last executing test programs: 7.604831573s ago: executing program 4 (id=1512): syz_open_dev$video(0x0, 0x0, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6002, &(0x7f0000000040)=0x3, 0x4, 0x0) set_mempolicy_home_node(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r2, 0x401, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) socket(0x0, 0x0, 0x0) io_submit(0x0, 0x0, 0x0) unshare(0x6a040000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r3, &(0x7f0000000340)={&(0x7f0000000240)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1200000000000000110000006700000020010000000000000009000000000000001ab6069c9e103e6603b255dd3aa9c6d988dc9070a7f4f227fdb4", @ANYRES32=0x0, @ANYBLOB], 0x28}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000840)=@mangle={'mangle\x00', 0x64, 0x6, 0x560, 0x100, 0x1d8, 0x100, 0x100, 0x2a8, 0x490, 0x490, 0x490, 0x490, 0x490, 0x6, 0x0, {[{{@ipv6={@empty, @loopback, [], [], 'gre0\x00', 'bond0\x00'}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@srh={{0x30}}]}, @common=@unspec=@CONNSECMARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@mcast2, @private1, [], [], 'pim6reg1\x00', 'vlan1\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@mcast1}}}, {{@ipv6={@private0, @remote, [], [], 'tunl0\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c0) r4 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000040)={0x7ff, 0xef9, 0x1}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f00000000c0)={0x5, 0x8}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r4, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e40000000201010800000000000000000a000000d00001800c000280050001000000000014000180080001000000000008000200000000002c00018014000300ff01000000000000000000000000000114000400ff0100000000000000000000000000010c000280050001000000000047000280050001000100000006000640000000000600"], 0xe4}}, 0x0) r6 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r6, 0x2284, &(0x7f0000000040)) 7.196338482s ago: executing program 3 (id=1515): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f00000023c0)=[{0x6}, {0x0, 0x0, 0x0, 0xba}]}) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000280)=0xd, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000980)={'wg2\x00', 0x0}) sendto$packet(r4, &(0x7f0000000180)="0b031404e0ff640f020047540ff6a13bb1000e04080008004803", 0x10f6c, 0x0, &(0x7f0000000140)={0x11, 0x0, r5}, 0x14) r6 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x1, 0x79) symlinkat(&(0x7f0000000200)='./file0\x00', r7, &(0x7f0000000240)='./file0\x00') execveat(r7, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_open_procfs$pagemap(0x0, &(0x7f0000000080)) r8 = syz_usb_connect(0x0, 0x24, &(0x7f0000000300)=ANY=[@ANYRES32=r0], 0x0) syz_usb_control_io(r8, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000100)={0x0, 0x9000000, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="240000003b0007010000000000000000047c0000040000000c00018006000600894f0000ad039214fc1c56a2a66e76372d4cd0e8ccfd1b4ea9cd4c2eca345dee24110c54c353b92dfa0f1cc4c203eaf68896a5537cd9c2c3432a9e7c685f34e6ef56f69fb51000dbd55b73edc7fe3380868152a1025982a0d2956293bd1011605e9bd65c6749cc6f88bfa62a99cd46b5a4c5599c50bd10bd4bbd833b393174d86b092089161aa993d553f7aec81e2992"], 0x24}}, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(r8, 0x0, 0x0) 5.925649109s ago: executing program 4 (id=1518): r0 = socket$pptp(0x18, 0x1, 0x2) r1 = syz_usb_connect(0x0, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="120100008010bd40820514009dbb0000000109022400011b00000009040000022a3e740009058bff7f0000100109050b362f"], 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x3, 0x42041) syz_usb_disconnect(r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r6 = socket(0x840000000002, 0x3, 0x9) connect$inet(r6, &(0x7f0000000540)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r6, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) ptrace$ARCH_GET_FS(0x1e, r2, &(0x7f0000000040), 0x1003) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x15) ioctl$EVIOCGSND(r7, 0x8040451a, &(0x7f00000001c0)=""/230) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) close_range(r0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x1a5}], 0x1}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 4.482614214s ago: executing program 1 (id=1525): r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003c40)={0x11, 0x0, 0x0, 0x0, 0x8, 0x9d, &(0x7f0000000000)=""/157, 0x0, 0x30}, 0x90) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000100)={0x1f, 0xffff}, 0x6) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="4c0003"], 0xd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x53) r4 = syz_genetlink_get_family_id$nfc(0x0, 0xffffffffffffffff) sendmsg$NFC_CMD_START_POLL(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2400003b41796bfac0b5e2bbff00", @ANYRES16=r4, @ANYBLOB="010000000000000000000600000008000100", @ANYRES32=0x0, @ANYBLOB="08000300ffffffff"], 0x24}}, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0x7f}], 0x18}, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000600), 0xfec8) recvmmsg(0xffffffffffffffff, &(0x7f0000003ac0)=[{{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003d00)=""/135, 0x87}, {&(0x7f0000003dc0)=""/171, 0xab}, {&(0x7f0000003e80)=""/246, 0xf6}, {&(0x7f0000000340)}, {&(0x7f0000003f80)=""/2, 0x2}, {&(0x7f0000003fc0)=""/222, 0xde}, {&(0x7f00000040c0)=""/216, 0xd8}, {&(0x7f00000041c0)=""/87, 0x57}], 0x8, 0x0, 0x0, 0x2000000}, 0x2}, {{&(0x7f0000000240)=@x25, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/87, 0x57}, {&(0x7f0000001980)=""/70, 0x46}, {&(0x7f0000001a00)=""/74, 0x4a}, {&(0x7f0000001a80)=""/65, 0x41}, {&(0x7f0000001b00)=""/239, 0xef}, {&(0x7f0000001c00)=""/187, 0xbb}, {&(0x7f0000001cc0)=""/214, 0xd6}], 0x8, &(0x7f0000001e40)=""/60, 0x3c}, 0x9}, {{&(0x7f0000001e80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001f00)=""/111, 0x6f}, {&(0x7f0000001f80)=""/23, 0x17}], 0x2, &(0x7f0000002000)=""/19, 0x13}, 0xb}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000002040)=""/217, 0xd9}, {&(0x7f0000002140)=""/209, 0xd1}, {&(0x7f0000002240)=""/49, 0x31}, {&(0x7f0000002280)=""/177, 0xb1}, {&(0x7f0000002340)=""/116, 0x74}], 0x5}}, {{&(0x7f0000002440)=@x25, 0x80, &(0x7f0000002600)=[{&(0x7f00000024c0)=""/29, 0x1d}, {&(0x7f0000002500)=""/161, 0xa1}, {&(0x7f00000025c0)=""/45, 0x2d}], 0x3, &(0x7f0000002640)=""/6, 0x6}}, {{&(0x7f0000002680)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000002700)=""/228, 0xe4}, {&(0x7f0000002800)=""/7, 0x7}, {&(0x7f0000002840)=""/91, 0x5b}, {&(0x7f00000028c0)=""/89, 0x59}, {&(0x7f0000002940)=""/176, 0xb0}, {&(0x7f0000002a00)=""/37, 0x25}], 0x6, &(0x7f0000002ac0)=""/4096, 0x1000}, 0xdb5}], 0x6, 0x1, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, 0x0, 0x0) r6 = socket(0x10, 0x3, 0x0) write(r6, &(0x7f0000000000)="240000001a005f0414f9f4070009040081000000000000000000000008000f0001000000", 0x24) r7 = openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$IOCTL_VMCI_DATAGRAM_RECEIVE(r7, 0x7ac, &(0x7f0000000200)={0x0, 0x0, 0x1000}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x3c1, 0x3, 0x418, 0x0, 0x168, 0x9, 0x0, 0xa, 0x348, 0x250, 0x250, 0x348, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'team_slave_0\x00', 'sit0\x00', {}, {}, 0x6, 0x0, 0x0, 0x41}, 0x6000000, 0x228, 0x248, 0x0, {0x0, 0x28e}, [@common=@inet=@hashlimit3={{0x158}, {'batadv_slave_1\x00', {0x0, 0x7ff, 0x0, 0x0, 0x0, 0x6, 0x1000}}}, @common=@inet=@ecn={{0x28}, {0x30}}]}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@mcast1, @remote, [], [], 'tunl0\x00', 'veth1_to_bond\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "5c14"}}]}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) 4.094585538s ago: executing program 3 (id=1527): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_PRIMARY={0x8}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}, 0x1, 0x2000000000000000}, 0x0) 3.96459065s ago: executing program 1 (id=1528): mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x10, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), r2) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f0000000240)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) getdents(r0, &(0x7f0000000380)=""/197, 0xc5) setsockopt$inet_group_source_req(r3, 0x0, 0x2b, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @empty}}}, 0x108) close_range(r2, r3, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r2) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@empty, @in=@empty, 0x4e21, 0x0, 0x0, 0xa16b, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x6c}, 0x0, @in6=@mcast2, 0x0, 0x1}}, 0xe8) listen(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000400000000000000"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='contention_end\x00'}, 0x10) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES64], 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x75}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) syz_usb_control_io$hid(r5, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x22, 0xf, {[@local=@item_4={0x3, 0x2, 0x0, "449bab59"}, @global=@item_4={0x3, 0x1, 0x1, "a0e90dbe"}, @local=@item_4={0x3, 0x2, 0x0, "0f4399cb"}]}}, 0x0}, 0x0) syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) 3.75521004s ago: executing program 3 (id=1529): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="1201000000000040d90455a0000000000001090224000100000000090400000103000000092100000001220500090581030000"], 0x0) syz_usb_control_io$hid(r5, 0x0, 0x0) syz_usb_control_io(r5, &(0x7f0000000ac0)={0x2c, &(0x7f0000000000)={0x0, 0x0, 0x5, {0x5, 0x0, "000200"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000100)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f00000008c0)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@redirect_dir={'redirect_dir', 0x3d, './file0/file0'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ov\"\xd8\x93\xe0\xb7\xbd'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':<#\\].