last executing test programs: 23.419971444s ago: executing program 2 (id=788): set_tid_address(&(0x7f0000000000)) 23.393143006s ago: executing program 2 (id=789): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) (async) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000640)="d8df0f23b3b9ce000000b807000000ba000000000f301b8154fea900c1210680320000c4e28ddc8dcd000000c182fd3f0000c8b950020000b801000400b9a6080000b80000010066b8377a000000d80f300f300fc79d53bf00000f0057000f01c3", 0x61}], 0x1, 0x14, 0x0, 0x0) (async, rerun: 32) mount$9p_fd(0x0, 0x0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd']) (rerun: 32) r3 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x8c0002) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ff6000/0x4000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000fee000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000001000/0x2000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000000040)="ef3df2ce41a82430df6caa920ff0183c546bd03c3dec578fd758baf9418a9b4ac227b851b850b6c3538144b2a67733354e8dfae8d5e0f8f37789e0c302ca60f26fe399a6670ec82b0c46cfbd235f0711f5dedf42149c63bfdcf3f3141149", 0x5e}, 0x68) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23.351869488s ago: executing program 2 (id=790): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$incfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x80, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x8c) r1 = openat$incfs(r0, &(0x7f0000000340)='.pending_reads\x00', 0x0, 0x0) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0xc058671e, &(0x7f00000000c0)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000700)={0x14, 0x3, 0x2, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000004200)=ANY=[@ANYBLOB="12010300e2793f10d10501200002000014010902120001000000000904"], 0x0) 22.756132867s ago: executing program 2 (id=802): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x9) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x9, 0x1, r0}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000080)=0x4000, 0x4) setsockopt$XDP_RX_RING(r4, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r4, 0x11b, 0x5, &(0x7f0000000140)=0x1, 0x4) bind$xdp(r4, &(0x7f0000000100)={0x2c, 0x0, r6}, 0x10) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000005, 0x10, r4, 0x100000000) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',allowVother,\x00']) lstat(&(0x7f0000000000)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/pids.max\x00', 0xc8442, 0x11) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f0000000180)=0x202, 0x4) write$P9_RWSTAT(r7, &(0x7f0000000000)={0x30, 0x7f, 0x2}, 0x7) getpeername$unix(r7, &(0x7f0000000080), &(0x7f0000000100)=0x6e) 22.703945659s ago: executing program 2 (id=803): r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mremap(&(0x7f00005ab000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) (async) r1 = openat$kvm(0x0, &(0x7f00000003c0), 0x280, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_kvm_setup_syzos_vm$x86(r2, &(0x7f0000c00000/0x400000)=nil) r4 = syz_kvm_add_vcpu$x86(r3, &(0x7f00000000c0)={0x0, &(0x7f0000000400)=[@enable_nested={0x12c, 0x18}, @code={0xa, 0x72, {"0fc77a3db9860b0000b80f000000ba000000000f3036400f01c23e3e0fc71cb20f013e0f01c54a0fc76818450f237b3e650f22112199d1240262260000c7442406000000000f01142448b88000c0fe000000000f23d80f21f835400000600f23f8"}}], 0x8a}) ioctl$KVM_RUN(r4, 0xae80, 0x0) (async, rerun: 32) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x4, 0x40, 0x7fff0000}]}) (rerun: 32) r6 = socket$inet(0x2, 0x2, 0x1) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) (async) munmap(&(0x7f00003d2000/0x3000)=nil, 0x3000) (async) remap_file_pages(&(0x7f00007d1000/0x1000)=nil, 0x1000, 0x0, 0x5e, 0x0) mlock2(&(0x7f0000c3d000/0x4000)=nil, 0x4000, 0x1) (async) unshare(0x6020400) r7 = syz_open_dev$loop(&(0x7f0000000000), 0x79, 0xa004) fadvise64(r7, 0x401000402, 0xffffffff, 0x4) ioctl$XFS_IOC_FSGROWFSDATA(r0, 0x4010586e, &(0x7f0000000380)={0x1, 0x7}) (async, rerun: 64) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000001200)=0xe095, 0x4) (async, rerun: 64) r8 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TIOCSWINSZ(r8, 0x5414, &(0x7f0000000200)={0xd, 0x5, 0x3ff}) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x8080, 0x0) (async) bind$inet(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64) r9 = socket$nl_xfrm(0x10, 0x3, 0x6) (rerun: 64) sendmsg$nl_xfrm(r9, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x29}, {0x0, 0x7, 0x0, 0x3, 0x0, 0xffff}, {}, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) (async) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000e2c000/0x1000)=nil, &(0x7f00005c7000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000dab000/0x1000)=nil, &(0x7f0000a0f000/0x2000)=nil, &(0x7f000072c000/0x3000)=nil, &(0x7f00008c5000/0x4000)=nil, &(0x7f000041e000/0x4000)=nil, &(0x7f00007d4000/0x2000)=nil, &(0x7f00001e5000/0x2000)=nil, &(0x7f000009a000/0x2000)=nil, &(0x7f0000000280)="5366246607ceab29d930126ff0818a5d6663250c91bdc35714dccd715859f05f3bb01f48e080fbefa3b970cc667aa7a2edc9725e3f2a997a31370fef0f4f07a3359bfc32a2557e45c885e2c449cc44fe858c37263b163b1afb52a26a749fbaaeb42ba5a33b741175ca150594ca5fcad156b2455a11c697b8d04d50f733e7e222d6821737cc241456779b24ec04b451ae8fe49397281222095c8ab90111cbee3b6a92b4743099090b8a4795a90c63c3b3c7da603df7005974be6d447b85950e4ef5429a07860b0b9623", 0xc9, r0}, 0x68) (async, rerun: 64) sendmsg$inet(r6, &(0x7f00000005c0)={&(0x7f00000003c0)={0x2, 0x0, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb35", 0x6}], 0x2, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @broadcast}}}], 0x20}, 0x20048894) (async, rerun: 64) fgetxattr(r5, &(0x7f0000000080)=@random={'trusted.', '\xff\xff\xff\xff\xff\xff'}, &(0x7f0000000140)=""/136, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbeec, 0x8031, r5, 0x52420000) 22.555513236s ago: executing program 2 (id=805): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40a01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x2881) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c86dd0700100000004000000060ec97000fc83a00fe8000000000000000000000000000aaff0200eb220000000000000000000001"], 0xffe) 9.807006864s ago: executing program 1 (id=839): r0 = syz_open_dev$loop(&(0x7f0000000100), 0x8, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x19) ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, &(0x7f0000000280)={0xff, 0xffffffffffffffff, 'id0\x00'}) syz_io_uring_setup(0x6cbc, &(0x7f0000000580)={0x0, 0xd5a8, 0x1008, 0x1, 0x0, 0x0, r1}, &(0x7f00000003c0), &(0x7f0000000100)) r2 = syz_create_resource$binfmt(&(0x7f0000000240)='./file1\x00') r3 = openat$binfmt(0xffffffffffffff9c, r2, 0x42, 0x1ff) close(r3) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x1e) ioctl$KVM_GET_STATS_FD_vm(r4, 0xaece) syz_io_uring_setup(0x48ce, &(0x7f0000000140)={0x0, 0x5e99, 0x0, 0x3, 0x6a}, &(0x7f0000000040), &(0x7f0000000080)) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000080)={{{@in=@broadcast, @in6=@private0, 0x0, 0x0, 0x4e22, 0x0, 0x2}, {0x0, 0x9, 0x0, 0x2}, {}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@local, 0x0, 0x32}, 0x0, @in6=@rand_addr=' \x01\x00', 0x34ff, 0x4, 0x0, 0xb7}}, 0x400) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000100)="bbb5393009f4", 0x6) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x181002, 0x0) ioctl$TCSETAF(r7, 0x5408, &(0x7f0000000080)={0x49db, 0x0, 0xfff9, 0xbfff, 0x18, "ec28a144f13d7607"}) write$binfmt_aout(r7, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r7, 0x40045431, &(0x7f00000001c0)={0x0, 0xefffef7b, 0x0, 0x81, 0x7, "1b09000010000000000000002000"}) r8 = syz_open_pts(r7, 0x20800) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000100)=0x44) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) r9 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='./binderfs/binder-control\x00', 0xc00, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$BINDER_CTL_ADD(r9, 0xc1086201, &(0x7f0000000000)={'custom1\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001240)={0x2, &(0x7f0000001200)=[{0xc}, {0x6}]}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r10) 9.806684354s ago: executing program 3 (id=840): socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='huge=always,huge=within_size,nr_blocks=5']) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ftruncate(r0, 0x8008976) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x13, r0, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000280)={0x4000, 0x2}, 0x10) sendmsg$netlink(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000001a0001002abd70000000000002"], 0x78}], 0x1, 0x0, 0x0, 0x20400}, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000100)) 8.0319028s ago: executing program 0 (id=841): r0 = socket$inet6(0xa, 0x802, 0x6f) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="00020401"], 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x80000) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002980), r1) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'ip6tnl0\x00', &(0x7f0000000180)={'ip6_vti0\x00', 0x0, 0x4, 0x32, 0x4, 0x1, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @empty}, 0x8000, 0x7800, 0x7, 0x7}}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@dev={0xfe, 0x80, '\x00', 0x3a}, 0x2f, r3}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000002a80)={0x0, 0x0, &(0x7f0000002a40)={&(0x7f00000029c0)={0x2c, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20004840}, 0x4008800) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x6e23, 0x2, @mcast1, 0x9}, 0x1c) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000040), 0x4) sendmmsg$inet6(r0, &(0x7f0000001840), 0x3b, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/187, 0xbb}], 0x3a862ae07ee8514c, 0x5, 0x8) 8.03155718s ago: executing program 1 (id=842): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0x7fffffffffffffff]}, 0x8, 0x80000) io_setup(0x2, &(0x7f0000000200)=0x0) io_submit(r1, 0x47f, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000003c0)="951aa14bd6f68579cac67c83bf8d4500e5cea1bb1596d4ee6645fa16fa7cacb9214070a622a2c57b89075f59b85c7b5b2c41edc9d2cd5a2c95ed1c2cf72425be9c1a2df1b60a309bc3228d7e85b300f0d7a042a40166b9208e9d2e423c32ad8e47adedf5dc425c6bcb031fb2230835d41afc23476eae602bad3246417e5ac757", 0x80}]) (async) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async) write$FUSE_INIT(0xffffffffffffffff, &(0x7f00000002c0)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x0, 0x5f8f4c58, 0x1, 0x101, 0x7, 0xa15, 0x0, 0x0, 0x20, 0x2}}, 0x50) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x1d7) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file0\x00', 0x0) (async) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000080)='./file1/file0\x00', 0x0, 0x1085408, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0), 0x0, &(0x7f00000004c0)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file1/file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) (async) chdir(&(0x7f00000001c0)='./bus\x00') (async) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) (async) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x1) (async) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000700)={'syz0\x00', {0x0, 0x0, 0x0, 0xfff8}, 0x16, [0x0, 0x3, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffc, 0x0, 0x1, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x3, 0x80000000, 0x0, 0x0, 0x2, 0x8, 0x0, 0x2000001, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0xfffffffc, 0x4, 0xfffffefe, 0x2000, 0xf6, 0x0, 0x6, 0x3, 0x5, 0x9, 0x0, 0x0, 