last executing test programs: 54.612242078s ago: executing program 3 (id=2011): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) socket(0x10, 0x3, 0x0) read$msr(r0, &(0x7f00000004c0)=""/102392, 0x18ff8) r1 = syz_open_procfs(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x4, &(0x7f0000019600)=ANY=[@ANYBLOB="18020e0000f6d327789b894ebd688913f55e000000000000170000000085000000500000009500008000000000099363b9854a1c9714761faa8f13f537c32a91f5f49934a9714277d401e0e43468ac8225ad8adb49c624eeb6f4b8cfb7d43df00307671b315e9d190b41395d8daa95ad8a24cec9f9b1d3e56a6b354e8d1d074eda8f9008d7e81b85d9d1fd2572e6276a752efa24d173839c1a785db8f165d287eca62b38f3f07d5c37244ec0a21d101c72579541fa01d46f64488fec0540512b5980eb337866808b89b9313ff988038f20070c9e450e088ab31159e3ace3483e0af5bca5fdd1cbb1d959528fd4357f"], &(0x7f00000000c0)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xd, 0x0, &(0x7f0000000100)="e02742e8680d85ff9782762f08", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000000)={0x0, 0xcc}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r3, &(0x7f0000001000)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000100)="90", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)}}], 0x2, 0x20008050) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000019540)=ANY=[@ANYBLOB="fc8c9d3c1cfc6a1cd63d81771abdf3a77b70ac56d5ddc43d42cf0ebb939b117495ab57f904329c8e32c7d2013257e48f011e7c258ed9cc2e8c6c33d2d3135206dcd813f2699428236c5de1be12b3107dbdab", @ANYRES64=r2, @ANYRES32=r3, @ANYRESHEX=r1, @ANYRESOCT, @ANYRESOCT=r0], 0x1000f) ioctl$TCXONC(0xffffffffffffffff, 0x4b3a, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1400000010000100000000000000000000001f0a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000000090003007379"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a30000000050a01030000000013000000020000090400c0800900010073797a3000000000090003"], 0x58}}, 0x20000080) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$swradio(&(0x7f0000002800), 0x0, 0x2) clock_gettime(0x0, &(0x7f0000000040)) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000180)) 54.456504505s ago: executing program 3 (id=2012): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c500000005000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) socket$tipc(0x1e, 0x5, 0x0) socket$tipc(0x1e, 0x5, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x1e, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x20000000) socket$nl_route(0x10, 0x3, 0x0) socket$tipc(0x1e, 0x5, 0x0) socket(0x1e, 0x5, 0x0) socket(0x1e, 0x805, 0x0) socket(0x1, 0x803, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x6a040000) mmap(&(0x7f00002ad000/0xc00000)=nil, 0xc00000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = gettid() sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r2, @ANYBLOB="6d3082610000000008001300", @ANYRES32=r4], 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='contention_end\x00', r5, 0x0, 0x3}, 0x18) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000000)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) gettid() 54.288212321s ago: executing program 1 (id=2014): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002ac0), 0x80000, 0x0) r3 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r3, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r4 = socket$kcm(0x29, 0x2, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x80, 0x80800) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x50, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x10c, &(0x7f0000002240)=0x2, 0x0, 0x4) r8 = syz_io_uring_setup(0x110, &(0x7f00000000c0)={0x0, 0x212e, 0x100, 0x3, 0x3de}, &(0x7f0000000040), &(0x7f0000000180)) r9 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140), 0xa0000, 0x0) io_uring_register$IORING_REGISTER_FILES(r8, 0x2, &(0x7f0000000300)=[r9], 0x1) mount$fuse(0x0, &(0x7f0000002e40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000002100), 0x800, &(0x7f0000002f40)=ANY=[]) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x1, 0x38775951944642b9, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) r10 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x24c01, 0x0) write$FUSE_ENTRY(r10, &(0x7f0000000340)={0x90, 0x0, 0x0, {0x2, 0x0, 0xa, 0x0, 0x800, 0x7, {0x5, 0x6, 0x7ff, 0x5, 0x51b5, 0x4, 0x1, 0x7fffffff, 0xf5, 0x6000, 0x4, 0x0, 0x0, 0x6, 0x3e}}}, 0x90) read$FUSE(r9, &(0x7f0000004200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmmsg$unix(r9, &(0x7f0000006280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002dc0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r1, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32=r9, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="004000005f59e48f451d8d0f89d62839c9817c943c447f54fec83bd2f26b16d1513cfc79bb09c0a807661fdd886266f382fbf251"], 0x38, 0xc1}}, {{&(0x7f0000002780)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002a80)=[{&(0x7f0000002800)="6199a449bedb8e3ad1c19420bded6da275b9ff24c746c6bea89cb5dce20524831e2f5ab583679e35c4f860ad640accea24437878f033e02fdb821d418266040c367c580426c1cc4c24861f689c03aaf76ddab51538a877010417311dd1578e7a492da67cfbdbbd68f3dcefe60fcfb3953f386bf481955237c75a1c1670b7bac30be62132c17f08000000618d5a832651825a2f268a14", 0x96}, {&(0x7f00000028c0)="e1cdb2845dc073896f3843d26f4ee346ab519ab70a6632ca7bb78516ba61af5d960aa406336b09a4419c6b4d840a62df73590645142ae095de46957aa64462d102f8d24da660640cbbd258", 0x4b}, {&(0x7f0000002740)="95a7fda62a4187bffa39022d9fde1dd339517f276aa44028fc2beed35662432cf3b06667271db1e8a619bae808df4f9c148c4749c0", 0x35}, {&(0x7f0000002980)="b3b843b55ec4f63e08abe01d28d0de897fd5fa43418c66d0aaa50a9d51803d03288248430504560ae4bedaa8b6c611c88d823dfccc8ff07565cc47f578ae842cdc0cb803f781131a7f0a5d43e7ec1e0b9ad7d7457ce5", 0x56}], 0x4, &(0x7f0000002ac0), 0x0, 0x8801}}, {{&(0x7f0000002b00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004140), 0x0, &(0x7f0000006240)=ANY=[@ANYBLOB="1c00000000000100000002000000", @ANYRES8=r6, @ANYRES32, @ANYRES32=r11, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x38, 0x4000}}], 0x3, 0x4000) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000001c0)={r5, r9}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000007b09763b000000180100000800000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000004ece8500000004000000850000000500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) r12 = socket(0x10, 0x80003, 0x0) write(r12, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) close_range(r12, 0xffffffffffffffff, 0x0) move_mount(r0, 0x0, r0, 0x0, 0x256) 53.820648604s ago: executing program 2 (id=2017): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='tlb_flush\x00', r0, 0x0, 0x10000000000000}, 0x18) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x19) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1, 0x5d032, 0xffffffffffffffff, 0x0) userfaultfd(0x801) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x10, &(0x7f0000000000)='us', 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0xa0c}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x50032, 0xffffffffffffffff, 0x0) 53.771711831s ago: executing program 1 (id=2018): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000240), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_usb_connect(0x0, 0x2d, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'veth1_to_batadv\x00'}) syz_usb_connect(0x0, 0x24, &(0x7f0000000200)=ANY=[@ANYBLOB="120100002ec6601037210100352a010203010902120001000000000904"], 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0), 0x40081, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x28, 0x0, 0x0, 0xfffffffe, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5, 0x49}}}}}, 0x28}}, 0x4000004) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a2, &(0x7f0000000000)='bridge0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000200)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="50b90600cde0", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @address_reply}}}}, 0x0) r3 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000dc0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0xfc5, 0xb080, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x3}}}}]}}]}}, 0x0) syz_usb_control_io(r3, 0x0, 0x0) syz_usb_control_io$hid(r3, &(0x7f0000000200)={0x24, &(0x7f0000000000)={0x40, 0x30, 0x5, {0x5, 0x3f, "dced88"}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r3, 0x0, 0x0) ustat(0x11, &(0x7f0000000600)) r4 = socket$inet(0x2, 0x2, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) close_range(r4, r5, 0x0) syz_usb_control_io(r3, 0x0, &(0x7f0000000780)={0x84, &(0x7f0000000380)={0x40, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x40, 0xf, 0x2, 0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000100000008000100040000002c00048005000300010000000500030080ffffff05000300000000000500030080ffffff0500030080ffffff0800020003"], 0x50}}, 0x0) 53.632416804s ago: executing program 2 (id=2019): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x9, 0x2, 0xfffff038}, {0x20, 0x7, 0x0, 0xaf6e}, {0x6, 0x20, 0x0, 0xa1a}]}, 0x10) socket(0x1d, 0x2, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x40001e0, 0x0) socket$netlink(0x10, 0x3, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000080)="441f0803", 0x1f) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) writev(r6, &(0x7f00000002c0)=[{&(0x7f0000000280)='\b\x00\x00\x00', 0x4}, {&(0x7f0000000640)='\x00', 0x1}], 0x2) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) 53.368140543s ago: executing program 0 (id=2020): r0 = socket(0x10, 0x3, 0x0) pread64(r0, &(0x7f00000000c0)=""/159, 0x9f, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @local, 0x2}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000000905000200000000000000000000000c0004800800014000000000240002001400018008000100e000000208000200ac1414bb0c00028005000100000000000900010073797a"], 0x50}}, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r7 = fsopen(&(0x7f0000000180)='hfs\x00', 0x1) fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000080)='iocharset', 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newqdisc={0x158, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x134, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0xb8, 0x9, 0x8, 0x2, 0x1, 0x3, 0x5}}, {0xe, 0x2, [0x9, 0x7, 0x100, 0xff, 0x1]}}, {{0x1c, 0x1, {0x5, 0x3, 0x9, 0x7, 0x1, 0x5, 0x3, 0x1}}, {0x6, 0x2, [0x4]}}, {{0x1c, 0x1, {0x32, 0x9, 0x40, 0x9d6, 0x2, 0x800, 0x1000, 0x5}}, {0xe, 0x2, [0xfc00, 0x7, 0xd, 0x670e, 0x6]}}, {{0x1c, 0x1, {0x84, 0x0, 0x4, 0x7, 0x0, 0x2, 0x4d, 0x8}}, {0x14, 0x2, [0x2, 0x0, 0x68e, 0x4, 0x0, 0x1, 0xae6, 0x5a31]}}, {{0x1c, 0x1, {0x3, 0x5, 0x516, 0x7, 0x2, 0x6, 0x5, 0x5}}, {0xe, 0x2, [0x2, 0x7, 0x5d13, 0x40, 0x1]}}, {{0x1c, 0x1, {0x0, 0xb, 0x3, 0x100, 0x1, 0x5, 0x100, 0x5}}, {0xe, 0x2, [0x3, 0x1b5, 0x1501, 0xfffe, 0x7]}}, {{0x1c, 0x1, {0x2, 0xfb, 0x7, 0x4, 0x1, 0x8000, 0x8, 0x5}}, {0xe, 0x2, [0x3cf, 0x0, 0xf14f, 0x1000, 0x1ff]}}]}]}, 0x158}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="800000000906010200000000000000000100000205000100070000aa3b6cc70073797a3000000000340007800a001100bbbbbbbbbbbb0000050007000100000008000b40000000060c001840000000000000000005000300010000000800094000000001050001000700000014000780060004404e1d000008000a4008000000"], 0x80}, 0x1, 0x0, 0x0, 0x20008041}, 0x20044010) 52.966693483s ago: executing program 4 (id=2022): socket(0x10, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffe}, 0x18) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x141301) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000280)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r1 = getpid() syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb88a840008100"], 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = syz_io_uring_setup(0x110, &(0x7f00000000c0)={0x0, 0x3232, 0x100, 0x0, 0x3de}, &(0x7f0000000040)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r7 = socket$phonet_pipe(0x23, 0x5, 0x2) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r7, 0x0, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001980)=ANY=[], 0x168}, 0x0, 0x20000000, 0x1}) io_uring_enter(r4, 0x47f6, 0x0, 0xa1ff, 0x0, 0x0) 52.925740654s ago: executing program 1 (id=2023): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000ebffffffffffffff0000000030c2cfba4328959c8f54c7a4e55981d460413390015a6fa0bc0d61e53701f595a985c92ff922f53e49ce32686b41cb559458c2698e33aeedff40ddc2e64a7bbdf3fdf7921f2710226744d1b6d640ad978154fe43b027814d94d7fc44f4e26607e80f35"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='contention_end\x00', r0}, 0x18) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000240), 0xfffffecc) ioctl$VT_DISALLOCATE(r1, 0x5608) 52.735455504s ago: executing program 3 (id=2024): syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_open_dev$tty1(0xc, 0x4, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0xa08000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x1) mount$overlay(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f0000000140), 0x0, &(0x7f0000000500)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x2, 0x7ffd) r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0xfeeb, 0x0, 0x7fffffff}, 0x0, 0x0) syz_io_uring_setup(0x6aa2, 0x0, &(0x7f0000000000), 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7000000002060500000000000000000000000000120003006269746d61703a69702c6d6163000000050004000000000009000200f3797a3000000000240007800c0002800800014000008e020c0001800800014000000000080008400000001005000500020000000500010006"], 0x70}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x33}, 0x4000a100) 52.709828247s ago: executing program 2 (id=2025): r0 = syz_open_dev$sndmidi(&(0x7f0000000100), 0x2, 0x141121) r1 = dup(r0) write$6lowpan_enable(r1, &(0x7f0000000000)='0', 0xfffffd2c) r2 = syz_io_uring_setup(0x38fe, &(0x7f0000000300)={0x0, 0x2355, 0x10100}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}) io_uring_enter(r2, 0x3023, 0x4000, 0x40, 0x0, 0x28) openat$ipvs(0xffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r7, 0x0, 0x39000, 0x0) r8 = socket(0x11, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r8, &(0x7f0000000180)={0x11, 0x0, r10, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r8, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="020114000129184ad4a08058195c60140000002f0600ac141414e0ecff02808a8972bd0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e46691e233da4d163f53ab1b3f65c3042e749c2d4c8303a0f7fbda34fb8825f80200a3"], 0xdd12}, {&(0x7f0000000600)=ANY=[], 0x4d8}, {&(0x7f0000002b00)={0x1e20, 0x27, 0x1, 0x70bd27, 0x25dfdbfc, "", [@generic="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", @typed={0xc, 0x56, 0x0, 0x0, @u64=0x2}, @nested={0x91, 0x38, 0x0, 0x1, [@generic="6ba05b2cafd48f5b068e0c591a521f8ee16cfde4e22b1970587e02ac6e69cd31c19d5ee93fe8ae9105f4731e887571920d58f7a19d040aa9c9e40d5f881f7761af9d5a8ca6ba5c137061723ac73475c83ac066b26d1ecddd5f4030eb2e94ce69cd78305e610c35ec648ea224ef16ec28758cf47a3fa56907ef82f53f5e9e1449cefd41401e2bc8604a679dce30"]}, @generic="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"]}, 0x1e20}], 0x3, 0x0, 0x0, 0x4008084}, 0x10) r11 = fcntl$dupfd(r6, 0x0, r6) write$FUSE_LK(r11, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x1, 0x1}}}, 0x28) 52.025965058s ago: executing program 0 (id=2026): socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000280)='contention_end\x00', r1}, 0x10) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000080)={0x0, 0xd}) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") socket$nl_generic(0x10, 0x3, 0x10) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0xe, 0x80000) r3 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000180)={0x1, 0x2, 0x4, 0x10001, 0x8, "008ef14ba278887cb0baba08431799317e6324"}) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000001040)={0x18, {"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", 0x100d}}, 0xfffffdef) 51.928664964s ago: executing program 4 (id=2027): r0 = fsopen(&(0x7f0000000340)='gadgetfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x300000000000000) 51.748977129s ago: executing program 4 (id=2028): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0xe, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x0, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xffffffffffffffff, 0x4}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x3a, 0x20000000) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10138, 0x2, 0x0) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000100)={0x1f, 0xffff, 0x3}, 0x6) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000280)={0x0, 0x3, 0x7, 0x0, 0x3ff, 0x8f}) r3 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000c40)=ANY=[@ANYBLOB="e000000011000100"], 0xe0}], 0x1, 0x0, 0x0, 0x2000081}, 0x20048040) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000), 0x178) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) syz_clone3(&(0x7f00000002c0)={0x8040000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r5 = syz_open_dev$dri(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$DRM_IOCTL_AUTH_MAGIC(r7, 0x40046411, &(0x7f0000000000)=0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r4, 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="000000000100010000000000"]) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000000)=0xc) r8 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r8, &(0x7f00000003c0)={0x8000201c}) syz_clone(0x20304000, 0x0, 0x0, 0x0, 0x0, 0x0) 51.665124715s ago: executing program 3 (id=2029): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async, rerun: 64) socket$nl_netfilter(0x10, 0x3, 0xc) (rerun: 64) io_submit(0x0, 0x0, &(0x7f0000000180)) (async) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000200)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x20000005}, 0x4) (async) getpid() (async, rerun: 64) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) syz_open_dev$vim2m(&(0x7f0000000140), 0x800000001005, 0x2) (async, rerun: 64) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'macsec0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="3c0000001000010010000000ffdbdf2530000000", @ANYRES32=r7, @ANYBLOB="20000000000000001c0012800b0001006d616373656300000c00028005000f"], 0x3c}}, 0x0) (async) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (async, rerun: 32) unshare(0x68060200) (rerun: 32) 51.612188143s ago: executing program 2 (id=2030): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8000) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x6, 0x8003, 0x1, 0x0, 0xffffffff, 0x91b1}}}}]}, 0x4c}, 0x1, 0x0, 0x3000000, 0x4000400}, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$sock_int(r3, 0x1, 0x2c, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='htcp\x00', 0x5) sendto$inet(r4, &(0x7f0000000000), 0xffffffffffffff94, 0x1000000, 0x0, 0x0) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) socket$key(0xf, 0x3, 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, 0x0}, 0x10) 51.608421294s ago: executing program 1 (id=2031): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = io_uring_setup(0x2a26, &(0x7f0000000140)={0x0, 0x8b60, 0x1000, 0x2, 0x2d1}) bpf$BPF_PROG_QUERY(0x9, &(0x7f0000000000)={@fallback=r0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, 0x40) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0xef4c9000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) shutdown(r1, 0x0) 51.606531932s ago: executing program 4 (id=2032): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_flowlabel\x00') pread64(r1, &(0x7f0000001600)=""/4103, 0x1007, 0x97) getsockopt$PNPIPE_HANDLE(r1, 0x113, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) syz_emit_ethernet(0x37e, &(0x7f0000000a40)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x348, 0x3a, 0x0, @remote, @local, {[@hopopts={0x4, 0x13, '\x00', [@jumbo={0xc2, 0x4, 0x3}, @calipso={0x7, 0x10, {0x1, 0x2, 0x80, 0x1, [0x7]}}, @generic={0xc, 0x2b, "2d7fbfa01387dd83b926068210b5565b0c0ab7d7fa958986f83ed986ef16e75b4604403840fd93d025a927"}, @jumbo={0xc2, 0x4, 0x28}, @calipso={0x7, 0x40, {0x3, 0xe, 0xe, 0x4, [0x10001, 0x899e, 0xfffffffffffffbff, 0x20000000, 0x8, 0x6, 0x800]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x1}]}, @routing={0x11, 0x2, 0x1, 0x10, 0x0, [@ipv4={'\x00', '\xff\xff', @empty}]}, @dstopts={0xf3, 0x35, '\x00', [@generic={0x14, 0x3c, "7006567cb1b9af1ccaa4c621bc4bf8b96f6699fa26963ec488270c3c7cd4fc3e5afe687fe07e54202f904c48129e24dd81b8df8716409948fccdf78d"}, @ra={0x5, 0x2, 0xfff8}, @calipso={0x7, 0x10, {0x3, 0x2, 0xe, 0x3, [0x100]}}, @pad1, @calipso={0x7, 0x30, {0x1, 0xa, 0x8, 0x7, [0x7, 0x126, 0x8, 0x8000000000000001, 0x8]}}, @enc_lim={0x4, 0x1, 0x4}, @calipso={0x7, 0x58, {0x3, 0x14, 0x9, 0xeb6d, [0x9, 0x8d, 0xf, 0x9, 0x3, 