\''}}, {@fowner_lt}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x37}}, {@obj_user={'obj_user', 0x3d, '\\)$,\\&{[@'}}]}) 3.170860028s ago: executing program 1 (id=1531): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) read$FUSE(r0, &(0x7f0000002240)={0x2020}, 0x2020) ioperm(0x0, 0x9, 0x9) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x44, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x44}}, 0x0) symlink(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r2, 0xaf01, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x8b101b, 0x0) r3 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f00000001c0)=0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RATE_NEW(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x34, 0x0, 0x0, 0x0, 0x0, {0x13}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}}, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0/../file0\x00', &(0x7f00000001c0), 0x0, 0x0) 2.899439363s ago: executing program 1 (id=1532): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) getpid() sched_setscheduler(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000740)={'wlan1\x00'}) sendmsg$NL80211_CMD_REGISTER_FRAME(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000002c0)={'wlan0\x00'}) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000010c0)=0x15) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000280), 0x22802, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000380)='\n', 0x160a}], 0x1) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r5, 0x0, 0x0) r6 = syz_io_uring_setup(0x7c, &(0x7f0000000100), &(0x7f0000000000), 0x0) r7 = io_uring_setup(0x4ea5, &(0x7f0000000500)={0x0, 0x92df, 0x0, 0x0, 0x2fc}) dup2(r6, r7) write(r5, 0x0, 0x0) 2.716637953s ago: executing program 4 (id=1534): getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x0, 0x9, 0x0, 0x0, 0xa}, {}, {0x0, 0x80000000}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000000}}, 0xe8) close(r0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) syz_emit_ethernet(0xda, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000cf13f56000000000a4110000000000000000000000000000000000ff020000000000000000000000000001000004000000000000000000009c90780100000000000000b0575c7b4df2bdda0000000000000080ba6a5d5d0d170fca692c77733846860829accf2af44c0e1aaaaf532417a91cadd9e65f82310f80cf64f46c761191fda0a250498ce1b5c603debf9e05d8de03dc3d73abde0d0700c3001000000000496b31143860dbd10000000000006cde9c5018586db672628c1415233979ba3df3d8a8490bce9cafc2ab6acde477"], 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) socket$inet6(0xa, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, 0x0, 0x0) 2.510187964s ago: executing program 2 (id=1535): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x7300, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x4}, 0x28) 2.258047575s ago: executing program 4 (id=1536): r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000200)='.\x00', 0x10000a0) r2 = dup(r0) inotify_rm_watch(r2, r1) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, 0x0) 2.059195997s ago: executing program 4 (id=1537): sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000500)=0x4) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000340)={{0x80}, 'port0\x00', 0x0, 0x140043}) close_range(r4, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 1.986476773s ago: executing program 0 (id=1538): ustat(0x801, &(0x7f0000000300)) 1.872757329s ago: executing program 1 (id=1539): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_int(r2, &(0x7f0000000540), 0xfffffdd8) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x19) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000340)="71e67a", 0x3) pipe2$watch_queue(&(0x7f0000000240), 0x80) io_submit(0x0, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x1000000, 0x0, 0x700000000000000, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000340), 0x41}]) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x200000, 0x1000}, 0x20) 1.763217933s ago: executing program 0 (id=1540): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz '], 0x2a, 0xfffffffffffffffc) sendmmsg(0xffffffffffffffff, &(0x7f0000002200)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="f8", 0x1}], 0x1}}], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 1.62480191s ago: executing program 0 (id=1541): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x9, 0x0, 0x0, 0x0, 0x4) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1) 1.514366179s ago: executing program 2 (id=1542): pipe(&(0x7f0000000080)) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) syz_emit_ethernet(0xda, &(0x7f0000000100)={@local, @multicast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "7f00ef", 0x2, 0x3c, 0x0, @remote, @mcast2, {[@routing], {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "64e05c485d4cb29c9eae242a95602b7e1c1c73f5f706f63ce71018efc1884105", "2402d6c22a2368df3d777a6fa6d743f1af13c0e5d8825f9eb513cb2a8618f414cf308e5961dc3bb2b0ba685691d35ead", "1c46b80615ecd682e4f336c905ff2c6a8453c443b04c1528fc64e2fc", {"f6e13420c6757feaccebef9f3cf695d3", "5576b4320a5fb7a777989ae75037af36"}}}}}}}}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x408c5333, &(0x7f0000000400)={0x0, 0x0, 0x0, {0x8000, 0xfffffffd}, 0x9, 0x200000}) tkill(0x0, 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x460, 0x210, 0x98, 0x178, 0x300, 0x98, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x3c8, 0x6, 0x0, {[{{@ip={@multicast2, @private, 0x0, 0x0, 'bond_slave_0\x00', 'veth0_to_bond\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={{0x20}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@empty, @empty, 0x0, 0x0, 'pimreg1\x00', 'rose0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@rand_addr, @multicast1, 0x0, 0x0, 'pim6reg0\x00', 'dummy0\x00'}, 0x0, 0xc8, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@ah={{0x30}}]}, @TTL={0x28}}, {{@ip={@remote, @local, 0x0, 0x0, 'veth1_to_hsr\x00', 'veth0_to_hsr\x00'}, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x4c0) 1.159913416s ago: executing program 4 (id=1543): socket$l2tp6(0xa, 0x2, 0x73) socket$xdp(0x2c, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r0}, 0x48) mmap(&(0x7f0000345000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0xe581a000) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) futex(0x0, 0x8, 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x1) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000f, 0x10, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) creat(0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x9, 0x4) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000006c0)={0x0, 0x0, 0x2c, 0x9, 0x0, 0x2}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x20, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf20000000000000160005003f1b48013d030100000000009500000000000000bc26000000000000bf67000000000000070200000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00'}, 0x90) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYRES16, @ANYBLOB="6d93000000000000972567440e8ce8a60600000100000008000300020000000c0006000000000000000000b14ad6b5d53805a20bb99afeab5949e0ce1b45169ab3cc6f541be1222342d848cc6b6ef528e0b88c98a9089afca19127d923bb7af4ab14c92859d16affc96c18065ca7cf7c"], 0x28}}, 0x840) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x301) ioctl$USBDEVFS_FREE_STREAMS(r5, 0x802c550a, &(0x7f0000000000)=ANY=[@ANYBLOB="02002301330007006000000002000020d3"]) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040e04f74120"], 0x7) ioctl$USBDEVFS_ALLOW_SUSPEND(r3, 0x5522) ioctl$USBDEVFS_ALLOC_STREAMS(r3, 0x8008551c, &(0x7f0000000040)=ANY=[@ANYBLOB="62da00000b00000081"]) 1.157285417s ago: executing program 2 (id=1553): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) syz_emit_ethernet(0x52, &(0x7f0000000a00)={@empty, @remote, @val, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00fbff", 0x14, 0x2f, 0x0, @dev, @private2, {[], {{0x0, 0x8906, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd308", 0x14, 0x6, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010700000000000000002000000008000300", @ANYRES32=r4], 0x1c}}, 0x0) syz_genetlink_get_family_id$l2tp(0x0, r2) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dd308", 0x4, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000400)=ANY=[], 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=ANY=[@ANYBLOB="24000000020000000000000034e6daa69158000100000000000000000002000000000000"], 