0x80001ff, 0x4, 0x0, 0x1, 0x7ffdffff, 0x2, 0x0, 0xfffffffd, 0x5, 0x0, 0xfdfffffe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffe, 0xffffffff, 0x7b67], [0x0, 0x0, 0x0, 0x3, 0x3, 0x4, 0xfffffffe, 0x3, 0x0, 0x0, 0x9b05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x4, 0xfffffff8, 0xfffffffc, 0x2, 0x0, 0x5, 0x1, 0x0, 0x0, 0x2, 0x0, 0xeb8, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6, 0x3, 0xffffffff, 0xfffffffc, 0x0, 0x0, 0xc0000, 0xffffffff, 0x1a0d, 0x39, 0xaecd, 0x0, 0x2, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x1, 0x1, 0x567, 0x4, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x100101, 0xfffffffe, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x1, 0xffffffff, 0x0, 0xd, 0x3, 0x4820, 0x20f90d26, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x1d, 0x400, 0x0, 0xed0, 0x4000002], [0x0, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4be6, 0xf7b, 0x0, 0x0, 0x0, 0x4080, 0x10000, 0x400, 0x0, 0x9, 0x0, 0x6, 0xfffffffd, 0x10000001, 0x0, 0x0, 0x5861, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0xf, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x101, 0xfffffffe, 0x0, 0x5, 0x1, 0xfffffffe]}, 0x45c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$nl_audit(0x10, 0x3, 0x9) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f00000000c0), 0x10) (async) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYRES16=r2], 0x448}}, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="050000000808"], 0x80}}, 0x0) (async) sendmmsg$inet(r3, &(0x7f0000001b00)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="050000007402b8f4191db62b", 0xc}, {&(0x7f0000000440)="9f336d70bf41f19e47e98b4015e3b0384d86a1ceb4e530554ebc8154bf392bcf9ce0b09f879bd7aaf9d086e3", 0x2c}], 0x2}}, {{0x0, 0x0, &(0x7f0000000100), 0x2}}], 0x40000000000003a, 0x0) (async) r4 = syz_kvm_add_vcpu$x86(0x0, &(0x7f0000000200)={0x0, &(0x7f0000000d80)=[@nested_load_code={0x12e, 0x8d, {0x3, "66bad004b0c2ee66baf80cb8e409cc8cef66bafc0ced650fc71f66baf80cb8706b2584ef66bafc0cb889860000efc744240012000000c7442402abd20000ff2c24c4829bf5b20088000066baf80cb8b06d7687ef66bafc0c66edc744240037000000c74424025f6d624fff2c24670fc73ef30fa7d8"}}, @code={0xa, 0x73, {"48b805000000000000000f23c80f21f8350c00b0000f23f8460fc72a660f740766baf80cb84c459d85ef66bafc0cb8982952a4ef66bad004ed0f01f63e470fc7a95500000065660f2202c7442400f3000000c744240200100000ff2c24660f38800e"}}, @enable_nested={0x12c, 0x18}, @in_dx={0x69, 0x20, {0xb5fb, 0x4}}, @uexit={0x0, 0x18, 0x800}, @nested_intel_vmwrite_mask={0x154, 0x38, {0x3, @guest32=0x482e, 0xf9, 0x9}}, @set_irq_handler={0xc8, 0x20, {0xa2, 0x1}}, @wr_crn={0x67, 0x20, {0x3, 0x3}}, @wr_crn={0x67, 0x20, {0x8, 0xffffffffffffffff}}, @nested_intel_vmwrite_mask={0x154, 0x38, {0x2, @ro64=0x2401, 0x0, 0xfffffffffffffffb, 0x3662}}, @set_irq_handler={0xc8, 0x20, {0x43, 0x2}}], 0x240}) ioctl$KVM_RUN(r4, 0xae80, 0x0) (async) write(r4, &(0x7f0000000280)="781ccdd845063108b488105df5d820371ce3a27b2f4550a797b37f72dda6700464b78f670416aca1688e32507665f501c7e5b6b0d26043ebe954", 0x3a) (async) r5 = socket(0x10, 0x803, 0x0) sendto(r5, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 8.03057029s ago: executing program 3 (id=843): r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc9a9c042ad77c5e5) lsetxattr$security_capability(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0), 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x4, 0x2, 0x8d, 0x4, 0x2, 0x6, 0x4, 0x19, 0x38, 0x25e, 0x408, 0x4, 0x20, 0x0, 0x5, 0x3ff, 0x200}, [], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa38) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./bus\x00', 0x1, 0x1) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') mkdir(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x100) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000800)='./file0\x00') 6.236330888s ago: executing program 0 (id=844): sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={0x0, 0x68}, 0x1, 0x0, 0x0, 0x24000804}, 0x0) r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000780)={0x0, {{0xa, 0x4e20, 0x7, @mcast2, 0x4}}, 0x1}, 0x90) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)=""/106, 0x6a}, {&(0x7f0000000280)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/100, 0x64}, {&(0x7f0000000980)=""/73, 0x49}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/141, 0x8d}, {&(0x7f00000001c0)=""/17, 0x11}], 0x8, &(0x7f0000000600)=""/191, 0xbf}, 0x5}], 0x1, 0x2000, &(0x7f0000003700)={0x77359400}) 6.233146468s ago: executing program 1 (id=845): r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r0, 0x0) syz_usb_connect(0x2, 0x8f, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'wg2\x00', 0x0}) sendto$packet(r1, 0x0, 0x0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x2042, 0x19d) r3 = openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000010c0)='./file0\x00', r3, &(0x7f00000004c0)='./file0\x00', 0x5) unlinkat(r3, &(0x7f00000011c0)='./file0\x00', 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c0100001000130700000000ffdbdf25e0000001000000000000000000000000ff020000000000000000000000000001000400004e2100020000000021000000", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="fe800000000000000000000000000037000004d232000000fc020000000000000000000000000000050000000000000400000000000000000000000000000000090000000000000001000000ffffffff0000000000000000010000800000190043050000000000000400000000000000ffffffffffffff7f000100000000000001000000000000000000000000000000000000002cbd7000053500000a000400500000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000080000000210466d3", @ANYRES32], 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2014) 6.225681068s ago: executing program 3 (id=846): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="a00000000101010200000000003a638387ac204926000d8008000200ffffffff08000200ac1414aa08ff01000a010102080001006401010228001640000000020000003b00000003000000060000d98b000000080000eb470000000003380004803400038008fe014000000400080002400000000208000240000000ff0800024000000e6508000340ffffffff080002400000000100"/160], 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x40) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="3000000064000100000000020000000008000000", @ANYRES32=r2], 0x30}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup(r4) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r3, &(0x7f00000002c0)={@void, @void, @eth={@broadcast, @remote, @val={@val={0x88a8, 0x2, 0x1, 0x4}, {0x8100, 0x0, 0x0, 0x1}}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x6, 0x14, 0x67, 0x0, 0x7, 0x33, 0x0, @empty, @local}}}}}}, 0x2a) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x88840, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r8, 0xf504, 0x0) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r9 = socket$packet(0x11, 0x2, 0x300) getpeername$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0xffffffffffffff26) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="e2d4ca5461a602116f2b321cafb04b25", @ANYRES32=r0, @ANYBLOB="01002cbd7000fcdbdf250a000000100004800900010016a9f9f890"], 0x24}, 0x1, 0x0, 0x0, 0x4000840}, 0x40080) 6.159084451s ago: executing program 0 (id=847): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x2}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @multicast}) write$tun(r0, &(0x7f0000000100)={@val={0x0, 0x80f3}, @void, @eth={@multicast, @random, @val={@void}, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x2, 0x7, 0x5c, 0x68, 0x4000, 0x5, 0x1, 0x0, @empty=0x1c, @local}, @redirect={0x5, 0x3, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, {0x10, 0x4, 0x0, 0x4, 0x6, 0x65, 0x1, 0x8, 0x67, 0x7, @loopback, @loopback, {[@timestamp_addr={0x44, 0x2c, 0xc3, 0x1, 0x9, [{@multicast2, 0x1}, {@loopback, 0x7}, {@multicast1, 0xa721}, {@multicast1, 0xf}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x3}]}]}}}}}}}}, 0x72) 4.274663173s ago: executing program 0 (id=848): r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="12011001000000407d1e383100000000000109022400010000100309040002fe0300000009210000020122050009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0xc002a0, 0x0) syz_usb_control_io(r0, &(0x7f00000002c0)={0x2c, &(0x7f0000000300)=ANY=[@ANYBLOB="401005000000fb"], 0x0, 0x0, 0x0, 0x0}, 0x0) 4.269828283s ago: executing program 1 (id=849): setsockopt$MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) setitimer(0x0, &(0x7f0000000580)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x111) close(r0) r1 = inotify_init1(0x800) fcntl$setstatus(r0, 0x4, 0x2c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) fcntl$setsig(r1, 0xa, 0xe) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) inotify_add_watch(r1, &(0x7f00000000c0)='./control\x00', 0x404) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) rmdir(&(0x7f0000000100)='./control\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) sendmmsg$unix(r3, &(0x7f0000001200)=[{{&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4, @ANYBLOB="99540a23d7858f31315aedd75c0c955db694268b4e1b760b1fe2b8c89a9d23b1e33e646ac12a5528945107c1a3284a76812c07420b716d276422051cba1bcf053bfb7555c37e19033d15f2f21cc270c9e3730dd57ad548ecabe8e3b3ce193153a422b74e53c97cef30fef58f11a090d3dcbfbbfa2f6249391a8515bd00d4948f0b72b59ed6b22039c50309197d2fb9ecd2bf7275559c64125f487e8192a452d897b93e8d83e5bfb6d13f12964d5fadd323be3fbc3a4ea1fde931286938a15571a7bcb280d0bef60129e2869d508600533b1acfaf77c33a7c7281ae9e103922"], 0x18, 0x4040010}}], 0x1, 0x0) ioctl$SIOCGETVIFCNT(0xffffffffffffffff, 0x89e0, &(0x7f0000000500)={0x1}) getsockname$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) setsockopt$MRT6_DEL_MIF(0xffffffffffffffff, 0x29, 0xcb, &(0x7f0000000280)={0x1, 0x1, 0x1, r6, 0x80000000}, 0xc) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000000)=0x5) 4.267463293s ago: executing program 3 (id=850): r0 = syz_usb_connect$hid(0x3, 0x36, &(0x7f0000000b40)=ANY=[@ANYBLOB="1201000000000010580413500000000000010902240001000050000904000081030000000921faff000122a00009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa, 0x7, 0x40) r1 = syz_usb_connect(0x1, 0x935, &(0x7f0000000b80)={{0x12, 0x1, 0x0, 0x43, 0x4, 0xc6, 0x10, 0x7d1, 0x3c03, 0xbef8, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x923, 0x2, 0xfb, 0x1, 0xc0, 0x0, "", [{{0x9, 0x4, 0x80, 0x8, 0x4, 0x4a, 0xf9, 0xa1, 0x40, [@cdc_ncm={{0xa, 0x24, 0x6, 0x0, 0x1, "c3f447012b"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x7, 0xbe0, 0x8001, 0x9}, {0x6, 0x24, 0x1a, 0x2, 0x2e}, [@obex={0x5, 0x24, 0x15, 0x9}]}], [{{0x9, 0x5, 0xc, 0x4, 0x8, 0x5, 0x3, 0x94, [@generic={0x39, 0xb, "374f446315c2a2581c43817b0d025a1a7afd3f91ea8953813b2ba2ebfb86d9a2d34da4d09a4ded095ad7c85e94cd907a7b9a8c99025c3a"}, @uac_iso={0x7, 0x25, 0x1, 0xc, 0x7, 0xbd}]}}, {{0x9, 0x5, 0xf, 0x10, 0x40, 0x6, 0x0, 0x80, [@generic={0xf4, 0x2, "8ee3ce63bf654faa8aa7c8c8eb1fdb569730025c07e629b368af750e6a91f0b5288e76191f6a179e13b5c785aa6ccf6a1a8709b49bd79ae0eacd7912f93b80213f3c4fa64781f17941a433cf10bf177cc07cd4638d98368b636e3ce7b38753a997a30d66bb475289e53bce3796d5a77035be2a510c2fafb22a1a6f12e9f2ef9160d42caf7badea8f46084feb7184ff20b0083bfb990a7c92329c92dde2e4a6e1a827057e1afc3d99f88e964461ca0cd5de0ac1cc3695b1932e4a8f512382b89f25c29ed9438150de92a98246afb47e4b89bf9a769274324f772a6b590b18759bdbccfd91b540a70d294285f45daf82057869"}]}}, {{0x9, 0x5, 0x1, 0x0, 0x200, 0xb, 0xad, 0x42, [@uac_iso={0x7, 0x25, 0x1, 0xc, 0x9, 0x6}, @uac_iso={0x7, 0x25, 0x1, 0xc, 0xd6, 0x4f}]}}, {{0x9, 0x5, 0xd, 0x4, 0x40, 0xd, 0x1, 0x6, [@generic={0xac, 