0x4, 0x3, 0x9, 0x2, 0x3]}}, @calipso={0x7, 0x48, {0x1, 0x10, 0x7, 0x4, [0x92, 0x200, 0x0, 0xd376, 0x5, 0x9, 0x51ae, 0x3]}}, @enc_lim, @generic={0x5, 0x7a, "4b437df3aaf7af05b98e4db9b2003c674d47dcb8b0e0c51fc7c73afcb3d2aaf217a25777a4b7cfbea2a7d72d9bfb8e428de5b18916693d2e2e0130fe7dcdb09e8f4fe4a95e961638a7c5b4e70f14e8721fa4321a1c0b128d10fe7d279693daa45f0db7d729394480f6b1422b17fdb34b89eff6345fcd209c4df9"}]}, @hopopts={0x6c}, @fragment={0x6, 0x0, 0x9, 0x1, 0x0, 0x8, 0x64}, @hopopts={0x2b, 0x7, '\x00', [@calipso={0x7, 0x38, {0x0, 0xc, 0x5, 0x8, [0x6, 0x2, 0x5b, 0x4, 0x401, 0x200]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, @routing={0x32, 0x6, 0x1, 0x4, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast1]}], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "5b29ab", 0x0, 0x11, 0x0, @private1, @local, [@hopopts={0x2b, 0x1, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}}}}}}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=ANY=[@ANYBLOB="380100001a00010000f70000fddbdf25fc02580000f4ffffffffffffff0000000000000000000000000000000000000040080006000300030000800000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff020000000000000000000000000001000000003300000000000000000000000000ffffe0000002fffffffffffffffffdffffffffffffff000000000000000001040000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00010000000000000000004800010073686132353600"/240], 0x138}}, 0x20000000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4880) write$P9_RREADDIR(r6, &(0x7f0000000580)={0xce, 0x29, 0x1, {0x7fff, [{{0x2, 0x3}, 0x6, 0x10, 0x7, './file1'}, {{0x0, 0x2, 0x5}, 0x810, 0x4, 0x10, './file0/../file1'}, {{0x10, 0x3}, 0x1, 0x7, 0x7, './file1'}, {{0x2, 0x4, 0x1}, 0x5, 0x10, 0x7, './file0'}, {{0x40, 0x0, 0x2}, 0x80000000, 0x1, 0x7, './file0'}, {{0x0, 0x3, 0x1}, 0x1, 0x96, 0x7, './file1'}]}}, 0xce) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000a00)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_on}]}) chdir(&(0x7f00000001c0)='./bus\x00') utime(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000380)='./file0/../file0\x00') 51.448084143s ago: executing program 2 (id=2033): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000002000)=""/102400, 0x19000) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001440)=ANY=[@ANYBLOB="1c0000005e0021a5553ff73042486134529f62054673877e37"], 0x1c}}, 0x0) recvmmsg$unix(r1, &(0x7f0000002380)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000002c0)=""/4096, 0x1004}], 0x1}}], 0x8, 0x34000, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x2f, 0x9d, 0x3, 0x1, 0x8, @private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8000, 0x7, 0x7ff, 0x7f}}) mknodat(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, 0x0, 0x15) r5 = dup(r4) write$FUSE_DIRENTPLUS(r5, 0x0, 0xb0) mount$9p_fd(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000080), 0x1010410, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_GET(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) r7 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4541b6bf, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x6a, &(0x7f0000001380)=ANY=[@ANYBLOB="aaaaaaaaaaaac6eb8947e4e408004564005c00670000031190780a010182ac1414b34e214e20004890780300001cbb3ff7c7d2b0d22a2d6513735e7a841d61eaf4c7acc940bc309a9b47bdc43eae05fe4d5b8bf1a71a8fd8e0d6ce2f22494a09a25f55304facba162e8448b267cfd69364d71d945d02dbc1e8efa25a4f9096a1368cc6be9d766ff6983999877e6f40e482f50211bc1aacd93181ca265cdba8d5d3bda1e5f86ebc763e347f62d6b97f"], 0x0) r8 = socket$netlink(0x10, 0x3, 0x13) sendmsg$NL80211_CMD_NEW_KEY(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c00228d", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4800) ioctl$vim2m_VIDIOC_S_CTRL(r7, 0xc008561c, 0x0) 51.416393209s ago: executing program 4 (id=2034): syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) mlock(&(0x7f000032d000/0x3000)=nil, 0x3000) munlockall() syz_open_dev$sndmidi(&(0x7f00000002c0), 0x2, 0x141101) ioctl$IOMMU_IOAS_ALLOC(0xffffffffffffffff, 0x3b81, 0x0) semget$private(0x0, 0x6, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x3, &(0x7f0000000080)=0x800008) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40800, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002040)={0x18, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000f0e780ea388e2f6f40291809fbffffff00000000000000004d"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r3}, 0x10) r4 = openat$rdma_cm(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r4, &(0x7f0000000380)={0xc, 0x8, 0x144, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x106}}, 0x20) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f00000009c0)) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) ioctl$VHOST_SET_VRING_ADDR(r5, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f0000000240)=""/266, 0x0}) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000080)={0x0, r7}) 51.389904852s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x20, 0x9, 0x2, 0xfffff038}, {0x20, 0x7, 0x0, 0xaf6e}, {0x6, 0x20, 0x0, 0xa1a}]}, 0x10) socket(0x1d, 0x2, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x40001e0, 0x0) socket$netlink(0x10, 0x3, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000080)="441f0803", 0x1f) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) writev(r6, &(0x7f00000002c0)=[{&(0x7f0000000280)='\b\x00\x00\x00', 0x4}, {&(0x7f0000000640)='\x00', 0x1}], 0x2) sendmmsg(r0, &(0x7f0000000180), 0x4000190, 0x0) 51.248849118s ago: executing program 2 (id=2036): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x180300, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) kcmp(0x0, 0x0, 0x1, 0xffffffffffffffff, r0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x0, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0x3fc, 0x0, 0x32}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x800, 0x0, 0x0, 0x8a}, 0x9c) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0c715905c80000080000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)={0x20000001}) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x34000, 0x600, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000a00)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x100, 0x0, 0xf401, 0x0, 0x54}, 0x9c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) 50.796437026s ago: executing program 1 (id=2037): syz_usb_connect(0x5, 0x24, &(0x7f0000000140)=ANY=[@ANYBLOB="120110010928fc10ac059102254301020301090212000100004000090491000003e102"], 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8102) r2 = fcntl$dupfd(r1, 0x406, r1) read$FUSE(r2, 0x0, 0x0) write$tun(r2, &(0x7f0000000400)=ANY=[], 0xa2) accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x80c00) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f00004a3000/0x2000)=nil, 0x2000, 0x2, 0x12, r3, 0x52316000) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0}}, 0x18) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_dev$evdev(&(0x7f0000000340), 0x4, 0x0) 50.60311973s ago: executing program 3 (id=2038): r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14927e, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) fallocate(r0, 0x0, 0x20, 0x1000f4) 50.459658679s ago: executing program 3 (id=2039): syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_open_dev$tty1(0xc, 0x4, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='hugetlbfs\x00', 0xa08000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x1) mount$overlay(0x0, &(0x7f0000000280)='./bus\x00', &(0x7f0000000140), 0x0, &(0x7f0000000500)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file0'}}]}) mknod(&(0x7f0000000040)='./file0\x00', 0x2, 0x7ffd) r1 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0xfeeb, 0x0, 0x7fffffff}, 0x0, 0x0) syz_io_uring_setup(0x6aa2, 0x0, &(0x7f0000000000), 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7000000002060500000000000000000000000000120003006269746d61703a69702c6d6163000000050004000000000009000200f3797a3000000000240007800c0002800800014000008e020c0001800800014000000000080008400000001005000500020000000500010006"], 0x70}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x33}, 0x4000a100) 50.456872322s ago: executing program 4 (id=2040): syz_open_dev$radio(&(0x7f0000000000), 0x1, 0x2) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_open_dev$tty1(0xc, 0x4, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./bus\x00', 0x1) listen(0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0xfeeb, 0x0, 0x7fffffff}, 0x0, 0x0) syz_io_uring_setup(0x6aa2, 0x0, &(0x7f0000000000), 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[], 0x7c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="7000000002060500000000000000000000000000120003006269746d61703a69702c6d6163000000050004000000000009000200f3797a3000000000240007800c0002800800014000008e020c0001800800014000000000080008400000001005000500020000000500010006"], 0x70}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 50.431549654s ago: executing program 0 (id=2041): socket$inet(0x2, 0x2, 0x1) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}}, 0xb8}}, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x50, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="ec00000021000100fcffffff000000000a010101000000000000000000000000fc02000000000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00001000000000009c00110000000000000000000000000000000000ff0100000000000000000000000000010a010102000000000000000000000000fc0200000000000000000000000000003c000000000000000200020000000000000000000000ffffe0000001ff010000000000000000000000001c010a0101020000000000000000000000007f00000100000000000000000000000033030000063500000a000800"], 0xec}}, 0x0) 50.360360511s ago: executing program 0 (id=2042): ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x5, 0x1000086}, 0x0) r0 = fanotify_init(0x200, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='net_prio.prioidx\x00', 0x275a, 0x0) fanotify_mark(r0, 0x101, 0x48001051, r1, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, &(0x7f0000000000)=0xff) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x43, &(0x7f0000000040)=0x2) r2 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x200000000000) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r3, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01040000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900010073797a31000000000900030073797a320000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000004c000000050a01020000000000000000010020000c00024000000000000000010900010073797a3100000000200004801400030076657468315f6d616376746170000000080001400000000514000000110001"], 0xe8}}, 0x0) sendmsg$inet6(r3, &(0x7f0000000100)={&(0x7f0000000080)={0xa, 0x4e21, 0x80000, @dev={0xfe, 0x80, '\x00', 0x16}, 0x400}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=[@dstopts_2292={{0x18, 0x29, 0x4, {0x84}}}], 0x18}, 0x40) 50.03397129s ago: executing program 1 (id=2043): r0 = fsopen(&(0x7f0000000000)='sysfs\x00', 0x0) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYRES16=r0, @ANYRES32=r1, @ANYRES16=r0, @ANYRESHEX=r1], 0x0, 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0x6, &(0x7f0000000300)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee9, 0x8031, r2, 0x35ec6000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000ea0000000095000000ba818b0342fe0100"/31], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r6}, 0x18) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000380)={r7, r8+60000000}) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x6c}}, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)='grpquota') r10 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$nl_crypto(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xf0}}, 0x0) syz_emit_ethernet(0x2a, 0x0, 0x0) 49.951211902s ago: executing program 0 (id=2044): move_pages(0x0, 0x2064, &(0x7f0000000040)=[&(0x7f0000ff9000/0x2000)=nil], &(0x7f0000001180), &(0x7f0000000000), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xd) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCFLSH(r2, 0x541b, 0x69de07c74d7effff) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x420000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000300)={0x1}) ioctl$TCSETS(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7ff, 0x0, "5dee000000594000"}) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r7 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000240)="01", 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r8, r8}, &(0x7f0000000480)=""/231, 0xe7, &(0x7f00000000c0)={&(0x7f0000000040)={'crc32c-generic\x00'}}) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, &(0x7f00000002c0)='big_key\x00', &(0x7f00000003c0)='/dev/\n\x00\x00\x00\x00\x00\x00\x00C#d\xa7\x19\xbe\xc6\xdc\xc9\xd9\xcf\x90\x0e}\xb7W=5V\xb9\xe3\xc5g\x90\xc3\x94\x9f\xa7\x96\xcd\xc7\xca\x10\xae2\xa9\x90l\x92S\x95:\xf0\\\x1d+\xf4\xfa$w\xb3\x87\xb5p9\xb1\xaa\xac\x02\xb7\'Mu\xed\x0eH\\\"\x96de\xaab\xe7\xc6S(\x19\x15\xb1waq<\xdea\x10\xc6;S7\xd9\xc1\x93\xf8f/\xcb\xdc\xdbw\x9d\x8b\xfb=\xe2\xc0s&\xaet\xe9h\r\x04\x91Ho0\x9d\x93WF[\x0f\xd4)nd]46I\x13\x80\xcc\xef\xe0\xc2\x1e6\xbeQ\x13\xe8&}\xac0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000300)={0x1}) ioctl$TCSETS(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7ff, 0x0, "5dee000000594000"}) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r7 = add_key$user(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000240)="01", 0x1, 0xfffffffffffffffe) r8 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r7, r8, r8}, &(0x7f0000000480)=""/231, 0xe7, &(0x7f00000000c0)={&(0x7f0000000040)={'crc32c-generic\x00'}}) keyctl$restrict_keyring(0x1d, 0xfffffffffffffffd, &(0x7f00000002c0)='big_key\x00', &(0x7f00000003c0)='/dev/\n\x00\x00\x00\x00\x00\x00\x00C#d\xa7\x19\xbe\xc6\xdc\xc9\xd9\xcf\x90\x0e}\xb7W=5V\xb9\xe3\xc5g\x90\xc3\x94\x9f\xa7\x96\xcd\xc7\xca\x10\xae2\xa9\x90l\x92S\x95:\xf0\\\x1d+\xf4\xfa$w\xb3\x87\xb5p9\xb1\xaa\xac\x02\xb7\'Mu\xed\x0eH\\\"\x96de\xaab\xe7\xc6S(\x19\x15\xb1waq<\xdea\x10\xc6;S7\xd9\xc1\x93\xf8f/\xcb\xdc\xdbw\x9d\x8b\xfb=\xe2\xc0s&\xaet\xe9h\r\x04\x91Ho0\x9d\x93WF[\x0f\xd4)nd]46I\x13\x80\xcc\xef\xe0\xc2\x1e6\xbeQ\x13\xe8&}\xac audit_backlog_limit=64 [ 157.285886][ T7326] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.305013][ T30] audit: type=1400 audit(1746892133.003:5211): avc: denied { read write } for pid=7321 comm="syz.1.420" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 157.331124][ T5480] audit: audit_lost=230 audit_rate_limit=0 audit_backlog_limit=64 [ 157.339175][ T7326] audit: audit_lost=231 audit_rate_limit=0 audit_backlog_limit=64 [ 157.352843][ T5480] audit: backlog limit exceeded [ 157.366780][ T7326] audit: backlog limit exceeded [ 157.381988][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 157.409580][ T7328] audit: audit_backlog=65 > audit_backlog_limit=64 [ 158.350791][ T7308] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 158.358035][ T7308] IPv6: NLM_F_CREATE should be set when creating new route [ 158.508835][ T7339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6765 sclass=netlink_route_socket pid=7339 comm=syz.1.426 [ 158.969598][ T7360] __nla_validate_parse: 134 callbacks suppressed [ 158.969612][ T7360] netlink: 4 bytes leftover after parsing attributes in process `syz.0.434'. [ 158.985398][ T7362] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 159.008469][ T7360] netlink: 20 bytes leftover after parsing attributes in process `syz.0.434'. [ 160.191356][ T7389] netlink: 12 bytes leftover after parsing attributes in process `syz.3.445'. [ 160.507259][ T7397] ceph: No mds server is up or the cluster is laggy [ 162.187513][ T7449] netlink: 12 bytes leftover after parsing attributes in process `syz.3.468'. [ 162.213989][ T30] kauditd_printk_skb: 11728 callbacks suppressed [ 162.214002][ T30] audit: type=1400 audit(1746892138.013:16729): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.367562][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.377838][ T30] audit: type=1400 audit(1746892138.023:16730): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 162.399438][ T5480] audit: audit_lost=303 audit_rate_limit=0 audit_backlog_limit=64 [ 162.409569][ T5480] audit: backlog limit exceeded [ 162.414951][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.431377][ T5480] audit: audit_lost=304 audit_rate_limit=0 audit_backlog_limit=64 [ 162.433465][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 162.448990][ T5480] audit: backlog limit exceeded [ 162.453963][ T5812] audit: audit_lost=305 audit_rate_limit=0 audit_backlog_limit=64 [ 163.178513][ T7492] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 163.664634][ T7501] netlink: 8 bytes leftover after parsing attributes in process `syz.2.488'. [ 163.673798][ T7501] macvtap1: entered promiscuous mode [ 163.690368][ T7501] macvtap1: entered allmulticast mode [ 163.690388][ T7501] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 164.347192][ T7512] netlink: 12 bytes leftover after parsing attributes in process `syz.1.493'. [ 165.102464][ T7548] trusted_key: encrypted_key: insufficient parameters specified [ 165.111589][ T7548] trusted_key: encrypted_key: insufficient parameters specified [ 165.432833][ T7557] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 165.476963][ T7559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7559 comm=syz.2.509 [ 165.814063][ T7567] FAULT_INJECTION: forcing a failure. [ 165.814063][ T7567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 165.891437][ T7567] CPU: 1 UID: 0 PID: 7567 Comm: syz.4.512 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 165.891462][ T7567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 165.891471][ T7567] Call Trace: [ 165.891477][ T7567] [ 165.891484][ T7567] dump_stack_lvl+0x16c/0x1f0 [ 165.891510][ T7567] should_fail_ex+0x512/0x640 [ 165.891534][ T7567] _copy_from_user+0x2e/0xd0 [ 165.891558][ T7567] kstrtouint_from_user+0xd6/0x1d0 [ 165.891575][ T7567] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 165.891591][ T7567] ? __lock_acquire+0xaa4/0x1ba0 [ 165.891629][ T7567] proc_fail_nth_write+0x83/0x250 [ 165.891653][ T7567] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 165.891682][ T7567] vfs_write+0x25c/0x1180 [ 165.891704][ T7567] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 165.891731][ T7567] ? __pfx___mutex_lock+0x10/0x10 [ 165.891753][ T7567] ? __pfx_vfs_write+0x10/0x10 [ 165.891783][ T7567] ? __fget_files+0x20e/0x3c0 [ 165.891815][ T7567] ksys_write+0x12a/0x240 [ 165.891837][ T7567] ? __pfx_ksys_write+0x10/0x10 [ 165.891859][ T7567] ? rcu_is_watching+0x12/0xc0 [ 165.891885][ T7567] do_syscall_64+0xcd/0x260 [ 165.891914][ T7567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 165.891931][ T7567] RIP: 0033:0x7f6ffdb8d41f [ 165.891943][ T7567] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 165.891959][ T7567] RSP: 002b:00007f6ffe9c1030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 165.891976][ T7567] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ffdb8d41f [ 165.891986][ T7567] RDX: 0000000000000001 RSI: 00007f6ffe9c10a0 RDI: 0000000000000005 [ 165.891995][ T7567] RBP: 00007f6ffe9c1090 R08: 0000000000000000 R09: 0000000000000000 [ 165.892004][ T7567] R10: 000020000086fff4 R11: 0000000000000293 R12: 0000000000000001 [ 165.892013][ T7567] R13: 0000000000000000 R14: 00007f6ffddb5fa0 R15: 00007ffc2a8a9938 [ 165.892035][ T7567] [ 166.085740][ C1] vkms_vblank_simulate: vblank timer overrun [ 166.280259][ T7582] trusted_key: encrypted_key: insufficient parameters specified [ 166.291589][ T7582] trusted_key: encrypted_key: insufficient parameters specified [ 166.863057][ T7599] mkiss: ax0: crc mode is auto. [ 167.188567][ T7614] trusted_key: encrypted_key: insufficient parameters specified [ 167.215367][ T7614] trusted_key: encrypted_key: insufficient parameters specified [ 167.227154][ T30] kauditd_printk_skb: 18547 callbacks suppressed [ 167.227167][ T30] audit: type=1400 audit(1746892143.023:30759): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.257127][ T30] audit: type=1400 audit(1746892143.033:30760): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.289414][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.298381][ T5480] audit: audit_lost=1812 audit_rate_limit=0 audit_backlog_limit=64 [ 167.307751][ T30] audit: type=1400 audit(1746892143.063:30761): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 167.312097][ T7617] audit: audit_backlog=65 > audit_backlog_limit=64 [ 167.330915][ T5480] audit: backlog limit exceeded [ 167.338838][ T7617] audit: audit_lost=1813 audit_rate_limit=0 audit_backlog_limit=64 [ 167.351696][ T7617] audit: backlog limit exceeded [ 167.356835][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 