0x24}}, 0x0) setxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f00000001c0), 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) r6 = syz_io_uring_setup(0x4b6, &(0x7f0000000080), 0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0xfffffffffffff63) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r6, 0x10, &(0x7f0000000600)={0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x20) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000041c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="28000000746329b9770ec666182a8ab2eb563759204fa3b05416a23bbe6687c5f2e403ade00301c8d281dbed5f99ea1f1bc40f01a667788444ff", @ANYRES16=r7, @ANYBLOB="0100000000000000000004000000140001800d0001007564703a73797a3000000000"], 0x28}}, 0x0) 777.249973ms ago: executing program 2 (id=1544): ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r0, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x32) r2 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r2, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}, 0x4, 0x4}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r2, 0x80047453, 0xfffffffffffffffe) 674.014179ms ago: executing program 0 (id=1545): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xcf5) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d80f7ffffff00"}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000140)=0x3) 650.77775ms ago: executing program 1 (id=1546): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000200)) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) getpgid(0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) fanotify_mark(r3, 0x80, 0x12, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') finit_module(r3, 0x0, 0x2) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r1, 0x7, r2, &(0x7f0000000140)={r3, r4, 0x6}) sched_setaffinity(r1, 0x8, &(0x7f0000000040)=0x10001) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r5, &(0x7f0000000340)=[{&(0x7f0000008680)=""/102386, 0xfdc6}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000cc0)={0x2020}, 0x2020) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c80)=ANY=[@ANYBLOB="4000000010001500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000180012800b0001006772657461700000080002800400120008001f0004000000"], 0x40}}, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x0) getpid() socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000300)="303e3002a0001f14000000d190c937dc6914243b0402d6dcb70ad80851956fe6727ae888746b02cee670a5882a0ad79716584e6b04b7f62edac751478af9c62f", 0x40, 0xfffffffffffffffc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x48, 0x4, 0x6, 0x201, 0x0, 0x0, {0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x800) 638.352201ms ago: executing program 3 (id=1547): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x175) write$binfmt_script(r0, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000640)=@broute={'broute\x00', 0x20, 0x1, 0x170, [], 0x0, 0x0, 0x0}, 0x1e8) 547.252666ms ago: executing program 2 (id=1548): r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = io_uring_setup(0x1ba5, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002580)={0x0, 0x10, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0}, 0x90) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r5 = syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) ioctl$vim2m_VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f0000000b00)={0x1, @vbi}) r6 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) futex(&(0x7f0000000040)=0xfffffffe, 0x5, 0x2, 0x0, &(0x7f0000000080), 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffff9c, 0x0, 0x41, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001880), 0x0, 0x0, 0x0) add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)='[', 0x1, 0xffffffffffffffff) 411.36868ms ago: executing program 2 (id=1549): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x6286) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0xa, 0x2, 0x8, 0x8}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$nl_route(0x10, 0x3, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x143142, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)) prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000100)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x280, 0x150, 0x150, 0x0, 0xf8010000, 0x398, 0x238, 0x238, 0x398, 0x238, 0x3, 0x0, {[{{@ipv6={@mcast1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [], 'team_slave_0\x00', 'macvlan1\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz0\x00'}}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @multicast1}, [], [], 'batadv_slave_0\x00', 'gre0\x00'}, 0x0, 0xa8, 0x118}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "decb585218ebf5805f7356720db1714438ea1c4e4d4388cf67108f218b895e9936aa46525113c03de9cfdfa043d27bdb73687ca94feda3275eefade1197a320d"}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) r4 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_DISCONNECT_CLAIM(r4, 0x8108551b, &(0x7f0000000380)={0x0, 0x0, "5a77bd318786aeb879ca62cdab2a0000000086d85b25a5665a3247e500f61681905db88235f8a5447dd2a2ed6e91626f068881e50f6853772b21a100efb76cba37ff3111d6847e8b9398a646717af75fc008daefba68e6222103472bc55704cdb72b4b996ed831f3b802549db3a8ffff7d34171113d806726615380fe65a6a0a72e1ac2b60bd6276fd8bb6363d10f70da60fd53ded22c87eb2be010e4a62fb73c33424b437bb192c9d06ea6ed04983fe5c5ca033dfce0a82575ef14eee686be0fc58e384f93a13f4e8bbf599394baea3a9ca1864f0a35d6cc38fca32ad6b39905a9727d2001457df7be7e1aefe363590d1f600"}) ioctl$USBDEVFS_CLEAR_HALT(r4, 0xc0105502, &(0x7f0000000340)={0x1, 0x1}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r5, &(0x7f0000000940)=[{{&(0x7f00000004c0)={0xa, 0x4e1d, 0x1, @mcast2, 0x4}, 0x1c, &(0x7f0000000780)=[{&(0x7f00000005c0)}, {&(0x7f0000000640)="b11ec96736a1c3e53c867cbfd2d5f5ffe9a18d4381e63415", 0x18}, {&(0x7f00000006c0)="f18767894112cd0f4bb90ff3d261a6d4a1a9e0ff89187bf98736fa13d25eeae5d220ea5c3bffde4febf6a52381562d9866e8ea58dd24dcbab73ecb594c673c2e4e38d66075e9568baf5d25bf93ecccfc4a3dcd72c995aaffb7c70944d3c7a5dc220a7e2b4658061eb74b6ca841c2e0ba38a9ee6d3c9c84958dcd138c5a71f77e55d3928bf0b2d072905248c858bf9f20a17fcaff9029f6101c613a125531ebff", 0xa0}], 0x3}}, {{&(0x7f00000007c0)={0xa, 0x4e24, 0x5, @mcast1, 0x10001}, 0x1c, &(0x7f0000000800), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="200000000000000029000000370000002cefef2f00000000000000c2040000000700002000000000cf910029000000360000007300000000000000c2040000000b00001400000000000000290000003400000080000000000000001400000000000000290000000b00000000000401000000002000000000000000290000003700000008000000000000000001000401000000180000000000000029000000040074c67a17fbcf000000140000000000000029000000080000000600000000"], 0xc0}}], 0x2, 0x4040845) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x420, 0xffffffff, 0x0, 0x140, 0x280, 0xffffffff, 0xffffffff, 0x350, 0x350, 0x350, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private1, @local, [0xff000000, 0xff, 0x0, 0xffffffff], [0xffffff00, 0x0, 0xff, 0xff000000], 'gre0\x00', 'veth0_macvtap\x00', {0xff}, {0xff}, 0x68, 0x56, 0x1, 0x1}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@inet=@length={{0x28}, {0x4}}, @common=@hbh={{0x48}, {0x6, 0x4, 0x1, [0x3, 0x8, 0x3f, 0x3, 0x400, 0x28, 0x7, 0x4, 0x200, 0x4a46, 0x9, 0x3, 0x7, 0x3, 0x5, 0x3], 0xa}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x0, 0x3}, {0x0, 0x6}}}}, {{@ipv6={@empty, @empty, [0xff, 0xffffffff, 0xff000000, 0xffffff00], [0xffffffff, 0xffffffff, 0xffffff00, 0xff000000], 'syz_tun\x00', 'ipvlan1\x00', {}, {}, 0x2, 0x0, 0x9, 0x25}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x4, 0x5, 0x1}}, @common=@icmp6={{0x28}, {0x11, "33ee"}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "c704de2fbf0e43749dc7cd137238ccb2e41d536e4b1b5b26a42e5adbc968"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x480) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='global_dirty_state\x00', r6}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 390.702584ms ago: executing program 3 (id=1550): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_OFFSET={0x8}, @NFTA_PAYLOAD_BASE={0x8}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}}, 0x0) 287.569854ms ago: executing program 0 (id=1551): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) write$selinux_validatetrans(r1, 0x0, 0x4c) 79.170511ms ago: executing program 3 (id=1552): ioperm(0x0, 0x6, 0x10000) pipe2$9p(0x0, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/3601], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x882) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000300)={{0x0, 0x2}}) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_START(r4, 0x54a0) write$sndseq(r3, &(0x7f0000000140)=[{0x1f, 0x0, 0x0, 0xfd, @tick, {}, {}, @raw32}], 0x1c) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r6, 0x40605346, &(0x7f0000000180)) r7 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r7, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000002c0)={0x0, 0x1, 0x0, &(0x7f0000000300)=""/51, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r7, 0x4028af11, &(0x7f0000000280)={0x1, 0x0, 