0x22, "f7c9dc92d193e94e93a56ea821a2503d05e3cde366738978de35ec139547f2f78d882707874921cfc23bffbe543fb33f53330731f31a416a760dbbc325de7348869b9db9994c886a686c288a0714f447eb6df37449c571c7f2885b56c1247527fd2de715a89b312a02e4ed9f5053fadb3a8ec794ae062eae5e457a23c71a90c491b3a4ae868ad3707cb829c0a335f8cbf5a3a84f7b8b5e7d251ad536bbb40f845dfff19c406c8fcbeb72"}]}}]}}, {{0x9, 0x4, 0xc4, 0xd4, 0xc, 0xee, 0xbc, 0x6d, 0x7, [@cdc_ecm={{0x9, 0x24, 0x6, 0x0, 0x0, "8fa2568c"}, {0x5, 0x24, 0x0, 0x10}, {0xd, 0x24, 0xf, 0x1, 0x3, 0xa2b5, 0x2, 0x48}, [@ncm={0x6, 0x24, 0x1a, 0xf73b}, @mbim_extended={0x8, 0x24, 0x1c, 0x2, 0x4e, 0x3ff}, @dmm={0x7, 0x24, 0x14, 0x7, 0x7f}, @mdlm={0x15, 0x24, 0x12, 0x1ff}]}, @cdc_ncm={{0xb, 0x24, 0x6, 0x0, 0x1, "ab9b8c975c8a"}, {0x5, 0x24, 0x0, 0xf}, {0xd, 0x24, 0xf, 0x1, 0x7, 0x1, 0x7, 0x7}, {0x6, 0x24, 0x1a, 0x8001, 0x4}, [@mbim_extended={0x8, 0x24, 0x1c, 0x4, 0xc, 0x16}, @acm={0x4, 0x24, 0x2, 0x5}, @call_mgmt={0x5, 0x24, 0x1, 0x3, 0x2}]}], [{{0x9, 0x5, 0x80, 0x8, 0x200, 0xaf, 0x7, 0x0, [@generic={0x5f, 0xc, "4d7b13acd102bafe3cf17ee82ddbeb6cd6520a0be4cb84a0c1064b255387e289a0eccb37f406b5942b967733955bb642a9054c88a60d6ceeea251c40c1874112a92d46246c6bbe9f88e5dd071f055ae9f393a6cf224abfaebdffa6e05d"}]}}, {{0x9, 0x5, 0x6, 0x8, 0x39723148600c5a82, 0xa1, 0x2, 0x5c, [@uac_iso={0x7}]}}, {{0x9, 0x5, 0xb, 0x10, 0x400, 0x59, 0x33, 0x81, [@generic={0x96, 0x0, "a75947b51ac164f5d19eedcb869b89d8a7ad1b977bcd68dd05bac09df45574d167795169199d18422656a97b4dbcd1f056a1fb7b949fcaba471dbdf89c4cd014a2eaa5ec5896d73745db3fd3b0d47299a34a793586c057deb8cd1a711410c2b2ffb11943b6144503bd9f7d1f7a009095b83c0058eac7ef5b4c53d72d493c46c35384dbae01cc32e7a4df13419ba28df536d95860"}, @generic={0xdf, 0xa, "9d5e231ccccf6c9c213426490994fc3f802ce89328953385b004b6987be1b543ae48e19ba4f62926da6efedf9c97490df1bef6cb7a48fe0daa65aa6098d5acb88dad8cbb824a684a6b11ac6cadd2bf9d0d3d7e14c78ab4d603fbcbccdbc2085d59ad12940c0c52f88fd3fab0522df4f889ba1beabca6ec45551f730df28b1b26c07c0d2ba9d23079aa156ba7e9310b0d0c7ba7a827f78a10f8c6da7fc5ce6e3fd602f22ab9b370f180f3b5343e784c5cede36ab17d211853bb06767e97883ad4d63f5b50f300c688492413d24b22ba3ef2cb35d18d5a0ff3361bc85226"}]}}, {{0x9, 0x5, 0x8, 0x2, 0x10, 0x5, 0x40, 0xe7, [@generic={0x67, 0x24, "6d877179684f0dd2b4f8d114b64a3026d7cb0b5e1a0a620235756a4e4a8c11b417c8563ad1d6573e7a0582a10fe53de8513922c09d0e045a95df404f5a7965043869332429ea2731a1aa7fd9feb11af87a22d24e287231b1c796c55244dc5fc9d37647b47d"}, @generic={0x1c, 0x10, "0cba6edcfb5b39c5fbb3dd52c3181159517d274a86a95c8b2961"}]}}, {{0x9, 0x5, 0xc, 0x1, 0x3ef, 0xe6, 0x27, 0xe, [@generic={0x36, 0x6, "8d48df489d110bc5d6321420fb471c8553c06f601803fe0e974256b201198c0cbfae94669c9d4bdfc428904e5eefa8d0199d3c28"}]}}, {{0x9, 0x5, 0x9, 0x10, 0x3ff, 0xff, 0xd, 0xff, [@uac_iso={0x7, 0x25, 0x1, 0xc, 0x80, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0x4, 0x10, 0x1}]}}, {{0x9, 0x5, 0xb, 0x4, 0x400, 0x2, 0x4, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x4, 0x0, 0x9}]}}, {{0x9, 0x5, 0x3cfd42ca42edec38, 0x2, 0x3ff, 0xc4, 0x7, 0x1, [@generic={0xab, 0x8, "f8b8337dd44756af5c3ff4a75f64062235a8c4da50749cd109cf501df770499353c23689f91cc528de1c481d83da9d4a5050cb51610e9f253f0ecf1af9391e359364ccae12b8db9d99107b97571e240f46818b574849d0bf1603fa325ab8f70a2c52872eedd338ab143c7d8cc1d52f884258c159ea4b981acb2a3b0fc495d5f0bcef6bce23bd170fef9f2f52c9d9da15c3316b1a89da2e46bd7a66372c326d6f5fe0281be46afc3ef4"}]}}, {{0x9, 0x5, 0x2, 0x0, 0x400, 0xcf, 0x7, 0x3, [@generic={0x99, 0x8, "992e3cd11b855e7b8d01e7654bc01f47ee48ad3829b720f3e27c2c750594dc234f09324682dc7234864e04676848a5b2d244d8fee451f1b0b11221d290e18850b441cdcf1071f8d9caf7be427cdcf99887c6c044ac1e702fb5eb2b8335555560a36ebc3ee9682aa49b9f2690374097a5adeb72c2817c18f8d4f1691c6e98ee7080d3b278bd324f7d66d2b0a5cae97453795dd4423468aa"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x81, 0x2}]}}, {{0x9, 0x5, 0xd, 0x0, 0x10, 0x9, 0x2, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0xc, 0x9, 0xff}, @generic={0xae, 0x7, "67772605187842f109a0837fdb703869bebdae55b005cc355000c6b91d661f85a70aa0c24ef7956a4e1074943b2a5b04d68f701412420d6ed4d6e4221d7c68484b24fd6d145b153beac8fa4a850c7a8a113b23a9a8bd8bc3e04744f274477d419d6d727d64972096c295b7380b04f3a4459761fcf45ad2a071f6428d01b4034a0c96d514eb0c492580ab53913a5458194f91dc13f2d032e62b9be3c6fd251e64f1b9d7485e1e077e64a16ec1"}]}}, {{0x9, 0x5, 0x0, 0x11, 0x40, 0x3, 0x1, 0x2, [@generic={0xbd, 0xa, "0c09be72786e0cd998bc773aed56239858b8a3bd4c38197d01968af489415f48efd60831c16ed1c80f7e7a203872303afb35f20badc9437115d2fa2be172dbfbbd9259871207b1b7a07335dcd1128c6a5b0bffe0635fe87314c62e9f67db1ce78497074f3da757978f089f63a4408d83aa49a82265697677c906d42677ce764933e7639185ed2fd84df91eccc8ef22077a0872f2eb3fc1e6d8319a7f9f3feb6ccfadc75d125f2f904bf3fb20d50a54376e2de37d485a483a957c07"}, @generic={0x76, 0x27, "f6203f9104d1dac33d9f5213716d75eff0ed00791546ab3639489b58ee6b439dec068e8146c2d54135f3b1b78db3933208efe7bedad836362ff40035095185acac92fbef2a67944a7fcc40ef9166e1cb02d9e5d2dbc6a46b0b3061ef9bb68050b23c55ddfe94d9a6c4193d9a6c7934aa29e6fa43"}]}}, {{0x9, 0x5, 0x4, 0x4, 0x20, 0x7, 0x1, 0x7a, [@uac_iso={0x7, 0x25, 0x1, 0x8, 0xf, 0xc26}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x4, 0x440}]}}]}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x110, 0x8, 0x3, 0x3, 0x20, 0x80}, 0x84, &(0x7f00000001c0)={0x5, 0xf, 0x84, 0x6, [@generic={0x44, 0x10, 0x4, "ff68776989c3e55a76b825afa03492d4c9345056ad20b1f812257485d7b19a936f7a76aa570716b20c50ece25b4cb5b7a179c6494f5b3877d97301f19bca6b4380"}, @ext_cap={0x7, 0x10, 0x2, 0x14, 0x1, 0x3, 0x3}, @ptm_cap={0x3}, @ptm_cap={0x3}, @ssp_cap={0x24, 0x10, 0xa, 0x0, 0x6, 0x5, 0xff00, 0x100, [0xf, 0xc030, 0xc0, 0x30, 0xffff0f, 0xc030]}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x0, 0x9, 0x2, 0x5}]}, 0x2, [{0x4, &(0x7f0000000140)=@lang_id={0x4, 0x3, 0x1001}}, {0xd0, &(0x7f0000000280)=@string={0xd0, 0x3, "4ed70fe8072ea33df7073ec259a481b488aa5c134a17cb8d7f50c8b57c18cf000d05ba575ea4e7ad89de9431564a030e8c3112378454ac0650096eef88a78bddd2003aaf604adf9c7e167ec5bc2cc6d544dcf8fff131f23c74f9b9149ce26d62ea18edeee4a6cf8c2146b8856569d6d9a97feb846bd594d6fbef02d97064120f884e4a3b7f2df1c4b1ac73b161b37e996180f9213960c386f6ecd16c08d50b54bd6a285d25ea3d127b2174086b66924a145eaddfd04af2d8cf4202ba3f7c5d14c3750ce65e8f4551454b0cb3f63c"}}]}) syz_usb_control_io$lan78xx(r1, &(0x7f00000004c0)={0x14, &(0x7f00000003c0)={0x0, 0x23, 0xb7, {0xb7, 0x10, "c23a74f216c57d190eaf8f4e9a9aaff99014dbd476b8cc5f41ed197a6f9cb4f62f16dea830248419fc7e9eb1bf56bd116d753f27655066dcdf2c9ca7271209070103d97d1f8fa993d8b5017202253e1006d0eba8e417bcc838458a045c5878db4484f121ed920c88ee819f921d522c1e7ba6356f27bccf0be083ddc8bf5eacbe7ab7b3dbedad9eb699cf6bd10339918ba92eb062362a549139cf05fb38364eb15451faa0cdcce510c0402e0142e8ce9bd36ea9c0f4"}}, &(0x7f0000000480)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x1c01}}}, &(0x7f0000000780)={0x34, &(0x7f0000000580)={0x40, 0xe, 0xe2, "38917f41e77f7f635bd31c34ad12cc985e31d9158132b0e2a54dd58753d13b8da33b85834f06ab6323697831f57a72fd43074eddccec2dcde9e1e788334feff313b02beb0502b7637b306f702fb02b58e2dfe2ad458cc1a262d2f81f37cd414c8bbaf7a225ccd2766fe26c7e06c38ff6ee7944e7571ec010d57022aa04912c5ffde06d3bce0044dd9a2817c51565c1927ebb446bc00c1a9c6b8a95671f655a15080df00d7bb81b1585418c2faac3d9389510ae6ba955c97af58b8e3c9dcaf9c7131e45366d40123568d6cbfdf3b93b1e066184e7e9d23a9e9064850e071ed7dd6fce"}, &(0x7f0000000500)={0x0, 0xa, 0x1}, &(0x7f0000000680)={0x0, 0x8, 0x1, 0x7}, &(0x7f00000006c0)={0xc0, 0xa1, 0x4, 0x1}, &(0x7f0000000700)={0x40, 0xa0, 0x4, 0x3}, &(0x7f0000000740)={0xc0, 0xa2, 0x2f, "0bd4425ba876093d69ac874d08b2116a3d39ea5a94f2a61b2455e16a7b49c100db7d9feede17b63e7f570b596290d1"}}) syz_usb_control_io(r0, &(0x7f0000000540)={0x2c, &(0x7f0000000180)=ANY=[@ANYBLOB="4023a0"], 0x0, 0x0, 0x0, 0x0}, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000), 0x4, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000040)=""/185) 2.212941373s ago: executing program 0 (id=851): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_merged\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) syz_clone(0x4020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)='=') r1 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r1, 0x0, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8000, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) madvise(&(0x7f000007f000/0x4000)=nil, 0x4000, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r2, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000100)={0x5, 0x0, &(0x7f0000599000/0x4000)=nil}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f0000000480)={0x3, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2e}}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000002100)=ANY=[]) syz_usb_connect$midi(0x2, 0x3e, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x20, 0x4752, 0x11, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2c, 0x1, 0x1, 0x4, 0xc0, 0x8, "", {{{0x9, 0x4, 0x0, 0x0, 0x2, 0x1, 0x3, 0x20, 0x8, [], [{{0x9, 0x5, 0x1, 0x2, 0x8, 0x0, 0xac, 0x2, {0x4}}}, {{0x9, 0x5, 0x4, 0x3, 0x20, 0xa1, 0x7, 0x7, {0x4}}}]}}}}}]}}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0}) 2.212159993s ago: executing program 1 (id=852): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$XFS_IOC_ATTRMULTI_BY_HANDLE(r0, 0x4048587b, &(0x7f0000000580)={{r1, &(0x7f0000000240)='/dev/net/tun\x00', 0x18000, &(0x7f00000002c0)={@align=0x9000, {0x87, 0x40, 0x7, 0xb}}, 0x2, &(0x7f0000000300), &(0x7f0000000340)=0x4335}, 0x1, &(0x7f0000000400)=[{0x3, 0x1, &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f00000003c0)="6f8cec0258c6f525cb00b0475574cb7015933379169277fb", 0x18, 0x6}]}) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_int(r0, &(0x7f00000000c0)=0xa7, 0x12) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in=@multicast1, @in=@local, 0x4e22, 0x0, 0x4e24, 0x0, 0x2, 0x0, 0x20, 0x3b}, {0x0, 0x1, 0x0, 0x0, 0x0, 0xa, 0x0, 0x100}, {}, 0x0, 0x0, 0x1, 0x1, 0x1}, {{@in6=@remote}, 0x2, @in=@empty, 0x0, 0x2, 0x1, 0x8, 0x0, 0x0, 0xe}}, 0xe8) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000140)={{}, {}, [], {}, [{0x8, 0x7}]}, 0x2c, 0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/power/wakeup_count', 0x20000, 0xe5) read$FUSE(r4, &(0x7f0000001540)={0x2020}, 0x2020) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000080)={0x2, 0x0, &(0x7f0000000040)={&(0x7f0000000540)=ANY=[@ANYBLOB="020a000002"], 0x10}}, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) chdir(&(0x7f00000001c0)='./file0\x00') connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x7ff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}, 0x1c) setuid(0xee01) creat(&(0x7f0000000200)='./file0\x00', 0x102) close_range(r3, 0xffffffffffffffff, 0x0) 2.159885245s ago: executing program 3 (id=853): r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) unshare(0x22020600) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x10, 0x0, &(0x7f0000000040)) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000080)='encrypted\x00', &(0x7f0000000140)='\xff\x00\xc2k\xe4\v\x1e\x9d\xdb\xe9\xa3\t@\xfb4\xbb8\xb4\x12\x1a\x86\x10\xa4!\x8b\xcd/\x95\xc9\v\xb5$\x19pj\x1c\xfc\xcdEK\xf6\x0fo!\x11\xd1\xf1}\xdeb\xdd\x15\xaf?