last executing test programs: 34m16.140854694s ago: executing program 2 (id=2006): r0 = syz_open_procfs(0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0xc01, 0x3, 0x220, 0x0, 0x5002004a, 0x0, 0x128, 0x0, 0x1f8, 0x3c8, 0x3c8, 0x1f8, 0x3c8, 0x3, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'veth0_virt_wifi\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x20000}}}, {{@uncond, 0x0, 0xb0, 0xd0, 0x0, {}, [@common=@set={{0x40}, {{0x0, [0x29, 0x1d]}}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x280) bpf$BPF_PROG_DETACH(0x1c, 0x0, 0x20) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) poll(0x0, 0x0, 0x3) r3 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x10b701) ioctl$USBDEVFS_CLAIM_PORT(r3, 0x80045518, &(0x7f0000000040)=0x1) close_range(r1, r3, 0x2) 34m15.915975743s ago: executing program 2 (id=2008): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000180)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x10000000000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x180b}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000100)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000800)={@flat=@handle={0x73682a85, 0x0, 0x1}, @ptr={0x70742a85, 0x0, &(0x7f0000000400)=""/216, 0xd8, 0x0, 0x2}, @fda={0x66646185, 0x9, 0x1, 0x48}}, &(0x7f0000000240)={0x0, 0x18, 0x40}}, 0x1000}], 0x0, 0x0, 0x0}) 34m15.727871133s ago: executing program 2 (id=2010): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r2, 0x107, 0x8, &(0x7f0000000100)=0x40049, 0x4) recvmmsg(r2, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write$tun(r0, &(0x7f0000001340)=ANY=[@ANYBLOB="0000884702030000820201004ba4f8f883bc59cd26fa94b5f06a0ddc848c9d1ed8dda6ef25f7e7b39c21bd98ea03134dcff8bab85f0b41cab7d37320413e60ec1bbe07d3c647a95d482db5f7b077c49f72e33be2faaf3c01d42dfc5e62dea8b49d56a7dcd7f960a0589d41e33e06f565eafcc912fc5dabe77f63f07d74ade22d07bf3d4d50bb145e55a8ada9f394be15b2c432a22837474b0bdb12fdff9b48fd24acc0838ffa32ee4672db29c10c0c652d44d5639610551af077ae9394f036a4357620b10b21f90dd581b45eca12d68b76b599015c1ea780aeaa93fc045664e1a6b2b30b23b2503cb527cf4323f0643c591f3c50227868c3eb16706c11cdb24d5b5f86414080c26443b34f284eea40b033ec28c0125aa4ea1064a79497725941848a4c42b1c9f225d49607dbd6110b96d0bed2f6d23c63ec40fc39f997cdd752ed514ae2f6294b3ada53547599e82fceb6639c4327717bc85ec11e24cbe022147f5201cabc2213ce9126ee04ca"], 0x923) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x54}}, 0x4000) 34m15.335800065s ago: executing program 2 (id=2015): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x10000, 0x0) mount$afs(0x0, &(0x7f0000000200)='./file1\x00', 0x0, 0x88, 0x0) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x800000000000001) 34m14.967146357s ago: executing program 2 (id=2020): mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) mkdir(&(0x7f0000000000)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x80, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './bus'}}]}) chdir(&(0x7f0000000440)='./bus\x00') r0 = open(&(0x7f0000000580)='./file1\x00', 0x80242, 0x1df2a23c5997fa5f) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0xffffffffffffffda, 0x0, {{0x3, 0x1, 0x8000000000007, 0x282b, 0x20103, 0x80001, {0x200004, 0x10005c62, 0x203, 0x0, 0x83, 0xd611, 0x10000006, 0x9, 0x7, 0x8000, 0x0, 0xee00, 0xee00, 0x3ff, 0x1}}, {0x0, 0x4}}}, 0xa0) sendfile(r0, r0, &(0x7f0000000080), 0x7f03) 34m13.8374561s ago: executing program 2 (id=2033): connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000340)={[{0x122e, 0x2, 0xfe, 0x0, 0x2a, 0x88, 0x0, 0x0, 0x5, 0xff, 0x1f}, {0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2}, {0x400, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x3, 0x20, 0x0, 0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1000000004"], 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x42082) ioctl$KVM_RUN(r2, 0xae80, 0x0) 34m13.630031231s ago: executing program 32 (id=2033): connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000340)={[{0x122e, 0x2, 0xfe, 0x0, 0x2a, 0x88, 0x0, 0x0, 0x5, 0xff, 0x1f}, {0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x2}, {0x400, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x3, 0x20, 0x0, 0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1000000004"], 0x48) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x42082) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12.81157214s ago: executing program 0 (id=9598): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r4 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r8 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r8, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 11.917438681s ago: executing program 4 (id=9605): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = dup(r0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r2 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x4000000000000001, 0xffff1000, 0xc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r1, 0x2000) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020}, 0x2020) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) r4 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_usb_connect(0x3, 0x36, 0x0, 0x0) sendmsg$netlink(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="1400000013000104000000000000000002"], 0x14}], 0x1}, 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f00000001c0)='\xe6\xd2=(L\x9f\x1c&\xda\xfa\xf3}\x18\xdckL<\xa5-#\xc8\xb7\x98\f\x87\xcf', 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x73, &(0x7f00000000c0)=0x179) 11.372228983s ago: executing program 5 (id=9606): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newtaction={0x50, 0x30, 0x48b, 0x70bd26, 0x40000000, {}, [{0x3c, 0x1, [@m_ctinfo={0x38, 0xd, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x4, 0x1}}}}]}]}, 0x50}}, 0x2000e994) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r2, 0x0, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000003e0007010000000000000000017c00000400fc800c0001800600060065580000080002"], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0xc010) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x11) syz_emit_ethernet(0x36, &(0x7f0000000480)=ANY=[], 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r3) syz_genetlink_get_family_id$ieee802154(0x0, r3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) r4 = eventfd2(0x8009, 0x1) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f00000001c0)={0x0, r4}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xb0) sync_file_range(r5, 0x800000000976, 0x5917, 0x3) r6 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r6, 0x29, 0xcf, 0x0, 0xffffffffffffffff) 11.202364648s ago: executing program 5 (id=9607): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x6, 0x50, 0xffffffffffffffff, 0x0) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004600), 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_usb_connect(0x0, 0x24, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r3, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x2000, 0x103) mknod$loop(&(0x7f0000000140)='./file7\x00', 0x2000, 0x0) ioctl$TCSETSW2(r2, 0x80047456, &(0x7f0000000040)={0x3, 0xb, 0xfffffffe, 0x7fffffff, 0x0, "23f555d9adb42d4408020e90d1beaa82dc1ecf", 0xffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000080)=@ethtool_cmd={0x24, 0x0, 0x3, 0xfffe, 0xff, 0x0, 0x0, 0xff, 0x0, 0xfe, 0x20000000, 0x7883, 0x0, 0x1, 0x1, 0x6162b9dd, [0x0, 0x80000000]}}) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x18) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = fsopen(&(0x7f0000000200)='ecryptfs\x00', 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000180)) 10.331782248s ago: executing program 3 (id=9609): r0 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) socket(0x10, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x6) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r4, 0x84, 0x1, 0x0, &(0x7f0000000000)) fsopen(0x0, 0x0) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r6, 0x0, 0x30, 0x0, @val=@perf_event={0x7e}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_SET_MEMORY_ATTRIBUTES(0xffffffffffffffff, 0x4020aed2, &(0x7f0000000000)={0xeeee8000, 0x10000, 0x8}) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000009c0)=0x80000) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000001c0)={{@host}, @host, 0x0, 0x2000000, 0x2449, 0xfffffffffffffffd}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, 0x0) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000000c0)=0xb0000) modify_ldt$write2(0x11, &(0x7f0000000100)={0x3ba, 0x20000000, 0x0, 0x1, 0x2, 0x1}, 0x10) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r5, 0x7a4, &(0x7f0000000380)={{@host}, 0x59, 0x2800000000000000, 0x1, 0xfffffffa}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='ntfs3\x00', 0x1000080, 0x0) 9.739864383s ago: executing program 3 (id=9610): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r8 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r8, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 8.779373727s ago: executing program 0 (id=9612): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './mnt\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$sysctl(0xffffffffffffffff, &(0x7f0000000000)='5\x00', 0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="4400000010001fff000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="08400000000004001c0012800e00010069703665727370616e000000080002800400120008000a00", @ANYRES32=r6, @ANYBLOB="e33b234a349dba337e183dae12a3636107927d31c92c8a935d09a5cdf17b5ef1e4fbbb613df224f930237a1498f10313bfdb773c7525545c73b68212c7d333f322e9767dacaa5abab4b791fe2d991730de6ec5d7b21e0b91e72283b5e070656b9d1f13a1c821aeb92e6962b60b37f14052b04525bcac3d02eb69ddfbe49afe22a4ab99fa480974eb1fa7b003764629f2b3db9a55be17f85d6d9b70f55c972b178d418a6f1e5463ef6b32cf0455ab190fe7559249db8eff95bd827e"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvmsg(r2, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x80, 0x2000000, 0x3a6}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0, 0x40000, 0x1}) io_uring_enter(r8, 0x47f6, 0x195d, 0x25, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 8.454414335s ago: executing program 4 (id=9613): r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000000c0)={[{@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x33]}}]}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x55a97588810c4848, 0x2, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendto$inet6(r4, &(0x7f0000000340)="d4d7efad020efa27e4b5b271825ef53d030f992ff58468566c6fc090ac508f876b89a6004f4d6aa59f13c8afda4bfc2137c8a1d584595b77c2a5f6a72a6d627f3408143aae7315bb608e1557b707b38c30f4", 0x52, 0x10, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000010c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) close(r3) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001600)={0x5, 0x10, 0xfffffffb}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x25, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0xffe2) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cpuinfo\x00', 0x0, 0x0) read$hiddev(r6, &(0x7f00000000c0)=""/4092, 0xffc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x328}}, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0xf0ffffff, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 7.266031602s ago: executing program 0 (id=9615): r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)={[{@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x33]}}]}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x55a97588810c4848, 0x2, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendto$inet6(r4, &(0x7f0000000340)="d4d7efad020efa27e4b5b271825ef53d030f992ff58468566c6fc090ac508f876b89a6004f4d6aa59f13c8afda4bfc2137c8a1d584595b77c2a5f6a72a6d627f3408143aae7315bb608e1557b707b38c30f4", 0x52, 0x10, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000010c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) close(r3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001600)={0x5, 0x10, 0xfffffffb}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x25, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0xffe2) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cpuinfo\x00', 0x0, 0x0) read$hiddev(r6, &(0x7f00000000c0)=""/4092, 0xffc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x328}}, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 6.880912039s ago: executing program 5 (id=9616): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0x8, 0x2}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r6, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r7 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r7, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r7, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 6.751802883s ago: executing program 1 (id=9617): r0 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) socket(0x10, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x6) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r4, 0x84, 0x1, 0x0, 0x0) fsopen(0x0, 0x0) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r6, 0x0, 0x30, 0x0, @val=@perf_event={0x7e}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_SET_MEMORY_ATTRIBUTES(0xffffffffffffffff, 0x4020aed2, &(0x7f0000000000)={0xeeee8000, 0x10000, 0x8}) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000009c0)=0x80000) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000001c0)={{@host}, @host, 0x0, 0x2000000, 0x2449, 0xfffffffffffffffd}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, 0x0) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000000c0)=0xb0000) modify_ldt$write2(0x11, &(0x7f0000000100)={0x3ba, 0x20000000, 0x0, 0x1, 0x2, 0x1}, 0x10) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r5, 0x7a4, &(0x7f0000000380)={{@host}, 0x59, 0x2800000000000000, 0x1, 0xfffffffa}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='ntfs3\x00', 0x1000080, 0x0) 6.400231136s ago: executing program 3 (id=9618): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x4ae60) syz_io_uring_setup(0x110, 0x0, &(0x7f0000000040)=0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}}], {0x14}}, 0x3c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000020303000000000000000000000100000800010001"], 0x1c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r8, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x30, 0x4, 0x8, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6840}]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4000000) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r9, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x44080) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r9, {}, {0xffe0, 0xa}, {0x1, 0xe}}, [@qdisc_kind_options=@q_codel={{0xa}, {0xc, 0x2, [@TCA_CODEL_LIMIT={0x8, 0x2, 0x1}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x55}, 0xc010) 6.227166198s ago: executing program 3 (id=9619): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0x8, 0x2}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r8 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r8, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 6.104469265s ago: executing program 1 (id=9620): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = dup(r0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r2 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000080)={0x4000000000000001, 0xffff1000, 0xc}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x13, r1, 0x2000) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$binfmt_script(r1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002100)={0x2020}, 0x2020) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x9) r4 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, 0x0, 0x0, 0x0) r5 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_usb_connect(0x3, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) sendmsg$netlink(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="1400000013000104000000000000000002"], 0x14}], 0x1}, 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x2, &(0x7f00000001c0)='\xe6\xd2=(L\x9f\x1c&\xda\xfa\xf3}\x18\xdckL<\xa5-#\xc8\xb7\x98\f\x87\xcf', 0x0, 0x0) r6 = syz_open_dev$usbfs(0x0, 0x204, 0x800542) ioctl$int_in(r6, 0x73, &(0x7f00000000c0)=0x179) 5.695183627s ago: executing program 0 (id=9621): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r8 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r8, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 4.821066123s ago: executing program 4 (id=9622): syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x4ae60) syz_io_uring_setup(0x110, 0x0, &(0x7f0000000040)=0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_SOCKET_DREG={0x8, 0x2, 0x1, 0x0, 