0x0, &(0x7f0000000500)=""/69, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r7, 0x4008af03, &(0x7f00000016c0)) ioctl$VHOST_SET_LOG_BASE(r7, 0x4008af00, &(0x7f00000000c0)) r8 = eventfd(0x0) ioctl$VHOST_SET_LOG_FD(r7, 0x4004af07, &(0x7f0000000180)=r8) ioctl$VHOST_VSOCK_SET_RUNNING(r7, 0x4004af61, &(0x7f0000000040)=0x1) ioctl$VHOST_SET_VRING_KICK(r7, 0x4008af20, &(0x7f0000000380)={0x1, r8}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40000000000000079100000000000007b0a00ff0000000095007400000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) 0s ago: executing program 0 (id=1554): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0202ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe801005300fff5dd00000010000100080c100000000100ffffffff", 0x58}], 0x1) kernel console output (not intermixed with test programs): system_u:object_r:fix [ 514.708538][ T29] audit: type=1400 audit(1723215746.584:721): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:02:27 syzkaller kern.notice kernel: [ 514.708538][ T29] audit: type=1400 audit(1723215746.584:721): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 518.957567][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 518.957581][ T29] audit: type=1400 audit(1723216263.289:840): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:03 syzkaller kern.warn kernel: [ 518.957567][ T29] kauditd_printk_skb: 118 callbacks suppressed Aug 9 15:11:03 syzkaller kern.notice kernel: [ 518.957581][ T29] audit: type=1400 audit(1723216263.289:840): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 519.095974][ T29] audit: type=1400 audit(1723216263.329:841): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.095974][ T29] audit: type=1400 audit(1723216263.329:841): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 519.153418][ T29] audit: type=1400 audit(1723216263.329:842): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.153418][ T29] audit: type=1400 audit(1723216263.329:842): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 519.247101][ T29] audit: type=1400 audit(1723216263.449:843): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.247101][ T29] audit: type=1400 audit(1723216263.449:843): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 519.373424][ T29] audit: type=1400 audit(1723216263.479:844): avc: denied { map_create } for pid=9540 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.373424][ T29] audit: type=1400 audit(1723216263.479:844): avc: denied { map_create } for pid=9540 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 519.515801][ T29] audit: type=1400 audit(1723216263.509:845): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.515801][ T29] audit: type=1400 audit(1723216263.509:845): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 519.629286][ T29] audit: type=1400 audit(1723216263.509:846): avc: denied { map_create } for pid=9540 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:03 syzkaller kern.notice kernel: [ 519.629286][ T29] audit: type=1400 audit(1723216263.509:846): avc: denied { map_create } for pid=9540 comm="syz.1.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 519.760598][ T29] audit: type=1400 audit(1723216263.509:847): avc: denied { read } for pid=9540 comm="syz.1.978" dev="nsfs" ino=4026532896 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 9 15:11:04 syzkaller kern.notice kernel: [ 519.760598][ T29] audit: type=1400 audit(1723216263.509:847): avc: denied { read } for pid=9540 comm="syz.1.978" dev="nsfs" ino=4026532896 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file per [ 519.928262][ T29] audit: type=1400 audit(1723216263.529:848): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:04 syzkaller kern.notice kernel: [ 519.928262][ T29] audit: type=1400 audit(1723216263.529:848): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 520.129476][ T29] audit: type=1400 audit(1723216263.540:849): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:04 syzkaller kern.notice kernel: [ 520.129476][ T29] audit: type=1400 audit(1723216263.540:849): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 524.629156][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 524.629174][ T29] audit: type=1400 audit(1723216268.962:967): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:08 syzkaller kern.warn kernel: [ 524.629156][ T29] kauditd_printk_skb: 117 callbacks suppressed Aug 9 15:11:08 syzkaller kern.[ 524.672138][ T29] audit: type=1400 audit(1723216268.972:968): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 524.629174][ [ 524.697232][ T29] audit: type=1400 audit(1723216269.002:969): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(172[ 524.721903][ T29] audit: type=1400 audit(1723216269.032:970): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 3216268.962:967)[ 524.745803][ T29] audit: type=1400 audit(1723216269.062:971): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.672138][ T29] audit: type=1400 audit(1723216268.972:968): avc: denied { read } for pid=4654 comm="syslogd" name="[ 524.796331][ T29] audit: type=1400 audit(1723216269.132:972): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkall[ 524.828861][ T29] audit: type=1400 audit(1723216269.162:973): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 er kern.notice kernel: [ 524.697232][ T29] audit: type=1400 audit(1723216269.002:969): avc: [ 524.860165][ T29] audit: type=1400 audit(1723216269.192:974): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.721903][ T29] audit: type=1400 audit(1723216269.032:970): avc: denied { read } for pid=4654 comm="syslogd[ 524.896046][ T29] audit: type=1400 audit(1723216269.222:975): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.745803][ T29] audit: type=1400 audit(1723216269.062:971): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 524.896113][ T29] audit: type=1400 audit(1723216269.222:976): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.796331][ T29] audit: type=1400 audit(1723216269.132:972): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.828861][ T29] audit: type=1400 audit(1723216269.162:973): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.860165][ T29] audit: type=1400 audit(1723216269.192:974): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.896046][ T29] audit: type=1400 audit(1723216269.222:975): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 9 15:11:09 syzkaller kern.notice kernel: [ 524.896113][ T29] audit: type=1400 audit(1723216269.222:976): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 528.934030][ T9644] syzkaller0: entered promiscuous mode [ 528.981169][ T9644] syzkaller0: entered allmulticast mode Aug 9 15:11:13 syzkaller kern.info kernel: [ 528.934030][ T9644] syzkaller0: entered promiscuous mode Aug 9 15:11:13 syzkaller kern.info kernel: [ 528.981169][ T9644] syzkaller0: entered allmulticast mode [ 529.726745][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 529.726765][ T29] audit: type=1400 audit(1723216274.065:1062): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:14 syzkaller kern.warn kernel: [ 529.726745][ T29] kauditd_printk_skb: 85 callbacks suppressed Aug 9 15:11:14 syzkaller kern.notice kernel: [ 529.726765][ T29] audit: type=1400 audit(1723216274.065:1062): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 529.810173][ T29] audit: type=1400 audit(1723216274.095:1063): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 529.810173][ T29] audit: type=1400 audit(1723216274.095:1063): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 529.879015][ T29] audit: type=1400 audit(1723216274.095:1064): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 529.879015][ T29] audit: type=1400 audit(1723216274.095:1064): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 529.949871][ T29] audit: type=1400 audit(1723216274.185:1065): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 529.949871][ T29] audit: type=1400 audit(1723216274.185:1065): avc: denied { read } for pid=4654 comm="syslogd" name="log"[ 529.998314][ T29] audit: type=1400 audit(1723216274.185:1066): avc: denied { create } for pid=9659 comm="syz.0.1021" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 530.030906][ T29] audit: type=1400 audit(1723216274.195:1067): avc: denied { create } for pid=9659 comm="syz.0.