][ T2249] ? audit_log_format+0xdb/0x140 [ 74.956086][ T2249] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 74.956103][ T2249] ? __cfi_audit_log_format+0x10/0x10 [ 74.956121][ T2249] ? audit_log_untrustedstring+0xea/0x100 [ 74.956138][ T2249] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 74.956157][ T2249] common_lsm_audit+0x147d/0x1860 [ 74.956176][ T2249] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 74.956195][ T2249] ? kernel_text_address+0xa9/0xe0 [ 74.956213][ T2249] ? __cfi_common_lsm_audit+0x10/0x10 [ 74.956231][ T2249] ? __kernel_text_address+0x11/0x40 [ 74.956249][ T2249] ? unwind_get_return_address+0x51/0x90 [ 74.956267][ T2249] ? arch_stack_walk+0x10b/0x170 [ 74.956292][ T2249] slow_avc_audit+0x18d/0x1f0 [ 74.956310][ T2249] ? __cfi_slow_avc_audit+0x10/0x10 [ 74.956328][ T2249] ? avc_denied+0xae/0x180 [ 74.956346][ T2249] ? avc_has_perm_noaudit+0x2b9/0x360 [ 74.956366][ T2249] avc_has_perm+0x1cd/0x220 [ 74.956385][ T2249] ? __cfi_avc_has_perm+0x10/0x10 [ 74.956404][ T2249] ? __asan_memcpy+0x5a/0x80 [ 74.956424][ T2249] selinux_mount+0x39a/0x4e0 [ 74.956446][ T2249] ? __cfi_selinux_mount+0x10/0x10 [ 74.956469][ T2249] security_sb_mount+0x72/0x100 [ 74.956489][ T2249] path_mount+0xca/0x1050 [ 74.956509][ T2249] ? putname+0x113/0x150 [ 74.956531][ T2249] __se_sys_mount+0x2bd/0x480 [ 74.956552][ T2249] ? ksys_write+0x1ef/0x250 [ 74.956581][ T2249] ? __x64_sys_mount+0xf0/0xf0 [ 74.956603][ T2249] __x64_sys_mount+0xc3/0xf0 [ 74.956624][ T2249] x64_sys_call+0x2021/0x2ee0 [ 74.956647][ T2249] do_syscall_64+0x58/0xf0 [ 74.956662][ T2249] ? clear_bhb_loop+0x50/0xa0 [ 74.956682][ T2249] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 74.956701][ T2249] RIP: 0033:0x7f24a038e929 [ 74.956716][ T2249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.956731][ T2249] RSP: 002b:00007f249e9f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 74.956751][ T2249] RAX: ffffffffffffffda RBX: 00007f24a05b5fa0 RCX: 00007f24a038e929 [ 74.956765][ T2249] RDX: 0000200000000100 RSI: 0000200000000000 RDI: 0000200000002440 [ 74.956778][ T2249] RBP: 00007f249e9f7090 R08: 0000000000000000 R09: 0000000000000000 [ 74.956790][ T2249] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000002 [ 74.956802][ T2249] R13: 0000000000000000 R14: 00007f24a05b5fa0 R15: 00007ffca47ebca8 [ 74.956817][ T2249] [ 76.359747][ T2273] tap0: tun_chr_ioctl cmd 1074025677 [ 76.380517][ T2273] tap0: linktype set to 776 [ 76.419438][ T2273] tap0: tun_chr_ioctl cmd 1074025673 [ 76.514659][ T2284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=59644 sclass=netlink_route_socket pid=2284 comm=syz.1.787 [ 76.614834][ T2296] FAULT_INJECTION: forcing a failure. [ 76.614834][ T2296] name failslab, interval 1, probability 0, space 0, times 0 [ 76.657164][ T2296] CPU: 0 UID: 0 PID: 2296 Comm: syz.2.793 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 76.657194][ T2296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 76.657205][ T2296] Call Trace: [ 76.657211][ T2296] [ 76.657218][ T2296] __dump_stack+0x21/0x30 [ 76.657244][ T2296] dump_stack_lvl+0x10c/0x190 [ 76.657263][ T2296] ? __cfi_dump_stack_lvl+0x10/0x10 [ 76.657284][ T2296] ? skb_put+0x112/0x1f0 [ 76.657309][ T2296] dump_stack+0x19/0x20 [ 76.657328][ T2296] should_fail_ex+0x3d9/0x530 [ 76.657349][ T2296] should_failslab+0xac/0x100 [ 76.657373][ T2296] __kmalloc_node_track_caller_noprof+0x68/0x440 [ 76.657396][ T2296] ? sidtab_sid2str_get+0x139/0x370 [ 76.657421][ T2296] kmemdup_noprof+0x31/0x80 [ 76.657442][ T2296] sidtab_sid2str_get+0x139/0x370 [ 76.657466][ T2296] security_sid_to_context_core+0x30d/0x5d0 [ 76.657488][ T2296] security_sid_to_context+0x2e/0x50 [ 76.657519][ T2296] avc_audit_post_callback+0x198/0x780 [ 76.657540][ T2296] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 76.657559][ T2296] ? __cfi_audit_log_format+0x10/0x10 [ 76.657578][ T2296] ? audit_log_untrustedstring+0xea/0x100 [ 76.657597][ T2296] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 76.657619][ T2296] common_lsm_audit+0x147d/0x1860 [ 76.657638][ T2296] ? __cfi_avc_audit_post_callback+0x10/0x10 [ 76.657657][ T2296] ? kernel_text_address+0xa9/0xe0 [ 76.657677][ T2296] ? __cfi_common_lsm_audit+0x10/0x10 [ 76.657694][ T2296] ? __kernel_text_address+0x11/0x40 [ 76.657712][ T2296] ? unwind_get_return_address+0x51/0x90 [ 76.657731][ T2296] ? arch_stack_walk+0x10b/0x170 [ 76.657754][ T2296] slow_avc_audit+0x18d/0x1f0 [ 76.657773][ T2296] ? __cfi_slow_avc_audit+0x10/0x10 [ 76.657791][ T2296] ? avc_denied+0xae/0x180 [ 76.657810][ T2296] ? avc_has_perm_noaudit+0x2b9/0x360 [ 76.657828][ T2296] avc_has_perm+0x1cd/0x220 [ 76.657846][ T2296] ? __cfi_avc_has_perm+0x10/0x10 [ 76.657866][ T2296] ? __asan_memcpy+0x5a/0x80 [ 76.657886][ T2296] selinux_mount+0x39a/0x4e0 [ 76.657907][ T2296] ? __cfi_selinux_mount+0x10/0x10 [ 76.657930][ T2296] security_sb_mount+0x72/0x100 [ 76.657951][ T2296] path_mount+0xca/0x1050 [ 76.657971][ T2296] ? putname+0x113/0x150 [ 76.657993][ T2296] __se_sys_mount+0x2bd/0x480 [ 76.658014][ T2296] ? ksys_write+0x1ef/0x250 [ 76.658036][ T2296] ? __x64_sys_mount+0xf0/0xf0 [ 76.658058][ T2296] __x64_sys_mount+0xc3/0xf0 [ 76.658079][ T2296] x64_sys_call+0x2021/0x2ee0 [ 76.658101][ T2296] do_syscall_64+0x58/0xf0 [ 76.658117][ T2296] ? clear_bhb_loop+0x50/0xa0 [ 76.658137][ T2296] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 76.658155][ T2296] RIP: 0033:0x7fcc5a18e929 [ 76.658171][ T2296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 76.658185][ T2296] RSP: 002b:00007fcc5afb1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.658205][ T2296] RAX: ffffffffffffffda RBX: 00007fcc5a3b5fa0 RCX: 00007fcc5a18e929 [ 76.658219][ T2296] RDX: 0000200000000100 RSI: 0000200000000000 RDI: 0000200000002440 [ 76.658232][ T2296] RBP: 00007fcc5afb1090 R08: 0000000000000000 R09: 0000000000000000 [ 76.658244][ T2296] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000002 [ 76.658255][ T2296] R13: 0000000000000000 R14: 00007fcc5a3b5fa0 R15: 00007fff55b456d8 [ 76.658270][ T2296] [ 77.605201][ T36] kauditd_printk_skb: 52072 callbacks suppressed [ 77.605217][ T36] audit: type=1400 audit(1750866521.989:408637): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.641145][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.648018][ T148] audit: audit_lost=19949 audit_rate_limit=0 audit_backlog_limit=64 [ 77.657444][ T36] audit: type=1400 audit(1750866522.017:408638): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.679763][ T148] audit: backlog limit exceeded [ 77.685007][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 77.691798][ T148] audit: audit_lost=19950 audit_rate_limit=0 audit_backlog_limit=64 [ 77.699868][ T36] audit: type=1400 audit(1750866522.017:408639): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 77.722217][ T148] audit: backlog limit exceeded [ 77.727413][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.173589][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.185898][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.198172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.210442][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.222251][ T2319] netlink: 'syz.2.805': attribute type 4 has an invalid length. [ 78.222704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.242279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.246020][ T2319] netlink: 3581 bytes leftover after parsing attributes in process `syz.2.805'. [ 78.254552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.275678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.287952][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.300243][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 78.383225][ T2326] FAULT_INJECTION: forcing a failure. [ 78.383225][ T2326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 78.417505][ T2326] CPU: 0 UID: 0 PID: 2326 Comm: syz.2.808 Not tainted 6.12.30-syzkaller-g030e00a2d78c #0 57efd5a98e1182d97bd5f975427dc401009108c9 [ 78.417534][ T2326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 78.417545][ T2326] Call Trace: [ 78.417551][ T2326] [ 78.417558][ T2326] __dump_stack+0x21/0x30 [ 78.417584][ T2326] dump_stack_lvl+0x10c/0x190 [ 78.417605][ T2326] ? __cfi_dump_stack_lvl+0x10/0x10 [ 78.417627][ T2326] dump_stack+0x19/0x20 [ 78.417649][ T2326] should_fail_ex+0x3d9/0x530 [ 78.417671][ T2326] should_fail+0xf/0x20 [ 78.417689][ T2326] should_fail_usercopy+0x1e/0x30 [ 78.417710][ T2326] _copy_to_user+0x24/0xa0 [ 78.417730][ T2326] simple_read_from_buffer+0xed/0x160 [ 78.417745][ T2326] proc_fail_nth_read+0x19e/0x210 [ 78.417761][ T2326] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.417776][ T2326] ? bpf_lsm_file_permission+0xd/0x20 [ 78.417796][ T2326] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 78.417813][ T2326] vfs_read+0x278/0xb60 [ 78.417833][ T2326] ? __cfi_vfs_read+0x10/0x10 [ 78.417852][ T2326] ? __kasan_check_write+0x18/0x20 [ 78.417872][ T2326] ? mutex_lock+0x92/0x1c0 [ 78.417892][ T2326] ? __cfi_mutex_lock+0x10/0x10 [ 78.417911][ T2326] ? __fget_files+0x2c5/0x340 [ 78.417936][ T2326] ksys_read+0x141/0x250 [ 78.417957][ T2326] ? __cfi_ksys_read+0x10/0x10 [ 78.417978][ T2326] ? __kasan_check_read+0x15/0x20 [ 78.417998][ T2326] __x64_sys_read+0x7f/0x90 [ 78.418019][ T2326] x64_sys_call+0x2638/0x2ee0 [ 78.418041][ T2326] do_syscall_64+0x58/0xf0 [ 78.418057][ T2326] ? clear_bhb_loop+0x50/0xa0 [ 78.418076][ T2326] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 78.418095][ T2326] RIP: 0033:0x7fcc5a18d33c [ 78.418111][ T2326] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 78.418125][ T2326] RSP: 002b:00007fcc5afb1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 78.418146][ T2326] RAX: ffffffffffffffda RBX: 00007fcc5a3b5fa0 RCX: 00007fcc5a18d33c [ 78.418159][ T2326] RDX: 000000000000000f RSI: 00007fcc5afb10a0 RDI: 0000000000000003 [ 78.418170][ T2326] RBP: 00007fcc5afb1090 R08: 0000000000000000 R09: 0000000000000000 [ 78.418182][ T2326] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000002 [ 78.418194][ T2326] R13: 0000000000000000 R14: 00007fcc5a3b5fa0 R15: 00007fff55b456d8 [ 78.418209][ T2326] [ 81.448193][ T1330] can0 (unregistered): slcan off ttyS3. [ 81.521569][ T60] bridge_slave_1: left allmulticast mode [ 81.533509][ T60] bridge_slave_1: left promiscuous mode [ 81.544947][ T60] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.564015][ T60] bridge_slave_0: left allmulticast mode [ 81.577505][ T60] bridge_slave_0: left promiscuous mode [ 81.590153][ T60] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.427674][ T60] veth1_macvtap: left promiscuous mode [ 82.433223][ T60] veth0_vlan: left promiscuous mode [ 82.961399][ T36] kauditd_printk_skb: 34081 callbacks suppressed [ 82.961414][ T36] audit: type=1400 audit(1750866527.003:441765): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 82.998150][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.005066][ T2416] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.011579][ T2416] audit: audit_lost=20270 audit_rate_limit=0 audit_backlog_limit=64 [ 83.020609][ T148] audit: audit_lost=20271 audit_rate_limit=0 audit_backlog_limit=64 [ 83.029106][ T2411] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.036156][ T2411] audit: audit_lost=20272 audit_rate_limit=0 audit_backlog_limit=64 [ 83.044152][ T2411] audit: backlog limit exceeded [ 83.048601][ T36] audit: type=1400 audit(1750866527.022:441766): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.049525][ T148] audit: backlog limit exceeded [ 83.527691][ C1] net_ratelimit: 30464 callbacks suppressed [ 83.527708][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.545929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.558186][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.570455][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.582713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.594950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.607188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.620342][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.632622][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 83.644896][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 88.760652][ T36] kauditd_printk_skb: 44352 callbacks suppressed [ 88.760669][ T36] audit: type=1400 audit(1750866532.419:477850): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.883603][ C0] net_ratelimit: 62261 callbacks suppressed [ 88.883623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 88.883709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 88.889586][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 88.901585][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 88.913568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 88.925592][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 88.937291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 88.949265][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 88.961346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 88.973331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 91.338467][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 91.398759][ T290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 91.405297][ T290] audit: audit_lost=23029 audit_rate_limit=0 audit_backlog_limit=64 [ 91.415678][ T36] audit: type=1400 audit(1750866532.419:477851): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 92.187124][ T148] audit: audit_lost=23030 audit_rate_limit=0 audit_backlog_limit=64 [ 92.195144][ T148] audit: backlog limit exceeded [ 92.957442][ T290] audit: backlog limit exceeded [ 93.003082][ T2458] audit: audit_backlog=65 > audit_backlog_limit=64 [ 93.054410][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.116572][ T36] kauditd_printk_skb: 117 callbacks suppressed [ 94.116588][ T36] audit: type=1400 audit(1750866537.433:477965): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.199053][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.239596][ C0] net_ratelimit: 162849 callbacks suppressed [ 94.239615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.239626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 94.239667][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 94.245694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.258299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 94.269657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.281559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 94.293582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.305661][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 94.317355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 94.382949][ T288] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.460014][ T289] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.468757][ T148] audit: audit_lost=23033 audit_rate_limit=0 audit_backlog_limit=64 [ 94.491335][ T2463] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.500016][ T288] audit: audit_lost=23034 audit_rate_limit=0 audit_backlog_limit=64 [ 94.517959][ T289] audit: audit_lost=23035 audit_rate_limit=0 audit_backlog_limit=64 [ 94.528174][ T148] audit: backlog limit exceeded [ 94.541067][ T2463] audit: audit_lost=23036 audit_rate_limit=0 audit_backlog_limit=64 [ 99.470546][ T36] kauditd_printk_skb: 1270 callbacks suppressed [ 99.470562][ T36] audit: type=1400 audit(1750866542.437:479230): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.595580][ C1] net_ratelimit: 151845 callbacks suppressed [ 99.595600][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 99.595619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.601806][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 99.613762][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.625734][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 99.637574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.649688][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 99.661449][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 99.673406][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 99.685253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 100.078061][ T36] audit: type=1400 audit(1750866542.437:479231): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 100.088152][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.270154][ T2475] audit: audit_backlog=65 > audit_backlog_limit=64 [ 100.276697][ T2475] audit: audit_lost=23038 audit_rate_limit=0 audit_backlog_limit=64 [ 100.988000][ T2475] audit: backlog limit exceeded [ 101.079051][ T2477] audit: audit_backlog=65 > audit_backlog_limit=64 [ 101.087570][ T148] audit: audit_lost=23039 audit_rate_limit=0 audit_backlog_limit=64 [ 101.111100][ T36] audit: type=1400 audit(1750866542.437:479232): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 101.146433][ T2477] audit: audit_lost=23040 audit_rate_limit=0 audit_backlog_limit=64 [ 104.951592][ C0] net_ratelimit: 143066 callbacks suppressed [ 104.951613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.951675][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 104.957714][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.969675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 104.981426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 104.993558][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 105.005482][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 105.017446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 105.029199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 105.041301][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 105.158281][ T36] kauditd_printk_skb: 1606 callbacks suppressed [ 105.158297][ T36] audit: type=1400 audit(1750866547.759:479634): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 105.335595][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.674566][ T148] audit: audit_lost=23442 audit_rate_limit=0 audit_backlog_limit=64 [ 106.682586][ T148] audit: backlog limit exceeded [ 106.737800][ T36] audit: type=1400 audit(1750866547.759:479635): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 106.770867][ T288] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.777402][ T288] audit: audit_lost=23443 audit_rate_limit=0 audit_backlog_limit=64 [ 106.801335][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 106.807872][ T148] audit: audit_lost=23444 audit_rate_limit=0 audit_backlog_limit=64 [ 107.026310][ T288] audit: backlog limit exceeded [ 110.307587][ C0] net_ratelimit: 141950 callbacks suppressed [ 110.307607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.307643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 110.313669][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.325813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 110.337553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.349539][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 110.361375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.373491][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 110.385250][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 110.397237][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 110.588883][ T36] kauditd_printk_skb: 1453 callbacks suppressed [ 110.588900][ T36] audit: type=1400 audit(1750866552.839:480719): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.391100][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 111.505153][ T36] audit: type=1400 audit(1750866552.839:480720): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 111.721076][ T148] audit: audit_lost=23568 audit_rate_limit=0 audit_backlog_limit=64 [ 111.819267][ T148] audit: backlog limit exceeded [ 112.010411][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 112.016952][ T148] audit: audit_lost=23569 audit_rate_limit=0 audit_backlog_limit=64 [ 112.051652][ T36] audit: type=1400 audit(1750866552.839:480721): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 