0xb}, @NFTA_SOCKET_KEY={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SOCKET_LEVEL={0x8, 0x3, 0x89}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000020303000000000000000000000100000800010001"], 0x1c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0xb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r8, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x30, 0x4, 0x8, 0x301, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6840}]}, 0x30}, 0x1, 0x0, 0x0, 0x880}, 0x4000000) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r9, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x44080) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x3c, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r9, {}, {0xffe0, 0xa}, {0x1, 0xe}}, [@qdisc_kind_options=@q_codel={{0xa}, {0xc, 0x2, [@TCA_CODEL_LIMIT={0x8, 0x2, 0x1}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x55}, 0xc010) 4.496520226s ago: executing program 4 (id=9623): r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)={[{@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x33]}}]}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x55a97588810c4848, 0x2, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendto$inet6(r4, &(0x7f0000000340)="d4d7efad020efa27e4b5b271825ef53d030f992ff58468566c6fc090ac508f876b89a6004f4d6aa59f13c8afda4bfc2137c8a1d584595b77c2a5f6a72a6d627f3408143aae7315bb608e1557b707b38c30f4", 0x52, 0x10, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000010c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) close(r3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001600)={0x5, 0x10, 0xfffffffb}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x25, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0xffe2) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cpuinfo\x00', 0x0, 0x0) read$hiddev(r6, &(0x7f00000000c0)=""/4092, 0xffc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x328}}, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0xf0ffffff, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030000007f03e3f7000000006ee2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec0012100001400d0c0c00bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) 3.795053525s ago: executing program 1 (id=9624): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) ftruncate(0xffffffffffffffff, 0x10000) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x17, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x80) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = fsopen(&(0x7f00000001c0)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) r5 = fsopen(&(0x7f00000014c0)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ec}, 0x94) r7 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000080)={r6, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x1, 0x353a, 0x1}}, 0x20) r8 = dup(r7) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)=@generic={&(0x7f0000000040)='./file0\x00', r8}, 0x18) r9 = fsmount(r5, 0x1, 0xa) close_range(r3, r9, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 3.555178104s ago: executing program 5 (id=9625): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$vim2m_VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000000)={0x8, 0x2}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000023896) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@updpolicy={0xb8, 0x1d, 0xcb23c9c9931e99e9, 0x0, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, 0x2, 0x0, 0xc9c, 0xa, 0x60, 0x30, 0x0, 0x0, 0xee01}, {0x0, 0x7f, 0x7, 0x2, 0x0, 0xfbfffffffffffffd, 0x5, 0xffffffffffffffff}, {0xffffffff, 0x0, 0xf, 0x4e48ca81}, 0x0, 0x0, 0x1, 0x0, 0x2}}, 0xb8}, 0x1, 0x0, 0x0, 0x90}, 0x0) mremap(&(0x7f000020e000/0x2000)=nil, 0x2000, 0x400000, 0x0, &(0x7f000082a000/0x400000)=nil) socket$inet6(0xa, 0x2, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCDARP(r7, 0x8955, &(0x7f00000004c0)={{0x2, 0x4e23, @broadcast}, {0x0, @random="9705000000e8"}, 0x48, {0x2, 0x0, @broadcast}}) r8 = socket(0x10, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r8, 0x0, 0x43, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) write(r8, &(0x7f0000000800)="240000001e005f031420654400000000000000000100000001000800080008c01300ff00", 0x24) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) setrlimit(0xb, &(0x7f0000000000)) timer_create(0x3, 0x0, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r9}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, r1, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r9}, @val={0xc, 0x99, {0xffffff80, 0x6d}}}}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x8, 0x3}}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x6}]}, 0x38}}, 0x4000004) syz_usb_connect(0x0, 0x3f, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000bb210a08c907120082f60102030109022d000100000000090400000396b70a0009050f000000000000090505000000000000090501"], 0x0) 2.85237907s ago: executing program 3 (id=9626): r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket(0x2c, 0x3, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x17) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r4, &(0x7f0000000140), 0x0}, 0x20) close(r3) r5 = syz_open_procfs(0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r5, r8, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000600)=[@text64={0x40, &(0x7f0000000640)="430fc73f0f2390b9800000c00f3235010000000f300f20d835080000000f22d8c4e18173f53866baf80cb83879e487ef66bafc0cec66b88e008ec02d1aa80000460f1c460041ae", 0x47}], 0x1, 0x74, 0x0, 0x0) recvmsg$can_bcm(r5, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, &(0x7f0000000240)) ioctl$KVM_RUN(r8, 0xae80, 0x0) connect$rose(r0, &(0x7f00000001c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x1, @bcast}, 0x1c) 2.524407217s ago: executing program 4 (id=9627): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}, 0x10) r3 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004600), 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_usb_connect(0x0, 0x24, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r3, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x2000, 0x103) mknod$loop(&(0x7f0000000140)='./file7\x00', 0x2000, 0x0) ioctl$TCSETSW2(r2, 0x80047456, &(0x7f0000000040)={0x3, 0xb, 0xfffffffe, 0x7fffffff, 0x0, "23f555d9adb42d4408020e90d1beaa82dc1ecf", 0xffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000080)=@ethtool_cmd={0x24, 0x0, 0x3, 0xfffe, 0xff, 0x0, 0x0, 0xff, 0x0, 0xfe, 0x20000000, 0x7883, 0x0, 0x1, 0x1, 0x6162b9dd, [0x0, 0x80000000]}}) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) r5 = fsopen(&(0x7f0000000200)='ecryptfs\x00', 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000180)) 1.903476208s ago: executing program 1 (id=9629): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newtaction={0x50, 0x30, 0x48b, 0x70bd26, 0x40000000, {}, [{0x3c, 0x1, [@m_ctinfo={0x38, 0xd, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x4, 0x1}}}}]}]}, 0x50}}, 0x2000e994) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r2, 0x0, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000003e0007010000000000000000017c00000400fc800c0001800600060065580000080002"], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0xc010) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x11) syz_emit_ethernet(0x36, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r3) syz_genetlink_get_family_id$ieee802154(0x0, r3) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) r4 = eventfd2(0x8009, 0x1) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af22, &(0x7f00000001c0)={0x0, r4}) r5 = creat(&(0x7f0000000280)='./file0\x00', 0xb0) sync_file_range(r5, 0x800000000976, 0x5917, 0x3) r6 = socket$igmp6(0xa, 0x3, 0x3a) getsockopt$MRT6(r6, 0x29, 0xcf, 0x0, 0xffffffffffffffff) 1.681905685s ago: executing program 1 (id=9630): r0 = socket$kcm(0x10, 0x2, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)={[{@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x33]}}]}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x55a97588810c4848, 0x2, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) sendto$inet6(r4, &(0x7f0000000340)="d4d7efad020efa27e4b5b271825ef53d030f992ff58468566c6fc090ac508f876b89a6004f4d6aa59f13c8afda4bfc2137c8a1d584595b77c2a5f6a72a6d627f3408143aae7315bb608e1557b707b38c30f4", 0x52, 0x10, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f00000010c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) close(r3) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000001600)={0x5, 0x10, 0xfffffffb}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x25, &(0x7f0000000080)=[@in={0x2, 0x0, @dev}], 0xffe2) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/cpuinfo\x00', 0x0, 0x0) read$hiddev(r6, &(0x7f00000000c0)=""/4092, 0xffc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x328}}, 0x84) sendmsg$kcm(r0, 0x0, 0x0) 1.076357438s ago: executing program 3 (id=9631): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './mnt\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$sysctl(0xffffffffffffffff, &(0x7f0000000000)='5\x00', 0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="4400000010001fff000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="08400000000004001c0012800e00010069703665727370616e000000080002800400120008000a00", @ANYRES32=r6, @ANYBLOB="e33b234a349dba337e183dae12a3636107927d31c92c8a935d09a5cdf17b5ef1e4fbbb613df224f930237a1498f10313bfdb773c7525545c73b68212c7d333f322e9767dacaa5abab4b791fe2d991730de6ec5d7b21e0b91e72283b5e070656b9d1f13a1c821aeb92e6962b60b37f14052b04525bcac3d02eb69ddfbe49afe22a4ab99fa480974eb1fa7b003764629f2b3db9a55be17f85d6d9b70f55c972b178d418a6f1e5463ef6b32cf0455ab190fe7559249db8eff95bd827e"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvmsg(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0xf5ffffff}, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x80, 0x2000000, 0x3a6}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0, 0x40000, 0x1}) io_uring_enter(r8, 0x47f6, 0x195d, 0x25, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 319.997242ms ago: executing program 4 (id=9632): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './mnt\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$sysctl(0xffffffffffffffff, &(0x7f0000000000)='5\x00', 0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r5, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$packet(0x11, 0x2, 0x300) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="4400000010001fff000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="08400000000004001c0012800e00010069703665727370616e000000080002800400120008000a00", @ANYRES32=r6, @ANYBLOB="e33b234a349dba337e183dae12a3636107927d31c92c8a935d09a5cdf17b5ef1e4fbbb613df224f930237a1498f10313bfdb773c7525545c73b68212c7d333f322e9767dacaa5abab4b791fe2d991730de6ec5d7b21e0b91e72283b5e070656b9d1f13a1c821aeb92e6962b60b37f14052b04525bcac3d02eb69ddfbe49afe22a4ab99fa480974eb1fa7b003764629f2b3db9a55be17f85d6d9b70f55c972b178d418a6f1e5463ef6b32cf0455ab190fe7559249db8eff95bd827e"], 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x0) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x318, 0x0, 0xdb0, 0xf5ffffff}, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r8 = syz_io_uring_setup(0x117, &(0x7f0000000100)={0x0, 0x0, 0x80, 0x2000000, 0x3a6}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffc00, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000000c0)=@IORING_OP_SENDMSG={0x9, 0x40, 0x0, r7, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0, 0x40000, 0x1}) io_uring_enter(r8, 0x47f6, 0x195d, 0x25, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 191.216665ms ago: executing program 5 (id=9633): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x8, 0x8a}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newtaction={0x50, 0x30, 0x48b, 0x70bd26, 0x40000000, {}, [{0x3c, 0x1, [@m_ctinfo={0x38, 0xd, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x9}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x4, 0x1}}}}]}]}, 0x50}}, 0x2000e994) syz_genetlink_get_family_id$wireguard(0x0, 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000003e0007010000000000000000017c00000400fc800c0001800600060065580000080002"], 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0xc010) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x11) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x0) eventfd2(0x8009, 0x1) creat(&(0x7f0000000280)='./file0\x00', 0xb0) socket$igmp6(0xa, 0x3, 0x3a) 97.149158ms ago: executing program 1 (id=9634): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x6, 0x50, 0xffffffffffffffff, 0x0) socket(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004600), 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = syz_usb_connect(0x0, 0x24, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r3, 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file2\x00', 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000400)='./file7\x00', 0x2000, 0x103) mknod$loop(&(0x7f0000000140)='./file7\x00', 0x2000, 0x0) ioctl$TCSETSW2(r2, 0x80047456, &(0x7f0000000040)={0x3, 0xb, 0xfffffffe, 0x7fffffff, 0x0, "23f555d9adb42d4408020e90d1beaa82dc1ecf", 0xffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000080)=@ethtool_cmd={0x24, 0x0, 0x3, 0xfffe, 0xff, 0x0, 0x0, 0xff, 0x0, 0xfe, 0x20000000, 0x7883, 0x0, 0x1, 0x1, 0x6162b9dd, [0x0, 0x80000000]}}) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x2e9, 0x0) r5 = fsopen(&(0x7f0000000200)='ecryptfs\x00', 0x0) close_range(r5, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000180)) 0s ago: executing program 5 (id=9635): r0 = syz_usb_connect(0x0, 0x36, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) socket(0x10, 0x803, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x4, &(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x6) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r4, 0x84, 0x1, 0x0, 0x0) fsopen(0x0, 0x0) r5 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={r6, 0x0, 0x30, 0x0, @val=@perf_event={0x7e}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_SET_MEMORY_ATTRIBUTES(0xffffffffffffffff, 0x4020aed2, &(0x7f0000000000)={0xeeee8000, 0x10000, 0x8}) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000009c0)=0x80000) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, &(0x7f00000001c0)={{@host}, @host, 0x0, 0x2000000, 0x2449, 0xfffffffffffffffd}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r5, 0x7a8, 0x0) ioctl$IOCTL_VMCI_VERSION2(r5, 0x7a7, &(0x7f00000000c0)=0xb0000) modify_ldt$write2(0x11, &(0x7f0000000100)={0x3ba, 0x20000000, 0x0, 0x1, 0x2, 0x1}, 0x10) ioctl$IOCTL_VMCI_QUEUEPAIR_SETVA(r5, 0x7a4, &(0x7f0000000380)={{@host}, 0x59, 0x2800000000000000, 0x1, 0xfffffffa}) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='ntfs3\x00', 0x1000080, 0x0) kernel console output (not intermixed with test programs): rmissive=0 [ 2191.432046][ T5474] audit: backlog limit exceeded [ 2191.464388][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2196.499645][ T30] kauditd_printk_skb: 10985 callbacks suppressed [ 2196.499661][ T30] audit: type=1400 audit(2000002132.199:1100628): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2196.589632][ T30] audit: type=1400 audit(2000002132.199:1100629): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2196.648959][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2196.691958][ T5474] audit: audit_lost=59745 audit_rate_limit=0 audit_backlog_limit=64 [ 2196.722146][ T2042] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2196.743919][ T2042] audit: audit_lost=59746 audit_rate_limit=0 audit_backlog_limit=64 [ 2196.751997][ T2042] audit: backlog limit exceeded [ 2196.795696][ T2041] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2196.820216][ T2041] audit: audit_lost=59747 audit_rate_limit=0 audit_backlog_limit=64 [ 2196.887544][ T5474] audit: backlog limit exceeded [ 2199.620910][ T2079] netlink: 'syz.3.8216': attribute type 29 has an invalid length. [ 2199.685536][ T2081] netlink: 'syz.3.8216': attribute type 29 has an invalid length. [ 2201.852700][ T30] kauditd_printk_skb: 9116 callbacks suppressed [ 2201.852716][ T30] audit: type=1400 audit(2000002137.206:1109655): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2201.890717][ T30] audit: type=1400 audit(2000002137.215:1109656): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2201.913258][ T30] audit: type=1400 audit(2000002137.215:1109657): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2201.936200][ T30] audit: type=1400 audit(2000002137.215:1109658): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2201.970353][ T30] audit: type=1400 audit(2000002137.215:1109659): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2201.982637][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2202.003439][ T30] audit: type=1400 audit(2000002137.215:1109660): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2202.031155][ T30] audit: type=1400 audit(2000002137.215:1109661): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2202.058280][ T5474] audit: audit_lost=59778 audit_rate_limit=0 audit_backlog_limit=64 [ 2202.082448][ T5474] audit: backlog limit exceeded [ 2207.205918][ T30] kauditd_printk_skb: 10997 callbacks suppressed [ 2207.205935][ T30] audit: type=1400 audit(2000002142.222:1119672): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2207.269096][ T30] audit: type=1400 audit(2000002142.222:1119673): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2207.312738][ T30] audit: type=1400 audit(2000002142.222:1119674): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2207.360582][ T30] audit: type=1400 audit(2000002142.222:1119675): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2207.406514][ T30] audit: type=1400 audit(2000002142.222:1119676): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2207.452674][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2207.460294][ T5474] audit: audit_lost=60108 audit_rate_limit=0 audit_backlog_limit=64 [ 2207.468423][ T5474] audit: backlog limit exceeded [ 2207.475807][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2207.482580][ T5474] audit: audit_lost=60109 audit_rate_limit=0 audit_backlog_limit=64 [ 2208.327798][ T2191] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8250'. [ 2211.737469][ T2235] netlink: 'syz.3.8262': attribute type 29 has an invalid length. [ 2211.770189][ T2235] netlink: 'syz.3.8262': attribute type 29 has an invalid length. [ 2212.559073][ T30] kauditd_printk_skb: 9966 callbacks suppressed [ 2212.559092][ T30] audit: type=1400 audit(2000002147.229:1128736): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2212.627627][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2212.644382][ T5474] audit: audit_lost=60412 audit_rate_limit=0 audit_backlog_limit=64 [ 2212.655200][ T5474] audit: backlog limit exceeded [ 2212.660112][ T30] audit: type=1400 audit(2000002147.248:1128737): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2212.688369][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2212.694903][ T5474] audit: audit_lost=60413 audit_rate_limit=0 audit_backlog_limit=64 [ 2212.712318][ T2241] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2212.718999][ T2241] audit: audit_lost=60414 audit_rate_limit=0 audit_backlog_limit=64 [ 2212.719189][ T5474] audit: backlog limit exceeded [ 2213.194310][ T2257] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8269'. [ 2215.280869][ T2292] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8282'. [ 2217.538447][ T2326] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8292'. [ 2217.924625][ T30] kauditd_printk_skb: 9060 callbacks suppressed [ 2217.924642][ T30] audit: type=1400 audit(2000002152.255:1136537): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2218.030493][ T30] audit: type=1400 audit(2000002152.255:1136538): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2218.055635][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2218.083914][ T5474] audit: audit_lost=60835 audit_rate_limit=0 audit_backlog_limit=64 [ 2218.128350][ T30] audit: type=1400 audit(2000002152.255:1136539): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2218.150445][ T5474] audit: backlog limit exceeded [ 2218.183035][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2218.197840][ T5474] audit: audit_lost=60836 audit_rate_limit=0 audit_backlog_limit=64 [ 2218.238663][ T5474] audit: backlog limit exceeded [ 2218.253457][ T30] audit: type=1400 audit(2000002152.255:1136540): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2220.847023][ T2366] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8304'. [ 2221.207339][ T2372] netlink: 'syz.5.8305': attribute type 29 has an invalid length. [ 2221.226945][ T2372] netlink: 'syz.5.8305': attribute type 29 has an invalid length. [ 2223.276082][ T30] kauditd_printk_skb: 9063 callbacks suppressed [ 2223.276099][ T30] audit: type=1400 audit(2000002157.253:1144845): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2223.369612][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2223.384059][ T30] audit: type=1400 audit(2000002157.262:1144846): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2223.397769][ T5474] audit: audit_lost=61090 audit_rate_limit=0 audit_backlog_limit=64 [ 2223.428669][ T2409] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2223.442915][ T2409] audit: audit_lost=61091 audit_rate_limit=0 audit_backlog_limit=64 [ 2223.471770][ T2409] audit: backlog limit exceeded [ 2223.481092][ T5474] audit: backlog limit exceeded [ 2223.486785][ T30] audit: type=1400 audit(2000002157.262:1144847): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2223.543570][ T2412] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2224.638066][ T2432] netlink: 'syz.3.8321': attribute type 29 has an invalid length. [ 2224.669007][ T2432] netlink: 'syz.3.8321': attribute type 29 has an invalid length. [ 2225.564157][ T2452] netlink: 'syz.0.8323': attribute type 29 has an invalid length. [ 2225.603577][ T2452] netlink: 'syz.0.8323': attribute type 29 has an invalid length. [ 2228.629125][ T30] kauditd_printk_skb: 7025 callbacks suppressed [ 2228.629141][ T30] audit: type=1400 audit(2000002162.269:1151625): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2228.664034][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2228.670757][ T5474] audit: audit_lost=61175 audit_rate_limit=0 audit_backlog_limit=64 [ 2228.683483][ T5474] audit: backlog limit exceeded [ 2228.688517][ T30] audit: type=1400 audit(2000002162.297:1151626): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2228.715493][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2228.730168][ T5474] audit: audit_lost=61176 audit_rate_limit=0 audit_backlog_limit=64 [ 2228.740190][ T2497] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2228.748007][ T2497] audit: audit_lost=61177 audit_rate_limit=0 audit_backlog_limit=64 [ 2228.756158][ T5474] audit: backlog limit exceeded [ 2229.550971][ T2503] netlink: 'syz.0.8335': attribute type 29 has an invalid length. [ 2229.588086][ T2503] netlink: 'syz.0.8335': attribute type 29 has an invalid length. [ 2230.361879][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2230.368244][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2230.378683][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2233.240241][ T2564] netlink: 'syz.4.8348': attribute type 29 has an invalid length. [ 2233.344202][ T2567] netlink: 'syz.4.8348': attribute type 29 has an invalid length. [ 2233.685105][ T2572] netlink: 'syz.3.8352': attribute type 39 has an invalid length. [ 2233.986592][ T30] kauditd_printk_skb: 9578 callbacks suppressed [ 2233.986607][ T30] audit: type=1400 audit(2000002167.276:1161099): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2234.095292][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2234.117070][ T2576] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2234.127363][ T30] audit: type=1400 audit(2000002167.314:1161100): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2234.158324][ T5474] audit: audit_lost=61213 audit_rate_limit=0 audit_backlog_limit=64 [ 2234.177547][ T2576] audit: audit_lost=61214 audit_rate_limit=0 audit_backlog_limit=64 [ 2234.196195][ T5474] audit: backlog limit exceeded [ 2234.206653][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2234.214807][ T2578] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2234.228581][ T2576] audit: backlog limit exceeded [ 2236.258099][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5500 ms [ 2236.266153][ C0] lec:lec_tx_timeout: lec0 [ 2239.338121][ T30] kauditd_printk_skb: 8762 callbacks suppressed [ 2239.338134][ T30] audit: type=1400 audit(2000002172.283:1169781): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2239.419248][ T30] audit: type=1400 audit(2000002172.293:1169782): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2239.480033][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2239.493127][ T5474] audit: audit_lost=61243 audit_rate_limit=0 audit_backlog_limit=64 [ 2239.542170][ T2670] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2239.559714][ T30] audit: type=1400 audit(2000002172.293:1169783): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2239.591960][ T5474] audit: backlog limit exceeded [ 2239.606451][ T2670] audit: audit_lost=61244 audit_rate_limit=0 audit_backlog_limit=64 [ 2239.618563][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2239.653082][ T2670] audit: backlog limit exceeded [ 2242.846599][ T2721] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8388'. [ 2244.001229][ T2732] netlink: 'syz.4.8390': attribute type 1 has an invalid length. [ 2244.253811][ T2732] 8021q: adding VLAN 0 to HW filter on device bond32 [ 2244.698680][ T30] kauditd_printk_skb: 7351 callbacks suppressed [ 2244.698695][ T30] audit: type=1400 audit(2000002177.290:1176734): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2244.821256][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2244.836843][ T5474] audit: audit_lost=61379 audit_rate_limit=0 audit_backlog_limit=64 [ 2244.863974][ T5474] audit: backlog limit exceeded [ 2244.874539][ T30] audit: type=1400 audit(2000002177.300:1176735): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2244.965199][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2244.988382][ T30] audit: type=1400 audit(2000002177.300:1176736): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2245.041127][ T5474] audit: audit_lost=61380 audit_rate_limit=0 audit_backlog_limit=64 [ 2245.057254][ T5474] audit: backlog limit exceeded [ 2245.070186][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2247.045315][ T2775] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8400'. [ 2248.950273][ T2803] netlink: 'syz.4.8409': attribute type 39 has an invalid length. [ 2250.043422][ T30] kauditd_printk_skb: 9761 callbacks suppressed [ 2250.043439][ T30] audit: type=1400 audit(2000002182.297:1184540): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2250.062906][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2250.129398][ T5474] audit: audit_lost=62034 audit_rate_limit=0 audit_backlog_limit=64 [ 2250.162945][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2250.169449][T12978] audit: audit_lost=62035 audit_rate_limit=0 audit_backlog_limit=64 [ 2250.178135][ T5474] audit: backlog limit exceeded [ 2250.183193][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2250.192853][ T30] audit: type=1400 audit(2000002182.297:1184541): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2250.193644][ T5474] audit: audit_lost=62036 audit_rate_limit=0 audit_backlog_limit=64 [ 2250.227069][ T5474] audit: backlog limit exceeded [ 2252.435115][ T2859] netlink: 'syz.1.8420': attribute type 1 has an invalid length. [ 2252.502778][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2252.602824][ T2859] 8021q: adding VLAN 0 to HW filter on device bond43 [ 2253.808922][ T2880] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8424'. [ 2255.394978][ T30] kauditd_printk_skb: 8316 callbacks suppressed [ 2255.394989][ T30] audit: type=1400 audit(2000002187.323:1191843): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2255.493881][ T30] audit: type=1400 audit(2000002187.342:1191844): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2255.534365][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2255.559862][ T5474] audit: audit_lost=62375 audit_rate_limit=0 audit_backlog_limit=64 [ 2255.591006][ T5474] audit: backlog limit exceeded [ 2255.600433][ T30] audit: type=1400 audit(2000002187.342:1191845): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2255.625540][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2255.654576][ T5474] audit: audit_lost=62376 audit_rate_limit=0 audit_backlog_limit=64 [ 2255.692727][ T5474] audit: backlog limit exceeded [ 2255.706779][ T30] audit: type=1400 audit(2000002187.342:1191846): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2257.853590][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5010 ms [ 2257.861620][ C0] lec:lec_tx_timeout: lec0 [ 2259.961525][ T2947] netlink: 'syz.5.8444': attribute type 1 has an invalid length. [ 2260.125562][ T2947] 8021q: adding VLAN 0 to HW filter on device bond29 [ 2260.747776][ T30] kauditd_printk_skb: 20526 callbacks suppressed [ 2260.747794][ T30] audit: type=1400 audit(2000002192.321:1203337): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2260.807075][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2260.853114][ T5474] audit: audit_lost=65389 audit_rate_limit=0 audit_backlog_limit=64 [ 2260.869551][ T30] audit: type=1400 audit(2000002192.321:1203338): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2260.899048][ T5474] audit: backlog limit exceeded [ 2260.910573][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2260.925165][ T5474] audit: audit_lost=65390 audit_rate_limit=0 audit_backlog_limit=64 [ 2260.943573][ T5474] audit: backlog limit exceeded [ 2260.948537][ T30] audit: type=1400 audit(2000002192.321:1203339): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2260.975184][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2262.645348][ T2977] netlink: 'syz.5.8456': attribute type 39 has an invalid length. [ 2266.100949][ T30] kauditd_printk_skb: 9613 callbacks suppressed [ 2266.100966][ T30] audit: type=1400 audit(2000002197.328:1212195): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2266.146503][ T30] audit: type=1400 audit(2000002197.328:1212196): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2266.199732][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2266.226830][ T5474] audit: audit_lost=65644 audit_rate_limit=0 audit_backlog_limit=64 [ 2266.243679][ T3021] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2266.252585][ T5474] audit: backlog limit exceeded [ 2266.262725][ T30] audit: type=1400 audit(2000002197.328:1212197): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2266.265401][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2266.315257][ T3021] audit: audit_lost=65645 audit_rate_limit=0 audit_backlog_limit=64 [ 2266.346579][ T5474] audit: audit_lost=65646 audit_rate_limit=0 audit_backlog_limit=64 [ 2269.917793][ T3074] netlink: 'syz.1.8483': attribute type 29 has an invalid length. [ 2269.967991][ T3074] netlink: 'syz.1.8483': attribute type 29 has an invalid length. [ 2271.455215][ T30] kauditd_printk_skb: 8876 callbacks suppressed [ 2271.455231][ T30] audit: type=1400 audit(2000002202.344:1219917): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2271.516196][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2271.526912][ T5474] audit: audit_lost=66032 audit_rate_limit=0 audit_backlog_limit=64 [ 2271.535363][ T5474] audit: backlog limit exceeded [ 2271.540858][ T30] audit: type=1400 audit(2000002202.354:1219918): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2271.566045][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2271.575133][ T5474] audit: audit_lost=66033 audit_rate_limit=0 audit_backlog_limit=64 [ 2271.589699][ T5474] audit: backlog limit exceeded [ 2271.603449][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2271.611276][ T30] audit: type=1400 audit(2000002202.354:1219919): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2273.580999][ T3122] netlink: 28 bytes leftover after parsing attributes in process `syz.0.8496'. [ 2274.883247][ T3131] netlink: 'syz.1.8498': attribute type 29 has an invalid length. [ 2274.920425][ T3131] netlink: 'syz.1.8498': attribute type 29 has an invalid length. [ 2276.807902][ T30] kauditd_printk_skb: 12454 callbacks suppressed [ 2276.807918][ T30] audit: type=1400 audit(2000002207.361:1229192): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2276.878702][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2276.882322][ T3155] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2276.911388][ T3155] audit: audit_lost=67095 audit_rate_limit=0 audit_backlog_limit=64 [ 2276.912261][ T5474] audit: audit_lost=67096 audit_rate_limit=0 audit_backlog_limit=64 [ 2276.935731][ T30] audit: type=1400 audit(2000002207.380:1229193): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2276.975532][ T3155] audit: backlog limit exceeded [ 2276.978107][ T5474] audit: backlog limit exceeded [ 2277.020565][ T30] audit: type=1400 audit(2000002207.380:1229194): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2277.047897][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2282.161512][ T30] kauditd_printk_skb: 8197 callbacks suppressed [ 2282.161528][ T30] audit: type=1400 audit(2000002212.368:1236697): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2282.256351][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2282.279145][ T30] audit: type=1400 audit(2000002212.368:1236698): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2282.300556][ T5474] audit: audit_lost=67329 audit_rate_limit=0 audit_backlog_limit=64 [ 2282.344515][ T5474] audit: backlog limit exceeded [ 2282.365901][ T3221] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2282.374032][ T30] audit: type=1400 audit(2000002212.368:1236699): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2282.376247][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2282.402984][ T3221] audit: audit_lost=67330 audit_rate_limit=0 audit_backlog_limit=64 [ 2282.414095][ T3221] audit: backlog limit exceeded [ 2286.999512][ T3281] 8021q: adding VLAN 0 to HW filter on device bond30 [ 2287.514640][ T30] kauditd_printk_skb: 12022 callbacks suppressed [ 2287.514657][ T30] audit: type=1400 audit(2000002217.375:1248708): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2287.561144][ T30] audit: type=1400 audit(2000002217.384:1248709): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2287.606992][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2287.621558][ T5474] audit: audit_lost=67336 audit_rate_limit=0 audit_backlog_limit=64 [ 2287.640901][ T3293] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2287.647550][ T5474] audit: backlog limit exceeded [ 2287.656170][ T30] audit: type=1400 audit(2000002217.384:1248710): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2287.656396][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2287.685241][ T3293] audit: audit_lost=67337 audit_rate_limit=0 audit_backlog_limit=64 [ 2287.701512][ T5474] audit: audit_lost=67338 audit_rate_limit=0 audit_backlog_limit=64 [ 2287.843155][ T3297] 8021q: adding VLAN 0 to HW filter on device bond31 [ 2288.324011][ T3304] netlink: 'syz.5.8548': attribute type 1 has an invalid length. [ 2288.457349][ T3304] 8021q: adding VLAN 0 to HW filter on device bond31 [ 2292.867259][ T30] kauditd_printk_skb: 11096 callbacks suppressed [ 2292.867275][ T30] audit: type=1400 audit(2000002222.391:1259805): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2292.969665][ T3348] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2292.978920][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2292.990574][ T5474] audit: audit_lost=67339 audit_rate_limit=0 audit_backlog_limit=64 [ 2292.994243][ T30] audit: type=1400 audit(2000002222.391:1259806): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2293.065475][ T3348] audit: audit_lost=67340 audit_rate_limit=0 audit_backlog_limit=64 [ 2293.073836][ T5474] audit: backlog limit exceeded [ 2293.078981][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2293.086241][ T5474] audit: audit_lost=67341 audit_rate_limit=0 audit_backlog_limit=64 [ 2293.095424][ T3348] audit: backlog limit exceeded [ 2293.775409][ T3353] netlink: 'syz.0.8562': attribute type 1 has an invalid length. [ 2293.900900][ T3353] 8021q: adding VLAN 0 to HW filter on device bond32 [ 2296.016251][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2296.023349][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2296.033224][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2298.220633][ T30] kauditd_printk_skb: 8891 callbacks suppressed [ 2298.220649][ T30] audit: type=1400 audit(2000002227.398:1268196): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2298.265472][ T30] audit: type=1400 audit(2000002227.398:1268197): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2298.274499][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2298.302352][ T30] audit: type=1400 audit(2000002227.398:1268198): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2298.318326][ T5474] audit: audit_lost=67509 audit_rate_limit=0 audit_backlog_limit=64 [ 2298.352903][ T30] audit: type=1400 audit(2000002227.398:1268199): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2298.358052][ T5474] audit: backlog limit exceeded [ 2298.401355][ T30] audit: type=1400 audit(2000002227.398:1268200): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2298.411077][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2298.446510][ T5474] audit: audit_lost=67510 audit_rate_limit=0 audit_backlog_limit=64 [ 2301.479114][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5100 ms [ 2301.487155][ C0] lec:lec_tx_timeout: lec0 [ 2302.267232][ T3465] netlink: 'syz.1.8593': attribute type 1 has an invalid length. [ 2302.393134][ T3465] 8021q: adding VLAN 0 to HW filter on device bond44 [ 2303.576485][ T30] kauditd_printk_skb: 8523 callbacks suppressed [ 2303.576497][ T30] audit: type=1400 audit(2000002232.415:1276723): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2303.630696][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2303.649276][ T5474] audit: audit_lost=67511 audit_rate_limit=0 audit_backlog_limit=64 [ 2303.683673][ T5474] audit: backlog limit exceeded [ 2303.696271][ T30] audit: type=1400 audit(2000002232.443:1276724): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2303.724469][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2303.738358][ T5474] audit: audit_lost=67512 audit_rate_limit=0 audit_backlog_limit=64 [ 2303.772071][ T5474] audit: backlog limit exceeded [ 2303.793620][ T30] audit: type=1400 audit(2000002232.443:1276725): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2303.815871][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2307.503320][ T3521] netlink: 'syz.4.8606': attribute type 29 has an invalid length. [ 2307.587711][ T3525] netlink: 'syz.4.8606': attribute type 29 has an invalid length. [ 2308.927483][ T30] kauditd_printk_skb: 9150 callbacks suppressed [ 2308.927500][ T30] audit: type=1400 audit(2000002237.413:1285064): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.001999][ T30] audit: type=1400 audit(2000002237.422:1285065): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.058363][ T30] audit: type=1400 audit(2000002237.422:1285066): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.095377][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2309.120133][ T30] audit: type=1400 audit(2000002237.422:1285067): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.144062][ T5474] audit: audit_lost=67784 audit_rate_limit=0 audit_backlog_limit=64 [ 2309.167952][ T30] audit: type=1400 audit(2000002237.422:1285068): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.189627][ T5474] audit: backlog limit exceeded [ 2309.199908][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2309.206885][ T30] audit: type=1400 audit(2000002237.422:1285069): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2309.688772][ T3548] 8021q: adding VLAN 0 to HW filter on device bond32 [ 2311.966811][ T3576] netlink: 'syz.0.8624': attribute type 29 has an invalid length. [ 2311.985549][ T3575] netlink: 'syz.5.8622': attribute type 1 has an invalid length. [ 2312.104056][ T3575] 8021q: adding VLAN 0 to HW filter on device bond33 [ 2312.156944][ T3576] netlink: 'syz.0.8624': attribute type 29 has an invalid length. [ 2313.585290][ T3608] netlink: 'syz.5.8629': attribute type 1 has an invalid length. [ 2313.810697][ T3608] 8021q: adding VLAN 0 to HW filter on device bond34 [ 2314.285791][ T30] kauditd_printk_skb: 10277 callbacks suppressed [ 2314.285806][ T30] audit: type=1400 audit(2000002242.420:1295330): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2314.397052][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2314.439453][ T30] audit: type=1400 audit(2000002242.457:1295331): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2314.439498][ T5474] audit: audit_lost=67791 audit_rate_limit=0 audit_backlog_limit=64 [ 2314.530533][ T5474] audit: backlog limit exceeded [ 2314.543446][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2314.560851][ T30] audit: type=1400 audit(2000002242.457:1295332): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2314.560872][ T5474] audit: audit_lost=67792 audit_rate_limit=0 audit_backlog_limit=64 [ 2314.560887][ T5474] audit: backlog limit exceeded [ 2314.690138][ T30] audit: type=1400 audit(2000002242.457:1295333): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2314.723833][ T3616] netlink: 'syz.3.8632': attribute type 1 has an invalid length. [ 2314.894302][ T3616] 8021q: adding VLAN 0 to HW filter on device bond38 [ 2319.632591][ T30] kauditd_printk_skb: 9626 callbacks suppressed [ 2319.632607][ T30] audit: type=1400 audit(2000002247.445:1304444): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2319.671242][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2319.678011][ T5474] audit: audit_lost=67965 audit_rate_limit=0 audit_backlog_limit=64 [ 2319.686732][ T5474] audit: backlog limit exceeded [ 2319.691740][ T30] audit: type=1400 audit(2000002247.464:1304445): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2319.713577][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2319.720255][ T5474] audit: audit_lost=67966 audit_rate_limit=0 audit_backlog_limit=64 [ 2319.728297][ T5474] audit: backlog limit exceeded [ 2319.733389][ T30] audit: type=1400 audit(2000002247.464:1304446): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2319.755206][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2320.163197][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2324.989020][ T30] kauditd_printk_skb: 9233 callbacks suppressed [ 2324.989036][ T30] audit: type=1400 audit(2000002252.443:1312664): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2325.062266][ T30] audit: type=1400 audit(2000002252.443:1312665): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2325.122409][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2325.124664][ T3722] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2325.148357][ T30] audit: type=1400 audit(2000002252.453:1312666): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2325.177943][ T3722] audit: audit_lost=68306 audit_rate_limit=0 audit_backlog_limit=64 [ 2325.188533][ T3722] audit: backlog limit exceeded [ 2325.214719][ T30] audit: type=1400 audit(2000002252.453:1312667): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2325.216395][ T5474] audit: audit_lost=68307 audit_rate_limit=0 audit_backlog_limit=64 [ 2325.327048][ T5474] audit: backlog limit exceeded [ 2325.475904][ T3730] netlink: 'syz.1.8669': attribute type 1 has an invalid length. [ 2325.579020][ T3730] 8021q: adding VLAN 0 to HW filter on device bond45 [ 2326.011126][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5470 ms [ 2326.019185][ C0] lec:lec_tx_timeout: lec0 [ 2330.340724][ T30] kauditd_printk_skb: 8115 callbacks suppressed [ 2330.340737][ T30] audit: type=1400 audit(2000002257.450:1320783): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2330.400605][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2330.412813][ T5474] audit: audit_lost=68308 audit_rate_limit=0 audit_backlog_limit=64 [ 2330.421274][ T30] audit: type=1400 audit(2000002257.488:1320784): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2330.445511][ T5474] audit: backlog limit exceeded [ 2330.453638][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2330.466752][ T5474] audit: audit_lost=68309 audit_rate_limit=0 audit_backlog_limit=64 [ 2330.477323][ T30] audit: type=1400 audit(2000002257.488:1320785): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2330.503191][ T5474] audit: backlog limit exceeded [ 2330.510578][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2332.218738][ T3800] netlink: 'syz.1.8685': attribute type 1 has an invalid length. [ 2332.386711][ T3800] 8021q: adding VLAN 0 to HW filter on device bond46 [ 2335.703970][ T30] kauditd_printk_skb: 11791 callbacks suppressed [ 2335.704012][ T30] audit: type=1400 audit(2000002262.448:1327919): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2335.766654][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2335.815412][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2335.827099][ T5474] audit: audit_lost=69863 audit_rate_limit=0 audit_backlog_limit=64 [ 2335.848615][ T30] audit: type=1400 audit(2000002262.457:1327920): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2335.849744][T12978] audit: audit_lost=69864 audit_rate_limit=0 audit_backlog_limit=64 [ 2335.880923][ T5474] audit: backlog limit exceeded [ 2335.911773][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2335.951774][ T5474] audit: audit_lost=69865 audit_rate_limit=0 audit_backlog_limit=64 [ 2335.979946][T12978] audit: backlog limit exceeded [ 2338.147558][ T3863] netlink: 'syz.0.8704': attribute type 1 has an invalid length. [ 2338.262890][ T3863] 8021q: adding VLAN 0 to HW filter on device bond33 [ 2341.060241][ T30] kauditd_printk_skb: 8881 callbacks suppressed [ 2341.060257][ T30] audit: type=1400 audit(2000002267.492:1336801): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2341.151723][ T30] audit: type=1400 audit(2000002267.492:1336802): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2341.223706][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2341.233111][ T5474] audit: audit_lost=69866 audit_rate_limit=0 audit_backlog_limit=64 [ 2341.243916][ T30] audit: type=1400 audit(2000002267.521:1336803): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2341.288377][ T5474] audit: backlog limit exceeded [ 2341.299323][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2341.342447][ T5474] audit: audit_lost=69867 audit_rate_limit=0 audit_backlog_limit=64 [ 2341.365380][ T30] audit: type=1400 audit(2000002267.521:1336804): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2341.395252][ T5474] audit: backlog limit exceeded [ 2341.722521][ T3919] netlink: 'syz.4.8720': attribute type 1 has an invalid length. [ 2341.869522][ T3919] 8021q: adding VLAN 0 to HW filter on device bond33 [ 2346.409197][ T30] kauditd_printk_skb: 7902 callbacks suppressed [ 2346.409212][ T30] audit: type=1400 audit(2000002272.499:1343744): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2346.474970][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2346.492445][ T5474] audit: audit_lost=70189 audit_rate_limit=0 audit_backlog_limit=64 [ 2346.500615][ T30] audit: type=1400 audit(2000002272.528:1343745): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2346.525133][ T5474] audit: backlog limit exceeded [ 2346.531917][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2346.538692][ T5474] audit: audit_lost=70190 audit_rate_limit=0 audit_backlog_limit=64 [ 2346.546721][ T30] audit: type=1400 audit(2000002272.528:1343746): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2346.568374][ T5474] audit: backlog limit exceeded [ 2346.578586][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2351.761795][ T30] kauditd_printk_skb: 10360 callbacks suppressed [ 2351.761812][ T30] audit: type=1400 audit(2000002277.497:1352281): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2351.838899][ T30] audit: type=1400 audit(2000002277.497:1352282): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2351.910281][ T30] audit: type=1400 audit(2000002277.535:1352283): avc: denied { create } for pid=4039 comm="syz.1.8754" name="file7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 2351.911836][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2351.976640][ T5474] audit: audit_lost=70800 audit_rate_limit=0 audit_backlog_limit=64 [ 2351.989955][ T4051] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2351.996589][ T5474] audit: backlog limit exceeded [ 2352.001838][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2352.010098][ T4052] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2352.016686][ T5474] audit: audit_lost=70801 audit_rate_limit=0 audit_backlog_limit=64 [ 2357.119361][ T30] kauditd_printk_skb: 7483 callbacks suppressed [ 2357.120932][ T30] audit: type=1400 audit(2000002282.514:1359642): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2357.168311][ T30] audit: type=1400 audit(2000002282.523:1359643): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2357.200154][ T30] audit: type=1400 audit(2000002282.523:1359644): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2357.229948][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2357.239209][ T4104] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2357.245821][ T5474] audit: audit_lost=70844 audit_rate_limit=0 audit_backlog_limit=64 [ 2357.254784][ T4104] audit: audit_lost=70845 audit_rate_limit=0 audit_backlog_limit=64 [ 2357.262842][ T5474] audit: backlog