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 529.998314][ T29] audit: type=1400 audit(1723216274.185:1066): avc: denied { create } for pid=9659 comm="syz.0.1021" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Aug 9 15:11:14 syzkaller kern.notice kernel: [ 530.030906][ T29] audit: type=1400 audit(1723216274.195:1067): avc: denied { create } for pid=9659 comm="syz.0.1021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 530.133090][ T29] audit: type=1400 audit(1723216274.255:1068): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 530.133090][ T29] audit: type=1400 audit(1723216274.255:1068): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 530.189840][ T29] audit: type=1400 audit(1723216274.325:1069): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 530.189840][ T29] audit: type=1400 audit(1723216274.325:1069): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 530.250655][ T29] audit: type=1400 audit(1723216274.335:1070): avc: denied { create } for pid=9659 comm="syz.0.1021" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 530.250655][ T29] audit: type=1400 audit(1723216274.335:1070): avc: denied { create } for pid=9659 comm="syz.0.1021" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 530.319670][ T29] audit: type=1400 audit(1723216274.405:1071): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:14 syzkaller kern.notice kernel: [ 530.319670][ T29] audit: type=1400 audit(1723216274.405:1071): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 532.063745][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:11:16 [ 532.131287][ T5271] libceph: mon0 (1)[c::]:6789 connect error syzkaller kern.err kernel: [ 532.063745][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:11:16 syz[ 532.147154][ T5271] libceph: connect (1)[c::]:6789 error -101 kaller kern.warn kernel: [ 532.131287][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 532.171527][ T5271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:11:16 syzkaller kern.err kernel: [ 532.147154][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:11:16 syzkaller kern.warn kernel: [ 532.171527][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 532.460178][ T5271] libceph: connect (1)[c::]:6789 error -101 [ 532.476749][ T5271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:11:16 syzkaller kern.err kernel: [ 532.460178][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:11:16 syzkaller kern.warn kernel: [ 532.476749][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 532.625239][ T9680] ceph: No mds server is up or the cluster is laggy Aug 9 15:11:17 syzkaller kern.info kernel: [ 532.625239][ T9680] ceph: No mds server is up or the cluster is laggy [ 534.766387][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 534.766406][ T29] audit: type=1400 audit(1723216279.097:1160): avc: denied { read write } for pid=9705 comm="syz.4.1037" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Aug 9 15:11:19 syzkaller kern.warn kernel: [ 5[ 534.804356][ T29] audit: type=1400 audit(1723216279.137:1161): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 34.766387][ T29] kauditd_printk_skb: 88 callbacks suppressed Aug 9 15:11:19 syzkaller kern.notice kernel: [ 534.766406][ T29] audit: type=1400 audit(1723216279.097:1160)[ 534.842187][ T29] audit: type=1400 audit(1723216279.137:1162): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied { read write } f[ 534.866678][ T29] audit: type=1400 audit(1723216279.177:1163): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 or pid=9705 com[ 534.890109][ T29] audit: type=1400 audit(1723216279.207:1164): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 m="syz.4.1037" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r Aug 9 15:11[ 534.913318][ T29] audit: type=1400 audit(1723216279.237:1165): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :19 syzkaller kern.notice kernel: [ 534.804356][ T29] audit: type=1400 audit(1723216279.137:1161): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkalle[ 534.970456][ T29] audit: type=1400 audit(1723216279.307:1166): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r kern.notice kernel: [ 534.842[ 535.004365][ T29] audit: type=1400 audit(1723216279.337:1167): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 187][ T29] audit: type=1400 audit(1723216279.137:1162): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 sco[ 535.027785][ T29] audit: type=1400 audit(1723216279.347:1168): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 534[ 535.103681][ T29] audit: type=1400 audit(1723216279.437:1169): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .866678][ T29] audit: type=1400 audit(1723216279.177:1163): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 534.890109][ T29] audit: type=1400 audit(1723216279.207:1164): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 534.913318][ T29] audit: type=1400 audit(1723216279.237:1165): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 534.970456][ T29] audit: type=1400 audit(1723216279.307:1166): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 535.004365][ T29] audit: type=1400 audit(1723216279.337:1167): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 535.027785][ T29] audit: type=1400 audit(1723216279.347:1168): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:19 syzkaller kern.notice kernel: [ 535.103681][ T29] audit: type=1400 audit(1723216279.437:1169): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 537.512730][ T9748] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration Aug 9 15:11:21 syzkaller kern.err kernel: [ 537.512730][ T9748] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 539.951030][ T29] kauditd_printk_skb: 137 callbacks suppressed [ 539.951050][ T29] audit: type=1400 audit(1723216284.290:1307): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 539.981855][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:24 syzkaller kern.warn kernel: [ 5[ 539.994951][ T29] audit: type=1400 audit(1723216284.330:1308): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 39.951030][ T2[ 540.018260][ C0] vkms_vblank_simulate: vblank timer overrun 9] kauditd_printk_skb: 137 callbacks suppressed Aug 9 15:11:24 syzkaller kern.notice kernel: [ 539.951050][ T29] audit: type=1400 audit(1723216284.290:1307): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:11:24 syzkaller kern.warn kernel: [ 539.981855][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:24 syzkaller kern.notice kernel: [ 539.994951][ T29] audit: type=1400 audit(1723216284.330:1308): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tc[ 540.083828][ T29] audit: type=1400 audit(1723216284.330:1309): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ontext=system_u:object_r:var_t tclass= Aug 9 15:11:24 syzkaller kern.warn kernel: [ 540.018260][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.083828][ T29] audit: type=1400 audit(1723216284.330:1309): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 540.171502][ T29] audit: type=1400 audit(1723216284.330:1310): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.171502][ T29] audit: type=1400 audit(1723216284.330:1310): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 540.315749][ T29] audit: type=1400 audit(1723216284.370:1311): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.315749][ T29] audit: type=1400 audit(1723216284.370:1311): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 540.382437][ T29] audit: type=1400 audit(1723216284.370:1312): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.382437][ T29] audit: type=1400 audit(1723216284.370:1312): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 540.462425][ T29] audit: type=1400 audit(1723216284.450:1313): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 540.484410][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.462425][ T29] audit: type=1400 audit(1723216284.450:1313): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:24 syzkaller kern.warn kernel: [ 540.484410][ C0] vkms_vblank_simulate: vblank timer overrun [ 540.550525][ T29] audit: type=1400 audit(1723216284.530:1314): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.550525][ T29] audit: type=1400 audit(1723216284.530:1314): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 540.609359][ T29] audit: type=1400 audit(1723216284.550:1315): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 540.633705][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:24 syzkaller kern.notice kernel: [ 540.609359][ T29] audit: type=1400 audit(1723216284.550:1315): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:11:24 syzkaller kern.warn kernel: [ 540.633705][ C0] vkms_vblank_simulate: vblank timer overrun [ 540.714358][ T29] audit: type=1400 audit(1723216284.630:1316): avc: denied { watch } for pid=9779 comm="syz.0.1076" path="/184" dev="tmpfs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 Aug 9 15:11:25 syzkaller kern.notice kernel: [ 540.714358][ T29] audit: type=1400 audit(1723216284.630:1316): avc: denied { watch } for pid=9779 comm="syz.0.1076" path="/184" dev="tmpfs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclas [ 545.008796][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 545.008816][ T29] audit: type=1400 audit(1723216289.352:1409): avc: denied { read write } for pid=7789 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:29 syzkaller kern.warn kernel: [ 545.008796][ T29] kauditd_printk_skb: 92 callbacks suppressed Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.008816][ T29] audit: type=1400 audit(1723216289.352:1409): avc: denied { read write } for pid=7789 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 545.119089][ T29] audit: type=1400 audit(1723216289.362:1410): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.119089][ T29] audit: type=1400 audit(1723216289.362:1410): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 545.189536][ T29] audit: type=1400 audit(1723216289.392:1411): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.189536][ T29] audit: type=1400 audit(1723216289.392:1411): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 