169.068392][ T7659] xt_socket: unknown flags 0x58 [ 170.137494][ T36] Bluetooth: hci5: Frame reassembly failed (-84) [ 170.174920][ T7680] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 170.877810][ T7703] netlink: 84 bytes leftover after parsing attributes in process `syz.1.567'. [ 171.451580][ T7712] netlink: 8 bytes leftover after parsing attributes in process `syz.4.571'. [ 171.472429][ T7712] netlink: 12 bytes leftover after parsing attributes in process `syz.4.571'. [ 171.485389][ T7712] netlink: 'syz.4.571': attribute type 18 has an invalid length. [ 171.832526][ T7729] netlink: 8 bytes leftover after parsing attributes in process `syz.4.578'. [ 171.851725][ T7729] netlink: 48 bytes leftover after parsing attributes in process `syz.4.578'. [ 171.879188][ T7729] geneve2: entered promiscuous mode [ 171.894399][ T7729] geneve2: entered allmulticast mode [ 172.144001][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 172.150142][ T5126] Bluetooth: hci5: command 0x1003 tx timeout [ 172.234517][ T30] kauditd_printk_skb: 20331 callbacks suppressed [ 172.234532][ T30] audit: type=1400 audit(1746892148.033:50866): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.255760][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.275058][ T7738] audit: audit_backlog=65 > audit_backlog_limit=64 [ 172.283296][ T7738] audit: audit_lost=1890 audit_rate_limit=0 audit_backlog_limit=64 [ 172.290173][ T30] audit: type=1400 audit(1746892148.043:50867): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.291558][ T5480] audit: audit_lost=1891 audit_rate_limit=0 audit_backlog_limit=64 [ 172.317163][ T30] audit: type=1400 audit(1746892148.043:50868): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.325435][ T7738] audit: backlog limit exceeded [ 172.342481][ T30] audit: type=1400 audit(1746892148.043:50869): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 172.352565][ T5480] audit: backlog limit exceeded [ 173.250665][ T7776] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 173.265257][ T7776] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 174.203269][ T7804] FAULT_INJECTION: forcing a failure. [ 174.203269][ T7804] name failslab, interval 1, probability 0, space 0, times 0 [ 174.223132][ T7804] CPU: 0 UID: 0 PID: 7804 Comm: syz.4.606 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 174.223155][ T7804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 174.223162][ T7804] Call Trace: [ 174.223168][ T7804] [ 174.223173][ T7804] dump_stack_lvl+0x16c/0x1f0 [ 174.223197][ T7804] should_fail_ex+0x512/0x640 [ 174.223213][ T7804] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 174.223235][ T7804] should_failslab+0xc2/0x120 [ 174.223249][ T7804] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 174.223267][ T7804] ? __lock_acquire+0xaa4/0x1ba0 [ 174.223285][ T7804] ? sk_prot_alloc+0x60/0x2a0 [ 174.223304][ T7804] sk_prot_alloc+0x60/0x2a0 [ 174.223320][ T7804] sk_alloc+0x36/0xc20 [ 174.223340][ T7804] unix_create1+0xa6/0x6c0 [ 174.223357][ T7804] unix_stream_connect+0x282/0x17c0 [ 174.223377][ T7804] ? selinux_netlbl_socket_connect+0x30/0x40 [ 174.223399][ T7804] ? __pfx_unix_stream_connect+0x10/0x10 [ 174.223418][ T7804] ? selinux_netlbl_socket_connect+0x30/0x40 [ 174.223437][ T7804] ? selinux_socket_connect+0x6b/0x80 [ 174.223456][ T7804] ? __pfx_unix_stream_connect+0x10/0x10 [ 174.223477][ T7804] __sys_connect_file+0x13e/0x1a0 [ 174.223501][ T7804] __sys_connect+0x14d/0x170 [ 174.223523][ T7804] ? __pfx___sys_connect+0x10/0x10 [ 174.223554][ T7804] ? __pfx_ksys_write+0x10/0x10 [ 174.223575][ T7804] ? rcu_is_watching+0x12/0xc0 [ 174.223598][ T7804] __x64_sys_connect+0x72/0xb0 [ 174.223619][ T7804] ? lockdep_hardirqs_on+0x7c/0x110 [ 174.223639][ T7804] do_syscall_64+0xcd/0x260 [ 174.223662][ T7804] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 174.223679][ T7804] RIP: 0033:0x7f6ffdb8e969 [ 174.223692][ T7804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.223708][ T7804] RSP: 002b:00007f6ffe9c1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 174.223724][ T7804] RAX: ffffffffffffffda RBX: 00007f6ffddb5fa0 RCX: 00007f6ffdb8e969 [ 174.223734][ T7804] RDX: 000000000000006e RSI: 00002000000005c0 RDI: 0000000000000003 [ 174.223743][ T7804] RBP: 00007f6ffe9c1090 R08: 0000000000000000 R09: 0000000000000000 [ 174.223752][ T7804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 174.223761][ T7804] R13: 0000000000000000 R14: 00007f6ffddb5fa0 R15: 00007ffc2a8a9938 [ 174.223782][ T7804] [ 174.483354][ T7806] netlink: 8 bytes leftover after parsing attributes in process `syz.2.607'. [ 174.534666][ T7806] netlink: 'syz.2.607': attribute type 30 has an invalid length. [ 174.549938][ T7806] netdevsim netdevsim2 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 174.560417][ T7806] netdevsim netdevsim2 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 174.570511][ T7806] netdevsim netdevsim2 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 174.579712][ T7806] netdevsim netdevsim2 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 175.384899][ T7830] netlink: 12 bytes leftover after parsing attributes in process `syz.4.616'. [ 175.410336][ T7830] netlink: 12 bytes leftover after parsing attributes in process `syz.4.616'. [ 176.520377][ T7864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7864 comm=syz.1.628 [ 176.894124][ T7872] xt_connbytes: Forcing CT accounting to be enabled [ 176.931104][ T7872] Cannot find add_set index 0 as target [ 177.244089][ T30] kauditd_printk_skb: 12355 callbacks suppressed [ 177.244104][ T30] audit: type=1400 audit(2000000004.280:63225): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 177.277048][ T30] audit: type=1400 audit(2000000004.280:63226): avc: denied { create } for pid=7876 comm="syz.2.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 177.296540][ C1] vkms_vblank_simulate: vblank timer overrun [ 177.306676][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 177.313796][ T5480] audit: audit_lost=1892 audit_rate_limit=0 audit_backlog_limit=64 [ 177.321851][ T5480] audit: backlog limit exceeded [ 177.327629][ T30] audit: type=1400 audit(2000000004.280:63227): avc: denied { read } for pid=7876 comm="syz.2.633" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 177.348728][ C1] vkms_vblank_simulate: vblank timer overrun [ 177.355319][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 177.361850][ T5480] audit: audit_lost=1893 audit_rate_limit=0 audit_backlog_limit=64 [ 177.369881][ T5480] audit: backlog limit exceeded [ 177.375051][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 180.640239][ T7960] xt_cgroup: xt_cgroup: no path or classid specified [ 181.633682][ T7984] netlink: 763 bytes leftover after parsing attributes in process `syz.2.671'. [ 181.670152][ T7984] ªªªªªª†³?ÂHº: renamed from lo (while UP) [ 181.925511][ T7998] netlink: 8 bytes leftover after parsing attributes in process `syz.4.678'. [ 181.939330][ T7998] netlink: 28 bytes leftover after parsing attributes in process `syz.4.678'. [ 182.023002][ T7998] geneve3: entered promiscuous mode [ 182.110137][ T7998] geneve3: entered allmulticast mode [ 182.126526][ T8002] netlink: 4 bytes leftover after parsing attributes in process `syz.0.677'. [ 182.170905][ T8002] ip6_vti0: Master is either lo or non-ether device [ 182.210126][ T8002] netlink: 20 bytes leftover after parsing attributes in process `syz.0.677'. [ 182.255099][ T30] kauditd_printk_skb: 14822 callbacks suppressed [ 182.255111][ T30] audit: type=1400 audit(2000000009.280:78048): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 182.327990][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.340120][ T8007] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.347587][ T5480] audit: audit_lost=1895 audit_rate_limit=0 audit_backlog_limit=64 [ 182.357974][ T8009] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.359475][ T30] audit: type=1400 audit(2000000009.320:78049): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 182.373897][ T8009] audit: audit_lost=1896 audit_rate_limit=0 audit_backlog_limit=64 [ 182.393687][ T8007] audit: audit_lost=1897 audit_rate_limit=0 audit_backlog_limit=64 [ 182.394424][ T8010] audit: audit_backlog=65 > audit_backlog_limit=64 [ 182.412458][ T5480] audit: backlog limit exceeded [ 184.653083][ T8078] netlink: 4 bytes leftover after parsing attributes in process `syz.0.701'. [ 184.675878][ T8078] ip6_vti0: Master is either lo or non-ether device [ 184.722341][ T8078] netlink: 20 bytes leftover after parsing attributes in process `syz.0.701'. [ 185.599441][ T8089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8089 comm=syz.3.706 [ 186.047889][ T8106] netlink: 4 bytes leftover after parsing attributes in process `syz.1.712'. [ 186.100399][ T8111] netlink: 20 bytes leftover after parsing attributes in process `syz.1.712'. [ 186.101424][ T8106] ip6_vti0: Master is either lo or non-ether device [ 186.791948][ T8129] netlink: 12 bytes leftover after parsing attributes in process `syz.2.720'. [ 186.826093][ T8129] netlink: 'syz.2.720': attribute type 5 has an invalid length. [ 186.919583][ T8129] vxlan1: entered promiscuous mode [ 187.133551][ T8148] netlink: 4 bytes leftover after parsing attributes in process `syz.0.727'. [ 187.169548][ T8148] ip6_vti0: Master is either lo or non-ether device [ 187.202852][ T8146] netlink: 20 bytes leftover after parsing attributes in process `syz.0.727'. [ 187.266224][ T30] kauditd_printk_skb: 12779 callbacks suppressed [ 187.266240][ T30] audit: type=1400 audit(2000000014.290:87174): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 187.278317][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.295512][ T30] audit: type=1400 audit(2000000014.300:87175): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 187.326414][ T5480] audit: audit_lost=3116 audit_rate_limit=0 audit_backlog_limit=64 [ 187.335265][ T5480] audit: backlog limit exceeded [ 187.341543][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.350021][ T5480] audit: audit_lost=3117 audit_rate_limit=0 audit_backlog_limit=64 [ 187.360728][ T5480] audit: backlog limit exceeded [ 187.367488][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 187.392302][ T30] audit: type=1400 audit(2000000014.300:87176): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 189.518947][ T8201] netlink: 136 bytes leftover after parsing attributes in process `syz.2.747'. [ 189.539115][ T8201] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 189.942639][ T8223] netlink: 4 bytes leftover after parsing attributes in process `syz.1.757'. [ 189.952618][ T8223] ip_vti0: Master is either lo or non-ether device [ 189.960609][ T8223] netlink: 20 bytes leftover after parsing attributes in process `syz.1.757'. [ 190.130488][ T8225] netlink: 4 bytes leftover after parsing attributes in process `syz.1.758'. [ 190.140101][ T8225] ip6_vti0: Master is either lo or non-ether device [ 190.151469][ T8225] netlink: 20 bytes leftover after parsing attributes in process `syz.1.758'. [ 190.339292][ T8232] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 190.656720][ T8247] netlink: 4 bytes leftover after parsing attributes in process `syz.1.768'. [ 190.682710][ T8247] ip_vti0: Master is either lo or non-ether device [ 190.708803][ T8247] netlink: 20 bytes leftover after parsing attributes in process `syz.1.768'. [ 191.667674][ T8271] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 191.947838][ T8279] netlink: 4 bytes leftover after parsing attributes in process `syz.3.780'. [ 191.960963][ T8279] ip_vti0: Master is either lo or non-ether device [ 191.972608][ T8279] netlink: 20 bytes leftover after parsing attributes in process `syz.3.780'. [ 192.277204][ T30] kauditd_printk_skb: 13095 callbacks suppressed [ 192.277219][ T30] audit: type=1400 audit(2000000019.310:95713): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.292217][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.323342][ T8290] bridge0: port 3(macsec0) entered blocking state [ 192.330243][ T8290] bridge0: port 3(macsec0) entered disabled state [ 192.337168][ T8290] macsec0: entered allmulticast mode [ 192.342471][ T8290] veth1_macvtap: entered allmulticast mode [ 192.351974][ T8290] macsec0: entered promiscuous mode [ 192.358354][ T8290] bridge0: port 3(macsec0) entered blocking state [ 192.365776][ T8290] bridge0: port 3(macsec0) entered forwarding state [ 192.374704][ T30] audit: type=1400 audit(2000000019.310:95714): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.406636][ T8291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.413200][ T5480] audit: audit_lost=4638 audit_rate_limit=0 audit_backlog_limit=64 [ 192.414913][ T30] audit: type=1400 audit(2000000019.310:95715): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 192.447898][ T8291] audit: audit_lost=4639 audit_rate_limit=0 audit_backlog_limit=64 [ 192.456140][ T5480] audit: backlog limit exceeded [ 192.464624][ T8292] audit: audit_backlog=65 > audit_backlog_limit=64 [ 192.471273][ T8292] audit: audit_lost=4640 audit_rate_limit=0 audit_backlog_limit=64 [ 193.127654][ T8301] netlink: 8 bytes leftover after parsing attributes in process `syz.3.788'. [ 193.171132][ T8301] netlink: 28 bytes leftover after parsing attributes in process `syz.3.788'. [ 193.213325][ T8301] geneve2: entered promiscuous mode [ 193.228589][ T8301] geneve2: entered allmulticast mode [ 193.831760][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.838198][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 195.399065][ T8359] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 196.426036][ T8395] netlink: 'syz.2.825': attribute type 29 has an invalid length. [ 196.439469][ T8395] netlink: 'syz.2.825': attribute type 29 has an invalid length. [ 197.316216][ T30] kauditd_printk_skb: 12997 callbacks suppressed [ 197.316232][ T30] audit: type=1400 audit(2000000024.350:107670): avc: denied { read } for pid=8416 comm="syz.1.834" name="video7" dev="devtmpfs" ino=949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 197.372096][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.380682][ T5480] audit: audit_lost=4988 audit_rate_limit=0 audit_backlog_limit=64 [ 197.391098][ T30] audit: type=1400 audit(2000000024.350:107671): avc: denied { create } for pid=8416 comm="syz.1.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 197.403688][ T8420] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.419787][ T5480] audit: backlog limit exceeded [ 197.427429][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 197.437041][ T5480] audit: audit_lost=4989 audit_rate_limit=0 audit_backlog_limit=64 [ 197.445065][ T8420] audit: audit_lost=4990 audit_rate_limit=0 audit_backlog_limit=64 [ 197.445241][ T30] audit: type=1400 audit(2000000024.350:107672): avc: denied { create } for pid=8416 comm="syz.1.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 198.472558][ T8445] trusted_key: encrypted_key: insufficient parameters specified [ 198.531486][ T8451] trusted_key: encrypted_key: insufficient parameters specified [ 198.702700][ T8456] netlink: 16 bytes leftover after parsing attributes in process `syz.3.851'. [ 199.041548][ T8444] netlink: 'syz.2.847': attribute type 16 has an invalid length. [ 199.088780][ T8444] netlink: 'syz.2.847': attribute type 17 has an invalid length. [ 200.449948][ T8488] trusted_key: encrypted_key: insufficient parameters specified [ 200.700251][ T8488] trusted_key: encrypted_key: insufficient parameters specified [ 201.134233][ T8508] netlink: 4 bytes leftover after parsing attributes in process `syz.0.870'. [ 201.151647][ T8506] debugfs: Directory 'ttyS3' with parent 'caif_serial' already present! [ 202.233382][ T8543] netlink: 8 bytes leftover after parsing attributes in process `syz.0.882'. [ 202.256152][ T8543] netlink: 20 bytes leftover after parsing attributes in process `syz.0.882'. [ 202.331815][ T30] kauditd_printk_skb: 13815 callbacks suppressed [ 202.331836][ T30] audit: type=1400 audit(2000000029.360:118384): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.343285][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.404695][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.422283][ T5809] audit: audit_lost=6025 audit_rate_limit=0 audit_backlog_limit=64 [ 202.432506][ T8549] audit: audit_backlog=65 > audit_backlog_limit=64 [ 202.441207][ T8549] audit: audit_lost=6026 audit_rate_limit=0 audit_backlog_limit=64 [ 202.449380][ T5809] audit: backlog limit exceeded [ 202.456956][ T30] audit: type=1400 audit(2000000029.360:118385): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 202.503014][ T8549] audit: backlog limit exceeded [ 202.506635][ T5480] audit: audit_lost=6027 audit_rate_limit=0 audit_backlog_limit=64 [ 204.510287][ T8618] netlink: 4 bytes leftover after parsing attributes in process `syz.1.914'. [ 204.521981][ T8618] ip_vti0: Master is either lo or non-ether device [ 205.434217][ T8659] netlink: 40 bytes leftover after parsing attributes in process `syz.1.932'. [ 206.126795][ T8695] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 206.720225][ T8708] vlan0: entered allmulticast mode [ 206.744043][ T8708] hsr_slave_0: entered allmulticast mode [ 207.335654][ T30] kauditd_printk_skb: 10101 callbacks suppressed [ 207.335671][ T30] audit: type=1400 audit(2000000001.930:128152): avc: denied { create } for pid=8735 comm="syz.4.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 207.377090][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.384940][ T8738] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.402458][ T8745] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.409190][ T8745] audit: audit_lost=6140 audit_rate_limit=0 audit_backlog_limit=64 [ 207.421042][ T8738] audit: audit_lost=6141 audit_rate_limit=0 audit_backlog_limit=64 [ 207.434800][ T8745] audit: backlog limit exceeded [ 207.441057][ T8738] audit: backlog limit exceeded [ 207.447584][ T8745] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.449003][ T8746] audit: audit_backlog=65 > audit_backlog_limit=64 [ 207.751505][ T8751] netlink: 'syz.0.971': attribute type 1 has an invalid length. [ 209.656774][ T8817] netlink: 72 bytes leftover after parsing attributes in process `syz.0.999'. [ 209.770164][ T8817] netlink: 72 bytes leftover after parsing attributes in process `syz.0.999'. [ 210.578065][ T8851] netlink: 36 bytes leftover after parsing attributes in process `syz.4.1008'. [ 210.589818][ T8851] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8851 comm=syz.4.1008 [ 211.314097][ T8870] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1019'. [ 211.343445][ T8870] (unnamed net_device) (uninitialized): option use_carrier: invalid value (4) [ 211.461088][ T8883] Cannot find add_set index 0 as target [ 211.866526][ T8906] bridge0: port 3(batadv0) entered blocking state [ 211.873074][ T8906] bridge0: port 3(batadv0) entered disabled state [ 211.879741][ T8906] batadv0: entered allmulticast mode [ 211.886510][ T8906] batadv0: entered promiscuous mode [ 211.892586][ T8906] bridge0: port 3(batadv0) entered blocking state [ 211.900179][ T8906] bridge0: port 3(batadv0) entered forwarding state [ 212.258459][ T5926] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 212.268560][ T5926] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 212.345563][ T30] kauditd_printk_skb: 9372 callbacks suppressed [ 212.345578][ T30] audit: type=1400 audit(2000000006.940:136924): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 212.362077][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.397464][ T8913] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.406200][ T5811] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.407381][ T5480] audit: audit_lost=6343 audit_rate_limit=0 audit_backlog_limit=64 [ 212.412697][ T5811] audit: audit_lost=6344 audit_rate_limit=0 audit_backlog_limit=64 [ 212.427228][ T8915] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.435215][ T5480] audit: backlog limit exceeded [ 212.437825][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 212.440117][ T8915] audit: audit_lost=6345 audit_rate_limit=0 audit_backlog_limit=64 [ 217.358611][ T30] kauditd_printk_skb: 15854 callbacks suppressed [ 217.358627][ T30] audit: type=1400 audit(2000000011.930:151716): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.386988][ C0] vkms_vblank_simulate: vblank timer overrun [ 217.412264][ T30] audit: type=1400 audit(2000000011.950:151718): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.412888][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 217.452104][ T5480] audit: audit_lost=6700 audit_rate_limit=0 audit_backlog_limit=64 [ 217.452624][ T5808] audit: audit_backlog=65 > audit_backlog_limit=64 [ 217.460703][ T5480] audit: backlog limit exceeded [ 217.474229][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 217.480818][ T5480] audit: audit_lost=6701 audit_rate_limit=0 audit_backlog_limit=64 [ 217.483901][ T30] audit: type=1400 audit(2000000011.950:151719): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 217.489095][ T5480] audit: backlog limit exceeded [ 217.854023][ T9048] warning: `syz.2.1091' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 219.776446][ T9104] IPv6: Can't replace route, no match found [ 220.404590][ T9119] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1117'. [ 222.077155][ T9165] xt_CT: You must specify a L4 protocol and not use inversions on it [ 222.341635][ T9178] netlink: 'syz.1.1137': attribute type 3 has an invalid length. [ 222.349549][ T9178] netlink: 'syz.1.1137': attribute type 1 has an invalid length. [ 222.367309][ T30] kauditd_printk_skb: 13336 callbacks suppressed [ 222.367322][ T30] audit: type=1400 audit(2000000016.960:161955): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 222.409745][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.413168][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.418606][ T5480] audit: audit_lost=7736 audit_rate_limit=0 audit_backlog_limit=64 [ 222.423301][ T5809] audit: audit_lost=7737 audit_rate_limit=0 audit_backlog_limit=64 [ 222.430822][ T30] audit: type=1400 audit(2000000016.960:161956): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 222.439029][ T5809] audit: backlog limit exceeded [ 222.476177][ T5480] audit: backlog limit exceeded [ 222.487199][ T9182] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.493639][ T9184] audit: audit_backlog=65 > audit_backlog_limit=64 [ 222.782961][ T9191] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1145'. [ 222.961262][ T9200] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 223.218672][ T9208] IPv6: Can't replace route, no match found [ 223.775672][ T9219] netlink: 'syz.2.1154': attribute type 3 has an invalid length. [ 223.787654][ T9219] netlink: 'syz.2.1154': attribute type 1 has an invalid length. [ 225.847676][ T9282] netlink: 'syz.1.1174': attribute type 4 has an invalid length. [ 225.873956][ T9281] netlink: 'syz.1.1174': attribute type 4 has an invalid length. [ 226.014028][ T9285] netlink: 'syz.1.1174': attribute type 4 has an invalid length. [ 226.129711][ T9289] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 226.942956][ T9313] netlink: 'syz.0.1188': attribute type 3 has an invalid length. [ 227.377205][ T30] kauditd_printk_skb: 10157 callbacks suppressed [ 227.377221][ T30] audit: type=1400 audit(2000000021.970:172044): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.386779][ T9330] batman_adv: batadv0: Adding interface: dummy0 [ 227.545615][ T9334] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.625683][ T9333] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.632817][ T9333] audit: audit_lost=7762 audit_rate_limit=0 audit_backlog_limit=64 [ 227.640976][ T9330] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 227.646706][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.666204][ C1] vkms_vblank_simulate: vblank timer overrun [ 227.666853][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 227.685865][ T9334] audit: audit_lost=7763 audit_rate_limit=0 audit_backlog_limit=64 [ 227.693898][ T30] audit: type=1400 audit(2000000021.970:172045): avc: denied { create } for pid=9329 comm="syz.2.1195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 227.694164][ T9334] audit: backlog limit exceeded [ 227.721149][ T9333] audit: backlog limit exceeded [ 227.747273][ T9330] batman_adv: batadv0: Interface activated: dummy0 [ 227.893555][ T9334] trusted_key: encrypted_key: insufficient parameters specified [ 228.500836][ T9375] netlink: 830 bytes leftover after parsing attributes in process `syz.3.1212'. [ 228.950302][ T9385] trusted_key: encrypted_key: insufficient parameters specified [ 230.295468][ T9428] trusted_key: encrypted_key: insufficient parameters specified [ 230.564363][ T9441] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1239'. [ 230.927376][ T9456] trusted_key: encrypted_key: insufficient parameters specified [ 231.190105][ T9470] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1253'. [ 231.219491][ T9470] ip6_vti0: Master is either lo or non-ether device [ 231.241685][ T9475] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1253'. [ 231.397813][ T9485] trusted_key: encrypted_key: insufficient parameters specified [ 232.395018][ T30] kauditd_printk_skb: 12289 callbacks suppressed [ 232.395033][ T30] audit: type=1400 audit(2000000026.980:182978): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 232.437548][ T9511] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1269'. [ 232.447619][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.456111][ T9514] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.463012][ T9514] audit: audit_lost=8217 audit_rate_limit=0 audit_backlog_limit=64 [ 232.472535][ T9511] ip6_vti0: Master is either lo or non-ether device [ 232.480696][ T9511] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1269'. [ 232.492586][ T9514] audit: backlog limit exceeded [ 232.497829][ T5480] audit: audit_lost=8218 audit_rate_limit=0 audit_backlog_limit=64 [ 232.515989][ T30] audit: type=1400 audit(2000000026.980:182979): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 232.538558][ T9515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 232.545108][ T9515] audit: audit_lost=8219 audit_rate_limit=0 audit_backlog_limit=64 [ 232.563129][ T9515] audit: backlog limit exceeded [ 232.777096][ T9518] trusted_key: encrypted_key: insufficient parameters specified [ 233.457837][ T9542] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1281'. [ 233.466932][ T9542] ip6_vti0: Master is either lo or non-ether device [ 233.474879][ T9542] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1281'. [ 234.532888][ T9565] kernel profiling enabled (shift: 1) [ 236.097319][ T9591] FAULT_INJECTION: forcing a failure. [ 236.097319][ T9591] name failslab, interval 1, probability 0, space 0, times 0 [ 236.113634][ T9591] CPU: 1 UID: 0 PID: 9591 Comm: syz.3.1300 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 236.113655][ T9591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 236.113661][ T9591] Call Trace: [ 236.113665][ T9591] [ 236.113669][ T9591] dump_stack_lvl+0x16c/0x1f0 [ 236.113687][ T9591] should_fail_ex+0x512/0x640 [ 236.113700][ T9591] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 236.113722][ T9591] should_failslab+0xc2/0x120 [ 236.113732][ T9591] __kmalloc_cache_noprof+0x6a/0x3e0 [ 236.113745][ T9591] ? find_held_lock+0x2b/0x80 [ 236.113757][ T9591] ? alloc_pipe_info+0x10e/0x590 [ 236.113768][ T9591] alloc_pipe_info+0x10e/0x590 [ 236.113779][ T9591] splice_direct_to_actor+0x77d/0xa30 [ 236.113795][ T9591] ? __lock_acquire+0x5ca/0x1ba0 [ 236.113816][ T9591] ? __pfx_direct_splice_actor+0x10/0x10 [ 236.113841][ T9591] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 236.113862][ T9591] ? __pfx___might_resched+0x10/0x10 [ 236.113877][ T9591] do_splice_direct+0x174/0x240 [ 236.113892][ T9591] ? __pfx_do_splice_direct+0x10/0x10 [ 236.113907][ T9591] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 236.113923][ T9591] ? rw_verify_area+0xcf/0x680 [ 236.113937][ T9591] do_sendfile+0xafd/0xe50 [ 236.113953][ T9591] ? __pfx_do_sendfile+0x10/0x10 [ 236.113966][ T9591] ? __fget_files+0x20e/0x3c0 [ 236.113985][ T9591] __x64_sys_sendfile64+0x1d8/0x220 [ 236.113995][ T9591] ? ksys_write+0x1b9/0x240 [ 236.114008][ T9591] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 236.114018][ T9591] ? rcu_is_watching+0x12/0xc0 [ 236.114035][ T9591] do_syscall_64+0xcd/0x260 [ 236.114056][ T9591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 236.114073][ T9591] RIP: 0033:0x7efeb878e969 [ 236.114087][ T9591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 236.114102][ T9591] RSP: 002b:00007efeb95dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 236.114118][ T9591] RAX: ffffffffffffffda RBX: 00007efeb89b5fa0 RCX: 00007efeb878e969 [ 236.114128][ T9591] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 236.114138][ T9591] RBP: 00007efeb95dd090 R08: 0000000000000000 R09: 0000000000000000 [ 236.114147][ T9591] R10: 0001000000201005 R11: 0000000000000246 R12: 0000000000000001 [ 236.114157][ T9591] R13: 0000000000000000 R14: 00007efeb89b5fa0 R15: 00007fffe8499c88 [ 236.114178][ T9591] [ 237.155835][ T9616] xt_CT: You must specify a L4 protocol and not use inversions on it [ 237.405696][ T30] kauditd_printk_skb: 11850 callbacks suppressed [ 237.405712][ T30] audit: type=1400 audit(2000000003.210:193311): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.405924][ T30] audit: type=1400 audit(2000000003.220:193312): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.406110][ T30] audit: type=1400 audit(2000000003.220:193313): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.406294][ T30] audit: type=1400 audit(2000000003.220:193314): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.406866][ T30] audit: type=1400 audit(2000000003.220:193315): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.407188][ T30] audit: type=1400 audit(2000000003.220:193316): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.407374][ T30] audit: type=1400 audit(2000000003.220:193317): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.407559][ T30] audit: type=1400 audit(2000000003.220:193318): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.407931][ T30] audit: type=1400 audit(2000000003.220:193319): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.408510][ T30] audit: type=1400 audit(2000000003.220:193320): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 237.783098][ T9630] block device autoloading is deprecated and will be removed. [ 238.012481][ C0] vkms_vblank_simulate: vblank timer overrun [ 238.911787][ T9656] netlink: 'syz.1.1325': attribute type 4 has an invalid length. [ 240.126723][ T9687] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1338'. [ 240.197156][ T9687] bridge1: entered promiscuous mode [ 240.214432][ T9687] bridge1: entered allmulticast mode [ 240.256946][ T9687] team0: Port device bridge1 added [ 240.532857][ T9695] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1342'. [ 240.572572][ T9695] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1342'. [ 240.697631][ T9710] netlink: 316 bytes leftover after parsing attributes in process `syz.1.1344'. [ 241.677295][ T9739] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1359'. [ 241.703518][ T9739] ip6_vti0: Master is either lo or non-ether device [ 241.715174][ T9739] netlink: 20 bytes leftover after parsing attributes in process `syz.4.1359'. [ 242.413798][ T30] kauditd_printk_skb: 12393 callbacks suppressed [ 242.413813][ T30] audit: type=1400 audit(2000000001.500:205450): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 242.432994][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.460782][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.477652][ T5809] audit: audit_lost=8814 audit_rate_limit=0 audit_backlog_limit=64 [ 242.478977][ T5480] audit: audit_lost=8815 audit_rate_limit=0 audit_backlog_limit=64 [ 242.493240][ T5809] audit: backlog limit exceeded [ 242.503180][ T30] audit: type=1400 audit(2000000001.510:205451): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 242.512803][ T5480] audit: backlog limit exceeded [ 242.569799][ T5811] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.577600][ T9770] audit: audit_backlog=65 > audit_backlog_limit=64 [ 242.928020][ T9785] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1374'. [ 244.375669][ T9816] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1386'. [ 245.755711][ T9860] xt_policy: neither incoming nor outgoing policy selected [ 247.397685][ T9937] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1436'. [ 247.425642][ T30] kauditd_printk_skb: 9469 callbacks suppressed [ 247.425657][ T30] audit: type=1400 audit(2000000006.520:213933): avc: denied { write } for pid=9938 comm="syz.3.1435" name="001" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 247.443694][ T9937] ip6_vti0: Master is either lo or non-ether device [ 247.473053][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.489643][ T9940] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.505466][ T30] audit: type=1400 audit(2000000006.520:213934): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 247.526847][ T30] audit: type=1400 audit(2000000006.520:213935): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 247.549386][ T30] audit: type=1400 audit(2000000006.520:213936): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 247.570823][ T5480] audit: audit_lost=9146 audit_rate_limit=0 audit_backlog_limit=64 [ 247.570840][ T5480] audit: backlog limit exceeded [ 247.571299][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 247.579345][ T30] audit: type=1400 audit(2000000006.520:213937): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 247.584581][ T9937] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1436'. [ 248.654067][ T9979] netlink: 'syz.2.1450': attribute type 8 has an invalid length. [ 252.086996][T10070] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1483'. [ 252.096049][T10070] ip6_vti0: Master is either lo or non-ether device [ 252.105574][T10070] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1483'. [ 252.434842][ T30] kauditd_printk_skb: 12228 callbacks suppressed [ 252.434856][ T30] audit: type=1400 audit(2000000011.534:224875): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.548226][ T30] audit: type=1400 audit(2000000011.534:224876): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.570269][ T30] audit: type=1400 audit(2000000011.534:224877): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.629060][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 252.630395][ T30] audit: type=1400 audit(2000000011.534:224878): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 252.666174][T10092] audit: audit_backlog=65 > audit_backlog_limit=64 [ 252.672759][T10092] audit: audit_lost=9578 audit_rate_limit=0 audit_backlog_limit=64 [ 252.682248][T10092] audit: backlog limit exceeded [ 252.689030][T10092] audit: audit_backlog=65 > audit_backlog_limit=64 [ 252.697392][T10092] audit: audit_lost=9579 audit_rate_limit=0 audit_backlog_limit=64 [ 254.447546][T10157] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1517'. [ 255.266225][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.272923][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.786546][T10189] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1529'. [ 256.159089][T10200] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1533'. [ 256.210683][T10204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10204 comm=syz.4.1533 [ 257.342937][T10230] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 257.401799][T10234] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 257.443326][ T30] kauditd_printk_skb: 13813 callbacks suppressed [ 257.443341][ T30] audit: type=1400 audit(2000000016.534:238092): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 257.484102][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.491426][ T5480] audit: audit_lost=9780 audit_rate_limit=0 audit_backlog_limit=64 [ 257.495267][T10236] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.518703][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 257.521201][T10236] audit: audit_lost=9781 audit_rate_limit=0 audit_backlog_limit=64 [ 257.525670][ T5480] audit: backlog limit exceeded [ 257.535633][ T30] audit: type=1400 audit(2000000016.534:238093): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 257.549949][ T5809] audit: audit_lost=9782 audit_rate_limit=0 audit_backlog_limit=64 [ 257.564839][T10236] audit: backlog limit exceeded [ 258.233480][T10261] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 258.714113][T10282] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1568'. [ 260.384039][T10332] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 261.522304][T10366] netlink: 'syz.1.1601': attribute type 46 has an invalid length. [ 261.568570][T10366] netlink: 44 bytes leftover after parsing attributes in process `syz.1.1601'. [ 261.705935][T10372] netlink: 'syz.1.1604': attribute type 21 has an invalid length. [ 261.750887][T10372] IPv6: NLM_F_CREATE should be specified when creating new route [ 262.453294][ T30] kauditd_printk_skb: 14568 callbacks suppressed [ 262.453309][ T30] audit: type=1400 audit(2000000021.544:248590): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.498800][ T30] audit: type=1400 audit(2000000021.544:248591): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.520038][ C0] vkms_vblank_simulate: vblank timer overrun [ 262.527006][ T30] audit: type=1400 audit(2000000021.544:248592): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.569935][ T30] audit: type=1400 audit(2000000021.554:248593): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.636459][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 262.647291][ T30] audit: type=1400 audit(2000000021.554:248594): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.651837][ T5480] audit: audit_lost=11140 audit_rate_limit=0 audit_backlog_limit=64 [ 262.677914][ T30] audit: type=1400 audit(2000000021.554:248595): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.699260][ T30] audit: type=1400 audit(2000000021.554:248596): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 262.707375][ T5480] audit: backlog limit exceeded [ 263.380499][T10412] netlink: 'syz.2.1616': attribute type 10 has an invalid length. [ 263.533879][T10425] netlink: 84 bytes leftover after parsing attributes in process `syz.0.1624'. [ 264.691275][T10463] netlink: 'syz.4.1637': attribute type 2 has an invalid length. [ 264.885968][T10471] netlink: 84 bytes leftover after parsing attributes in process `syz.2.1639'. [ 265.666365][T10491] FAULT_INJECTION: forcing a failure. [ 265.666365][T10491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.684846][T10491] CPU: 0 UID: 0 PID: 10491 Comm: syz.0.1646 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 265.684869][T10491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 265.684879][T10491] Call Trace: [ 265.684885][T10491] [ 265.684891][T10491] dump_stack_lvl+0x16c/0x1f0 [ 265.684921][T10491] should_fail_ex+0x512/0x640 [ 265.684945][T10491] _copy_to_user+0x32/0xd0 [ 265.684970][T10491] simple_read_from_buffer+0xcb/0x170 [ 265.684996][T10491] proc_fail_nth_read+0x197/0x270 [ 265.685020][T10491] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 265.685045][T10491] ? rw_verify_area+0xcf/0x680 [ 265.685064][T10491] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 265.685086][T10491] vfs_read+0x1de/0xc70 [ 265.685109][T10491] ? __pfx___mutex_lock+0x10/0x10 [ 265.685130][T10491] ? __pfx_vfs_read+0x10/0x10 [ 265.685158][T10491] ? __fget_files+0x20e/0x3c0 [ 265.685188][T10491] ksys_read+0x12a/0x240 [ 265.685206][T10491] ? __pfx_ksys_read+0x10/0x10 [ 265.685227][T10491] ? rcu_is_watching+0x12/0xc0 [ 265.685253][T10491] do_syscall_64+0xcd/0x260 [ 265.685275][T10491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 265.685292][T10491] RIP: 0033:0x7fc62938d37c [ 265.685304][T10491] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 265.685319][T10491] RSP: 002b:00007fc62a17b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 265.685334][T10491] RAX: ffffffffffffffda RBX: 00007fc6295b5fa0 RCX: 00007fc62938d37c [ 265.685344][T10491] RDX: 000000000000000f RSI: 00007fc62a17b0a0 RDI: 0000000000000003 [ 265.685353][T10491] RBP: 00007fc62a17b090 R08: 0000000000000000 R09: 0000000000000000 [ 265.685361][T10491] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 265.685369][T10491] R13: 0000000000000000 R14: 00007fc6295b5fa0 R15: 00007ffcd1dbf208 [ 265.685395][T10491] [ 265.878703][ C0] vkms_vblank_simulate: vblank timer overrun [ 266.218032][T10506] netlink: 84 bytes leftover after parsing attributes in process `syz.2.1652'. [ 266.728035][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.745715][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.757136][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.775409][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.833741][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.903475][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.923189][T10523] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1657'. [ 266.938611][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 