limit exceeded [ 2357.268341][ T4104] audit: backlog limit exceeded [ 2357.273511][ T30] audit: type=1400 audit(2000002282.523:1359645): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2361.659470][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2361.665960][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2361.679802][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2361.920437][ T4163] netlink: 'syz.4.8790': attribute type 1 has an invalid length. [ 2362.173244][ T4163] 8021q: adding VLAN 0 to HW filter on device bond34 [ 2362.469507][ T30] kauditd_printk_skb: 8922 callbacks suppressed [ 2362.469525][ T30] audit: type=1400 audit(2000002287.530:1367041): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2362.526302][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2362.553816][ T5474] audit: audit_lost=71355 audit_rate_limit=0 audit_backlog_limit=64 [ 2362.581041][ T30] audit: type=1400 audit(2000002287.549:1367042): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2362.611634][ T5474] audit: backlog limit exceeded [ 2362.630772][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2362.650094][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2362.656695][ T5474] audit: audit_lost=71356 audit_rate_limit=0 audit_backlog_limit=64 [ 2362.671140][T12978] audit: audit_lost=71357 audit_rate_limit=0 audit_backlog_limit=64 [ 2362.691405][T12978] audit: backlog limit exceeded [ 2367.330775][ T4226] netlink: 'syz.1.8809': attribute type 29 has an invalid length. [ 2367.365206][ T4226] netlink: 'syz.1.8809': attribute type 29 has an invalid length. [ 2367.724997][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5660 ms [ 2367.733033][ C0] lec:lec_tx_timeout: lec0 [ 2367.827631][ T30] kauditd_printk_skb: 8254 callbacks suppressed [ 2367.827650][ T30] audit: type=1400 audit(2000002292.528:1375296): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2367.934900][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2367.943287][ T30] audit: type=1400 audit(2000002292.537:1375297): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2368.018343][ T5474] audit: audit_lost=71358 audit_rate_limit=0 audit_backlog_limit=64 [ 2368.037582][ T5474] audit: backlog limit exceeded [ 2368.037923][ T30] audit: type=1400 audit(2000002292.537:1375298): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2368.114750][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2368.124832][ T30] audit: type=1400 audit(2000002292.537:1375299): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2368.185549][ T5474] audit: audit_lost=71359 audit_rate_limit=0 audit_backlog_limit=64 [ 2368.210931][ T5474] audit: backlog limit exceeded [ 2371.241169][ T4272] netlink: 'syz.0.8824': attribute type 39 has an invalid length. [ 2373.176807][ T30] kauditd_printk_skb: 7200 callbacks suppressed [ 2373.176821][ T30] audit: type=1400 audit(2000002297.544:1382500): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.263088][ T30] audit: type=1400 audit(2000002297.544:1382501): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.339823][ T30] audit: type=1400 audit(2000002297.544:1382502): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.393285][ T30] audit: type=1400 audit(2000002297.544:1382503): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.437380][ T30] audit: type=1400 audit(2000002297.544:1382504): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.461418][ T30] audit: type=1400 audit(2000002297.544:1382505): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.487547][ T30] audit: type=1400 audit(2000002297.554:1382506): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.495891][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2373.512150][ T30] audit: type=1400 audit(2000002297.554:1382507): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2373.571772][ T4301] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2378.188955][ T4367] netlink: 'syz.1.8853': attribute type 1 has an invalid length. [ 2378.400661][ T4367] 8021q: adding VLAN 0 to HW filter on device bond47 [ 2378.571613][ T30] kauditd_printk_skb: 12025 callbacks suppressed [ 2378.571624][ T30] audit: type=1400 audit(2000002302.598:1390431): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2378.635490][ T30] audit: type=1400 audit(2000002302.626:1390432): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2378.689132][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2378.703186][ T5474] audit: audit_lost=72728 audit_rate_limit=0 audit_backlog_limit=64 [ 2378.720229][ T5474] audit: backlog limit exceeded [ 2378.752232][ T4373] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2378.769607][ T4373] audit: audit_lost=72729 audit_rate_limit=0 audit_backlog_limit=64 [ 2378.791954][ T30] audit: type=1400 audit(2000002302.626:1390433): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2378.823547][ T4373] audit: backlog limit exceeded [ 2378.860249][ T4373] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2383.923508][ T30] kauditd_printk_skb: 10249 callbacks suppressed [ 2383.923524][ T30] audit: type=1400 audit(2000002307.605:1399370): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2383.964111][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2383.974836][ T5474] audit: audit_lost=73168 audit_rate_limit=0 audit_backlog_limit=64 [ 2383.987504][ T5474] audit: backlog limit exceeded [ 2383.992497][ T30] audit: type=1400 audit(2000002307.605:1399371): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2384.020851][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2384.031459][ T5474] audit: audit_lost=73169 audit_rate_limit=0 audit_backlog_limit=64 [ 2384.044538][ T5474] audit: backlog limit exceeded [ 2384.053381][ T30] audit: type=1400 audit(2000002307.605:1399372): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2384.075384][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2387.648773][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2389.281758][ T30] kauditd_printk_skb: 9382 callbacks suppressed [ 2389.281775][ T30] audit: type=1400 audit(2000002312.622:1407718): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2389.341425][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2389.354449][ T30] audit: type=1400 audit(2000002312.622:1407719): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2389.379344][ T5474] audit: audit_lost=73516 audit_rate_limit=0 audit_backlog_limit=64 [ 2389.411609][ T30] audit: type=1400 audit(2000002312.622:1407720): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2389.466054][ T5474] audit: backlog limit exceeded [ 2389.485831][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2389.492799][ T5474] audit: audit_lost=73517 audit_rate_limit=0 audit_backlog_limit=64 [ 2389.494661][ T30] audit: type=1400 audit(2000002312.622:1407721): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2389.580164][ T5474] audit: backlog limit exceeded [ 2391.839251][ T4482] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8884'. [ 2393.368878][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5350 ms [ 2393.376897][ C0] lec:lec_tx_timeout: lec0 [ 2394.638270][ T30] kauditd_printk_skb: 9352 callbacks suppressed [ 2394.638285][ T30] audit: type=1400 audit(2000002317.629:1417074): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.681207][ T30] audit: type=1400 audit(2000002317.629:1417075): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.725883][ T30] audit: type=1400 audit(2000002317.629:1417076): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.757839][ T30] audit: type=1400 audit(2000002317.629:1417077): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.782999][ T4515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2394.789568][ T4515] audit: audit_lost=73518 audit_rate_limit=0 audit_backlog_limit=64 [ 2394.798938][ T4515] audit: backlog limit exceeded [ 2394.809564][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2394.814668][ T30] audit: type=1400 audit(2000002317.629:1417078): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.854027][ T30] audit: type=1400 audit(2000002317.629:1417079): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2394.971614][ T4520] netlink: 'syz.1.8895': attribute type 1 has an invalid length. [ 2395.051701][ T4520] 8021q: adding VLAN 0 to HW filter on device bond48 [ 2397.499185][ T4558] netlink: 'syz.0.8904': attribute type 1 has an invalid length. [ 2397.661099][ T4558] 8021q: adding VLAN 0 to HW filter on device bond34 [ 2399.983709][ T30] kauditd_printk_skb: 8138 callbacks suppressed [ 2399.983725][ T30] audit: type=1400 audit(2000002322.645:1425102): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2400.050665][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2400.073470][ T30] audit: type=1400 audit(2000002322.645:1425103): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2400.095797][ T5474] audit: audit_lost=73558 audit_rate_limit=0 audit_backlog_limit=64 [ 2400.113801][ T5474] audit: backlog limit exceeded [ 2400.133865][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2400.155212][ T5474] audit: audit_lost=73559 audit_rate_limit=0 audit_backlog_limit=64 [ 2400.166466][ T30] audit: type=1400 audit(2000002322.645:1425104): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2400.214555][ T5474] audit: backlog limit exceeded [ 2400.230551][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2401.501521][ T4590] netlink: 'syz.1.8912': attribute type 1 has an invalid length. [ 2401.638220][ T4590] 8021q: adding VLAN 0 to HW filter on device bond49 [ 2405.336209][ T30] kauditd_printk_skb: 8381 callbacks suppressed [ 2405.336226][ T30] audit: type=1400 audit(2000002327.652:1432353): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2405.367946][ T30] audit: type=1400 audit(2000002327.652:1432354): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2405.391063][ T30] audit: type=1400 audit(2000002327.652:1432355): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2405.415218][ T30] audit: type=1400 audit(2000002327.652:1432356): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2405.475498][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2405.490854][ T30] audit: type=1400 audit(2000002327.652:1432357): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2405.517533][ T5474] audit: audit_lost=73938 audit_rate_limit=0 audit_backlog_limit=64 [ 2405.572188][ T5474] audit: backlog limit exceeded [ 2405.606403][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2405.621245][ T30] audit: type=1400 audit(2000002327.652:1432358): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2408.622411][ T4679] netlink: 'syz.1.8939': attribute type 29 has an invalid length. [ 2408.659846][ T4679] netlink: 'syz.1.8939': attribute type 29 has an invalid length. [ 2410.689478][ T30] kauditd_printk_skb: 7971 callbacks suppressed [ 2410.689493][ T30] audit: type=1400 audit(2000002332.659:1439293): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2410.735879][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2410.763312][ T5474] audit: audit_lost=74285 audit_rate_limit=0 audit_backlog_limit=64 [ 2410.808405][ T5474] audit: backlog limit exceeded [ 2410.829320][ T30] audit: type=1400 audit(2000002332.678:1439294): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2410.878274][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2410.907589][ T5474] audit: audit_lost=74286 audit_rate_limit=0 audit_backlog_limit=64 [ 2410.927315][ T5474] audit: backlog limit exceeded [ 2410.950005][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2410.957122][ T30] audit: type=1400 audit(2000002332.678:1439295): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2416.042269][ T30] kauditd_printk_skb: 11138 callbacks suppressed [ 2416.042280][ T30] audit: type=1400 audit(2000002337.666:1449274): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2416.107812][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2416.116882][ T5474] audit: audit_lost=74674 audit_rate_limit=0 audit_backlog_limit=64 [ 2416.131030][ T5474] audit: backlog limit exceeded [ 2416.139292][ T30] audit: type=1400 audit(2000002337.666:1449275): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2416.167896][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2416.181115][ T5474] audit: audit_lost=74675 audit_rate_limit=0 audit_backlog_limit=64 [ 2416.200197][ T5474] audit: backlog limit exceeded [ 2416.263499][ T30] audit: type=1400 audit(2000002337.666:1449276): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2416.288141][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2421.399033][ T30] kauditd_printk_skb: 7837 callbacks suppressed [ 2421.399049][ T30] audit: type=1400 audit(2000002342.673:1456950): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2421.502211][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2421.519893][ T5474] audit: audit_lost=74731 audit_rate_limit=0 audit_backlog_limit=64 [ 2421.528144][ T5474] audit: backlog limit exceeded [ 2421.544326][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2421.548253][ T30] audit: type=1400 audit(2000002342.683:1456951): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2421.572120][ T5474] audit: audit_lost=74732 audit_rate_limit=0 audit_backlog_limit=64 [ 2421.572139][ T5474] audit: backlog limit exceeded [ 2421.572394][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2421.610345][ T4811] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2421.788011][ T4820] netlink: 'syz.5.8983': attribute type 1 has an invalid length. [ 2421.899030][ T4820] 8021q: adding VLAN 0 to HW filter on device bond35 [ 2422.945171][ T4832] netlink: 'syz.4.8986': attribute type 1 has an invalid length. [ 2423.255968][ T4832] 8021q: adding VLAN 0 to HW filter on device bond35 [ 2424.134043][ T4861] netlink: 'syz.0.8995': attribute type 1 has an invalid length. [ 2424.358421][ T4861] 8021q: adding VLAN 0 to HW filter on device bond35 [ 2426.758463][ T30] kauditd_printk_skb: 6584 callbacks suppressed [ 2426.758478][ T30] audit: type=1400 audit(2000002347.680:1463478): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2426.852186][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2426.884874][ T30] audit: type=1400 audit(2000002347.690:1463479): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2426.884889][ T5474] audit: audit_lost=74753 audit_rate_limit=0 audit_backlog_limit=64 [ 2426.958043][ T30] audit: type=1400 audit(2000002347.690:1463480): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2426.980687][ T30] audit: type=1400 audit(2000002347.690:1463481): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2427.056258][ T30] audit: type=1400 audit(2000002347.690:1463482): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2427.117311][ T5474] audit: backlog limit exceeded [ 2427.119598][ T30] audit: type=1400 audit(2000002347.690:1463483): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2427.167797][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2427.309425][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2427.317442][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2427.324720][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2429.795281][ T4948] netlink: 'syz.5.9021': attribute type 1 has an invalid length. [ 2429.947813][ T4948] 8021q: adding VLAN 0 to HW filter on device bond36 [ 2432.103252][ T30] kauditd_printk_skb: 8829 callbacks suppressed [ 2432.103268][ T30] audit: type=1400 audit(2000002352.706:1470367): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2432.147995][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2432.154821][ T5474] audit: audit_lost=75403 audit_rate_limit=0 audit_backlog_limit=64 [ 2432.165061][ T5474] audit: backlog limit exceeded [ 2432.171974][ T30] audit: type=1400 audit(2000002352.706:1470368): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2432.200100][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2432.207077][ T5474] audit: audit_lost=75404 audit_rate_limit=0 audit_backlog_limit=64 [ 2432.215575][ T5474] audit: backlog limit exceeded [ 2432.220822][ T30] audit: type=1400 audit(2000002352.706:1470369): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2432.243255][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2432.860155][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5180 ms [ 2432.868176][ C0] lec:lec_tx_timeout: lec0 [ 2437.456541][ T30] kauditd_printk_skb: 10665 callbacks suppressed [ 2437.456558][ T30] audit: type=1400 audit(2000002357.713:1480041): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2437.494429][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2437.511788][ T5474] audit: audit_lost=75737 