545.271756][ T29] audit: type=1400 audit(1723216289.402:1412): avc: denied { read } for pid=9842 comm="syz.4.1089" name="dlm-control" dev="devtmpfs" ino=94 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 545.311175][ T29] audit: type=1400 audit(1723216289.432:1413): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.271756][ [ 545.341003][ T29] audit: type=1400 audit(1723216289.492:1414): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type[ 545.365147][ T29] audit: type=1400 audit(1723216289.563:1415): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1723216289.402:1412): avc: denied { read } for pi[ 545.392038][ T29] audit: type=1400 audit(1723216289.653:1416): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d=9842 comm="syz.4.1089" name="dlm-control" dev="devtmpfs" ino=94 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devic Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.311175][ T29] audit: type=1400 audit(1723216289.432:1413): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.341[ 545.455374][ T29] audit: type=1400 audit(1723216289.683:1417): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 003][ T29] audit: type=1400 audit(1723216289.492:1414): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.365147][ T29] audit: type=1400 audit(1723216289.563:1415): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.392038][ T29] audit: type=1400 audit(1723216289.653:1416): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.455374][ T29] audit: type=1400 audit(1723216289.683:1417): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 545.576180][ T29] audit: type=1400 audit(1723216289.713:1418): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:29 syzkaller kern.notice kernel: [ 545.576180][ T29] audit: type=1400 audit(1723216289.713:1418): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 550.033313][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 550.033326][ T29] audit: type=1400 audit(1723216294.385:1545): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:34 syzkaller kern.warn kernel: [ 550.033313][ T29] kauditd_printk_skb: 126 callbacks suppressed Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.033326][ T29] audit: type=1400 audit(1723216294.385:1545): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 550.149893][ T29] audit: type=1400 audit(1723216294.435:1546): avc: denied { prog_load } for pid=9921 comm="syz.1.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 550.149968][ T29] audit: type=1400 audit(1723216294.445:1547): avc: denied { create } for pid=9921 comm="syz.1.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 550.150079][ T29] audit: type=1400 audit(1723216294.445:1548): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 550.150147][ T29] audit: type=1400 audit(1723216294.445:1549): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 550.150205][ T29] audit: type=1400 audit(1723216294.455:1550): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 550.171507][ T29] audit: type=1400 audit(1723216294.505:1551): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 550.192306][ C0] vkms_vblank_simulate: vblank timer overrun [ 550.197965][ T29] audit: type=1400 audit(1723216294.545:1552): avc: denied { create } for pid=9928 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 550.211574][ T29] audit: type=1326 audit(1723216294.565:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9928 comm="syz.0.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88ef9779f9 code=0x7ffc0000 [ 550.213196][ T29] audit: type=1326 audit(1723216294.565:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9928 comm="syz.0.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88ef9779f9 code=0x7ffc0000 [ 550.244406][ C0] vkms_vblank_simulate: vblank timer overrun [ 550.326728][ C0] vkms_vblank_simulate: vblank timer overrun [ 550.460002][ C0] vkms_vblank_simulate: vblank timer overrun [ 550.643749][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.149893][ T29] audit: type=1400 audit(1723216294.435:1546): avc: denied { prog_load } for pid=9921 comm="syz.1.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.149968][ T29] audit: type=1400 audit(1723216294.445:1547): avc: denied { create } for pid=9921 comm="syz.1.1120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permiss Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.150079][ T29] audit: type=1400 audit(1723216294.445:1548): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.150147][ T29] audit: type=1400 audit(1723216294.445:1549): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.150205][ T29] audit: type=1400 audit(1723216294.455:1550): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.171507][ T29] audit: type=1400 audit(1723216294.505:1551): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:34 syzkaller kern.warn kernel: [ 550.192306][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.197965][ T29] audit: type=1400 audit(1723216294.545:1552): avc: denied { create } for pid=9928 comm="syz.0.1122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.211574][ T29] audit: type=1326 audit(1723216294.565:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9928 comm="syz.0.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compa Aug 9 15:11:34 syzkaller kern.notice kernel: [ 550.213196][ T29] audit: type=1326 audit(1723216294.565:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9928 comm="syz.0.1122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compa Aug 9 15:11:34 syzkaller kern.warn kernel: [ 550.244406][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:34 syzkaller kern.warn kernel: [ 550.326728][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:34 syzkaller kern.warn kernel: [ 550.460002][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:35 syzkaller kern.warn kernel: [ 550.643749][ C0] vkms_vblank_simulate: vblank timer overrun [ 552.063460][ T9954] ALSA: seq fatal error: cannot create timer (-22) [ 552.138278][ T9955] ALSA: seq fatal error: cannot create timer (-22) Aug 9 15:11:36 syzkaller kern.err kernel: [ 552.063460][ T9954] ALSA: seq fatal error: cannot create timer (-22) Aug 9 15:11:36 syzkaller kern.err kernel: [ 552.138278][ T9955] ALSA: seq fatal error: cannot create timer (-22) [ 555.038648][ T29] kauditd_printk_skb: 1253 callbacks suppressed [ 555.038669][ T29] audit: type=1326 audit(1723216299.387:2808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9990 comm="syz.2.1142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc29fd13379 code=0x7ffc0000 Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.038648][ T29] kauditd_printk_skb: 1253 callbacks suppressed Aug 9 15:11:39 syzkaller kern.notice kernel: [ 555.038669][ T29] audit: type=1326 audit(1723216299.387:2808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9990 comm="syz.2.[ 555.109433][ T29] audit: type=1326 audit(1723216299.387:2809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9990 comm="syz.2.1142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc29fd779f9 code=0x7ffc0000 1142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat Aug 9 15:11:39 syzkaller [ 555.140802][T10001] audit: audit_backlog=65 > audit_backlog_limit=64 kern.notice kernel: [ 555.109433][ T29] audit: type=1326 audi[ 555.153148][T10001] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 t(1723216299.387:2809): auid=4294967295 uid=0 gid=0 ses=42949672[ 555.166250][T10000] audit: audit_backlog=65 > audit_backlog_limit=64 95 subj=root:sys[ 555.166405][ T4654] audit: audit_backlog=65 > audit_backlog_limit=64 [ 555.179901][ T29] audit: type=1326 audit(1723216299.387:2810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9990 comm="syz.2.1142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc29fd6e9a7 code=0x7ffc0000 adm_r:sysadm_t p[ 555.187594][T10001] audit: backlog limit exceeded id=9990 comm="sy[ 555.204781][ C0] vkms_vblank_simulate: vblank timer overrun [ 555.217940][T10000] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 z.2.1142" exe="/[ 555.226908][ T4654] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 root/syz-executor" sig=0 arch=c000003e syscall=202 compa Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.140802][T10001] audit: audit_backlog=65 > audit_backlog_limit=64 Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.153148][T10001] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.166250][T10000] audit: audit_backlog=65 > audit_backlog_limit=64 Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.166405][ T4654] audit: audit_backlog=65 > audit_backlog_limit=64 Aug 9 15:11:39 syzkaller kern.notice kernel: [ 555.179901][ T29] audit: type=1326 audit(1723216299.387:2810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9990 comm="syz.2.1142" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat Aug 9 15:11:39 syzkaller kern.err kernel: [ 555.187594][T10001] audit: backlog limit exceeded Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.204781][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.217940][T10000] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Aug 9 15:11:39 syzkaller kern.warn kernel: [ 555.226908][ T4654] audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 [ 558.761480][T10067] syzkaller0: entered promiscuous mode [ 558.767361][T10067] syzkaller0: entered allmulticast mode Aug 9 15:11:43 syzkaller kern.info kernel: [ 558.761480][T10067] syzkaller0: entered promiscuous mode Aug 9 15:11:43 syzkaller kern.info kernel: [ 558.767361][T10067] syzkaller0: entered allmulticast mode [ 560.236173][ T29] kauditd_printk_skb: 1939 callbacks suppressed [ 560.236186][ T29] audit: type=1400 audit(1723216304.590:4724): avc: denied { create } for pid=10098 comm="syz.4.