\xebVo\x1dN8N\x8a\x85*\xd5\xaf\x05\nI\xbc_\x15\x9f5\xe2\xb2\xd8\xb3 \x1d\r\t\xf2\xb1|X\xc5\b\'WO\xc8t\xe9\x91\x8cv1UM\x81\xf4\x87<\xc8\x94\x9b\xd4X}Gv\xff\x86\x1e>m:o,\xa7\xa9/F\x19_\xf0\xc1\x89\xab[\xd5\x9d\x14\xaa\xc4\x1e\xa5x\xe4\xbd\xcb\xfb\xf2k') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0xa000, 0x0) ioctl$PTP_SYS_OFFSET(r3, 0x43403d05, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0}, &(0x7f0000000ac0)=0xc) sendmsg$netlink(r4, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000140)={0x10, 0x16, 0x100, 0x70bd2b, 0x25dfdbfc}, 0x10}], 0x1, &(0x7f0000000bc0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r5}}}], 0x20, 0x20000000}, 0x4000800) keyctl$get_persistent(0x16, r5, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r6, 0x8982, &(0x7f0000000040)={0x1, 'vlan0\x00', {}, 0x3}) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)=@secondary) 50.873018ms ago: executing program 0 (id=854): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1f4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x234850, 0x0) (async) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@xino_on}, {@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000980)={0x2c, r1, 0x1, 0x703d28, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000040}, 0x40c4) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000040)={[{@xino_on}, {@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x80) getresgid(&(0x7f0000000380)=0x0, &(0x7f0000001400), &(0x7f0000001440)) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) lsetxattr$system_posix_acl(&(0x7f0000000300)='./cgroup/file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000001540)={{}, {0x1, 0x1}, [{}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x4, r4}], {}, {0x20, 0x2}}, 0x3c, 0x0) (async) mount$incfs(&(0x7f0000000080)='./cgroup\x00', &(0x7f00000000c0)='./cgroup\x00', &(0x7f0000000100), 0x80, &(0x7f0000000580)=ANY=[@ANYBLOB='read_timeout_ms=040000000006']) (async) statx(r2, &(0x7f00000001c0)='./cgroup\x00', 0x6000, 0x10, &(0x7f0000000200)) (async) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000004c0), r2) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r5, 0x200, 0x70bd26, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0xc001) 46.743398ms ago: executing program 1 (id=855): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000e40), 0xffffffffffffffff) r1 = syz_usb_connect(0x2, 0x2d, &(0x7f0000000240)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b000111000000090400000195699b0009058b", @ANYRES8], 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r1, 0x0, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x44583, 0x0) ioctl$ASHMEM_SET_SIZE(r2, 0x40087703, 0xfffffff5) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0xcc840000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4e, 0x0, &(0x7f0000000040)) quotactl_fd$Q_SYNC(r2, 0xffffffff80000101, 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x40087707, &(0x7f0000000e80)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\b\x9d\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\xfeW\x19\xae>\xaa\b\x1f\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\xb5\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9d\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x17\x92\xc7\xa55\x9fZ\xff*\xe2\xa4d\xcc\x92mD>\x1c\xc0\xdd\x93Tir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\x9e:\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K[u\xc7\fd*\a\x14\xe1\xb1\xd6\xe5\xa1\xc0\'K^\xd08\x1d:G\xb2\x8em^\xadc\xdfn\xd1=\xf9Z\xb6eZ\xeak\xa0\x04\x00dC\xeb\x15!G\xcap$\x19|$\xd2&\xd2X\xd5\x83\xa2\xad1\xbf\xfe<\xeb\'\x00\x8d`\x1b\x00D\xf5&\x8c\xad\x9fp\x03\xc0}e\xad\xc2\x00'/795) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9"], 0xb8}, 0x1, 0x0, 0x0, 0x80}, 0x0) syz_usb_disconnect(r5) syz_usb_connect(0x4, 0x24, &(0x7f0000000400)=ANY=[], 0x0) ioctl$EVIOCRMFF(r5, 0xc0085504, &(0x7f0000000000)=0x10) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, 0x0, &(0x7f0000000100)=0x60) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000000500)={'gre0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x710, 0x80, 0x1, 0x0, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x64, 0x0, 0x1, 0x2f, 0x0, @empty, @private}}}}) 0s ago: executing program 3 (id=856): r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f0000000300)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}, [@mark={0xc, 0x15, {0x35075b, 0x5}}]}, 0xc4}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="021600000a0000000000000000000000080012000007a18208"], 0x50}}, 0x0) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x0, 0x2}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x1a9b42, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'\x00', 0x2}) ioctl$TUNSETDEBUG(r4, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) fstat(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_genetlink_get_family_id$devlink(&(0x7f0000000b00), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f80), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_STATION(r7, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000280)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="cf04000000000000607013000000080aab77", @ANYRES32=r9, @ANYBLOB="040013000a00060008021100000100000600100080050000060012"], 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x0) fsetxattr(r7, &(0x7f0000000000)=@random={'btrfs.', '%@\xb2\x00'}, &(0x7f0000000040)='\xff\xff', 0x2, 0x3) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x2, &(0x7f0000000240)=0x1000, 0x4) getsockopt$inet6_tcp_int(r10, 0x6, 0x2, 0x0, &(0x7f0000000100)) setreuid(r5, r5) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x258, 0x19, 0x1, 0x0, 0x0, {0x18, 0xd601, 0x9}, [@nested={0x23c, 0x12, 0x0, 0x1, [@typed={0x8, 0x124, 0x0, 0x0, @u32=0xe}, @nested={0x22f, 0xb9, 0x0, 0x1, [@nested={0x131, 0x41, 0x0, 0x1, [@generic="1814e404eb40f3dbbc84228d548f2c79892bd39bd6a2840bb6c313003484e74a0381ebae69bd", @nested={0x4, 0x68}, @nested={0x4, 0x37}, @nested={0x4, 0xdb}, @typed={0x14, 0x155, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @local}}, @nested={0x4, 0xf2}, @typed={0x8, 0x7e, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0xb7, 0x0, 0x0, @fd}, @generic="733d5f814d06f69196f5d3bbbfd0601fb9c2b20958af88450f80c4a83fb81467d1ddb995dcda11a3a96bc4402bf10743000eb7ec50d2b31a10bac544d9da4dbee16cd0a1538f9413f6ce9e10f799123e548a5d7330c1790c7beca7eea36800a3858a6cf243245ee965832c3c70860e8d91ca1f46c14d536251f5b053fe6c32db01a285d3e966c772855e212f1d58ca30e0c7b8af39a2ae2e571b0801aa4917f9c84cdfacf44385aa54464a7908900d2f9d799376b66b969fd150ac228fc209a000fd64b34d166a5b0f5f529bddf421c9e0c844"]}, @typed={0xc, 0x109, 0x0, 0x0, @u64=0x10001}, @generic="b6dea058cbac6b1ed42ef16527d087a4fb5a783ead937a6d5329d814c6375f0f75cd14356b9980c2ad02b46332a086a535563286b857258ecde05f0e6e79d29162a7dbfe15de32aa2f0edab465db46ac0c5331906083f3391da5f16af4d922be28837d936146ed6620b48d040f09b376182796ec06df42b328b9554d517d886ef6c678b27dee60c622b4d1389c15a3ada1b89d18eaa888a72abd16df65483d8a177cf38c75f24034585003fd0abd012242828808b3da7cc348dc6c226b42661f3fe87ff83e45102b3903ac74d3657cc98063e22ed38ded204e1d53e80fca203e6eb0f378b39de1bfbaf699"]}]}, @nested={0x8, 0x5, 0x0, 0x1, [@generic="0bc007e0"]}]}, 0x258}, 0x1, 0x0, 0x0, 0x4}, 0x804) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.32' (ED25519) to the list of known hosts. [ 20.585475][ T36] audit: type=1400 audit(1773841413.330:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.586786][ T282] cgroup: Unknown subsys name 'net' [ 20.608517][ T36] audit: type=1400 audit(1773841413.330:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.637093][ T36] audit: type=1400 audit(1773841413.360:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.637344][ T282] cgroup: Unknown subsys name 'devices' [ 20.777873][ T282] cgroup: Unknown subsys name 'hugetlb' [ 20.783621][ T282] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 20.938022][ T36] audit: type=1400 audit(1773841413.680:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 20.960368][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 20.965406][ T36] audit: type=1400 audit(1773841413.680:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 20.990883][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.001257][ T36] audit: type=1400 audit(1773841413.680:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.034563][ T36] audit: type=1400 audit(1773841413.720:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.060896][ T36] audit: type=1400 audit(1773841413.720:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.087274][ T36] audit: type=1400 audit(1773841413.730:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.113720][ T36] audit: type=1400 audit(1773841413.730:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.575978][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.583497][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.590686][ T289] bridge_slave_0: entered allmulticast mode [ 22.597026][ T289] bridge_slave_0: entered promiscuous mode [ 22.616782][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.624181][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.631592][ T289] bridge_slave_1: entered allmulticast mode [ 22.638233][ T289] bridge_slave_1: entered promiscuous mode [ 22.652835][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.660117][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.668033][ T291] bridge_slave_0: entered allmulticast mode [ 22.674341][ T291] bridge_slave_0: entered promiscuous mode [ 22.680978][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.688071][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.696739][ T291] bridge_slave_1: entered allmulticast mode [ 22.703325][ T291] bridge_slave_1: entered promiscuous mode [ 22.731674][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.739119][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.746409][ T290] bridge_slave_0: entered allmulticast mode [ 22.753040][ T290] bridge_slave_0: entered promiscuous mode [ 22.762153][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.769452][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.776622][ T290] bridge_slave_1: entered allmulticast mode [ 22.783291][ T290] bridge_slave_1: entered promiscuous mode [ 22.850834][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.858294][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.865844][ T292] bridge_slave_0: entered allmulticast mode [ 22.872158][ T292] bridge_slave_0: entered promiscuous mode [ 22.889636][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.897046][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.904509][ T292] bridge_slave_1: entered allmulticast mode [ 22.911337][ T292] bridge_slave_1: entered promiscuous mode [ 22.995976][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.003179][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.010630][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.018190][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.042185][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.049395][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.057000][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.064034][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.110162][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.117711][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.125153][ T293] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.132398][ T293] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.166391][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.173524][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.181356][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.188501][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.210327][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.218643][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.232800][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.239983][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.248288][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.255736][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.264696][ T293] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.271960][ T293] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.312158][ T293] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.319470][ T293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.331349][ T289] veth0_vlan: entered promiscuous mode [ 23.346848][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.354248][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.372668][ T291] veth0_vlan: entered promiscuous mode [ 23.389702][ T292] veth0_vlan: entered promiscuous mode [ 23.400024][ T289] veth1_macvtap: entered promiscuous mode [ 23.410409][ T291] veth1_macvtap: entered promiscuous mode [ 23.434747][ T290] veth0_vlan: entered promiscuous mode [ 23.443892][ T292] veth1_macvtap: entered promiscuous mode [ 23.476244][ T289] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 23.498822][ T290] veth1_macvtap: entered promiscuous mode [ 23.549629][ T337] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 23.573599][ T342] syzkaller0: tun_chr_ioctl cmd 1074025676 [ 23.585828][ T342] syzkaller0: owner set to 0 [ 23.593318][ T344] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 23.614364][ T344] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 23.614370][ T345] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 23.670541][ T351] netlink: 36 bytes leftover after parsing attributes in process `syz.2.3'. [ 23.704172][ T354] Zero length message leads to an empty skb [ 23.933170][ T370] IPv6: A: Disabled Multicast RS [ 24.100695][ T379] bpf: Bad value for 'uid' [ 24.154448][ T385] netlink: 'syz.3.16': attribute type 4 has an invalid length. [ 24.165504][ T384] netlink: 'syz.3.16': attribute type 4 has an invalid length. [ 24.173639][ T385] netlink: 'syz.3.16': attribute type 4 has an invalid length. [ 24.182091][ T384] netlink: 'syz.3.16': attribute type 4 has an invalid length. [ 24.293110][ T393] ======================================================= [ 24.293110][ T393] WARNING: The mand mount option has been deprecated and [ 24.293110][ T393] and is ignored by this kernel. Remove the mand [ 24.293110][ T393] option from the mount to silence this warning. [ 24.293110][ T393] ======================================================= [ 24.328561][ T10] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 24.339446][ T393] netlink: 4 bytes leftover after parsing attributes in process `syz.3.18'. [ 24.485195][ T10] usb 3-1: Using ep0 maxpacket: 8 [ 24.491598][ T10] usb 3-1: config 1 interface 0 has no altsetting 0 [ 24.500661][ T10] usb 3-1: string descriptor 0 read error: -22 [ 24.507038][ T10] usb 3-1: New USB device found, idVendor=0b43, idProduct=0003, bcdDevice= 0.40 [ 24.516706][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 24.585173][ T9] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 24.743547][ T9] usb 4-1: Using ep0 maxpacket: 16 [ 24.749876][ T9] usb 4-1: config 0 has an invalid interface number: 41 but max is 0 [ 24.760365][ T9] usb 4-1: config 0 has no interface number 0 [ 24.766933][ T9] usb 4-1: config 0 interface 41 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 24.776813][ T9] usb 4-1: config 0 interface 41 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 24.786951][ T9] usb 4-1: config 0 interface 41 has no altsetting 0 [ 24.795493][ T9] usb 4-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 24.804572][ T9] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 24.812680][ T9] usb 4-1: Product: syz [ 24.817304][ T9] usb 4-1: Manufacturer: syz [ 24.821909][ T9] usb 4-1: SerialNumber: syz [ 24.827309][ T9] usb 4-1: config 0 descriptor?? [ 24.832851][ T393] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 24.840541][ T393] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 24.875183][ T331] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 24.930575][ T377] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 24.939832][ T377] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 24.948151][ T377] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 24.956974][ T377] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 25.025144][ T331] usb 1-1: Using ep0 maxpacket: 8 [ 25.031791][ T331] usb 1-1: unable to get BOS descriptor or descriptor too short [ 25.040882][ T331] usb 1-1: config 0 has an invalid interface number: 88 but max is 0 [ 25.049202][ T331] usb 1-1: config 0 has no interface number 0 [ 25.049695][ T393] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 25.055488][ T331] usb 1-1: config 0 interface 88 altsetting 8 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 25.063477][ T393] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 25.074139][ T331] usb 1-1: config 0 interface 88 has no altsetting 0 [ 25.090471][ T331] usb 1-1: string descriptor 0 read error: -22 [ 25.096974][ T331] usb 1-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=96.31 [ 25.106457][ T331] usb 1-1: New USB device strings: Mfr=1, Product=84, SerialNumber=3 [ 25.125545][ T331] usb 1-1: config 0 descriptor?? [ 25.133106][ T331] input: USB Acecad Flair Tablet 0460:0004 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.88/input/input4 [ 25.169526][ T377] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 25.172096][ T10] usbhid 3-1:1.0: can't add hid device: -32 [ 25.193602][ T377] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 25.201718][ T10] usbhid 3-1:1.0: probe with driver usbhid failed with error -32 [ 25.212400][ T10] usb 3-1: USB disconnect, device number 2 [ 25.314089][ T9] CoreChips 4-1:0.41 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 25.329429][ T9] CoreChips 4-1:0.41: probe with driver CoreChips failed with error -71 [ 25.339698][ T9] usb 4-1: USB disconnect, device number 2 [ 25.384366][ T10] usb 1-1: USB disconnect, device number 2 [ 25.384500][ C1] usb_acecad 1-1:0.88: can't resubmit intr, dummy_hcd.0-1/input0, status -19 [ 25.425264][ T331] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 25.555627][ T331] usb 2-1: device descriptor read/64, error -71 [ 25.776591][ T36] kauditd_printk_skb: 83 callbacks suppressed [ 25.776610][ T36] audit: type=1400 audit(1773841418.520:157): avc: denied { create } for pid=427 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 25.803622][ T36] audit: type=1400 audit(1773841418.520:158): avc: denied { accept } for pid=427 comm="syz.2.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 25.820564][ T45] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 25.824025][ T331] usb 2-1: device descriptor read/64, error -71 [ 25.842430][ T432] tipc: Enabling of bearer rejected, media not registered [ 25.851274][ T432] netlink: 57 bytes leftover after parsing attributes in process `syz.3.28'. [ 25.862769][ T36] audit: type=1400 audit(1773841418.600:159): avc: denied { create } for pid=431 comm="syz.3.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 25.876171][ T434] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.901854][ T36] audit: type=1400 audit(1773841418.640:160): avc: denied { unmount } for pid=290 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 25.990459][ T36] audit: type=1400 audit(1773841418.730:161): avc: denied { ioctl } for pid=437 comm="syz.3.31" path="socket:[3917]" dev="sockfs" ino=3917 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.015536][ T45] usb 1-1: Using ep0 maxpacket: 8 [ 26.017875][ T439] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 26.022519][ T45] usb 1-1: unable to get BOS descriptor or descriptor too short [ 26.030351][ T10] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 26.038381][ T45] usb 1-1: config 0 has an invalid interface number: 88 but max is 0 [ 26.045985][ T439] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 26.053187][ T45] usb 1-1: config 0 has no interface number 0 [ 26.067220][ T45] usb 1-1: config 0 interface 88 altsetting 8 endpoint 0x86 has an invalid bInterval 0, changing to 7 [ 26.078354][ T45] usb 1-1: config 0 interface 88 has no altsetting 0 [ 26.086681][ T45] usb 1-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=96.31 [ 26.095909][ T45] usb 1-1: New USB device strings: Mfr=1, Product=84, SerialNumber=3 [ 26.104257][ T45] usb 1-1: Product: syz [ 26.105177][ T331] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 26.108512][ T45] usb 1-1: Manufacturer: syz [ 26.120925][ T45] usb 1-1: SerialNumber: syz [ 26.126119][ T45] usb 1-1: config 0 descriptor?? [ 26.216459][ T10] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 26.228016][ T10] usb 3-1: New USB device found, idVendor=1430, idProduct=474b, bcdDevice= 0.40 [ 26.238360][ T10] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 26.246791][ T331] usb 2-1: device descriptor read/64, error -71 [ 26.253133][ T10] usb 3-1: Product: syz [ 26.257367][ T10] usb 3-1: Manufacturer: syz [ 26.262157][ T10] usb 3-1: SerialNumber: syz [ 26.275331][ T9] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 26.332391][ T400] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 26.341326][ T400] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 26.342149][ T401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 26.358461][ T401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 26.369410][ T45] input: syz syz as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.88/input/input5 [ 26.380601][ T45] usb 1-1: USB disconnect, device number 3 [ 26.380623][ C0] usb_acecad 1-1:0.88: can't resubmit intr, dummy_hcd.0-1/input0, status -19 [ 26.387584][ T36] audit: type=1400 audit(1773841419.120:162): avc: denied { read } for pid=95 comm="acpid" name="event3" dev="devtmpfs" ino=448 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.418067][ T36] audit: type=1400 audit(1773841419.120:163): avc: denied { open } for pid=95 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=448 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.442145][ T36] audit: type=1400 audit(1773841419.120:164): avc: denied { ioctl } for pid=95 comm="acpid" path="/dev/input/event3" dev="devtmpfs" ino=448 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.455215][ T9] usb 4-1: Using ep0 maxpacket: 16 [ 26.473103][ T36] audit: type=1400 audit(1773841419.210:165): avc: denied { ioctl } for pid=429 comm="syz.2.27" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4605 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 26.476044][ T9] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 26.476443][ T10] usb 3-1: MIDIStreaming interface descriptor not found [ 26.517380][ T9] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 26.527302][ T331] usb 2-1: device descriptor read/64, error -71 [ 26.534026][ T9] usb 4-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 0 [ 26.544095][ T9] usb 4-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 22 [ 26.559022][ T9] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 26.568600][ T9] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 26.577451][ T9] usb 4-1: SerialNumber: syz [ 26.585548][ T10] usb 3-1: USB disconnect, device number 3 [ 26.593117][ T9] cdc_acm 4-1:1.0: Control and data interfaces are not separated! [ 26.606451][ T403] udevd[403]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 26.608378][ T9] cdc_acm 4-1:1.0: probe with driver cdc_acm failed with error -12 [ 26.635225][ T331] usb usb2-port1: attempt power cycle [ 26.796297][ T45] usb 4-1: USB disconnect, device number 3 [ 26.879193][ T36] audit: type=1404 audit(1773841419.620:166): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 26.975333][ T331] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 27.395381][ T331] usb 2-1: device not accepting address 4, error -71 [ 27.990545][ T488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=488 comm=syz.3.48 [ 28.037715][ T493] netlink: 'syz.2.50': attribute type 2 has an invalid length. [ 28.045664][ T493] netlink: 8 bytes leftover after parsing attributes in process `syz.2.50'. [ 28.657551][ T528] netlink: 96 bytes leftover after parsing attributes in process `syz.3.64'. [ 28.718995][ T550] veth1_macvtap: left promiscuous mode [ 28.724693][ T550] macsec0: entered promiscuous mode [ 28.734667][ T550] veth1_macvtap: entered promiscuous mode [ 28.740658][ T550] macsec0: left promiscuous mode [ 29.475216][ T573] capability: warning: `syz.1.83' uses deprecated v2 capabilities in a way that may be insecure [ 30.032271][ T598] syzkaller1: entered promiscuous mode [ 30.038265][ T598] syzkaller1: entered allmulticast mode [ 30.662642][ T615] mmap: syz.3.99 (615) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 30.684594][ T618] netlink: 57 bytes leftover after parsing attributes in process `syz.2.100'. [ 30.730654][ T626] syzkaller1: entered promiscuous mode [ 30.745525][ T626] syzkaller1: entered allmulticast mode [ 30.785561][ T36] kauditd_printk_skb: 410 callbacks suppressed [ 30.785576][ T36] audit: type=1400 audit(1773841423.530:577): avc: denied { create } for pid=628 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 30.823621][ T36] audit: type=1400 audit(1773841423.530:578): avc: denied { create } for pid=628 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 30.853474][ T36] audit: type=1400 audit(1773841423.530:579): avc: denied { create } for pid=628 comm="syz.3.