266.973201][T10523] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1657'. [ 266.995627][T10526] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1658'. [ 267.260744][T10526] geneve2: left promiscuous mode [ 267.298836][T10526] geneve3: left promiscuous mode [ 267.340528][T10526] bridge1: left promiscuous mode [ 267.466580][ T30] kauditd_printk_skb: 6320 callbacks suppressed [ 267.466594][ T30] audit: type=1400 audit(2000000026.564:254761): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 267.530679][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 267.539379][ T30] audit: type=1400 audit(2000000026.594:254762): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 267.563565][ T5480] audit: audit_lost=11193 audit_rate_limit=0 audit_backlog_limit=64 [ 267.582915][ T5480] audit: backlog limit exceeded [ 267.592972][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 267.600347][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 267.614362][ T5480] audit: audit_lost=11194 audit_rate_limit=0 audit_backlog_limit=64 [ 267.620246][ T30] audit: type=1400 audit(2000000026.594:254763): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 267.622364][ T5812] audit: audit_lost=11195 audit_rate_limit=0 audit_backlog_limit=64 [ 268.717752][T10575] bridge0: port 3(veth0_to_bridge) entered blocking state [ 268.729884][T10575] bridge0: port 3(veth0_to_bridge) entered disabled state [ 268.749379][T10575] veth0_to_bridge: entered allmulticast mode [ 268.822581][T10575] veth0_to_bridge: entered promiscuous mode [ 268.858780][T10575] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 268.916665][T10575] bridge0: port 3(veth0_to_bridge) entered blocking state [ 268.923924][T10575] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 269.329092][T10600] geneve1: entered promiscuous mode [ 270.973934][ T5926] Bluetooth: hci5: Frame reassembly failed (-84) [ 271.227480][T10676] FAULT_INJECTION: forcing a failure. [ 271.227480][T10676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.268060][T10676] CPU: 0 UID: 0 PID: 10676 Comm: syz.4.1698 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 271.268084][T10676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 271.268093][T10676] Call Trace: [ 271.268099][T10676] [ 271.268105][T10676] dump_stack_lvl+0x16c/0x1f0 [ 271.268131][T10676] should_fail_ex+0x512/0x640 [ 271.268156][T10676] _copy_from_user+0x2e/0xd0 [ 271.268179][T10676] kstrtouint_from_user+0xd6/0x1d0 [ 271.268197][T10676] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 271.268212][T10676] ? __lock_acquire+0xaa4/0x1ba0 [ 271.268248][T10676] proc_fail_nth_write+0x83/0x250 [ 271.268271][T10676] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 271.268298][T10676] vfs_write+0x25c/0x1180 [ 271.268319][T10676] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 271.268345][T10676] ? __pfx___mutex_lock+0x10/0x10 [ 271.268366][T10676] ? __pfx_vfs_write+0x10/0x10 [ 271.268392][T10676] ? __fget_files+0x20e/0x3c0 [ 271.268423][T10676] ksys_write+0x12a/0x240 [ 271.268445][T10676] ? __pfx_ksys_write+0x10/0x10 [ 271.268466][T10676] ? rcu_is_watching+0x12/0xc0 [ 271.268491][T10676] do_syscall_64+0xcd/0x260 [ 271.268515][T10676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.268531][T10676] RIP: 0033:0x7f6ffdb8d41f [ 271.268544][T10676] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 271.268560][T10676] RSP: 002b:00007f6ffe9c1030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 271.268576][T10676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6ffdb8d41f [ 271.268586][T10676] RDX: 0000000000000001 RSI: 00007f6ffe9c10a0 RDI: 0000000000000003 [ 271.268595][T10676] RBP: 00007f6ffe9c1090 R08: 0000000000000000 R09: 0000000000000000 [ 271.268605][T10676] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 271.268619][T10676] R13: 0000000000000000 R14: 00007f6ffddb5fa0 R15: 00007ffc2a8a9938 [ 271.268642][T10676] [ 272.473368][ T30] kauditd_printk_skb: 4590 callbacks suppressed [ 272.473382][ T30] audit: type=1400 audit(2000000031.574:257072): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 272.513969][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.523382][ T5480] audit: audit_lost=11956 audit_rate_limit=0 audit_backlog_limit=64 [ 272.525096][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.531451][ T5480] audit: backlog limit exceeded [ 272.543012][ T30] audit: type=1400 audit(2000000031.584:257073): avc: denied { create } for pid=10699 comm="syz.2.1707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 272.564094][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.570591][ T5480] audit: audit_lost=11957 audit_rate_limit=0 audit_backlog_limit=64 [ 272.576862][ T5809] audit: audit_backlog=65 > audit_backlog_limit=64 [ 272.579338][ T5812] audit: audit_lost=11958 audit_rate_limit=0 audit_backlog_limit=64 [ 273.023408][ T5822] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 273.029989][ T5126] Bluetooth: hci5: command 0x1003 tx timeout [ 275.037023][T10778] __nla_validate_parse: 147 callbacks suppressed [ 275.037033][T10778] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1738'. [ 275.107594][T10783] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 275.114389][T10783] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 275.126425][T10783] vhci_hcd vhci_hcd.0: Device attached [ 275.139759][T10783] vhci_hcd vhci_hcd.0: pdev(2) rhport(1) sockfd(6) [ 275.146276][T10783] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 275.156852][T10783] vhci_hcd vhci_hcd.0: Device attached [ 275.169240][T10783] vhci_hcd vhci_hcd.0: pdev(2) rhport(2) sockfd(8) [ 275.175752][T10783] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 275.188147][T10783] vhci_hcd vhci_hcd.0: Device attached [ 275.196686][T10788] vhci_hcd: connection closed [ 275.198611][ T1030] vhci_hcd: stop threads [ 275.212961][ T1030] vhci_hcd: release socket [ 275.217815][T10784] vhci_hcd: connection closed [ 275.218031][T10786] vhci_hcd: connection closed [ 275.230221][ T1030] vhci_hcd: disconnect device [ 275.240706][ T1030] vhci_hcd: stop threads [ 275.249988][ T1030] vhci_hcd: release socket [ 275.256193][ T1030] vhci_hcd: disconnect device [ 275.261516][ T1030] vhci_hcd: stop threads [ 275.269511][ T1030] vhci_hcd: release socket [ 275.274241][ T1030] vhci_hcd: disconnect device [ 275.305448][ T92] vhci_hcd: vhci_device speed not set [ 275.822591][T10811] bond1: entered allmulticast mode [ 276.422661][T10830] xt_socket: unknown flags 0x90 [ 277.484121][ T30] kauditd_printk_skb: 13170 callbacks suppressed [ 277.484136][ T30] audit: type=1400 audit(2000000036.574:269184): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 277.518759][ T30] audit: type=1400 audit(2000000036.584:269185): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 277.541231][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.551564][T10851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.567729][ T5480] audit: audit_lost=12312 audit_rate_limit=0 audit_backlog_limit=64 [ 277.584976][ T5480] audit: backlog limit exceeded [ 277.588729][ T5812] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.595671][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 277.598618][T10851] audit: audit_lost=12313 audit_rate_limit=0 audit_backlog_limit=64 [ 277.603763][ T5480] audit: audit_lost=12314 audit_rate_limit=0 audit_backlog_limit=64 [ 278.991876][T10869] netlink: 'syz.2.1770': attribute type 4 has an invalid length. [ 281.419765][T10934] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1797'. [ 281.688966][T10943] netlink: 'syz.3.1801': attribute type 4 has an invalid length. [ 281.999169][T10957] bridge1: entered promiscuous mode [ 282.494785][ T30] kauditd_printk_skb: 13771 callbacks suppressed [ 282.494799][ T30] audit: type=1400 audit(2000000041.584:282845): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 282.525694][ T30] audit: type=1400 audit(2000000041.594:282846): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 282.534154][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.551337][ T30] audit: type=1400 audit(2000000041.594:282847): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 282.580543][ T5480] audit: audit_lost=12352 audit_rate_limit=0 audit_backlog_limit=64 [ 282.589831][ T5480] audit: backlog limit exceeded [ 282.594910][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 282.597179][ T30] audit: type=1400 audit(2000000041.594:282848): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 282.604740][ T5480] audit: audit_lost=12353 audit_rate_limit=0 audit_backlog_limit=64 [ 282.632500][T10971] audit: audit_backlog=65 > audit_backlog_limit=64 [ 283.539954][T10986] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1818'. [ 283.550436][T10986] ip6_vti0: Master is either lo or non-ether device [ 283.558120][T10986] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1818'. [ 284.087203][T11000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=11000 comm=syz.3.1824 [ 284.626769][T11018] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1830'. [ 284.635940][T11018] ip6_vti0: Master is either lo or non-ether device [ 284.643842][T11018] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1830'. [ 284.740161][T11022] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1832'. [ 284.749268][T11022] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1832'. [ 284.758656][T11022] netlink: 'syz.2.1832': attribute type 18 has an invalid length. [ 285.627445][T11051] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1843'. [ 285.650351][T11051] ip6_vti0: Master is either lo or non-ether device [ 285.682185][T11051] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1843'. [ 286.985970][T11085] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1857'. [ 286.999014][T11085] ip6_vti0: Master is either lo or non-ether device [ 287.034183][T11085] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1857'. [ 287.503338][ T30] kauditd_printk_skb: 16096 callbacks suppressed [ 287.503352][ T30] audit: type=1400 audit(2000000046.604:298234): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.569633][ T30] audit: type=1400 audit(2000000046.624:298235): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.643445][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 287.650323][ T30] audit: type=1400 audit(2000000046.624:298236): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.675770][ T30] audit: type=1400 audit(2000000046.624:298237): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.678447][ T5480] audit: audit_lost=12591 audit_rate_limit=0 audit_backlog_limit=64 [ 287.697578][ T30] audit: type=1400 audit(2000000046.624:298238): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.726465][ T30] audit: type=1400 audit(2000000046.624:298239): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.747772][ T30] audit: type=1400 audit(2000000046.624:298240): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 287.769116][ T30] audit: type=1400 audit(2000000046.624:298241): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 288.662374][T11156] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1885'. [ 291.892513][T11226] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1912'. [ 291.919342][T11226] ip6_vti0: Master is either lo or non-ether device [ 291.993620][T11226] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1912'. [ 292.513783][ T30] kauditd_printk_skb: 11616 callbacks suppressed [ 292.513797][ T30] audit: type=1400 audit(2000000051.604:309821): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.541302][ C0] vkms_vblank_simulate: vblank timer overrun [ 292.562785][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.563114][ T30] audit: type=1400 audit(2000000051.604:309822): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.590516][ C0] vkms_vblank_simulate: vblank timer overrun [ 292.598995][ T30] audit: type=1400 audit(2000000051.604:309823): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.609149][ T5480] audit: audit_lost=12604 audit_rate_limit=0 audit_backlog_limit=64 [ 292.620645][ T30] audit: type=1400 audit(2000000051.604:309824): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.657320][ T30] audit: type=1400 audit(2000000051.604:309825): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 292.698263][ T5480] audit: backlog limit exceeded [ 292.708572][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 292.711713][ T30] audit: type=1400 audit(2000000051.604:309826): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 293.342608][T11267] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1926'. [ 293.375396][T11267] ip6_vti0: Master is either lo or non-ether device [ 293.391269][T11267] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1926'. [ 294.526774][T11295] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1938'. [ 294.546482][T11295] ip6_vti0: Master is either lo or non-ether device [ 294.555093][T11295] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1938'. [ 295.650381][T11334] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1953'. [ 295.686434][T11334] ip6_vti0: Master is either lo or non-ether device [ 295.718693][T11334] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1953'. [ 297.068655][T11388] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1972'. [ 297.084098][T11388] ip6_vti0: Master is either lo or non-ether device [ 297.096361][T11388] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1972'. [ 297.523335][ T30] kauditd_printk_skb: 13756 callbacks suppressed [ 297.523350][ T30] audit: type=1400 audit(2000000056.614:320008): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.540067][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.551154][T11410] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.564346][T11410] audit: audit_lost=13797 audit_rate_limit=0 audit_backlog_limit=64 [ 297.572331][T11410] audit: backlog limit exceeded [ 297.581584][ T5480] audit: audit_lost=13798 audit_rate_limit=0 audit_backlog_limit=64 [ 297.582197][ T30] audit: type=1400 audit(2000000056.624:320009): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 297.596305][ T5480] audit: backlog limit exceeded [ 297.626561][T11413] audit: audit_backlog=65 > audit_backlog_limit=64 [ 297.627125][T11410] audit: audit_backlog=65 > audit_backlog_limit=64 [ 298.169509][T11423] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(6) [ 298.176055][T11423] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 298.222023][T11423] vhci_hcd vhci_hcd.0: Device attached [ 298.250966][T11425] vhci_hcd: connection closed [ 298.251965][ T36] vhci_hcd: stop threads [ 298.281739][ T36] vhci_hcd: release socket [ 298.297021][ T36] vhci_hcd: disconnect device [ 300.304635][T11473] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 302.262155][T11509] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2015'. [ 302.460081][T11511] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2016'. [ 302.539877][ T30] kauditd_printk_skb: 14864 callbacks suppressed [ 302.539891][ T30] audit: type=1400 audit(2000000061.634:331798): avc: denied { read } for pid=11512 comm="syz.2.2017" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 302.587959][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.609766][ T5480] audit: audit_lost=14825 audit_rate_limit=0 audit_backlog_limit=64 [ 302.633467][ T30] audit: type=1400 audit(2000000061.634:331799): avc: denied { execute } for pid=11512 comm="syz.2.2017" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=27780 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=0 [ 302.676370][ T5480] audit: backlog limit exceeded [ 302.686933][ T5480] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.704544][ T30] audit: type=1400 audit(2000000061.634:331800): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 302.728569][ T5480] audit: audit_lost=14826 audit_rate_limit=0 audit_backlog_limit=64 [ 302.737130][ T5480] audit: backlog limit exceeded [ 302.746985][T11518] audit: audit_backlog=65 > audit_backlog_limit=64 [ 302.988106][T11500] ceph: No mds server is up or the cluster is laggy [ 306.468468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.468733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 306.480766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.492782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 306.504623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.516737][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 306.528530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.540614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 306.552426][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 306.564618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.473457][ C1] net_ratelimit: 34827 callbacks suppressed [ 311.473475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.473479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.473763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.479614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.491712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.503504][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.515599][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.527396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 311.539498][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 311.551376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 312.666293][ T30] kauditd_printk_skb: 4837 callbacks suppressed [ 312.666312][ T30] audit: type=1400 audit(2000000066.094:335808): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 312.703352][ C1] sched: DL replenish lagged too much [ 316.483291][ C0] net_ratelimit: 34401 callbacks suppressed [ 316.483309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.483424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 316.489503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.501443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 316.513391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.525331][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 316.537285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.549235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 316.561174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 316.573132][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 318.181301][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 318.195869][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 318.352655][ T30] audit: type=1400 audit(2000000066.844:335809): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 321.493374][ C1] net_ratelimit: 34238 callbacks suppressed [ 321.493394][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 321.493435][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.499582][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 321.511509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.523500][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 321.535500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.547439][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 321.559338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 321.571332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 321.583255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.503339][ C0] net_ratelimit: 33922 callbacks suppressed [ 326.503358][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.503437][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 326.509534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.521505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 326.533516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.545562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 326.557444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.569385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 326.581300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 326.593288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 331.513372][ C0] net_ratelimit: 21527 callbacks suppressed [ 331.513390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.513558][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 331.519606][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.532202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 331.543562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.556100][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 331.567494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 331.579990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 331.591318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 331.603964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 