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 Aug 9 15:11:44 syzkaller kern.warn kernel: [ 560.236173][ T29] kauditd_printk_skb: 1939 callbacks suppressed Aug 9 15:11:44 syzkaller kern.notice kernel: [ 560.236186][ T29] audit: type=1400 audit(1723216304.590:4724): avc: denied { create } for pid=10098 comm="syz.4.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 560.342611][ T29] audit: type=1400 audit(1723216304.640:4725): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:44 syzkaller kern.notice kernel: [ 560.342611][ T29] audit: type=1400 audit(1723216304.640:4725): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 560.421641][ T29] audit: type=1400 audit(1723216304.640:4726): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:44 syzkaller kern.notice kernel: [ 560.421641][ T29] audit: type=1400 audit(1723216304.640:4726): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 560.508064][ T29] audit: type=1400 audit(1723216304.690:4727): avc: denied { read } for pid=10098 comm="syz.4.1185" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 Aug 9 15:11:44 syzkaller kern.notice kernel: [ 560.508064][ T29] audit: type=1400 audit(1723216304.690:4727): avc: denied { read } for pid=10098 comm="syz.4.1185" name="card1" dev="devtmpfs" ino=630 scontext=root:sysa[ 560.553188][ T29] audit: type=1400 audit(1723216304.730:4728): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dm_r:sysadm_t tcontext=system_u:object_r:dri_devic Aug 9 15:11:44 syzkaller kern.notice kernel: [ 560.553188][ T29] audit: type=1400 audit(1723216304.730:4728): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 560.634869][ T29] audit: type=1400 audit(1723216304.750:4729): avc: denied { write } for pid=10098 comm="syz.4.1185" name="snmp" dev="proc" ino=4026533080 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 Aug 9 15:11:45 syzkaller kern.notice kernel: [ 560.634869][ T29] audit: type=1400 audit(1723216304.750:4729): avc: denied { write } for pid=10098 comm="syz.4.1185" name="snmp" dev="proc" ino=4026533080 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_n [ 560.714030][ T29] audit: type=1400 audit(1723216304.800:4730): avc: denied { name_bind } for pid=10098 comm="syz.4.1185" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 Aug 9 15:11:45 syzkaller kern.notice kernel: [ 560.714030][ T29] audit: type=1400 audit(1723216304.800:4730): avc: denied { name_bind } for pid=10098 comm="syz.4.1185" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_s [ 560.790430][ T29] audit: type=1400 audit(1723216304.820:4731): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:45 syzkaller kern.notice kernel: [ 560.790430][ T29] audit: type=1400 audit(1723216304.820:4731): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 560.875230][ T29] audit: type=1400 audit(1723216304.890:4732): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:45 syzkaller kern.notice kernel: [ 560.875230][ T29] audit: type=1400 audit(1723216304.890:4732): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 561.004788][ T29] audit: type=1400 audit(1723216304.950:4733): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:45 syzkaller kern.notice kernel: [ 561.004788][ T29] audit: type=1400 audit(1723216304.950:4733): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 563.909096][ T1262] ieee802154 phy1 wpan1: encryption failed: -22 Aug 9 15:11:48 syzkaller kern.warn kernel: [ 563.909096][ T1262] ieee802154 phy1 wpan1: encryption failed: -22 Aug 9 15:11:48 syzkaller kern.debug kernel: [ 563.977482][T10137] PM: Image not found (code -6) [ 564.769400][T10166] kernel profiling enabled (shift: 4) Aug 9 15:11:49 syzkaller kern.info kernel: [ 564.769400][T10166] kernel profiling enabled (shift: 4) [ 565.247995][ T29] kauditd_printk_skb: 123 callbacks suppressed [ 565.248014][ T29] audit: type=1400 audit(1723216309.603:4857): avc: denied { create } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Aug 9 15:11:49 syzkaller kern.warn kernel: [ 565.247995][ T29] kauditd_printk_skb: 123 callbacks suppressed Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.248014][ T29] audit: type=1400 audit(1723216309.603:4857): avc: denied { create } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 565.332595][ T29] audit: type=1400 audit(1723216309.613:4858): avc: denied { create } for pid=10174 comm="syz.0.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.332595][ T29] audit: type=1400 audit(1723216309.613:4858): avc: denied { create } for pid=10174 comm="syz.0.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfi[ 565.376674][ T29] audit: type=1400 audit(1723216309.633:4859): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 lter_socket permis Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.376674][ T29] audit: type=1400 audit(1723216309.633:4859): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 565.430608][ T29] audit: type=1400 audit(1723216309.633:4860): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.430608][ T29] audit: type=1400 audit(1723216309.633:4860): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 565.513292][ T29] audit: type=1400 audit(1723216309.633:4861): avc: denied { prog_load } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.513292][ T29] audit: type=1400 audit(1723216309.633:4861): avc: denied { prog_load } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 565.560830][ T29] audit: type=1400 audit(1723216309.633:4862): avc: denied { execmem } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 9 15:11:49 syzkaller kern.notice kernel: [ 565.560830][ T29] audit: type=1400 audit(1723216309.633:4862): avc: denied { execmem } for pid=10171 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 565.617427][ T29] audit: type=1400 audit(1723216309.683:4863): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 565.700442][ T29] audit: type=1400 audit(1723216309.713:4864): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:50 syzkaller kern.notice kernel: [ [ 565.740443][ T29] audit: type=1400 audit(1723216309.763:4865): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 565.617427][ T29] audit: type=1400 audit(1723216309.683:4863): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=sy[ 565.780885][ T29] audit: type=1400 audit(1723216309.823:4866): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:object_r:fi Aug 9 15:11:50 syzkaller kern.notice kernel: [ 565.700442][ T29] audit: type=1400 audit(1723216309.713:4864): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:50 syzkaller kern.notice kernel: [ 565.740443][ T29] audit: type=1400 audit(1723216309.763:4865): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:50 syzkaller kern.notice kernel: [ 565[ 565.857049][T10184] netlink: 'syz.3.1216': attribute type 3 has an invalid length. .780885][ T29] audit: type=1400 audit(1723216309.823:4866): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:50 syzkaller kern.warn kernel: [ 565.857049][T10184] netlink: 'syz.3.1216': attribute type 3 has an invalid length. Aug 9 15:11:54 syzkaller daemon.err dhcpcd[4886]: ps_sendpsmmsg: Connection refused Aug 9 15:11:54 syzkaller daemon.err dhcpcd[4886]: ps_root_recvmsgcb: failed to send message to pid 9406: Connection refused [ 570.317018][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 570.317037][ T29] audit: type=1400 audit(1723216314.675:5025): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:54 syzkaller kern.warn kernel: [ 570.317018][ T29] kauditd_printk_skb: 158 callbacks suppressed Aug 9 15:11:54 syzkaller kern.notice kernel: [ 570.317037][ T29] audit: type=1400 audit(1723216314.675:5025): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 570.464355][ T29] audit: type=1400 audit(1723216314.715:5026): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 570.611730][ T29] audit: type=1400 audit(1723216314.715:5027): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:54 syzkaller kern.notice kernel: [ 570.464355][ T29] audit: type=1400 audit(1723216314.715:5026): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:11:54 syzkaller kern.notice kernel: [ 570.611730][ T29] audit: type=1400 audit(1723216314.715:5027): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 570.686962][ T29] audit: type=1400 audit(1723216314.735:5028): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:11:55 syzkaller kern.notice kernel: [ 570.686962][ T29] audit: type=1400 audit(1723216314.735:5028): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 570.760990][ T29] audit: type=1400 audit(1723216314.845:5029): avc: denied { map_create } for pid=10266 