audit_rate_limit=0 audit_backlog_limit=64 [ 2437.540273][ T5474] audit: backlog limit exceeded [ 2437.557622][ T5474] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2437.574859][ T30] audit: type=1400 audit(2000002357.732:1480042): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2437.604257][ T5474] audit: audit_lost=75738 audit_rate_limit=0 audit_backlog_limit=64 [ 2437.612256][ T5474] audit: backlog limit exceeded [ 2437.655442][ T5022] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2437.664381][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2442.576730][ T5059] netlink: 'syz.3.9054': attribute type 1 has an invalid length. [ 2442.695818][ T5059] 8021q: adding VLAN 0 to HW filter on device bond39 [ 2442.808105][ T30] kauditd_printk_skb: 10282 callbacks suppressed [ 2442.808116][ T30] audit: type=1400 audit(2000002362.711:1489309): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2442.934438][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2442.945562][ T30] audit: type=1400 audit(2000002362.720:1489310): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2442.980189][ T5474] audit: audit_lost=76078 audit_rate_limit=0 audit_backlog_limit=64 [ 2443.021516][ T5474] audit: backlog limit exceeded [ 2443.033414][ T5065] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2443.062820][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2443.072370][ T5065] audit: audit_lost=76079 audit_rate_limit=0 audit_backlog_limit=64 [ 2443.082963][ T30] audit: type=1400 audit(2000002362.720:1489311): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2443.113258][ T5474] audit: audit_lost=76080 audit_rate_limit=0 audit_backlog_limit=64 [ 2443.923944][ T5075] netlink: 'syz.5.9058': attribute type 1 has an invalid length. [ 2444.052350][ T5075] 8021q: adding VLAN 0 to HW filter on device bond37 [ 2448.164578][ T30] kauditd_printk_skb: 8012 callbacks suppressed [ 2448.164589][ T30] audit: type=1400 audit(2000002367.718:1496617): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2448.247645][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2448.251295][ T5111] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2448.262704][ T5112] netlink: 'syz.0.9066': attribute type 29 has an invalid length. [ 2448.267858][ T30] audit: type=1400 audit(2000002367.727:1496618): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2448.293408][ T5474] audit: audit_lost=76316 audit_rate_limit=0 audit_backlog_limit=64 [ 2448.302362][ T5112] netlink: 'syz.0.9066': attribute type 29 has an invalid length. [ 2448.310304][ T5474] audit: backlog limit exceeded [ 2448.316545][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2448.325645][ T5112] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2448.332904][ T5474] audit: audit_lost=76317 audit_rate_limit=0 audit_backlog_limit=64 [ 2448.333034][ T5111] audit: audit_lost=76318 audit_rate_limit=0 audit_backlog_limit=64 [ 2449.122850][ T5120] netlink: 'syz.5.9069': attribute type 1 has an invalid length. [ 2449.245187][ T5120] 8021q: adding VLAN 0 to HW filter on device bond38 [ 2449.755645][ T5134] netlink: 'syz.4.9071': attribute type 39 has an invalid length. [ 2453.514093][ T30] kauditd_printk_skb: 9827 callbacks suppressed [ 2453.514110][ T30] audit: type=1400 audit(2000002372.744:1506040): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2453.584469][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2453.592971][ T30] audit: type=1400 audit(2000002372.744:1506041): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2453.600645][ T5474] audit: audit_lost=76454 audit_rate_limit=0 audit_backlog_limit=64 [ 2453.624047][ T5178] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2453.630644][ T5178] audit: audit_lost=76455 audit_rate_limit=0 audit_backlog_limit=64 [ 2453.641173][ T5178] audit: backlog limit exceeded [ 2453.663103][ T5174] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2453.673737][ T5174] audit: audit_lost=76456 audit_rate_limit=0 audit_backlog_limit=64 [ 2453.693360][ T5474] audit: backlog limit exceeded [ 2454.303912][ T5183] netlink: 'syz.5.9082': attribute type 29 has an invalid length. [ 2454.327862][ T5183] netlink: 'syz.5.9082': attribute type 29 has an invalid length. [ 2457.060118][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2458.868269][ T30] kauditd_printk_skb: 10528 callbacks suppressed [ 2458.868284][ T30] audit: type=1400 audit(2000002377.751:1516524): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2458.962352][ T30] audit: type=1400 audit(2000002377.779:1516525): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2459.001283][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2459.022046][ T5474] audit: audit_lost=76472 audit_rate_limit=0 audit_backlog_limit=64 [ 2459.052290][ T5474] audit: backlog limit exceeded [ 2459.071616][ T30] audit: type=1400 audit(2000002377.779:1516526): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2459.096804][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2459.113445][ T5474] audit: audit_lost=76473 audit_rate_limit=0 audit_backlog_limit=64 [ 2459.121456][ T5474] audit: backlog limit exceeded [ 2459.124409][ T5223] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2462.777907][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5350 ms [ 2462.785931][ C0] lec:lec_tx_timeout: lec0 [ 2463.881195][ T5285] netlink: 'syz.3.9111': attribute type 1 has an invalid length. [ 2463.963690][ T5289] netlink: 36 bytes leftover after parsing attributes in process `syz.3.9111'. [ 2464.028078][ T5285] 8021q: adding VLAN 0 to HW filter on device bond40 [ 2464.225521][ T30] kauditd_printk_skb: 14367 callbacks suppressed [ 2464.225551][ T30] audit: type=1400 audit(2000002382.758:1526062): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2464.318190][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2464.324772][ T30] audit: type=1400 audit(2000002382.758:1526063): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2464.346957][ T5474] audit: audit_lost=78085 audit_rate_limit=0 audit_backlog_limit=64 [ 2464.355087][ T5474] audit: backlog limit exceeded [ 2464.360153][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2464.371674][ T5474] audit: audit_lost=78086 audit_rate_limit=0 audit_backlog_limit=64 [ 2464.379740][ T30] audit: type=1400 audit(2000002382.758:1526064): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2464.405541][ T5474] audit: backlog limit exceeded [ 2464.414615][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2465.450417][ T5305] netlink: 'syz.0.9115': attribute type 1 has an invalid length. [ 2465.530827][ T5308] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9115'. [ 2465.541685][ T5305] 8021q: adding VLAN 0 to HW filter on device bond36 [ 2468.201627][ T5334] netlink: 'syz.4.9123': attribute type 1 has an invalid length. [ 2468.306726][ T5336] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9123'. [ 2468.503302][ T5334] 8021q: adding VLAN 0 to HW filter on device bond36 [ 2468.798771][ T5348] netlink: 'syz.5.9125': attribute type 1 has an invalid length. [ 2468.959655][ T5348] 8021q: adding VLAN 0 to HW filter on device bond39 [ 2469.573931][ T30] kauditd_printk_skb: 7562 callbacks suppressed [ 2469.573946][ T30] audit: type=1400 audit(2000002387.774:1533505): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2469.695960][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2469.723066][ T5474] audit: audit_lost=78128 audit_rate_limit=0 audit_backlog_limit=64 [ 2469.747161][ T30] audit: type=1400 audit(2000002387.774:1533506): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2469.823755][ T5474] audit: backlog limit exceeded [ 2469.840142][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2469.868496][ T5474] audit: audit_lost=78129 audit_rate_limit=0 audit_backlog_limit=64 [ 2469.890092][ T30] audit: type=1400 audit(2000002387.774:1533507): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2469.979472][ T5474] audit: backlog limit exceeded [ 2469.995573][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2474.926797][ T30] kauditd_printk_skb: 7898 callbacks suppressed [ 2474.926813][ T30] audit: type=1400 audit(2000002392.781:1541404): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2474.992664][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2475.014288][ T5474] audit: audit_lost=78131 audit_rate_limit=0 audit_backlog_limit=64 [ 2475.056712][ T5474] audit: backlog limit exceeded [ 2475.061717][ T30] audit: type=1400 audit(2000002392.809:1541405): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2475.091506][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2475.113113][ T5474] audit: audit_lost=78132 audit_rate_limit=0 audit_backlog_limit=64 [ 2475.133519][ T5474] audit: backlog limit exceeded [ 2475.145151][ T30] audit: type=1400 audit(2000002392.809:1541406): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2475.172803][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2475.601877][ T5417] netlink: 'syz.0.9143': attribute type 1 has an invalid length. [ 2475.661413][ T5417] 8021q: adding VLAN 0 to HW filter on device bond37 [ 2477.019533][ T5437] netlink: 'syz.3.9149': attribute type 1 has an invalid length. [ 2477.164308][ T5437] 8021q: adding VLAN 0 to HW filter on device bond41 [ 2477.267605][ T5446] netlink: 'syz.5.9152': attribute type 1 has an invalid length. [ 2477.403502][ T5446] 8021q: adding VLAN 0 to HW filter on device bond40 [ 2479.932864][ T5482] netlink: 'syz.1.9160': attribute type 29 has an invalid length. [ 2479.978131][ T5482] netlink: 'syz.1.9160': attribute type 29 has an invalid length. [ 2480.280882][ T30] kauditd_printk_skb: 9794 callbacks suppressed [ 2480.280899][ T30] audit: type=1400 audit(2000002397.779:1550224): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2480.360962][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2480.367701][ T5474] audit: audit_lost=78459 audit_rate_limit=0 audit_backlog_limit=64 [ 2480.376005][ T5474] audit: backlog limit exceeded [ 2480.381052][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2480.391960][ T5474] audit: audit_lost=78460 audit_rate_limit=0 audit_backlog_limit=64 [ 2480.413948][ T5474] audit: backlog limit exceeded [ 2480.413977][ T30] audit: type=1400 audit(2000002397.779:1550225): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2480.479834][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2480.501786][ T5474] audit: audit_lost=78461 audit_rate_limit=0 audit_backlog_limit=64 [ 2485.632832][ T30] kauditd_printk_skb: 9331 callbacks suppressed [ 2485.632848][ T30] audit: type=1400 audit(2000002402.795:1559415): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2485.709244][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2485.726189][ T5474] audit: audit_lost=78509 audit_rate_limit=0 audit_backlog_limit=64 [ 2485.747310][ T30] audit: type=1400 audit(2000002402.824:1559416): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2485.771874][ T5474] audit: backlog limit exceeded [ 2485.781444][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2485.798984][ T5474] audit: audit_lost=78510 audit_rate_limit=0 audit_backlog_limit=64 [ 2485.824605][ T30] audit: type=1400 audit(2000002402.824:1559417): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2485.847566][ T5474] audit: backlog limit exceeded [ 2485.856906][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2488.640893][ T5559] netlink: 'syz.4.9183': attribute type 29 has an invalid length. [ 2488.840935][ T5560] netlink: 'syz.4.9183': attribute type 29 has an invalid length. [ 2489.151284][ T5562] netlink: 'syz.1.9184': attribute type 39 has an invalid length. [ 2489.639421][ T5570] netlink: 'syz.5.9186': attribute type 1 has an invalid length. [ 2489.766806][ T5570] 8021q: adding VLAN 0 to HW filter on device bond41 [ 2490.497350][ T5586] netlink: 'syz.1.9189': attribute type 1 has an invalid length. [ 2490.661478][ T5586] 8021q: adding VLAN 0 to HW filter on device bond50 [ 2490.987373][ T30] kauditd_printk_skb: 12820 callbacks suppressed [ 2490.987385][ T30] audit: type=1400 audit(2000002407.803:1571096): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2491.073623][ T30] audit: type=1400 audit(2000002407.849:1571097): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2491.160075][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2491.182127][ T5474] audit: audit_lost=78892 audit_rate_limit=0 audit_backlog_limit=64 [ 2491.192741][ T30] audit: type=1400 audit(2000002407.849:1571098): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2491.295869][ T5474] audit: backlog limit exceeded [ 2491.301160][ T5591] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2491.311092][ T30] audit: type=1400 audit(2000002407.849:1571099): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2491.311427][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2491.376341][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2492.954121][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2492.960414][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2492.967745][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2495.191097][ T5640] netlink: 'syz.4.9201': attribute type 1 has an invalid length. [ 2495.390664][ T5640] 8021q: adding VLAN 0 to HW filter on device bond37 [ 2496.339555][ T30] kauditd_printk_skb: 6978 callbacks suppressed [ 2496.339572][ T30] audit: type=1400 audit(2000002412.810:1578072): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2496.377185][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2496.385188][ T5474] audit: audit_lost=78896 audit_rate_limit=0 audit_backlog_limit=64 [ 2496.385190][ T30] audit: type=1400 audit(2000002412.810:1578073): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2496.385226][ T30] audit: type=1400 audit(2000002412.810:1578074): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2496.504893][ T5474] audit: backlog limit exceeded [ 2496.510318][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2496.538025][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2496.545532][ T5474] audit: audit_lost=78897 audit_rate_limit=0 audit_backlog_limit=64 [ 2496.554713][T12978] audit: audit_lost=78898 audit_rate_limit=0 audit_backlog_limit=64 [ 2499.106477][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5740 ms [ 2499.114515][ C0] lec:lec_tx_timeout: lec0 [ 2501.694472][ T30] kauditd_printk_skb: 9042 callbacks suppressed [ 2501.694488][ T30] audit: type=1400 audit(2000002417.835:1587115): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2501.771078][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2501.787569][ T5474] audit: audit_lost=78899 audit_rate_limit=0 audit_backlog_limit=64 [ 2501.801747][ T5474] audit: backlog limit exceeded [ 2501.809484][ T30] audit: type=1400 audit(2000002417.863:1587116): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2501.869468][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2501.886528][ T5474] audit: audit_lost=78900 audit_rate_limit=0 audit_backlog_limit=64 [ 2501.898527][ T30] audit: type=1400 audit(2000002417.873:1587117): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2501.942506][ T5474] audit: backlog limit exceeded [ 2501.967227][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.045677][ T30] kauditd_printk_skb: 9993 callbacks suppressed [ 2507.045692][ T30] audit: type=1400 audit(2000002422.842:1597109): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2507.097729][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.105517][ T5474] audit: audit_lost=78902 audit_rate_limit=0 audit_backlog_limit=64 [ 2507.113820][ T5474] audit: backlog limit exceeded [ 2507.119109][ T30] audit: type=1400 audit(2000002422.861:1597110): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2507.136666][ T5740] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.147444][ T5740] audit: audit_lost=78903 audit_rate_limit=0 audit_backlog_limit=64 [ 2507.147555][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2507.162963][ T5474] audit: audit_lost=78904 audit_rate_limit=0 audit_backlog_limit=64 [ 2507.170956][ T30] audit: type=1400 audit(2000002422.861:1597111): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2510.494389][ T5785] netlink: 'syz.5.9246': attribute type 1 has an invalid length. [ 2510.597355][ T5785] 8021q: adding VLAN 0 to HW filter on device bond42 [ 2512.402918][ T30] kauditd_printk_skb: 9400 callbacks suppressed [ 2512.402933][ T30] audit: type=1400 audit(2000002427.850:1605160): avc: denied { prog_load } for pid=5813 comm="syz.0.9250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2512.463108][ T30] audit: type=1400 audit(2000002427.896:1605161): avc: denied { bpf } for pid=5815 comm="syz.1.9251" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 2512.510595][ T30] audit: type=1400 audit(2000002427.906:1605162): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2512.547275][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.556880][ T5818] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.570203][ T5816] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2512.583743][ T5818] audit: audit_lost=79355 audit_rate_limit=0 audit_backlog_limit=64 [ 2512.604508][ T5818] audit: backlog limit exceeded [ 2512.609553][ T5816] audit: audit_lost=79356 audit_rate_limit=0 audit_backlog_limit=64 [ 2512.620041][ T5474] audit: audit_lost=79357 audit_rate_limit=0 audit_backlog_limit=64 [ 2517.755582][ T30] kauditd_printk_skb: 7372 callbacks suppressed [ 2517.755600][ T30] audit: type=1400 audit(2000002432.866:1612530): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2517.813565][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2517.830358][ T5474] audit: audit_lost=79359 audit_rate_limit=0 audit_backlog_limit=64 [ 2517.840272][ T30] audit: type=1400 audit(2000002432.866:1612531): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2517.867036][ T5474] audit: backlog limit exceeded [ 2517.873254][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2517.880869][ T5474] audit: audit_lost=79360 audit_rate_limit=0 audit_backlog_limit=64 [ 2517.888843][ T5474] audit: backlog limit exceeded [ 2517.895074][ T30] audit: type=1400 audit(2000002432.866:1612532): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2517.917281][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.105567][ T30] kauditd_printk_skb: 8218 callbacks suppressed [ 2523.105583][ T30] audit: type=1400 audit(2000002437.873:1619841): avc: denied { create } for pid=5984 comm="syz.5.9298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2523.133811][ T30] audit: type=1400 audit(2000002437.873:1619840): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2523.201974][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.218779][ T5474] audit: audit_lost=79665 audit_rate_limit=0 audit_backlog_limit=64 [ 2523.236867][ T5474] audit: backlog limit exceeded [ 2523.261250][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.269631][T12978] audit: audit_lost=79666 audit_rate_limit=0 audit_backlog_limit=64 [ 2523.273020][ T30] audit: type=1400 audit(2000002437.892:1619842): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2523.332902][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2523.353399][T12978] audit: backlog limit exceeded [ 2525.075836][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2528.458276][ T30] kauditd_printk_skb: 7426 callbacks suppressed [ 2528.458615][ T30] audit: type=1400 audit(2000002442.871:1627267): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2528.488111][ T30] audit: type=1400 audit(2000002442.880:1627268): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2528.528258][ T30] audit: type=1400 audit(2000002442.880:1627269): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2528.583107][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2528.594919][ T5474] audit: audit_lost=79668 audit_rate_limit=0 audit_backlog_limit=64 [ 2528.610920][ T30] audit: type=1400 audit(2000002442.880:1627270): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2528.647245][ T5474] audit: backlog limit exceeded [ 2528.658215][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2528.683926][ T5474] audit: audit_lost=79669 audit_rate_limit=0 audit_backlog_limit=64 [ 2528.714586][ T30] audit: type=1400 audit(2000002442.880:1627271): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2530.362651][ T6057] netlink: 'syz.4.9318': attribute type 29 has an invalid length. [ 2530.411444][ T6060] netlink: 'syz.4.9318': attribute type 29 has an invalid length. [ 2531.172005][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5700 ms [ 2531.180057][ C0] lec:lec_tx_timeout: lec0 [ 2533.812766][ T30] kauditd_printk_skb: 11648 callbacks suppressed [ 2533.812778][ T30] audit: type=1400 audit(2000002447.878:1636255): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2533.861527][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2533.872271][T12978] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2533.879112][ T5474] audit: audit_lost=80558 audit_rate_limit=0 audit_backlog_limit=64 [ 2533.887547][T12978] audit: audit_lost=80559 audit_rate_limit=0 audit_backlog_limit=64 [ 2533.895634][ T5474] audit: backlog limit exceeded [ 2533.900779][ T30] audit: type=1400 audit(2000002447.887:1636256): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2533.925541][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2533.932398][T12978] audit: backlog limit exceeded [ 2533.939340][ T5474] audit: audit_lost=80560 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.164356][ T30] kauditd_printk_skb: 8632 callbacks suppressed [ 2539.164373][ T30] audit: type=1400 audit(2000002452.904:1644483): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2539.200197][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.208842][ T5474] audit: audit_lost=80696 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.220067][ T5474] audit: backlog limit exceeded [ 2539.231214][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.241394][ T30] audit: type=1400 audit(2000002452.922:1644484): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2539.275506][ T5474] audit: audit_lost=80697 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.295005][ T6162] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2539.301728][ T6162] audit: audit_lost=80698 audit_rate_limit=0 audit_backlog_limit=64 [ 2539.310036][ T5474] audit: backlog limit exceeded [ 2539.321116][ T6162] netlink: 'syz.5.9348': attribute type 1 has an invalid length. [ 2539.380975][ T6166] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9348'. [ 2539.518392][ T6162] 8021q: adding VLAN 0 to HW filter on device bond43 [ 2541.296210][ T6188] netlink: 'syz.5.9355': attribute type 1 has an invalid length. [ 2541.372100][ T6190] netlink: 36 bytes leftover after parsing attributes in process `syz.5.9355'. [ 2541.417043][ T6188] 8021q: adding VLAN 0 to HW filter on device bond44 [ 2544.517388][ T30] kauditd_printk_skb: 8512 callbacks suppressed [ 2544.517404][ T30] audit: type=1400 audit(2000002457.901:1652546): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2544.556564][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2544.585019][ T5474] audit: audit_lost=80849 audit_rate_limit=0 audit_backlog_limit=64 [ 2544.608548][ T5474] audit: backlog limit exceeded [ 2544.614000][ T30] audit: type=1400 audit(2000002457.901:1652547): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2544.645797][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2544.653444][ T5474] audit: audit_lost=80850 audit_rate_limit=0 audit_backlog_limit=64 [ 2544.688247][ T5474] audit: backlog limit exceeded [ 2544.701523][ T30] audit: type=1400 audit(2000002457.929:1652548): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2544.731271][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2547.792609][ T6238] netlink: 'syz.4.9368': attribute type 1 has an invalid length. [ 2548.039413][ T6238] 8021q: adding VLAN 0 to HW filter on device bond38 [ 2549.871481][ T30] kauditd_printk_skb: 15973 callbacks suppressed [ 2549.871502][ T30] audit: type=1400 audit(2000002462.908:1662376): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2549.920661][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2549.932837][ T5474] audit: audit_lost=82900 audit_rate_limit=0 audit_backlog_limit=64 [ 2549.964969][ T5474] audit: backlog limit exceeded [ 2549.980780][ T30] audit: type=1400 audit(2000002462.908:1662377): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2550.005713][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2550.027675][ T5474] audit: audit_lost=82901 audit_rate_limit=0 audit_backlog_limit=64 [ 2550.064887][ T5474] audit: backlog limit exceeded [ 2550.119849][ T30] audit: type=1400 audit(2000002462.908:1662378): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2550.167286][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2550.655454][ T6276] netlink: 'syz.1.9378': attribute type 1 has an invalid length. [ 2550.731551][ T6278] netlink: 36 bytes leftover after parsing attributes in process `syz.1.9378'. [ 2550.755457][ T6276] 8021q: adding VLAN 0 to HW filter on device bond51 [ 2554.341629][ T6319] netlink: 'syz.1.9390': attribute type 29 has an invalid length. [ 2554.374814][ T6319] netlink: 'syz.1.9390': attribute type 29 has an invalid length. [ 2555.234418][ T30] kauditd_printk_skb: 8742 callbacks suppressed [ 2555.234429][ T30] audit: type=1400 audit(2000002467.943:1669865): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2555.278018][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2555.284526][ T5474] audit: audit_lost=83321 audit_rate_limit=0 audit_backlog_limit=64 [ 2555.309134][ T5474] audit: backlog limit exceeded [ 2555.319964][ T5474] audit: audit_backlog=66 > audit_backlog_limit=64 [ 2555.326479][ T5474] audit: audit_lost=83322 audit_rate_limit=0 audit_backlog_limit=64 [ 2555.334722][ T30] audit: type=1400 audit(2000002467.962:1669866): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2555.373483][ T6324] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2555.380354][ T5474] audit: backlog limit exceeded [ 2555.388812][ T6324] audit: audit_lost=83323 audit_rate_limit=0 audit_backlog_limit=64 [ 2557.367474][ T6357] netlink: 'syz.0.9402': attribute type 29 has an invalid length. [ 2557.420996][ T6357] netlink: 'syz.0.9402': attribute type 29 has an invalid length. [ 2558.604049][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2558.621424][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2558.629523][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2560.588516][ T30] kauditd_printk_skb: 12688 callbacks suppressed [ 2560.588531][ T30] audit: type=1400 audit(2000002472.951:1682104): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2560.631408][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2560.643950][ T5474] audit: audit_lost=83474 audit_rate_limit=0 audit_backlog_limit=64 [ 2560.654398][ T30] audit: type=1400 audit(2000002472.979:1682105): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2560.676163][ T5474] audit: backlog limit exceeded [ 2560.681367][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2560.688740][ T5474] audit: audit_lost=83475 audit_rate_limit=0 audit_backlog_limit=64 [ 2560.697210][ T30] audit: type=1400 audit(2000002472.979:1682106): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2560.729453][ T5474] audit: backlog limit exceeded [ 2560.734959][ T6388] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2560.999679][ T6396] netlink: 'syz.1.9415': attribute type 29 has an invalid length. [ 2561.022054][ T6396] netlink: 'syz.1.9415': attribute type 29 has an invalid length. [ 2562.535920][ T6410] netlink: 'syz.1.9418': attribute type 1 has an invalid length. [ 2562.655884][ T6410] 8021q: adding VLAN 0 to HW filter on device bond52 [ 2564.327123][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5330 ms [ 2564.335132][ C0] lec:lec_tx_timeout: lec0 [ 2565.946406][ T30] kauditd_printk_skb: 9737 callbacks suppressed [ 2565.946421][ T30] audit: type=1400 audit(2000002477.958:1689568): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2566.000495][ T30] audit: type=1400 audit(2000002477.958:1689569): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2566.039353][ T30] audit: type=1400 audit(2000002477.958:1689570): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2566.074994][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2566.086399][ T30] audit: type=1400 audit(2000002477.958:1689571): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2566.121748][ T5474] audit: audit_lost=84235 audit_rate_limit=0 audit_backlog_limit=64 [ 2566.130645][ T5474] audit: backlog limit exceeded [ 2566.136521][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2566.165089][ T5474] audit: audit_lost=84236 audit_rate_limit=0 audit_backlog_limit=64 [ 2566.183145][ T30] audit: type=1400 audit(2000002477.958:1689572): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2568.253736][ T6482] netlink: 'syz.0.9436': attribute type 1 has an invalid length. [ 2568.342721][ T6484] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9436'. [ 2568.343513][ T6482] 8021q: adding VLAN 0 to HW filter on device bond38 [ 2571.293741][ T30] kauditd_printk_skb: 9614 callbacks suppressed [ 2571.293757][ T30] audit: type=1400 audit(2000002482.965:1698145): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2571.380602][ T30] audit: type=1400 audit(2000002482.974:1698146): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2571.411432][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2571.467500][ T5474] audit: audit_lost=84584 audit_rate_limit=0 audit_backlog_limit=64 [ 2571.482758][ T5474] audit: backlog limit exceeded [ 2571.483629][ T6515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2571.502883][ T30] audit: type=1400 audit(2000002482.974:1698147): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2571.548959][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2571.548977][ T6515] audit: audit_lost=84585 audit_rate_limit=0 audit_backlog_limit=64 [ 2571.565915][ T5474] audit: audit_lost=84586 audit_rate_limit=0 audit_backlog_limit=64 [ 2574.146083][ T6549] netlink: 'syz.1.9456': attribute type 1 has an invalid length. [ 2574.214367][ T6549] 8021q: adding VLAN 0 to HW filter on device bond53 [ 2576.077888][ T6572] netlink: 'syz.3.9463': attribute type 1 has an invalid length. [ 2576.162149][ T6572] 8021q: adding VLAN 0 to HW filter on device bond42 [ 2576.187751][ T6574] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9463'. [ 2576.647512][ T30] kauditd_printk_skb: 8121 callbacks suppressed [ 2576.647530][ T30] audit: type=1400 audit(2000002487.972:1706225): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2576.766331][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2576.779449][ T6581] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2576.790795][ T30] audit: type=1400 audit(2000002487.972:1706226): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2576.824260][ T6581] audit: audit_lost=84601 audit_rate_limit=0 audit_backlog_limit=64 [ 2576.859849][ T5474] audit: audit_lost=84602 audit_rate_limit=0 audit_backlog_limit=64 [ 2576.875348][ T6581] audit: backlog limit exceeded [ 2576.912852][ T5474] audit: backlog limit exceeded [ 2576.934293][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2576.960172][ T30] audit: type=1400 audit(2000002487.972:1706227): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2577.941113][ T6595] netlink: 'syz.0.9468': attribute type 1 has an invalid length. [ 2578.070041][ T6595] 8021q: adding VLAN 0 to HW filter on device bond39 [ 2582.000354][ T30] kauditd_printk_skb: 11607 callbacks suppressed [ 2582.000365][ T30] audit: type=1400 audit(2000002492.988:1715574): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.036081][ T30] audit: type=1400 audit(2000002493.016:1715575): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.069683][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2582.076420][ T30] audit: type=1400 audit(2000002493.016:1715576): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.122572][ T5474] audit: audit_lost=85357 audit_rate_limit=0 audit_backlog_limit=64 [ 2582.140282][ T5474] audit: backlog limit exceeded [ 2582.153984][ T30] audit: type=1400 audit(2000002493.016:1715577): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.177366][ T30] audit: type=1400 audit(2000002493.016:1715578): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.209732][ T30] audit: type=1400 audit(2000002493.016:1715579): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.238597][ T30] audit: type=1400 audit(2000002493.016:1715580): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2582.805358][ T6646] netlink: 'syz.0.9481': attribute type 1 has an invalid length. [ 2582.963386][ T6646] 8021q: adding VLAN 0 to HW filter on device bond40 [ 2587.353609][ T30] kauditd_printk_skb: 9760 callbacks suppressed [ 2587.353620][ T30] audit: type=1400 audit(2000002498.005:1725209): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2587.396574][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2587.413460][ T5474] audit: audit_lost=85402 audit_rate_limit=0 audit_backlog_limit=64 [ 2587.439114][ T5474] audit: backlog limit exceeded [ 2587.446374][ T6705] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2587.453040][ T6705] audit: audit_lost=85403 audit_rate_limit=0 audit_backlog_limit=64 [ 2587.458928][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2587.477340][ T30] audit: type=1400 audit(2000002498.033:1725210): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2587.505583][ T6705] audit: backlog limit exceeded [ 2587.527621][ T6706] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2592.707096][ T30] kauditd_printk_skb: 9747 callbacks suppressed [ 2592.707113][ T30] audit: type=1400 audit(2000002503.002:1734285): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2592.738459][ T30] audit: type=1400 audit(2000002503.002:1734286): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2592.762558][ T30] audit: type=1400 audit(2000002503.040:1734287): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2592.788401][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2592.796326][ T5474] audit: audit_lost=85629 audit_rate_limit=0 audit_backlog_limit=64 [ 2592.830674][ T5474] audit: backlog limit exceeded [ 2592.842852][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2592.855820][ T30] audit: type=1400 audit(2000002503.040:1734288): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2592.890929][ T5474] audit: audit_lost=85630 audit_rate_limit=0 audit_backlog_limit=64 [ 2592.901734][ T5474] audit: backlog limit exceeded [ 2592.936148][T12936] lec:lec_start_xmit: lec0:No lecd attached [ 2598.059941][ T30] kauditd_printk_skb: 18008 callbacks suppressed [ 2598.059958][ T30] audit: type=1400 audit(2000002508.019:1743960): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2598.156337][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2598.181410][ T5474] audit: audit_lost=88410 audit_rate_limit=0 audit_backlog_limit=64 [ 2598.200068][ T30] audit: type=1400 audit(2000002508.019:1743961): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2598.230407][ T5474] audit: backlog limit exceeded [ 2598.240121][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2598.253588][ T5474] audit: audit_lost=88411 audit_rate_limit=0 audit_backlog_limit=64 [ 2598.268399][ T30] audit: type=1400 audit(2000002508.019:1743962): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2598.322328][ T5474] audit: backlog limit exceeded [ 2598.332210][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2598.518881][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5220 ms [ 2598.526927][ C0] lec:lec_tx_timeout: lec0 [ 2603.413782][ T30] kauditd_printk_skb: 8465 callbacks suppressed [ 2603.413799][ T30] audit: type=1400 audit(2000002513.035:1750476): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2603.453154][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2603.465978][ T5474] audit: audit_lost=89063 audit_rate_limit=0 audit_backlog_limit=64 [ 2603.479088][ T5474] audit: backlog limit exceeded [ 2603.484022][ T30] audit: type=1400 audit(2000002513.063:1750477): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2603.510902][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2603.520683][ T5474] audit: audit_lost=89064 audit_rate_limit=0 audit_backlog_limit=64 [ 2603.532347][ T5474] audit: backlog limit exceeded [ 2603.539572][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2603.546717][ T30] audit: type=1400 audit(2000002513.063:1750478): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2608.767106][ T30] kauditd_printk_skb: 10828 callbacks suppressed [ 2608.767123][ T30] audit: type=1400 audit(2000002518.042:1760291): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2608.826826][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2608.844269][ T5474] audit: audit_lost=89404 audit_rate_limit=0 audit_backlog_limit=64 [ 2608.878579][ T6905] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2608.930756][ T5474] audit: backlog limit exceeded [ 2608.954460][ T30] audit: type=1400 audit(2000002518.061:1760292): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2609.017268][ T30] audit: type=1400 audit(2000002518.061:1760293): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2609.072993][ T30] audit: type=1400 audit(2000002518.061:1760294): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2609.129725][ T6905] audit: audit_lost=89405 audit_rate_limit=0 audit_backlog_limit=64 [ 2609.131419][ T30] audit: type=1400 audit(2000002518.061:1760295): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2611.114731][ T6933] netlink: 'syz.0.9558': attribute type 1 has an invalid length. [ 2611.254621][ T6935] netlink: 36 bytes leftover after parsing attributes in process `syz.0.9558'. [ 2611.404406][ T6933] 8021q: adding VLAN 0 to HW filter on device bond41 [ 2611.954905][ T6942] netlink: 'syz.3.9560': attribute type 1 has an invalid length. [ 2612.083360][ T6942] 8021q: adding VLAN 0 to HW filter on device bond43 [ 2612.327684][ T6951] netlink: 'syz.4.9561': attribute type 1 has an invalid length. [ 2612.720892][ T6951] 8021q: adding VLAN 0 to HW filter on device bond39 [ 2614.118824][ T30] kauditd_printk_skb: 6418 callbacks suppressed [ 2614.118840][ T30] audit: type=1400 audit(2000002523.040:1766551): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2614.196940][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2614.208158][ T6982] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2614.215839][ T5474] audit: audit_lost=89460 audit_rate_limit=0 audit_backlog_limit=64 [ 2614.233590][ T5474] audit: backlog limit exceeded [ 2614.243891][ T6982] audit: audit_lost=89461 audit_rate_limit=0 audit_backlog_limit=64 [ 2614.254341][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2614.264788][ T6983] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2614.275698][ T5474] audit: audit_lost=89462 audit_rate_limit=0 audit_backlog_limit=64 [ 2614.283795][ T30] audit: type=1400 audit(2000002523.049:1766552): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2619.473817][ T30] kauditd_printk_skb: 14197 callbacks suppressed [ 2619.473834][ T30] audit: type=1400 audit(2000002528.056:1777788): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2619.481961][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2619.552154][ T30] audit: type=1400 audit(2000002528.066:1777789): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2619.592255][ T7040] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2619.598861][ T5474] audit: audit_lost=90450 audit_rate_limit=0 audit_backlog_limit=64 [ 2619.612517][ T7040] audit: audit_lost=90451 audit_rate_limit=0 audit_backlog_limit=64 [ 2619.622831][ T5474] audit: backlog limit exceeded [ 2619.632011][ T7040] audit: backlog limit exceeded [ 2619.639388][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2619.658573][ T5474] audit: audit_lost=90452 audit_rate_limit=0 audit_backlog_limit=64 [ 2623.442084][ T7093] netlink: 'syz.3.9602': attribute type 1 has an invalid length. [ 2623.510471][ T7093] 8021q: adding VLAN 0 to HW filter on device bond44 [ 2624.254610][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 2624.262219][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 2624.271129][ T1297] lec:lec_start_xmit: lec0:No lecd attached [ 2624.827405][ T30] kauditd_printk_skb: 10912 callbacks suppressed [ 2624.827422][ T30] audit: type=1400 audit(2000002533.063:1788266): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2624.915178][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2624.937698][ T30] audit: type=1400 audit(2000002533.063:1788267): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2624.959408][ T5474] audit: audit_lost=90598 audit_rate_limit=0 audit_backlog_limit=64 [ 2624.980964][ T5474] audit: backlog limit exceeded [ 2624.996431][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2625.032304][ T30] audit: type=1400 audit(2000002533.063:1788268): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2625.081615][ T7113] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2625.084687][ T5474] audit: audit_lost=90599 audit_rate_limit=0 audit_backlog_limit=64 [ 2625.088214][ T30] audit: type=1400 audit(2000002533.063:1788269): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2626.976181][ T7124] netlink: 'syz.0.9612': attribute type 1 has an invalid length. [ 2627.091800][ T7124] 8021q: adding VLAN 0 to HW filter on device bond42 [ 2629.622505][ C0] lec0: NETDEV WATCHDOG: CPU: 0: transmit queue 0 timed out 5010 ms [ 2629.630565][ C0] lec:lec_tx_timeout: lec0 [ 2630.179253][ T30] kauditd_printk_skb: 7868 callbacks suppressed [ 2630.179269][ T30] audit: type=1400 audit(2000002538.070:1795292): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2630.230902][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2630.248402][ T5474] audit: audit_lost=90882 audit_rate_limit=0 audit_backlog_limit=64 [ 2630.273421][ T5474] audit: backlog limit exceeded [ 2630.281548][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2630.283706][ T30] audit: type=1400 audit(2000002538.070:1795293): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2630.328427][ T5474] audit: audit_lost=90883 audit_rate_limit=0 audit_backlog_limit=64 [ 2630.374237][ T5474] audit: backlog limit exceeded [ 2630.379845][ T30] audit: type=1400 audit(2000002538.070:1795294): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2630.388947][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2634.633269][ T7201] netlink: 'syz.3.9631': attribute type 1 has an invalid length. [ 2634.766762][ T7201] 8021q: adding VLAN 0 to HW filter on device bond45 [ 2635.518218][ T7210] netlink: 'syz.4.9632': attribute type 1 has an invalid length. [ 2635.548363][ T30] kauditd_printk_skb: 11396 callbacks suppressed [ 2635.548380][ T30] audit: type=1400 audit(2000002543.106:1805594): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2635.593098][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2635.603366][ T5474] audit: audit_lost=91250 audit_rate_limit=0 audit_backlog_limit=64 [ 2635.630062][ T7214] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2635.640840][ T5474] audit: backlog limit exceeded [ 2635.648939][ T7214] audit: audit_lost=91251 audit_rate_limit=0 audit_backlog_limit=64 [ 2635.668591][ T30] audit: type=1400 audit(2000002543.106:1805595): avc: denied { create } for pid=7211 comm="syz.1.9634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2635.681138][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2635.701931][ T7210] 8021q: adding VLAN 0 to HW filter on device bond40 [ 2635.712959][ T7214] audit: backlog limit exceeded [ 2635.740874][ T7218] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2635.874013][ T6732] BUG: MAX_LOCKDEP_KEYS too low! [ 2635.878960][ T6732] turning off the locking correctness validator. [ 2635.885259][ T6732] CPU: 0 UID: 0 PID: 6732 Comm: kworker/u8:13 Tainted: G L syzkaller #0 PREEMPT(full) [ 2635.885276][ T6732] Tainted: [L]=SOFTLOCKUP [ 2635.885280][ T6732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2635.885287][ T6732] Workqueue: events_unbound linkwatch_event [ 2635.885303][ T6732] Call Trace: [ 2635.885307][ T6732] [ 2635.885311][ T6732] dump_stack_lvl+0x100/0x190 [ 2635.885327][ T6732] register_lock_class+0x4a4/0x560 [ 2635.885339][ T6732] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2635.885353][ T6732] ? __pfx___schedule+0x10/0x10 [ 2635.885363][ T6732] __lock_acquire+0x3cb/0x2630 [ 2635.885375][ T6732] ? synchronize_rcu_expedited+0x3c3/0x450 [ 2635.885389][ T6732] lock_acquire+0x17c/0x330 [ 2635.885399][ T6732] ? dev_reset_queue+0xa9/0x1e0 [ 2635.885414][ T6732] _raw_spin_lock_bh+0x33/0x40 [ 2635.885431][ T6732] ? dev_reset_queue+0xa9/0x1e0 [ 2635.885442][ T6732] dev_reset_queue+0xa9/0x1e0 [ 2635.885455][ T6732] dev_deactivate_many+0x40b/0xc50 [ 2635.885470][ T6732] ? __pfx_dev_deactivate_many+0x10/0x10 [ 2635.885484][ T6732] ? ref_tracker_free+0x2c1/0x6c0 [ 2635.885500][ T6732] ? __pfx_ref_tracker_free+0x10/0x10 [ 2635.885516][ T6732] dev_deactivate+0xf8/0x1c0 [ 2635.885529][ T6732] ? __pfx_dev_deactivate+0x10/0x10 [ 2635.885543][ T6732] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2635.885560][ T6732] linkwatch_do_dev+0xce/0x110 [ 2635.885571][ T6732] __linkwatch_run_queue+0x3a9/0x900 [ 2635.885582][ T6732] ? __pfx___linkwatch_run_queue+0x10/0x10 [ 2635.885594][ T6732] linkwatch_event+0x8f/0xc0 [ 2635.885604][ T6732] ? __pfx_linkwatch_event+0x10/0x10 [ 2635.885615][ T6732] ? rcu_is_watching+0x12/0xc0 [ 2635.885628][ T6732] process_one_work+0x9c2/0x1840 [ 2635.885648][ T6732] ? __pfx_process_one_work+0x10/0x10 [ 2635.885662][ T6732] ? assign_work+0x19c/0x250 [ 2635.885674][ T6732] worker_thread+0x5da/0xe40 [ 2635.885689][ T6732] ? kthread+0x17d/0x730 [ 2635.885699][ T6732] ? __pfx_worker_thread+0x10/0x10 [ 2635.885711][ T6732] kthread+0x3b3/0x730 [ 2635.885722][ T6732] ? __pfx_kthread+0x10/0x10 [ 2635.885732][ T6732] ? ret_from_fork+0x79/0xaf0 [ 2635.885745][ T6732] ? ret_from_fork+0x79/0xaf0 [ 2635.885756][ T6732] ? rcu_is_watching+0x12/0xc0 [ 2635.885770][ T6732] ? __pfx_kthread+0x10/0x10 [ 2635.885781][ T6732] ret_from_fork+0x754/0xaf0 [ 2635.885794][ T6732] ? __pfx_ret_from_fork+0x10/0x10 [ 2635.885806][ T6732] ? __switch_to+0x7b9/0x10c0 [ 2635.885821][ T6732] ? __pfx_kthread+0x10/0x10 [ 2635.885832][ T6732] ret_from_fork_asm+0x1a/0x30 [ 2635.885846][ T6732] [ 2640.895106][ T30] kauditd_printk_skb: 45585 callbacks suppressed [ 2640.895122][ T30] audit: type=1400 audit(2000002548.103:1849359): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2640.911601][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2640.922930][ T30] audit: type=1400 audit(2000002548.113:1849360): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2640.929333][ T5474] audit: audit_lost=91860 audit_rate_limit=0 audit_backlog_limit=64 [ 2640.950633][ T30] audit: type=1400 audit(2000002548.113:1849361): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2640.958530][ T5474] audit: backlog limit exceeded [ 2640.979815][ T30] audit: type=1400 audit(2000002548.113:1849362): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2640.985629][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2641.008224][ T30] audit: type=1400 audit(2000002548.113:1849363): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2641.014170][ T5474] audit: audit_lost=91861 audit_rate_limit=0 audit_backlog_limit=64 [ 2646.248312][ T30] kauditd_printk_skb: 56711 callbacks suppressed [ 2646.248328][ T30] audit: type=1400 audit(2000002553.120:1902429): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2646.254861][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2646.276179][ T30] audit: type=1400 audit(2000002553.120:1902430): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2646.282590][ T5474] audit: audit_lost=93077 audit_rate_limit=0 audit_backlog_limit=64 [ 2646.309130][ T30] audit: type=1400 audit(2000002553.120:1902431): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2646.312139][ T5474] audit: backlog limit exceeded [ 2646.333805][ T30] audit: type=1400 audit(2000002553.120:1902432): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2646.338656][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2646.366031][ T5474] audit: audit_lost=93078 audit_rate_limit=0 audit_backlog_limit=64 [ 2646.373999][ T5474] audit: backlog limit exceeded [ 2651.601755][ T30] kauditd_printk_skb: 55092 callbacks suppressed [ 2651.601773][ T30] audit: type=1400 audit(2000002558.136:1956226): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2651.617873][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2651.630264][ T30] audit: type=1400 audit(2000002558.136:1956227): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2651.636863][ T5474] audit: audit_lost=93512 audit_rate_limit=0 audit_backlog_limit=64 [ 2651.658383][ T30] audit: type=1400 audit(2000002558.136:1956228): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2651.687712][ T5474] audit: backlog limit exceeded [ 2651.687768][ T30] audit: type=1400 audit(2000002558.136:1956229): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2651.692996][ T5474] audit: audit_backlog=65 > audit_backlog_limit=64 [ 2651.714038][ T30] audit: type=1400 audit(2000002558.136:1956230): avc: denied { read } for pid=5474 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2651.720457][ T5474] audit: audit_lost=93513 audit_rate_limit=0 audit_backlog_limit=64 VM DIAGNOSIS: ssh: connect to host 10.128.1.106 port 22: Connection timed out failed to run ["ssh" "-p" "22" "-F" "/dev/null" "-o" "UserKnownHostsFile=/dev/null" "-o" "IdentitiesOnly=yes" "-o" "BatchMode=yes" "-o" "StrictHostKeyChecking=no" "-o" "ConnectTimeout=10" "root@10.128.1.106" "cat" "/proc/lockdep_stats" "/proc/lockdep" "/proc/lockdep_chains"]: exit status 255