112.414764][ T148] audit: backlog limit exceeded [ 112.437488][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 115.663563][ C0] net_ratelimit: 140103 callbacks suppressed [ 115.663584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.663707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 115.669659][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.681830][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 115.693629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.705802][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 115.717521][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.729619][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 115.741452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 115.753552][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 115.995690][ T36] kauditd_printk_skb: 9969 callbacks suppressed [ 115.995709][ T36] audit: type=1400 audit(1750866557.759:486270): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.094537][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 116.101157][ T148] audit: audit_lost=25044 audit_rate_limit=0 audit_backlog_limit=64 [ 116.131889][ T148] audit: backlog limit exceeded [ 116.295962][ T148] audit: audit_backlog=65 > audit_backlog_limit=64 [ 116.310480][ T36] audit: type=1400 audit(1750866557.759:486271): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 116.333413][ T148] audit: audit_lost=25045 audit_rate_limit=0 audit_backlog_limit=64 [ 116.462481][ T148] audit: backlog limit exceeded [ 116.607011][ T289] audit: audit_backlog=65 > audit_backlog_limit=64 [ 116.613557][ T289] audit: audit_lost=25046 audit_rate_limit=0 audit_backlog_limit=64 [ 121.019598][ C0] net_ratelimit: 143309 callbacks suppressed [ 121.019619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 121.019748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 121.025702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 121.037685][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.049547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 121.061651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 121.073419][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 121.085373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 121.097226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 121.109339][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 121.438755][ T36] kauditd_printk_skb: 1994 callbacks suppressed [ 121.438771][ T36] audit: type=1400 audit(1750866562.988:486738): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 125.658026][ T36] audit: type=1400 audit(1750866562.988:486739): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.237903][ T36] audit: type=1400 audit(1750866562.988:486740): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 126.375609][ C0] net_ratelimit: 146323 callbacks suppressed [ 126.375629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 126.375655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 126.381671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 126.393791][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.405651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 126.417652][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 126.429442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 126.441562][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 126.453435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 126.465402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 128.013142][ T36] audit: type=1400 audit(1750866562.988:486741): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 129.017223][ T36] audit: type=1400 audit(1750866562.988:486742): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 129.305917][ T36] audit: type=1400 audit(1750866562.988:486743): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 129.411362][ T36] audit: type=1400 audit(1750866562.988:486744): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 130.121375][ T36] audit: type=1400 audit(1750866562.988:486745): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.241094][ T36] audit: type=1400 audit(1750866562.988:486746): avc: denied { read } for pid=148 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 131.731603][ C0] net_ratelimit: 144965 callbacks suppressed [ 131.731623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 131.731700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 131.737668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 131.749788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.761647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 131.773629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0) [ 131.785381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 131.797479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 131.809365][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 131.821359][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:6a:3a:13:6c:ea:81, vlan:0)