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 30.874875][ T36] audit: type=1400 audit(1773841423.560:580): avc: denied { execmem } for pid=632 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 30.895433][ T36] audit: type=1400 audit(1773841423.560:581): avc: denied { create } for pid=632 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 30.917135][ T36] audit: type=1400 audit(1773841423.560:582): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.942053][ T36] audit: type=1400 audit(1773841423.560:583): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.967295][ T36] audit: type=1400 audit(1773841423.560:584): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 30.992383][ T36] audit: type=1400 audit(1773841423.590:585): avc: denied { read } for pid=641 comm="syz.2.107" dev="nsfs" ino=4026532303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 31.014402][ T36] audit: type=1400 audit(1773841423.590:586): avc: denied { read write } for pid=639 comm="syz.1.106" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 32.832718][ T710] netlink: 32 bytes leftover after parsing attributes in process `syz.1.131'. [ 33.067797][ T721] netlink: 12 bytes leftover after parsing attributes in process `syz.0.136'. [ 33.250750][ T742] netlink: 'syz.2.144': attribute type 20 has an invalid length. [ 33.288281][ T748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=748 comm=syz.2.147 [ 33.301517][ T748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=748 comm=syz.2.147 [ 34.309786][ T791] netlink: 4 bytes leftover after parsing attributes in process `syz.1.161'. [ 34.558316][ T12] Bluetooth: hci0: Frame reassembly failed (-84) [ 36.062145][ T36] kauditd_printk_skb: 257 callbacks suppressed [ 36.062162][ T36] audit: type=1400 audit(1773841428.800:844): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.093350][ T36] audit: type=1400 audit(1773841428.810:845): avc: denied { read write } for pid=837 comm="syz.1.179" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 36.096308][ T845] netlink: 'syz.1.181': attribute type 13 has an invalid length. [ 36.117037][ T36] audit: type=1400 audit(1773841428.810:846): avc: denied { create } for pid=837 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 36.145091][ T36] audit: type=1400 audit(1773841428.820:847): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.169824][ T36] audit: type=1400 audit(1773841428.820:848): avc: denied { create } for pid=842 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 36.190531][ T36] audit: type=1400 audit(1773841428.820:849): avc: denied { create } for pid=842 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 36.212666][ T36] audit: type=1400 audit(1773841428.820:850): avc: denied { create } for pid=842 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 36.234433][ T36] audit: type=1400 audit(1773841428.830:851): avc: denied { read write } for pid=289 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.259038][ T36] audit: type=1400 audit(1773841428.870:852): avc: denied { read } for pid=844 comm="syz.1.181" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 36.282973][ T36] audit: type=1400 audit(1773841428.870:853): avc: denied { create } for pid=844 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 36.605168][ T813] Bluetooth: hci0: command 0x1003 tx timeout [ 36.605187][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 36.680282][ T864] netlink: 'syz.2.190': attribute type 13 has an invalid length. [ 36.748743][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 37.568874][ T926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=926 comm=syz.3.213 [ 37.603835][ T930] capability: warning: `syz.3.215' uses 32-bit capabilities (legacy support in use) [ 37.877384][ T943] syz.1.220 uses obsolete (PF_INET,SOCK_PACKET) [ 38.133523][ T956] netlink: 'syz.3.225': attribute type 16 has an invalid length. [ 38.141624][ T956] netlink: 64138 bytes leftover after parsing attributes in process `syz.3.225'. [ 38.212021][ T959] netlink: 8 bytes leftover after parsing attributes in process `syz.3.226'. [ 38.403319][ T330] Bluetooth: hci1: Frame reassembly failed (-84) [ 38.409899][ T961] Bluetooth: hci1: Frame reassembly failed (-84) [ 38.416567][ T961] Bluetooth: hci1: Frame reassembly failed (-84) [ 38.423223][ T961] Bluetooth: hci1: Frame reassembly failed (-84) [ 38.739999][ T962] Bluetooth: hci0: command 0x1003 tx timeout [ 38.739999][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 39.661232][ T1000] bridge0: port 3(syz_tun) entered blocking state [ 39.668146][ T1000] bridge0: port 3(syz_tun) entered disabled state [ 39.675799][ T1000] syz_tun: entered allmulticast mode [ 39.682109][ T1000] syz_tun: entered promiscuous mode [ 39.687497][ T1000] bridge0: port 3(syz_tun) entered blocking state [ 39.694251][ T1000] bridge0: port 3(syz_tun) entered forwarding state [ 40.371547][ T54] Bluetooth: hci1: command 0x1003 tx timeout [ 40.371556][ T813] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 41.082522][ T36] kauditd_printk_skb: 431 callbacks suppressed [ 41.082538][ T36] audit: type=1400 audit(1773841433.914:1285): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.113348][ T36] audit: type=1400 audit(1773841433.914:1286): avc: denied { create } for pid=1051 comm="syz.3.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 41.133991][ T36] audit: type=1400 audit(1773841433.924:1287): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.159106][ T36] audit: type=1400 audit(1773841433.935:1288): avc: denied { execmem } for pid=1053 comm="syz.3.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 41.179079][ T36] audit: type=1400 audit(1773841433.945:1289): avc: denied { read write } for pid=290 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.203860][ T36] audit: type=1400 audit(1773841433.965:1290): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.228515][ T36] audit: type=1400 audit(1773841433.986:1291): avc: denied { write } for pid=1057 comm="syz.2.261" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.286293][ T36] audit: type=1400 audit(1773841434.109:1292): avc: denied { read write } for pid=291 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.310951][ T36] audit: type=1400 audit(1773841434.119:1293): avc: denied { mount } for pid=1062 comm="syz.2.262" name="/" dev="ramfs" ino=6722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 41.334154][ T36] audit: type=1400 audit(1773841434.119:1294): avc: denied { execute } for pid=1062 comm="syz.2.262" path="/94/memory.events.local" dev="tmpfs" ino=523 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 41.394437][ T1082] can0: slcan on ttynull. [ 42.589920][ T1147] netlink: 112 bytes leftover after parsing attributes in process `syz.0.289'. [ 43.158942][ T1172] syzkaller1: entered promiscuous mode [ 43.173972][ T1172] syzkaller1: entered allmulticast mode [ 43.853083][ T1201] netlink: 288 bytes leftover after parsing attributes in process `syz.0.307'. [ 44.674782][ T1257] syz_tun: entered allmulticast mode [ 44.884179][ T1269] netlink: 'syz.3.330': attribute type 13 has an invalid length. [ 45.538069][ T1298] netlink: 'syz.2.340': attribute type 13 has an invalid length. [ 45.865032][ T1324] ªªªªªª: renamed from vlan0 (while UP) [ 45.893038][ T1324] syzkaller1: entered promiscuous mode [ 45.899123][ T1324] syzkaller1: entered allmulticast mode [ 46.151072][ T36] kauditd_printk_skb: 44276 callbacks suppressed [ 46.151088][ T36] audit: type=1400 audit(1773841438.925:44608): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 46.157966][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.185405][ T149] audit: audit_lost=322 audit_rate_limit=0 audit_backlog_limit=64 [ 46.193411][ T149] audit: backlog limit exceeded [ 46.194486][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.199059][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 46.212960][ T149] audit: audit_lost=323 audit_rate_limit=0 audit_backlog_limit=64 [ 46.216608][ T291] audit: audit_lost=324 audit_rate_limit=0 audit_backlog_limit=64 [ 46.222029][ T149] audit: backlog limit exceeded [ 46.234876][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.490406][ T36] kauditd_printk_skb: 57619 callbacks suppressed [ 51.490423][ T36] audit: type=1400 audit(1773841443.936:102225): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.519420][ T36] audit: type=1400 audit(1773841443.936:102226): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.524772][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.541623][ T36] audit: type=1400 audit(1773841443.936:102227): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.548196][ T149] audit: audit_lost=326 audit_rate_limit=0 audit_backlog_limit=64 [ 51.570187][ T36] audit: type=1400 audit(1773841443.936:102228): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.578144][ T149] audit: backlog limit exceeded [ 51.599783][ T36] audit: type=1400 audit(1773841443.936:102229): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 51.605375][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 51.627585][ T36] audit: type=1400 audit(1773841443.936:102230): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.829797][ T36] kauditd_printk_skb: 58367 callbacks suppressed [ 56.829815][ T36] audit: type=1400 audit(1773841448.928:159390): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.836832][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.859699][ T36] audit: type=1400 audit(1773841448.946:159391): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.865925][ T149] audit: audit_lost=730 audit_rate_limit=0 audit_backlog_limit=64 [ 56.887978][ T36] audit: type=1400 audit(1773841448.946:159392): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.896142][ T149] audit: backlog limit exceeded [ 56.896476][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 