336.523311][ C0] net_ratelimit: 20471 callbacks suppressed [ 336.523329][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.523470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 336.529546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.542005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 336.553352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 336.566003][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 336.577360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.589861][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 336.601284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 336.613761][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 339.658767][ T30] audit: type=1400 audit(2000000066.844:335810): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 341.533252][ C0] net_ratelimit: 21027 callbacks suppressed [ 341.533272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.533979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 341.539438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.552049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 341.563436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.576031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 341.587215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 341.599973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 341.611207][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 341.623886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.544034][ C1] net_ratelimit: 22208 callbacks suppressed [ 346.544053][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.552583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.562888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.574093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.586742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.598011][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 346.610623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.621912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 346.634588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 346.645847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 348.131611][ T30] audit: type=1400 audit(2000000066.844:335811): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.153545][ T30] audit: type=1400 audit(2000000066.844:335812): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.153589][ T30] audit: type=1400 audit(2000000066.854:335813): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.153626][ T30] audit: type=1400 audit(2000000066.864:335814): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165723][ T30] audit: type=1400 audit(2000000066.864:335815): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165762][ T30] audit: type=1400 audit(2000000066.864:335816): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165797][ T30] audit: type=1400 audit(2000000066.874:335817): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165834][ T30] audit: type=1400 audit(2000000066.874:335818): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165869][ T30] audit: type=1400 audit(2000000066.894:335819): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 348.165906][ T30] audit: type=1400 audit(2000000066.914:335820): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 351.553306][ C0] net_ratelimit: 21134 callbacks suppressed [ 351.553324][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.553443][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 351.553690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.553971][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.554289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.554496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 351.554636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.554904][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 351.555232][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 351.555578][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 354.893779][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 354.893796][ T30] audit: type=1400 audit(2000000113.974:335853): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 356.563431][ C0] net_ratelimit: 22732 callbacks suppressed [ 356.563451][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.563692][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.563838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 356.563980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.564299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.564533][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 356.564821][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.564889][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 356.565139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 356.565389][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 359.964128][ T30] audit: type=1400 audit(2000000119.044:335854): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 361.573463][ C0] net_ratelimit: 22452 callbacks suppressed [ 361.573481][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.573740][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.574009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 361.574038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.574384][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.574656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 361.574958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.574961][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 361.575311][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 361.575574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.583467][ C0] net_ratelimit: 21976 callbacks suppressed [ 366.583485][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.583760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 366.583813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.584050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.584326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.584645][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.584812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 366.584894][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 366.585168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 366.585500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.113460][ T30] audit: type=1400 audit(2000000130.174:335855): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.113506][ T30] audit: type=1400 audit(2000000130.194:335856): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 371.593376][ C1] net_ratelimit: 22296 callbacks suppressed [ 371.593396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 371.593436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.593687][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.593975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.594293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.594350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 371.594527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 371.594803][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.595119][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 371.595298][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 376.603304][ C1] net_ratelimit: 22967 callbacks suppressed [ 376.603329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 376.603595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.603870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.604148][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.604416][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 376.604460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.604697][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 376.604973][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.605308][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 376.605497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 378.763653][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.773441][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 381.613227][ C1] net_ratelimit: 23247 callbacks suppressed [ 381.613247][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 381.613582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.613846][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.614150][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.614337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 381.614520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.614795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.615099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 381.615421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 381.615465][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.623230][ C1] net_ratelimit: 22896 callbacks suppressed [ 386.623248][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 386.623292][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.623531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.623816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.624142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.624198][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 386.624381][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 386.624655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.624965][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.625142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 391.633363][ C1] net_ratelimit: 24063 callbacks suppressed [ 391.633384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 391.633695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.633931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.634205][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.634448][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 391.634511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.634743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 391.635032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.635354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 391.635503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 396.643241][ C0] net_ratelimit: 24403 callbacks suppressed [ 396.643259][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.643508][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.643777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.643876][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 396.644096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.644344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 396.644613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.644827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 396.644924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 396.645177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.653383][ C0] net_ratelimit: 23116 callbacks suppressed [ 401.653402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.653733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.653985][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.654116][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 401.654264][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.654577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.654809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 401.655083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 401.655197][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 401.655429][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.663204][ C0] net_ratelimit: 23558 callbacks suppressed [ 406.663223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.663291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 406.663476][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.663764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.664083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.664256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 406.664318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 406.664595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.664918][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 406.665166][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.673366][ C0] net_ratelimit: 24925 callbacks suppressed [ 411.673385][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.673449][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 411.673662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.673982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.674245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.674431][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 411.674520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.674830][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 411.675074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 411.675347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.683368][ C0] net_ratelimit: 24949 callbacks suppressed [ 416.683388][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.683574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 416.683625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.683900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.684236][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.684473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 416.684560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 416.684759][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.685071][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 416.685313][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.693332][ C0] net_ratelimit: 24982 callbacks suppressed [ 421.693352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.693623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.693944][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.694184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.694294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 421.694467][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.694774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 421.695006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 421.695246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 421.695297][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.703340][ C0] net_ratelimit: 25215 callbacks suppressed [ 426.703359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.703595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.703617][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 426.703879][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.704208][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.704442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 426.704579][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 426.704709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.705017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 426.705269][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.713312][ C0] net_ratelimit: 25091 callbacks suppressed [ 431.713331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.713651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.713905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.714068][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 431.714184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.714515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.714748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 431.715030][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 431.715043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 431.715343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.723412][ C0] net_ratelimit: 24784 callbacks suppressed [ 436.723431][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.723667][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.723957][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.724023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 436.724283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.724520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 436.724792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.724995][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 436.725125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 436.725361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 439.709502][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.717573][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 441.733438][ C0] net_ratelimit: 24229 callbacks suppressed [ 441.733458][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.733725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.733727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 441.734038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.734399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.734663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 441.734666][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 441.734989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.735338][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 441.735602][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.743340][ C0] net_ratelimit: 23019 callbacks suppressed [ 446.743361][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.743445][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 446.743685][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.743926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.744195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.744513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 446.744514][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.744747][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 446.745024][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 446.745344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.753291][ C0] net_ratelimit: 25073 callbacks suppressed [ 451.753310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.753471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 451.753546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.753814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.754120][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.754374][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 451.754441][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 451.754655][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.754961][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 451.755200][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 453.053138][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 453.053155][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5809/1:b..l [ 453.053636][ C0] rcu: (detected by 0, t=10502 jiffies, g=38697, q=816 ncpus=2) [ 453.053652][ C0] task:syz-executor state:R running task stack:24024 pid:5809 tgid:5809 ppid:5806 task_flags:0x400140 flags:0x00000002 [ 453.053704][ C0] Call Trace: [ 453.053711][ C0] [ 453.053722][ C0] __schedule+0x116f/0x5de0 [ 453.053747][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 453.053775][ C0] ? stack_trace_save+0x51/0xc0 [ 453.053805][ C0] ? __pfx___schedule+0x10/0x10 [ 453.053829][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 453.053858][ C0] ? mark_held_locks+0x49/0x80 [ 453.053892][ C0] preempt_schedule_irq+0x51/0x90 [ 453.053914][ C0] irqentry_exit+0x36/0x90 [ 453.053935][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 453.053954][ C0] RIP: 0010:lock_release+0x183/0x2f0 [ 453.053979][ C0] Code: 0f c1 05 68 31 0c 12 83 f8 01 0f 85 1d 01 00 00 9c 58 f6 c4 02 0f 85 08 01 00 00 41 f7 c5 00 02 00 00 74 01 fb 48 8b 44 24 10 <65> 48 2b 05 bd f3 0b 12 0f 85 58 01 00 00 48 83 c4 18 5b 41 5c 41 [ 453.053996][ C0] RSP: 0018:ffffc90003f3f218 EFLAGS: 00000206 [ 453.054011][ C0] RAX: 21cb4af094b94400 RBX: ffffffff8e3bf5c0 RCX: ffffc90003f3f224 [ 453.054024][ C0] RDX: 0000000000000002 RSI: ffffffff8dbbbdff RDI: ffffffff8bf482e0 [ 453.054035][ C0] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 453.054046][ C0] R10: 0000000000000002 R11: 00000000000069df R12: ffffffff8169bd14 [ 453.054058][ C0] R13: 0000000000000206 R14: ffff8880263ea440 R15: 0000000000000003 [ 453.054071][ C0] ? unwind_next_frame+0x3f4/0x20a0 [ 453.054107][ C0] unwind_next_frame+0x3f9/0x20a0 [ 453.054127][ C0] ? __unwind_start+0x574/0x7f0 [ 453.054151][ C0] __unwind_start+0x45f/0x7f0 [ 453.054173][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 453.054196][ C0] arch_stack_walk+0x73/0x100 [ 453.054221][ C0] ? arch_stack_walk+0x73/0x100 [ 453.054245][ C0] stack_trace_save+0x8e/0xc0 [ 453.054267][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 