56.918314][ T36] audit: type=1400 audit(1773841448.946:159393): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 56.923534][ T149] audit: audit_lost=731 audit_rate_limit=0 audit_backlog_limit=64 [ 56.930794][ T36] audit: type=1400 audit(1773841448.946:159394): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 59.675227][ T1372] syzkaller1: entered promiscuous mode [ 59.681182][ T1372] syzkaller1: entered allmulticast mode [ 59.820345][ T1383] vlan1: entered allmulticast mode [ 59.827173][ T1383] veth0_vlan: entered allmulticast mode [ 60.255628][ T1406] syzkaller1: entered promiscuous mode [ 60.261361][ T1406] syzkaller1: entered allmulticast mode [ 60.661826][ T1429] incfs: Backing dir is not set, filesystem can't be mounted. [ 60.669639][ T1429] incfs: mount failed -2 [ 61.800511][ T1472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=1472 comm=syz.1.405 [ 61.815599][ T1472] sit0: entered promiscuous mode [ 61.823058][ T1472] netlink: 'syz.1.405': attribute type 1 has an invalid length. [ 61.831374][ T1472] netlink: 9 bytes leftover after parsing attributes in process `syz.1.405'. [ 62.169183][ T36] kauditd_printk_skb: 57972 callbacks suppressed [ 62.169201][ T36] audit: type=1400 audit(1773841453.938:214948): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.198115][ T36] audit: type=1400 audit(1773841453.938:214949): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.220732][ T36] audit: type=1400 audit(1773841453.938:214950): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.245099][ T36] audit: type=1400 audit(1773841453.938:214951): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.268725][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 62.268745][ T36] audit: type=1400 audit(1773841453.938:214952): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.281572][ T1482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 62.298656][ T36] audit: type=1400 audit(1773841453.938:214953): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 62.308201][ T149] audit: audit_lost=1538 audit_rate_limit=0 audit_backlog_limit=64 [ 62.327322][ T36] audit: type=1400 audit(1773841453.938:214954): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 64.019856][ T1527] syzkaller1: entered promiscuous mode [ 64.025752][ T1527] syzkaller1: entered allmulticast mode [ 64.588916][ T1551] syzkaller1: entered promiscuous mode [ 64.594612][ T1551] syzkaller1: entered allmulticast mode [ 64.766807][ T1558] netlink: 12 bytes leftover after parsing attributes in process `syz.0.439'. [ 65.077041][ T1577] syzkaller1: entered promiscuous mode [ 65.083196][ T1577] syzkaller1: entered allmulticast mode [ 65.512785][ T1597] syzkaller1: entered promiscuous mode [ 65.524402][ T1597] syzkaller1: entered allmulticast mode [ 65.727437][ T1613] netlink: 4 bytes leftover after parsing attributes in process `syz.0.465'. [ 66.121556][ T1639] syzkaller1: entered promiscuous mode [ 66.136377][ T1639] syzkaller1: entered allmulticast mode [ 66.859195][ T1669] syzkaller1: entered promiscuous mode [ 66.865854][ T1669] syzkaller1: entered allmulticast mode [ 67.508315][ T36] kauditd_printk_skb: 52407 callbacks suppressed [ 67.508332][ T36] audit: type=1400 audit(1773841458.949:266966): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.514381][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.514811][ T36] audit: type=1400 audit(1773841458.958:266967): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.537280][ T149] audit: audit_lost=1671 audit_rate_limit=0 audit_backlog_limit=64 [ 67.543746][ T36] audit: type=1400 audit(1773841458.958:266968): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.566722][ T149] audit: backlog limit exceeded [ 67.574479][ T36] audit: type=1400 audit(1773841458.958:266969): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.596703][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 67.601275][ T36] audit: type=1400 audit(1773841458.958:266970): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 67.622422][ T149] audit: audit_lost=1672 audit_rate_limit=0 audit_backlog_limit=64 [ 67.852186][ T1689] netlink: 'syz.1.493': attribute type 4 has an invalid length. [ 67.866037][ T1690] netlink: 'syz.2.494': attribute type 16 has an invalid length. [ 67.881370][ T1690] netlink: 64130 bytes leftover after parsing attributes in process `syz.2.494'. [ 68.601628][ T1722] netlink: 17 bytes leftover after parsing attributes in process `syz.3.509'. [ 71.024429][ T1788] netlink: 'syz.2.537': attribute type 12 has an invalid length. [ 72.070825][ T1826] syzkaller1: entered promiscuous mode [ 72.076495][ T1826] syzkaller1: entered allmulticast mode [ 72.847849][ T36] kauditd_printk_skb: 51541 callbacks suppressed [ 72.847867][ T36] audit: type=1400 audit(1773841463.969:318238): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.854547][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.858541][ T36] audit: type=1400 audit(1773841463.969:318239): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.876203][ T149] audit: audit_lost=1764 audit_rate_limit=0 audit_backlog_limit=64 [ 72.891642][ T36] audit: type=1400 audit(1773841463.969:318240): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.905823][ T149] audit: backlog limit exceeded [ 72.916527][ T36] audit: type=1400 audit(1773841463.969:318241): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 72.937671][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.941489][ T291] audit: audit_backlog=65 > audit_backlog_limit=64 [ 72.961959][ T149] audit: audit_lost=1765 audit_rate_limit=0 audit_backlog_limit=64 [ 72.997269][ T1852] syzkaller1: entered promiscuous mode [ 73.002874][ T1852] syzkaller1: entered allmulticast mode [ 73.182076][ T1871] netlink: 'syz.1.573': attribute type 4 has an invalid length. [ 73.190630][ T1870] netlink: 'syz.1.573': attribute type 4 has an invalid length. [ 73.729415][ T1890] syzkaller1: entered promiscuous mode [ 73.753504][ T1890] syzkaller1: entered allmulticast mode [ 73.926864][ T1894] netlink: 'syz.0.582': attribute type 10 has an invalid length. [ 73.949853][ T1894] netlink: 40 bytes leftover after parsing attributes in process `syz.0.582'. [ 73.976590][ T1894] veth1: entered promiscuous mode [ 74.497405][ T1910] syzkaller1: entered promiscuous mode [ 74.503922][ T1910] syzkaller1: entered allmulticast mode [ 75.131209][ T1930] syzkaller1: entered promiscuous mode [ 75.137309][ T1930] syzkaller1: entered allmulticast mode [ 75.923684][ T1951] syzkaller1: entered promiscuous mode [ 75.929625][ T1951] syzkaller1: entered allmulticast mode [ 76.411229][ T1976] syzkaller1: entered promiscuous mode [ 76.416825][ T1976] syzkaller1: entered allmulticast mode [ 76.538554][ T1989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1989 comm=syz.3.618 [ 77.360275][ T2017] syzkaller1: entered promiscuous mode [ 77.375086][ T2017] syzkaller1: entered allmulticast mode [ 77.848859][ T2044] syzkaller1: entered promiscuous mode [ 77.854802][ T2044] syzkaller1: entered allmulticast mode [ 78.147172][ T2063] syzkaller1: entered promiscuous mode [ 78.153145][ T2063] syzkaller1: entered allmulticast mode [ 78.187130][ T36] kauditd_printk_skb: 47346 callbacks suppressed [ 78.187149][ T36] audit: type=1400 audit(1773841468.980:365240): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.193392][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.193923][ T36] audit: type=1400 audit(1773841468.980:365241): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.215412][ T149] audit: audit_lost=1882 audit_rate_limit=0 audit_backlog_limit=64 [ 78.215434][ T149] audit: backlog limit exceeded [ 78.215730][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 78.222785][ T36] audit: type=1400 audit(1773841468.980:365242): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.243889][ T149] audit: audit_lost=1883 audit_rate_limit=0 audit_backlog_limit=64 [ 78.252167][ T36] audit: type=1400 audit(1773841468.980:365243): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 78.257380][ T149] audit: backlog limit exceeded [ 78.299196][ T2067] netlink: 'syz.1.650': attribute type 4 has an invalid length. [ 78.327307][ T2067] netlink: 'syz.1.650': attribute type 5 has an invalid length. [ 78.335346][ T2067] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.650'. [ 80.374725][ T2156] syzkaller1: entered promiscuous mode [ 80.380336][ T2156] syzkaller1: entered allmulticast mode [ 81.019486][ T2183] syzkaller1: entered promiscuous mode [ 81.047572][ T2183] syzkaller1: entered allmulticast mode [ 81.738730][ T2206] FAULT_INJECTION: forcing a failure. [ 81.738730][ T2206] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 81.752601][ T2206] CPU: 1 UID: 0 PID: 2206 Comm: syz.0.706 Not tainted syzkaller #0 49aa54d9fff9a118f1e320bc713a86df8a810573 [ 81.752637][ T2206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 81.752648][ T2206] Call Trace: [ 81.752664][ T2206] [ 81.752671][ T2206] __dump_stack+0x21/0x30 [ 81.752703][ T2206] dump_stack_lvl+0x140/0x1c0 [ 81.752723][ T2206] ? __cfi_dump_stack_lvl+0x10/0x10 [ 81.752745][ T2206] ? vsnprintf+0x7b4/0x1ad0 [ 81.752767][ T2206] ? check_stack_object+0x106/0x150 [ 81.752790][ T2206] dump_stack+0x19/0x20 [ 81.752809][ T2206] should_fail_ex+0x3d7/0x530 [ 81.752830][ T2206] should_fail+0xf/0x20 [ 81.752847][ T2206] should_fail_usercopy+0x1e/0x30 [ 81.752868][ T2206] _copy_from_user+0x20/0xa0 [ 81.752891][ T2206] kstrtouint_from_user+0xde/0x170 [ 81.752910][ T2206] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 81.752929][ T2206] ? selinux_file_permission+0x318/0xb60 [ 81.752950][ T2206] ? __cfi_selinux_file_permission+0x10/0x10 [ 81.752970][ T2206] proc_fail_nth_write+0x8f/0x220 [ 81.752991][ T2206] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 81.753009][ T2206] ? bpf_lsm_file_permission+0xd/0x20 [ 81.753027][ T2206] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 81.753046][ T2206] vfs_write+0x3c5/0xf90 [ 81.753068][ T2206] ? __cfi_vfs_write+0x10/0x10 [ 81.753089][ T2206] ? __kasan_check_write+0x18/0x20 [ 81.753110][ T2206] ? mutex_lock+0x97/0x1d0 [ 81.753134][ T2206] ? __cfi_mutex_lock+0x10/0x10 [ 81.753157][ T2206] ? __fget_files+0x2c5/0x340 [ 81.753182][ T2206] ksys_write+0x145/0x260 [ 81.753203][ T2206] ? __cfi_ksys_write+0x10/0x10 [ 81.753224][ T2206] ? fdget+0x188/0x1e0 [ 81.753246][ T2206] ? __kasan_check_read+0x15/0x20 [ 81.753268][ T2206] __x64_sys_write+0x7f/0x90 [ 81.753290][ T2206] x64_sys_call+0x271c/0x2ee0 [ 81.753312][ T2206] do_syscall_64+0x57/0xf0 [ 81.753332][ T2206] ? clear_bhb_loop+0x50/0xa0 [ 81.753354][ T2206] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 81.753375][ T2206] RIP: 0033:0x7f414335cfce [ 81.753398][ T2206] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 81.753412][ T2206] RSP: 002b:00007f4144316fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 81.753437][ T2206] RAX: ffffffffffffffda RBX: 00007f41443176c0 RCX: 00007f414335cfce [ 81.753450][ T2206] RDX: 0000000000000001 RSI: 00007f41443170a0 RDI: 0000000000000004 [ 81.753461][ T2206] RBP: 00007f4144317090 R08: 0000000000000000 R09: 0000000000000000 [ 81.753471][ T2206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 81.753482][ T2206] R13: 00007f4143616038 R14: 00007f4143615fa0 R15: 00007fff2d0757a8 [ 81.753498][ T2206] [ 82.087738][ T2210] syzkaller1: entered promiscuous mode [ 82.093691][ T2210] syzkaller1: entered allmulticast mode [ 82.986517][ T2247] syzkaller1: entered promiscuous mode [ 82.992220][ T2247] syzkaller1: entered allmulticast mode [ 83.526311][ T36] kauditd_printk_skb: 