453.054289][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 453.054314][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 453.054338][ C0] save_stack+0x160/0x1f0 [ 453.054363][ C0] ? __pfx_save_stack+0x10/0x10 [ 453.054396][ C0] ? page_ext_put+0x3e/0xd0 [ 453.054425][ C0] __reset_page_owner+0x84/0x1a0 [ 453.054453][ C0] __free_frozen_pages+0x69d/0xff0 [ 453.054483][ C0] __put_partials+0x16d/0x1c0 [ 453.054511][ C0] qlist_free_all+0x4e/0x120 [ 453.054537][ C0] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 453.054561][ C0] kasan_quarantine_reduce+0x195/0x1e0 [ 453.054587][ C0] __kasan_kmalloc+0x8a/0xb0 [ 453.054612][ C0] __kmalloc_noprof+0x223/0x510 [ 453.054644][ C0] tomoyo_realpath_from_path+0xc2/0x6e0 [ 453.054674][ C0] tomoyo_check_open_permission+0x2ab/0x3c0 [ 453.054698][ C0] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 453.054743][ C0] ? do_raw_spin_lock+0x12c/0x2b0 [ 453.054769][ C0] tomoyo_file_open+0x6b/0x90 [ 453.054787][ C0] security_file_open+0x84/0x1e0 [ 453.054812][ C0] do_dentry_open+0x596/0x1c10 [ 453.054843][ C0] vfs_open+0x82/0x3f0 [ 453.054866][ C0] path_openat+0x1e5e/0x2d40 [ 453.054906][ C0] ? __pfx_path_openat+0x10/0x10 [ 453.054938][ C0] do_filp_open+0x20b/0x470 [ 453.054963][ C0] ? __pfx_do_filp_open+0x10/0x10 [ 453.055005][ C0] ? alloc_fd+0x471/0x7d0 [ 453.055036][ C0] do_sys_openat2+0x11b/0x1d0 [ 453.055055][ C0] ? __pfx_do_sys_openat2+0x10/0x10 [ 453.055076][ C0] ? __pfx_get_timespec64+0x10/0x10 [ 453.055103][ C0] __x64_sys_openat+0x174/0x210 [ 453.055122][ C0] ? __pfx___x64_sys_openat+0x10/0x10 [ 453.055143][ C0] ? rcu_is_watching+0x12/0xc0 [ 453.055168][ C0] do_syscall_64+0xcd/0x260 [ 453.055193][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 453.055209][ C0] RIP: 0033:0x7efeb878e261 [ 453.055224][ C0] RSP: 002b:00007fffe8499fa0 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 453.055241][ C0] RAX: ffffffffffffffda RBX: 0000000000000416 RCX: 00007efeb878e261 [ 453.055253][ C0] RDX: 0000000000090800 RSI: 00007efeb8810dd1 RDI: 00000000ffffff9c [ 453.055264][ C0] RBP: 00007fffe849a04c R08: 0000000000000000 R09: 0000000000000000 [ 453.055274][ C0] R10: 0000000000000000 R11: 0000000000000287 R12: 0000000000000175 [ 453.055285][ C0] R13: 0000000000000000 R14: 000000000004ac17 R15: 00007fffe849a0a0 [ 453.055308][ C0] [ 453.055315][ C0] rcu: rcu_preempt kthread starved for 900 jiffies! g38697 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 453.055334][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 453.055343][ C0] rcu: RCU grace-period kthread stack dump: [ 453.055348][ C0] task:rcu_preempt state:R running task stack:28856 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 [ 453.055403][ C0] Call Trace: [ 453.055409][ C0] [ 453.055419][ C0] __schedule+0x116f/0x5de0 [ 453.055445][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 453.055474][ C0] ? __pfx___schedule+0x10/0x10 [ 453.055498][ C0] ? find_held_lock+0x2b/0x80 [ 453.055518][ C0] ? schedule+0x2d7/0x3a0 [ 453.055540][ C0] schedule+0xe7/0x3a0 [ 453.055559][ C0] schedule_timeout+0x123/0x290 [ 453.055576][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 453.055593][ C0] ? __pfx_process_timeout+0x10/0x10 [ 453.055617][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 453.055636][ C0] ? prepare_to_swait_event+0xf5/0x480 [ 453.055663][ C0] rcu_gp_fqs_loop+0x1ea/0xb00 [ 453.055690][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 453.055717][ C0] ? rcu_gp_cleanup+0x7c1/0xd90 [ 453.055744][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 453.055767][ C0] rcu_gp_kthread+0x270/0x380 [ 453.055791][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 453.055813][ C0] ? rcu_is_watching+0x12/0xc0 [ 453.055832][ C0] ? lockdep_hardirqs_on+0x7c/0x110 [ 453.055854][ C0] ? __kthread_parkme+0x19e/0x250 [ 453.055886][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 453.055909][ C0] kthread+0x3c2/0x780 [ 453.055925][ C0] ? __pfx_kthread+0x10/0x10 [ 453.055940][ C0] ? __pfx_kthread+0x10/0x10 [ 453.055955][ C0] ? __pfx_kthread+0x10/0x10 [ 453.055970][ C0] ? __pfx_kthread+0x10/0x10 [ 453.055985][ C0] ? rcu_is_watching+0x12/0xc0 [ 453.056004][ C0] ? __pfx_kthread+0x10/0x10 [ 453.056021][ C0] ret_from_fork+0x45/0x80 [ 453.056037][ C0] ? __pfx_kthread+0x10/0x10 [ 453.056053][ C0] ret_from_fork_asm+0x1a/0x30 [ 453.056087][ C0] [ 453.056093][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 453.056100][ C0] Sending NMI from CPU 0 to CPUs 1: [ 453.056122][ C1] NMI backtrace for cpu 1 [ 453.056138][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 453.056155][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 453.056162][ C1] RIP: 0010:lock_release+0x16b/0x2f0 [ 453.056180][ C1] Code: 0f 84 00 01 00 00 48 c7 c7 ff bd bb 8d e8 ad d0 d4 09 b8 ff ff ff ff 65 0f c1 05 68 31 0c 12 83 f8 01 0f 85 1d 01 00 00 9c 58 c4 02 0f 85 08 01 00 00 41 f7 c5 00 02 00 00 74 01 fb 48 8b 44 [ 453.056193][ C1] RSP: 0018:ffffc90000a081e0 EFLAGS: 00000046 [ 453.056203][ C1] RAX: 0000000000000046 RBX: ffffffff8e3bf5c0 RCX: ffffc90000a081ec [ 453.056211][ C1] RDX: 0000000000000001 RSI: ffffffff8dbbbdff RDI: ffffffff8bf482e0 [ 453.056220][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 453.056228][ C1] R10: 0000000000000001 R11: 0000000000094089 R12: ffffffff8169bd14 [ 453.056236][ C1] R13: 0000000000000206 R14: ffff88801dad2440 R15: 0000000000000002 [ 453.056245][ C1] FS: 0000000000000000(0000) GS:ffff888124ae1000(0000) knlGS:0000000000000000 [ 453.056259][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 453.056268][ C1] CR2: 000020000000d000 CR3: 0000000079971000 CR4: 00000000003526f0 [ 453.056276][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 453.056283][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 453.056291][ C1] Call Trace: [ 453.056295][ C1] [ 453.056301][ C1] unwind_next_frame+0x3f9/0x20a0 [ 453.056316][ C1] ? br_handle_frame+0xad5/0x14a0 [ 453.056328][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 453.056348][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 453.056364][ C1] arch_stack_walk+0x94/0x100 [ 453.056380][ C1] ? __netif_receive_skb_core.constprop.0+0xa23/0x4a00 [ 453.056401][ C1] stack_trace_save+0x8e/0xc0 [ 453.056416][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 453.056431][ C1] ? br_netif_receive_skb+0xff/0x200 [ 453.056451][ C1] kasan_save_stack+0x33/0x60 [ 453.056468][ C1] ? kasan_save_stack+0x33/0x60 [ 453.056484][ C1] ? kasan_save_track+0x14/0x30 [ 453.056501][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 453.056512][ C1] ? kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 453.056530][ C1] ? __skb_ext_alloc+0x1a/0x80 [ 453.056547][ C1] ? skb_ext_add+0x232/0x7a0 [ 453.056562][ C1] ? br_nf_pre_routing_ipv6+0xca/0x8c0 [ 453.056576][ C1] ? br_nf_pre_routing+0x860/0x15b0 [ 453.056591][ C1] ? br_handle_frame+0xad5/0x14a0 [ 453.056618][ C1] kasan_save_track+0x14/0x30 [ 453.056636][ C1] __kasan_slab_alloc+0x89/0x90 [ 453.056649][ C1] kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 453.056668][ C1] ? __skb_ext_alloc+0x1a/0x80 [ 453.056685][ C1] __skb_ext_alloc+0x1a/0x80 [ 453.056700][ C1] skb_ext_add+0x232/0x7a0 [ 453.056716][ C1] ? ebt_do_table+0x1bcf/0x21a0 [ 453.056732][ C1] br_nf_pre_routing_ipv6+0xca/0x8c0 [ 453.056745][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 453.056757][ C1] ? lock_acquire+0x179/0x350 [ 453.056776][ C1] ? find_held_lock+0x2b/0x80 [ 453.056790][ C1] ? net_generic+0xea/0x2a0 [ 453.056810][ C1] br_nf_pre_routing+0x860/0x15b0 [ 453.056825][ C1] br_handle_frame+0xad5/0x14a0 [ 453.056839][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 453.056852][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 453.056874][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 453.056886][ C1] __netif_receive_skb_core.constprop.0+0xa23/0x4a00 [ 453.056908][ C1] ? kmem_cache_free+0x2d4/0x4d0 [ 453.056926][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 453.056943][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 453.056962][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 453.056978][ C1] ? sk_skb_reason_drop+0x136/0x1a0 [ 453.056992][ C1] ? ip6_mc_input+0x46c/0xfd0 [ 453.057010][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 453.057026][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 453.057043][ C1] ? __lock_acquire+0x5ca/0x1ba0 [ 453.057062][ C1] ? process_backlog+0x3f0/0x15e0 [ 453.057079][ C1] __netif_receive_skb_one_core+0xb0/0x1e0 [ 453.057097][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 453.057116][ C1] ? lock_acquire+0x179/0x350 [ 453.057140][ C1] ? process_backlog+0x3f0/0x15e0 [ 453.057157][ C1] __netif_receive_skb+0x1d/0x160 [ 453.057175][ C1] process_backlog+0x442/0x15e0 [ 453.057195][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 453.057213][ C1] ? rcu_is_watching+0x12/0xc0 [ 453.057227][ C1] net_rx_action+0xa97/0x1010 [ 453.057248][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 453.057268][ C1] ? tmigr_handle_remote+0x132/0x380 [ 453.057285][ C1] ? run_timer_base+0x121/0x190 [ 453.057301][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 453.057319][ C1] handle_softirqs+0x216/0x8e0 [ 453.057335][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 453.057351][ C1] __irq_exit_rcu+0x109/0x170 [ 453.057365][ C1] irq_exit_rcu+0x9/0x30 [ 453.057378][ C1] sysvec_apic_timer_interrupt+0xa4/0xc0 [ 453.057393][ C1] [ 453.057397][ C1] [ 453.057402][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 453.057415][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 453.057430][ C1] Code: 35 62 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 73 2a 1d 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 453.057441][ C1] RSP: 0018:ffffc90000197df8 EFLAGS: 000002c6 [ 453.057450][ C1] RAX: 0000000001232751 RBX: 0000000000000001 RCX: ffffffff8b6cc419 [ 453.057458][ C1] RDX: 0000000000000000 RSI: ffffffff8dbe13ef RDI: ffffffff8bf482e0 [ 453.057466][ C1] RBP: ffffed1003b5a488 R08: 0000000000000001 R09: ffffed10170a65bd [ 453.057475][ C1] R10: ffff8880b8532deb R11: 0000000000000000 R12: 0000000000000001 [ 453.057482][ C1] R13: ffff88801dad2440 R14: ffffffff9084f010 R15: 0000000000000000 [ 453.057493][ C1] ? ct_kernel_exit+0x139/0x190 [ 453.057510][ C1] default_idle+0x13/0x20 [ 453.057529][ C1] default_idle_call+0x6d/0xb0 [ 453.057545][ C1] do_idle+0x391/0x510 [ 453.057560][ C1] ? __pfx_do_idle+0x10/0x10 [ 453.057575][ C1] ? trace_sched_exit_tp+0x31/0x130 [ 453.057593][ C1] cpu_startup_entry+0x4f/0x60 [ 453.057608][ C1] start_secondary+0x21d/0x2b0 [ 453.057626][ C1] ? __pfx_start_secondary+0x10/0x10 [ 453.057646][ C1] common_startup_64+0x13e/0x148 [ 453.057665][ C1] [ 456.763169][ C0] net_ratelimit: 24972 callbacks suppressed [ 456.763189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.763416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.763553][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.763670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 456.763836][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.764094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 456.764367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.764620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 456.764695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 456.764943][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.773159][ C0] net_ratelimit: 24956 callbacks suppressed [ 461.773177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.773417][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.773418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 461.773698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.774038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.774285][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 461.774409][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 461.774579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.774893][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 461.775136][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.783159][ C0] net_ratelimit: 24664 callbacks suppressed [ 466.783178][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 466.783290][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.783488][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 466.784336][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.785373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.786387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.787393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.788402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.789424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 466.790417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 471.793376][ C0] net_ratelimit: 24262 callbacks suppressed [ 471.793395][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.793564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 471.793643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.793912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.794227][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.794461][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 471.794531][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 471.794743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.795056][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 471.795305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.803154][ C0] net_ratelimit: 25000 callbacks suppressed [ 476.803173][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.803323][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 476.803487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.803739][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.804020][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.804294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 476.804335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.804585][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 476.804864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 476.805189][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.152241][ T30] audit: type=1400 audit(2000000240.184:335857): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 481.152287][ T30] audit: type=1400 audit(2000000240.244:335858): avc: denied { read } for pid=5480 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 481.813260][ C1] net_ratelimit: 24600 callbacks suppressed [ 481.813279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 481.813315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.813656][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.813891][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.814177][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.814363][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 481.814487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.814722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 481.815014][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 481.815342][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.823222][ C0] net_ratelimit: 24131 callbacks suppressed [ 486.823239][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.823551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.823651][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 486.823781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.824072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.824392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.824629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 486.824634][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 486.824905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 486.825226][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.833241][ C0] net_ratelimit: 25255 callbacks suppressed [ 491.833260][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.833488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.833646][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 491.833650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.833929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.834254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.834489][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 491.834614][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 491.834777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 491.835084][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.843301][ C0] net_ratelimit: 24995 callbacks suppressed [ 496.843319][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.843508][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 496.843631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.843882][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.844161][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.844485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 496.844490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.844725][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 496.845000][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 496.845214][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.146376][ T1293] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.154877][ T1293] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.853288][ C0] net_ratelimit: 24698 callbacks suppressed [ 501.853309][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.853568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 501.853629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.853938][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.854181][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.854448][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.854504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 501.854769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 501.854972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 501.855213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.863124][ C0] net_ratelimit: 23363 callbacks suppressed [ 506.863143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.863341][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.863477][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.863732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.863969][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 506.863989][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.864264][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.864576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 506.864814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 506.864951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 511.873234][ C0] net_ratelimit: 22513 callbacks suppressed [ 511.873255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.873569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.873940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.874015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 511.874200][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.874503][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.874857][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 511.875110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 511.875112][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 511.875427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.883180][ C0] net_ratelimit: 21930 callbacks suppressed [ 516.883198][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.883420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 516.883513][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.883864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.884141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.884373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 516.884453][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.884804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 516.885109][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 516.885326][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 521.893172][ C0] net_ratelimit: 21335 callbacks suppressed [ 521.893190][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.893546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.893718][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 521.893830][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.894164][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.894516][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.894672][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 521.894783][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 521.895103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 521.895454][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.903106][ C1] net_ratelimit: 21299 callbacks suppressed [ 526.903124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 526.903194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.903470][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 526.903781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.904084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 526.904139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.904412][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 526.904748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 526.905039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 526.905106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.913326][ C1] net_ratelimit: 21307 callbacks suppressed [ 531.913345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 531.913405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.913708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.914033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.914329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 531.914387][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.914662][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 531.914974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 531.915276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 531.915343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.923135][ C0] net_ratelimit: 21032 callbacks suppressed [ 536.923155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.923525][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.923641][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 536.923806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.924123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.924475][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.924577][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 536.924743][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 536.925073][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 536.925423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.933156][ C0] net_ratelimit: 21135 callbacks suppressed [ 541.933173][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.933452][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.933763][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.933882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 541.934136][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.934421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 541.934731][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.934855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:92:fe:98:46:de:87, vlan:0) [ 541.935089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 541.935362][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 545.833310][ T31] INFO: task syz.0.2044:11599 blocked for more than 143 seconds. [ 545.833334][ T31] Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 [ 545.833346][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 545.833354][ T31] task:syz.0.2044 state:D stack:28200 pid:11599 tgid:11598 ppid:5808 task_flags:0x400040 flags:0x00004006 [ 545.833411][ T31] Call Trace: [ 545.833419][ T31] [ 545.833430][ T31] __schedule+0x116f/0x5de0 [ 545.833464][ T31] ? __lock_acquire+0x5ca/0x1ba0 [ 545.833497][ T31] ? __pfx___schedule+0x10/0x10 [ 545.833522][ T31] ? find_held_lock+0x2b/0x80 [ 545.833542][ T31] ? schedule+0x2d7/0x3a0 [ 545.833566][ T31] schedule+0xe7/0x3a0 [ 545.833585][ T31] schedule_preempt_disabled+0x13/0x30 [ 545.833606][ T31] rwsem_down_read_slowpath+0x62f/0xb60 [ 545.833636][ T31] ? __pfx_rwsem_down_read_slowpath+0x10/0x10 [ 545.833670][ T31] ? __pfx___might_resched+0x10/0x10 [ 545.833699][ T31] down_read+0xef/0x480 [ 545.833723][ T31] ? __pfx_down_read+0x10/0x10 [ 545.833747][ T31] ? __might_fault+0x13b/0x190 [ 545.833771][ T31] kernel_move_pages+0x539/0x1430 [ 545.833801][ T31] ? __pfx_kernel_move_pages+0x10/0x10 [ 545.833835][ T31] ? exc_page_fault+0x5c/0xc0 [ 545.833865][ T31] __x64_sys_move_pages+0xe0/0x1c0 [ 545.833886][ T31] ? do_syscall_64+0x91/0x260 [ 545.833908][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 545.833929][ T31] do_syscall_64+0xcd/0x260 [ 545.833954][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 545.833973][ T31] RIP: 0033:0x7fc62938e969 [ 545.833987][ T31] RSP: 002b:00007fc62a17b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 545.834005][ T31] RAX: ffffffffffffffda RBX: 00007fc6295b5fa0 RCX: 00007fc62938e969 [ 545.834017][ T31] RDX: 0000200000000040 RSI: 0000000000002064 RDI: 0000000000000000 [ 545.834028][ T31] RBP: 00007fc629410ab1 R08: 0000200000000000 R09: 0000000000000000 [ 545.834038][ T31] R10: 0000200000001180 R11: 0000000000000246 R12: 0000000000000000 [ 545.834049][ T31] R13: 0000000000000001 R14: 00007fc6295b5fa0 R15: 00007ffcd1dbf208 [ 545.834073][ T31] [ 545.834080][ T31] [ 545.834080][ T31] Showing all locks held in the system: [ 545.834087][ T31] 1 lock held by kthreadd/2: [ 545.834099][ T31] 4 locks held by kworker/0:1/10: [ 545.834109][ T31] #0: ffff888021f12d48 ((wq_completion)wg-kex-wg0#2){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 545.834160][ T31] #1: ffffc900000f7d18 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 545.834220][ T31] #2: ffff88805c29d308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c2/0x880 [ 545.834274][ T31] #3: ffff888059f80d20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ac/0x880 [ 545.834328][ T31] 4 locks held by kworker/u8:0/12: [ 545.834338][ T31] 4 locks held by kworker/u8:1/13: [ 545.834350][ T31] 3 locks held by kworker/1:0/24: [ 545.834360][ T31] 1 lock held by khungtaskd/31: [ 545.834369][ T31] #0: ffffffff8e3bf5c0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 545.834421][ T31] 4 locks held by kworker/u8:2/36: [ 545.834432][ T31] 4 locks held by kworker/u8:3/57: [ 545.834442][ T31] 3 locks held by kworker/u8:4/72: [ 545.834452][ T31] 1 lock held by kswapd0/90: [ 545.834462][ T31] 3 locks held by kworker/0:2/92: [ 545.834475][ T31] 4 locks held by kworker/u8:5/1030: [ 545.834485][ T31] #0: ffff888024a45948 ((wq_completion)wg-kex-wg2#3){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 545.834530][ T31] #1: ffffc900039ffd18 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 545.834575][ T31] #2: ffff88805ba05308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0xec/0x650 [ 545.834626][ T31] #3: ffff888059fe8d20 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x100/0x650 [ 545.834680][ T31] 4 locks held by kworker/u8:6/1812: [ 545.834698][ T31] 5 locks held by kworker/R-bat_e/3392: [ 545.834708][ T31] 2 locks held by kworker/1:2/3393: [ 545.834718][ T31] 4 locks held by kworker/u8:7/3567: [ 545.834728][ T31] 2 locks held by klogd/5174: [ 545.834738][ T31] 1 lock held by udevd/5185: [ 545.834748][ T31] 3 locks held by dhcpcd/5479: [ 545.834758][ T31] 2 locks held by dhcpcd/5480: [ 545.834767][ T31] 3 locks held by crond/5554: [ 545.834777][ T31] 2 locks held by getty/5569: [ 545.834787][ T31] #0: ffff8880320240a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 545.834843][ T31] #1: ffffc90002ffe2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 545.834886][ T31] 2 locks held by syz-executor/5798: [ 545.834897][ T31] 2 locks held by syz-executor/5809: [ 545.834907][ T31] 2 locks held by syz-executor/5810: [ 545.834919][ T31] 2 locks held by kworker/0:5/5864: [ 545.834929][ T31] 5 locks held by kworker/1:7/5891: [ 545.834939][ T31] 4 locks held by kworker/u8:9/5925: [ 545.834949][ T31] 4 locks held by kworker/u8:10/5926: [ 545.834959][ T31] 3 locks held by syz.3.2039/11583: [ 545.834970][ T31] 2 locks held by syz.4.2040/11593: [ 545.834980][ T31] 3 locks held by syz.0.2044/11598: [ 545.834990][ T31] 1 lock held by syz.0.2044/11599: [ 545.834999][ T31] #0: ffff8880331b6fe0 (&mm->mmap_lock){++++}-{4:4}, at: kernel_move_pages+0x539/0x1430 [ 545.835044][ T31] [ 545.835048][ T31] ============================================= [ 545.835048][ T31] [ 545.835056][ T31] NMI backtrace for cpu 0 [ 545.835065][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 545.835085][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 545.835094][ T31] Call Trace: [ 545.835100][ T31] [ 545.835106][ T31] dump_stack_lvl+0x116/0x1f0 [ 545.835127][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 545.835146][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 545.835163][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 545.835182][ T31] watchdog+0xf70/0x12c0 [ 545.835202][ T31] ? __pfx_watchdog+0x10/0x10 [ 545.835216][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 545.835238][ T31] ? __kthread_parkme+0x19e/0x250 [ 545.835261][ T31] ? __pfx_watchdog+0x10/0x10 [ 545.835276][ T31] kthread+0x3c2/0x780 [ 545.835291][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835304][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835317][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835331][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835345][ T31] ? rcu_is_watching+0x12/0xc0 [ 545.835364][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835380][ T31] ret_from_fork+0x45/0x80 [ 545.835395][ T31] ? __pfx_kthread+0x10/0x10 [ 545.835410][ T31] ret_from_fork_asm+0x1a/0x30 [ 545.835444][ T31] [ 545.835449][ T31] Sending NMI from CPU 0 to CPUs 1: [ 545.835471][ C1] NMI backtrace for cpu 1 [ 545.835481][ C1] CPU: 1 UID: 0 PID: 3392 Comm: kworker/R-bat_e Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 545.835498][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 545.835506][ C1] Workqueue: bat_events batadv_nc_worker [ 545.835525][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x23/0x70 [ 545.835538][ C1] Code: 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 34 24 65 48 8b 15 28 cd e8 11 65 8b 05 39 cd e8 11 a9 00 01 ff 00 74 1d f6 c4 01 74 43 00 00 0f 00 75 3c a9 00 00 f0 00 75 35 8b 82 3c 16 00 00 85 c0 [ 545.835551][ C1] RSP: 0018:ffffc90000a079b0 EFLAGS: 00000202 [ 545.835560][ C1] RAX: 0000000080000301 RBX: ffff888194e6d000 RCX: ffffffff894a2e2b [ 545.835569][ C1] RDX: ffff8880320c8000 RSI: ffffffff894a33f4 RDI: 0000000000000001 [ 545.835578][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000060 [ 545.835590][ C1] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88805b39c000 [ 545.835598][ C1] R13: 0000612e4fdd09e9 R14: ffff88807eda4d00 R15: 0000000000000000 [ 545.835607][ C1] FS: 0000000000000000(0000) GS:ffff888124ae1000(0000) knlGS:0000000000000000 [ 545.835620][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 545.835628][ C1] CR2: 000020000000d000 CR3: 0000000023a83000 CR4: 00000000003526f0 [ 545.835636][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 545.835644][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 545.835652][ C1] Call Trace: [ 545.835656][ C1] [ 545.835660][ C1] validate_xmit_skb+0x994/0xfe0 [ 545.835679][ C1] ? stack_depot_save_flags+0x28/0xa50 [ 545.835696][ C1] __dev_queue_xmit+0x71b/0x43e0 [ 545.835714][ C1] ? __kasan_slab_free+0x51/0x70 [ 545.835726][ C1] ? kmem_cache_free+0x2d4/0x4d0 [ 545.835743][ C1] ? __skb_ext_put+0x102/0x2c0 [ 545.835759][ C1] ? __skb_ext_del+0xf3/0x340 [ 545.835774][ C1] ? br_nf_dev_queue_xmit+0x7b7/0x2cb0 [ 545.835786][ C1] ? br_nf_post_routing+0x8e7/0x1190 [ 545.835797][ C1] ? nf_hook_slow+0xbb/0x200 [ 545.835814][ C1] ? nf_hook+0x45e/0x780 [ 545.835830][ C1] ? br_forward_finish+0xcd/0x130 [ 545.835846][ C1] ? br_nf_hook_thresh+0x301/0x410 [ 545.835856][ C1] ? br_nf_forward_finish+0x66a/0xba0 [ 545.835869][ C1] ? __pfx___dev_queue_xmit+0x10/0x10 [ 545.835885][ C1] ? nf_hook+0x45e/0x780 [ 545.835899][ C1] ? __br_forward+0x1be/0x5b0 [ 545.835914][ C1] ? br_flood+0x39c/0x650 [ 545.835929][ C1] ? br_handle_frame_finish+0xe10/0x1c20 [ 545.835941][ C1] ? br_nf_hook_thresh+0x301/0x410 [ 545.835952][ C1] ? br_nf_pre_routing_ipv6+0x3cd/0x8c0 [ 545.835964][ C1] ? br_nf_pre_routing+0x860/0x15b0 [ 545.835975][ C1] ? br_handle_frame+0xad5/0x14a0 [ 545.835985][ C1] ? __netif_receive_skb_core.constprop.0+0xa23/0x4a00 [ 545.836004][ C1] ? __netif_receive_skb_one_core+0xb0/0x1e0 [ 545.836021][ C1] ? __netif_receive_skb+0x1d/0x160 [ 545.836039][ C1] ? process_backlog+0x442/0x15e0 [ 545.836056][ C1] ? __napi_poll.constprop.0+0xb7/0x550 [ 545.836073][ C1] ? net_rx_action+0xa97/0x1010 [ 545.836090][ C1] ? handle_softirqs+0x216/0x8e0 [ 545.836104][ C1] ? do_softirq+0xb2/0xf0 [ 545.836117][ C1] ? __local_bh_enable_ip+0x100/0x120 [ 545.836131][ C1] ? batadv_nc_purge_paths+0x1d4/0x3a0 [ 545.836145][ C1] ? batadv_nc_worker+0x921/0x1030 [ 545.836158][ C1] ? process_one_work+0x9cc/0x1b70 [ 545.836170][ C1] ? rescuer_thread+0x620/0xea0 [ 545.836182][ C1] ? kthread+0x3c2/0x780 [ 545.836192][ C1] ? ret_from_fork+0x45/0x80 [ 545.836203][ C1] ? ret_from_fork_asm+0x1a/0x30 [ 545.836223][ C1] ? mark_held_locks+0x49/0x80 [ 545.836239][ C1] ? kasan_quarantine_put+0x10a/0x240 [ 545.836259][ C1] br_dev_queue_push_xmit+0x272/0x8a0 [ 545.836276][ C1] ? __skb_ext_put+0x102/0x2c0 [ 545.836292][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 545.836310][ C1] ? __skb_ext_del+0xf3/0x340 [ 545.836327][ C1] br_nf_dev_queue_xmit+0x6f3/0x2cb0 [ 545.836341][ C1] ? __pfx_br_nf_dev_queue_xmit+0x10/0x10 [ 545.836355][ C1] br_nf_post_routing+0x8e7/0x1190 [ 545.836368][ C1] ? __pfx_br_nf_post_routing+0x10/0x10 [ 545.836379][ C1] nf_hook_slow+0xbb/0x200 [ 545.836397][ C1] nf_hook+0x45e/0x780 [ 545.836413][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 545.836430][ C1] ? __pfx_nf_hook+0x10/0x10 [ 545.836447][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 545.836463][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 545.836478][ C1] ? __pfx_ip6table_mangle_hook+0x10/0x10 [ 545.836495][ C1] br_forward_finish+0xcd/0x130 [ 545.836511][ C1] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 545.836528][ C1] br_nf_hook_thresh+0x301/0x410 [ 545.836540][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836558][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 545.836569][ C1] ? lock_acquire+0x179/0x350 [ 545.836591][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836607][ C1] ? net_generic+0xea/0x2a0 [ 545.836627][ C1] br_nf_forward_finish+0x66a/0xba0 [ 545.836639][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836657][ C1] br_nf_forward_ip.part.0+0x609/0x810 [ 545.836671][ C1] br_nf_forward+0xf0f/0x1be0 [ 545.836684][ C1] ? __pfx_br_nf_forward+0x10/0x10 [ 545.836696][ C1] nf_hook_slow+0xbb/0x200 [ 545.836714][ C1] nf_hook+0x45e/0x780 [ 545.836729][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836746][ C1] ? __pfx_nf_hook+0x10/0x10 [ 545.836763][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836783][ C1] __br_forward+0x1be/0x5b0 [ 545.836798][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 545.836816][ C1] br_flood+0x39c/0x650 [ 545.836835][ C1] br_handle_frame_finish+0xe8e/0x1c20 [ 545.836848][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 545.836871][ C1] ? ip6t_do_table+0xc20/0x1be0 [ 545.836885][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 545.836900][ C1] ? nf_hook_slow+0x132/0x200 [ 545.836918][ C1] br_nf_hook_thresh+0x301/0x410 [ 545.836930][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 545.836949][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 545.836963][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 545.836982][ C1] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 545.836998][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 545.837016][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 545.837036][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfb0 [ 545.837048][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 545.837069][ C1] br_nf_pre_routing_ipv6+0x3cd/0x8c0 [ 545.837082][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 545.837095][ C1] ? lock_acquire+0x179/0x350 [ 545.837113][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 545.837127][ C1] ? net_generic+0xea/0x2a0 [ 545.837146][ C1] br_nf_pre_routing+0x860/0x15b0 [ 545.837159][ C1] br_handle_frame+0xad5/0x14a0 [ 545.837172][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 545.837184][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 545.837205][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 545.837217][ C1] __netif_receive_skb_core.constprop.0+0xa23/0x4a00 [ 545.837236][ C1] ? kasan_quarantine_put+0xc0/0x240 [ 545.837255][ C1] ? kmem_cache_free+0x2d4/0x4d0 [ 545.837274][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 545.837293][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 545.837308][ C1] ? sk_skb_reason_drop+0x136/0x1a0 [ 545.837322][ C1] ? ip6_mc_input+0x46c/0xfd0 [ 545.837339][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 545.837356][ C1] ? __lock_acquire+0x5ca/0x1ba0 [ 545.837375][ C1] ? process_backlog+0x3f0/0x15e0 [ 545.837392][ C1] __netif_receive_skb_one_core+0xb0/0x1e0 [ 545.837410][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 545.837429][ C1] ? lock_acquire+0x179/0x350 [ 545.837448][ C1] ? process_backlog+0x3f0/0x15e0 [ 545.837464][ C1] __netif_receive_skb+0x1d/0x160 [ 545.837482][ C1] process_backlog+0x442/0x15e0 [ 545.837501][ C1] __napi_poll.constprop.0+0xb7/0x550 [ 545.837520][ C1] net_rx_action+0xa97/0x1010 [ 545.837541][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 545.837561][ C1] ? tmigr_handle_remote+0x132/0x380 [ 545.837577][ C1] ? run_timer_base+0x121/0x190 [ 545.837598][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 545.837616][ C1] handle_softirqs+0x216/0x8e0 [ 545.837632][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 545.837646][ C1] ? irqtime_account_irq+0x18d/0x2e0 [ 545.837664][ C1] ? batadv_nc_purge_paths+0x1d4/0x3a0 [ 545.837677][ C1] ? __pfx_batadv_nc_to_purge_nc_path_coding+0x10/0x10 [ 545.837693][ C1] do_softirq+0xb2/0xf0 [ 545.837706][ C1] [ 545.837710][ C1] [ 545.837715][ C1] __local_bh_enable_ip+0x100/0x120 [ 545.837730][ C1] batadv_nc_purge_paths+0x1d4/0x3a0 [ 545.837746][ C1] batadv_nc_worker+0x921/0x1030 [ 545.837761][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 545.837777][ C1] ? __pfx_batadv_nc_worker+0x10/0x10 [ 545.837793][ C1] ? rcu_is_watching+0x12/0xc0 [ 545.837808][ C1] process_one_work+0x9cc/0x1b70 [ 545.837824][ C1] ? __pfx_process_one_work+0x10/0x10 [ 545.837841][ C1] ? assign_work+0x1a0/0x250 [ 545.837853][ C1] rescuer_thread+0x620/0xea0 [ 545.837869][ C1] ? rcu_is_watching+0x12/0xc0 [ 545.837882][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 545.837894][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 545.837910][ C1] ? __kthread_parkme+0x19e/0x250 [ 545.837926][ C1] ? __pfx_rescuer_thread+0x10/0x10 [ 545.837940][ C1] kthread+0x3c2/0x780 [ 545.837951][ C1] ? __pfx_kthread+0x10/0x10 [ 545.837962][ C1] ? __pfx_kthread+0x10/0x10 [ 545.837972][ C1] ? __pfx_kthread+0x10/0x10 [ 545.837983][ C1] ? __pfx_kthread+0x10/0x10 [ 545.837994][ C1] ? rcu_is_watching+0x12/0xc0 [ 545.838007][ C1] ? __pfx_kthread+0x10/0x10 [ 545.838019][ C1] ret_from_fork+0x45/0x80 [ 545.838030][ C1] ? __pfx_kthread+0x10/0x10 [ 545.838040][ C1] ret_from_fork_asm+0x1a/0x30 [ 545.838061][ C1] [ 545.838469][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 545.838480][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller-00204-g0e1329d4045c #0 PREEMPT(full) [ 545.838500][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 545.838509][ T31] Call Trace: [ 545.838515][ T31] [ 545.838521][ T31] dump_stack_lvl+0x3d/0x1f0 [ 545.838542][ T31] panic+0x71c/0x800 [ 545.838566][ T31] ? __pfx_panic+0x10/0x10 [ 545.838587][ T31] ? __pfx__printk+0x10/0x10 [ 545.838609][ T31] ? ret_from_fork_asm+0x1a/0x30 [ 545.838635][ T31] ? nmi_backtrace_stall_check+0x6e/0x540 [ 545.838655][ T31] ? irq_work_queue+0xce/0x100 [ 545.838673][ T31] ? watchdog+0xdda/0x12c0 [ 545.838688][ T31] ? watchdog+0xdcd/0x12c0 [ 545.838706][ T31] watchdog+0xdeb/0x12c0 [ 545.838725][ T31] ? __pfx_watchdog+0x10/0x10 [ 545.838740][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 545.838761][ T31] ? __kthread_parkme+0x19e/0x250 [ 545.838785][ T31] ? __pfx_watchdog+0x10/0x10 [ 545.838800][ T31] kthread+0x3c2/0x780 [ 545.838816][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838835][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838849][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838863][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838878][ T31] ? rcu_is_watching+0x12/0xc0 [ 545.838896][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838912][ T31] ret_from_fork+0x45/0x80 [ 545.838927][ T31] ? __pfx_kthread+0x10/0x10 [ 545.838942][ T31] ret_from_fork_asm+0x1a/0x30 [ 545.838976][ T31] [ 545.839168][ T31] Kernel Offset: disabled