65761 callbacks suppressed [ 83.526328][ T36] audit: type=1400 audit(1773841473.990:413800): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.533085][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.533646][ T36] audit: type=1400 audit(1773841473.990:413801): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.555650][ T149] audit: audit_lost=7619 audit_rate_limit=0 audit_backlog_limit=64 [ 83.562699][ T36] audit: type=1400 audit(1773841473.990:413802): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.583932][ T149] audit: backlog limit exceeded [ 83.592198][ T36] audit: type=1400 audit(1773841473.990:413803): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.614201][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 83.619080][ T36] audit: type=1400 audit(1773841473.990:413804): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 83.642295][ T149] audit: audit_lost=7620 audit_rate_limit=0 audit_backlog_limit=64 [ 83.795663][ T2273] netlink: 'syz.0.734': attribute type 46 has an invalid length. [ 84.655631][ T2305] netlink: 'syz.1.747': attribute type 4 has an invalid length. [ 84.663851][ T2305] netlink: 'syz.1.747': attribute type 5 has an invalid length. [ 84.672351][ T2305] netlink: 'syz.1.747': attribute type 1 has an invalid length. [ 85.162476][ T2314] syzkaller1: entered promiscuous mode [ 85.173525][ T2314] syzkaller1: entered allmulticast mode [ 85.914037][ T2348] syzkaller1: entered promiscuous mode [ 85.920293][ T2348] syzkaller1: entered allmulticast mode [ 86.575182][ T2380] netlink: 4 bytes leftover after parsing attributes in process `syz.0.774'. [ 86.584199][ T2380] bridge_slave_1: left allmulticast mode [ 86.590331][ T2380] bridge_slave_1: left promiscuous mode [ 86.596344][ T2380] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.604292][ T2380] bridge_slave_0: left allmulticast mode [ 86.610201][ T2380] bridge_slave_0: left promiscuous mode [ 86.616574][ T2380] bridge0: port 1(bridge_slave_0) entered disabled state [ 87.828623][ T2426] netlink: 'syz.3.792': attribute type 16 has an invalid length. [ 87.838066][ T2426] netlink: 'syz.3.792': attribute type 25 has an invalid length. [ 87.847318][ T2426] netlink: 64094 bytes leftover after parsing attributes in process `syz.3.792'. [ 88.199027][ T2448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=2448 comm=syz.1.799 [ 88.213829][ T2448] netlink: 32 bytes leftover after parsing attributes in process `syz.1.799'. [ 88.309818][ T2452] syzkaller1: entered promiscuous mode [ 88.315734][ T2452] syzkaller1: entered allmulticast mode [ 88.369065][ T291] cgroup: fork rejected by pids controller in /syz2 [ 88.402178][ T1357] bridge0: port 3(syz_tun) entered disabled state [ 88.415768][ T1357] syz_tun (unregistering): left allmulticast mode [ 88.431156][ T1357] syz_tun (unregistering): left promiscuous mode [ 88.440173][ T1357] bridge0: port 3(syz_tun) entered disabled state [ 88.474604][ T330] bridge_slave_1: left allmulticast mode [ 88.480385][ T330] bridge_slave_1: left promiscuous mode [ 88.504267][ T330] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.525007][ T330] bridge_slave_0: left allmulticast mode [ 88.531395][ T330] bridge_slave_0: left promiscuous mode [ 88.545959][ T330] bridge0: port 1(bridge_slave_0) entered disabled state [ 88.711681][ T330] veth1_macvtap: left promiscuous mode [ 88.718373][ T330] veth0_vlan: left promiscuous mode [ 88.865689][ T36] kauditd_printk_skb: 31929 callbacks suppressed [ 88.865708][ T36] audit: type=1400 audit(1773841479.001:445505): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.893348][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.895846][ T36] audit: type=1400 audit(1773841479.001:445506): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.901209][ T149] audit: audit_lost=7697 audit_rate_limit=0 audit_backlog_limit=64 [ 88.923678][ T36] audit: type=1400 audit(1773841479.001:445507): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.930273][ T149] audit: backlog limit exceeded [ 88.951754][ T36] audit: type=1400 audit(1773841479.001:445508): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.960405][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 88.978208][ T36] audit: type=1400 audit(1773841479.001:445509): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 88.985644][ T149] audit: audit_lost=7698 audit_rate_limit=0 audit_backlog_limit=64 [ 90.370399][ T2483] syzkaller1: entered promiscuous mode [ 90.376320][ T2483] syzkaller1: entered allmulticast mode [ 94.205182][ T36] kauditd_printk_skb: 14857 callbacks suppressed [ 94.205199][ T36] audit: type=1400 audit(1773841484.011:460285): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.233166][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.235272][ T36] audit: type=1400 audit(1773841484.011:460286): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.240920][ T149] audit: audit_lost=7726 audit_rate_limit=0 audit_backlog_limit=64 [ 94.263619][ T36] audit: type=1400 audit(1773841484.011:460287): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.270670][ T149] audit: backlog limit exceeded [ 94.292632][ T36] audit: type=1400 audit(1773841484.011:460288): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.298833][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 94.319225][ T36] audit: type=1400 audit(1773841484.011:460289): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 94.326284][ T2510] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.544494][ T36] kauditd_printk_skb: 15035 callbacks suppressed [ 99.544510][ T36] audit: type=1400 audit(1773841489.022:475321): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.573884][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.586857][ T149] audit: audit_lost=7729 audit_rate_limit=0 audit_backlog_limit=64 [ 99.593434][ T36] audit: type=1400 audit(1773841489.022:475322): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 99.599711][ T149] audit: backlog limit exceeded [ 99.622515][ T2549] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.629056][ T2549] audit: audit_lost=7730 audit_rate_limit=0 audit_backlog_limit=64 [ 99.638629][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 99.640411][ T2549] audit: backlog limit exceeded [ 99.645695][ T149] audit: audit_lost=7731 audit_rate_limit=0 audit_backlog_limit=64 [ 104.853758][ T2579] netlink: 12 bytes leftover after parsing attributes in process `syz.3.846'. [ 104.883758][ T36] kauditd_printk_skb: 14722 callbacks suppressed [ 104.883776][ T36] audit: type=1400 audit(1773841494.033:489990): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.915378][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.915818][ T2579] audit: audit_backlog=65 > audit_backlog_limit=64 [ 104.922391][ T149] audit: audit_lost=7750 audit_rate_limit=0 audit_backlog_limit=64 [ 104.933905][ T2579] audit: audit_lost=7751 audit_rate_limit=0 audit_backlog_limit=64 [ 104.945145][ T36] audit: type=1400 audit(1773841494.033:489992): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.946593][ T2582] syzkaller1: entered promiscuous mode [ 104.967452][ T2579] audit: backlog limit exceeded [ 104.974918][ T149] audit: backlog limit exceeded [ 104.984504][ T2582] syzkaller1: entered allmulticast mode [ 104.988747][ T36] audit: type=1400 audit(1773841494.033:489993): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 104.991969][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 110.222870][ T36] kauditd_printk_skb: 15159 callbacks suppressed [ 110.222887][ T36] audit: type=1400 audit(1773841499.034:505132): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.251407][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 110.252337][ T36] audit: type=1400 audit(1773841499.043:505133): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.259167][ T149] audit: audit_lost=7759 audit_rate_limit=0 audit_backlog_limit=64 [ 110.281920][ T36] audit: type=1400 audit(1773841499.043:505134): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.289600][ T149] audit: backlog limit exceeded [ 110.312087][ T36] audit: type=1400 audit(1773841499.043:505135): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.318245][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 110.338885][ T36] audit: type=1400 audit(1773841499.043:505136): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 110.344738][ T149] audit: audit_lost=7760 audit_rate_limit=0 audit_backlog_limit=64 [ 111.333584][ T46] bridge_slave_1: left allmulticast mode [ 111.339718][ T46] bridge_slave_1: left promiscuous mode [ 111.367026][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.385056][ T46] bridge_slave_0: left allmulticast mode [ 111.390734][ T46] bridge_slave_0: left promiscuous mode [ 111.405914][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 111.568873][ T46] veth1_macvtap: left promiscuous mode [ 111.574675][ T46] veth0_vlan: left promiscuous mode [ 111.900622][ T46] bridge_slave_1: left allmulticast mode [ 111.906438][ T46] bridge_slave_1: left promiscuous mode [ 111.913315][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 111.921984][ T46] bridge_slave_0: left allmulticast mode [ 111.927822][ T46] bridge_slave_0: left promiscuous mode [ 111.934545][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 112.074906][ T46] veth1_macvtap: left promiscuous mode [ 112.080866][ T46] veth0_vlan: left promiscuous mode [ 112.086844][ T46] veth1_macvtap: left promiscuous mode [ 112.093784][ T46] veth0_vlan: left promiscuous mode [ 115.562232][ T36] kauditd_printk_skb: 14264 callbacks suppressed [ 115.562253][ T36] audit: type=1400 audit(1773841504.045:519400): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 115.590375][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 115.591421][ T36] audit: type=1400 audit(1773841504.054:519401): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 115.597200][ T149] audit: audit_lost=7761 audit_rate_limit=0 audit_backlog_limit=64 [ 115.620169][ T36] audit: type=1400 audit(1773841504.054:519402): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 115.627769][ T149] audit: backlog limit exceeded [ 115.650294][ T36] audit: type=1400 audit(1773841504.054:519403): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 115.656351][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 115.677305][ T36] audit: type=1400 audit(1773841504.054:519404): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 115.683508][ T149] audit: audit_lost=7762 audit_rate_limit=0 audit_backlog_limit=64 [ 120.901772][ T36] kauditd_printk_skb: 15479 callbacks suppressed [ 120.901790][ T36] audit: type=1400 audit(1773841509.065:534883): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 120.930173][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 120.930943][ T36] audit: type=1400 audit(1773841509.065:534884): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 120.936978][ T149] audit: audit_lost=7763 audit_rate_limit=0 audit_backlog_limit=64 [ 120.959349][ T36] audit: type=1400 audit(1773841509.065:534885): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 120.966853][ T149] audit: backlog limit exceeded [ 120.989148][ T36] audit: type=1400 audit(1773841509.065:534886): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 120.995450][ T149] audit: audit_backlog=65 > audit_backlog_limit=64 [ 121.015903][ T36] audit: type=1400 audit(1773841509.065:534887): avc: denied { read } for pid=149 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 121.021927][ T149] audit: audit_lost=7764 audit_rate_limit=0 audit_backlog_limit=64