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:55 [ 570.821657][ T29] audit: type=1400 audit(1723216314.845:5030): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 syzkaller kern.notice kernel: [ 570.760990][ T29] audit: type=1400 audit(1723216314.845:5029): avc: denied { map_create } for pid=10266 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 570.898582][ T29] audit: type=1400 audit(1723216314.855:5031): avc: denied { prog_load } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:55 syzkaller kern.notice kernel: [ 570.821657][ T29] audit: type=1400 audit(1723[ 570.937516][ T29] audit: type=1400 audit(1723216314.865:5032): avc: denied { map_create } for pid=10266 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 216314.845:5030): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Aug 9 15:11:55 sy[ 570.974212][ T29] audit: type=1400 audit(1723216314.865:5033): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 zkaller kern.notice kernel: [ 570.898582][ T29] audit: type=1400 audit(1723216314.855:5031): avc: denied { [ 571.003487][ T29] audit: type=1400 audit(1723216314.865:5034): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 prog_load } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:55 syzkaller kern.notice kernel: [ 570.937516][ T29] audit: type=1400 audit(1723216314.865:5032): avc: denied { map_create } for pid=10266 comm="syz.1.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:11:55 syzkaller kern.notice kernel: [ 570.974212][ T29] audit: type=1400 audit(1723216314.865:5033): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 Aug 9 15:11:55 syzkaller kern.notice kernel: [ 571.003487][ T29] audit: type=1400 audit(1723216314.865:5034): avc: denied { create } for pid=10263 comm="syz.3.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 572.290979][T10299] can0: slcan on ptm1. Aug 9 15:11:56 syzkaller kern.info kernel: [ 572.290979][T10299] can0: slcan on ptm1. [ 572.422084][T10297] can0 (unregistered): slcan off ptm1. Aug 9 15:11:56 syzkaller kern.info kernel: [ 572.422084][T10297] can0 (unregistered): slcan off ptm1. Aug 9 15:11:57 syzkaller daemon.err dhcpcd[4886]: ps_sendpsmmsg: Connection refused Aug 9 15:11:57 syzkaller daemon.err dhcpcd[4886]: ps_root_recvmsgcb: failed to send message to pid 9407: Connection refused Aug 9 15:11:57 syzkaller daemon.err dhcpcd[[ 572.765747][T10310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=10310 comm=syz.4.1262 4886]: ps_sendpsmmsg: Connection refused Aug 9 15:11:57 syzkaller daemon.err dhcpcd[4886]: ps_root_recvmsgcb: failed to send message to pid 9409: Connection refused Aug 9 15:11:57 syzkaller kern.warn kernel: [ 572.765747][T10310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=10310 comm=syz.4.1262 Aug 9 15:11:57 syzkaller daemon.err dhcpcd[4886]: ps_sendpsmmsg: Connection refused Aug 9 15:11:57 syzkaller daemon.err dhcpcd[4886]: ps_root_recvmsgcb: failed to send message to pid 9408: Connection refused [ 574.272148][T10335] futex_wake_op: syz.3.1271 tries to shift op by -1; fix this program Aug 9 15:11:58 syzkaller kern.info kernel: [ 574.272148][T10335] futex_wake_op: syz.3.1271 tries to shift op by -1; fix this program [ 575.370380][ T29] kauditd_printk_skb: 189 callbacks suppressed [ 575.370399][ T29] audit: type=1400 audit(1723216319.728:5224): avc: denied { create } for pid=10351 comm="syz.0.1278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 575.376625][T10353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10353 comm=syz.0.1278 Aug 9 15:11:59 syzkaller kern.warn kernel: [ 575.370380][ T29] kauditd_printk_skb: 189 callbacks suppressed Aug 9 15:11:59 syzkaller kern.notice kernel: [ 575.370399][ T29] audit: type=1400 audit(1723216319.728:5224): avc: denied { create } for pid=10351 comm="syz.0.1278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi Aug 9 15:11:59 syzkaller kern.warn kernel: [ 575.376625][T10353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10353 comm=syz.0.1278 [ 575.529746][ T29] audit: type=1400 audit(1723216319.738:5225): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:11:59 syzkaller kern.notice kernel: [ 575.529746][ T29] audit: type=1400 audit(1723216319.738:5225): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 575.641673][ T29] audit: type=1400 audit(1723216319.768:5226): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 575.641673][ T29] audit: type=1400 audit(1723216319.768:5226): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 575.736782][ T29] audit: type=1400 audit(1723216319.778:5227): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 575.736782][ T29] audit: type=1400 audit(1723216319.778:5227): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 575.834505][ T29] audit: type=1400 audit(1723216319.788:5228): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 575.834505][ T29] audit: type=1400 audit(1723216319.788:5228): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 575.938773][ T29] audit: type=1400 audit(1723216319.908:5229): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 575.938773][ T29] audit: type=1400 audit(1723216319.908:5229): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.017519][ T29] audit: type=1400 audit(1723216320.018:5230): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 576.017519][ T29] audit: type=1400 audit(1723216320.018:5230): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.097814][ T29] audit: type=1400 audit(1723216320.148:5231): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 576.097814][ T29] audit: type=1400 audit(1723216320.148:5231): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.182022][ T29] audit: type=1400 audit(1723216320.218:5232): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 576.182022][ T29] audit: type=1400 audit(1723216320.218:5232): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 576.254194][ T29] audit: type=1400 audit(1723216320.228:5233): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:00 syzkaller kern.notice kernel: [ 576.254194][ T29] audit: type=1400 audit(1723216320.228:5233): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 580.383565][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 580.383592][ T29] audit: type=1400 audit(1723216324.740:5354): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:04 syzkaller kern.warn kernel: [ 580.383565][ T29] kauditd_printk_skb: 120 callbacks suppressed Aug 9 15:12:04 syzkaller kern.notice kernel: [ 580.383592][ T29] audit: type=1400 audit(1723216324.740:5354): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 580.485830][ T29] audit: type=1400 audit(1723216324.760:5355): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:04 syzkaller kern.n[ 580.518088][ T29] audit: type=1400 audit(1723216324.780:5356): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 580.485830][ T29] audit: type=1400 audit(1723216324.760:5355): avc: denied { read } for pid=4654 comm="syslogd" name="log"[ 580.553038][ T29] audit: type=1400 audit(1723216324.880:5357): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:obje[ 580.581216][ T29] audit: type=1400 audit(1723216324.910:5358): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Aug 9 15:12:04 syzkaller kern.notice kernel: [ 580.518088][ T29] audit: type=1400 audit(1723216324.780:5356): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:04 syzkaller kern.notice ke[ 580.632872][ T29] audit: type=1400 audit(1723216324.940:5359): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rnel: [ 580.553038][ T29] audit: type=1400 audit(1723216324.880:5357): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:04 syzkaller kern.notice kernel: [ 580.581216][ T29] audit: type=1400 audit(1723216324.910:5358): avc: denied { read } for pid=4654 comm="syslogd[ 580.690387][ T29] audit: type=1400 audit(1723216324.970:5360): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 " name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:05 syzkaller kern.notice kernel: [ 580.632872][ T29] audit: type=1400 audit(1723216324.940:5359): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:05 syzkaller kern.notice kernel: [ 580.690387][ T29] audit: type=1400 audit(1723216324.970:5360): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontex[ 580.763429][ T29] audit: type=1400 audit(1723216325.030:5361): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:05 syzkaller kern.notice kernel: [ 580.763429][ T29] audit: type=1400 audit(1723216325.030:5361): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 580.865364][ T29] audit: type=1400 audit(1723216325.090:5362): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 580.947176][ T29] audit: type=1400 audit(1723216325.100:5363): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:05 syzkaller kern.notice kernel: [ 580.865364][ T29] audit: type=1400 audit(1723216325.090:5362): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:05 syzkaller kern.notice kernel: [ 580.947176][ T29] audit: type=1400 audit(1723216325.100:5363): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 582.308553][T10463] serio: Serial port ptm0 Aug 9 15:12:06 syzkaller kern.info kernel: [ 582.308553][T10463] serio: Serial port ptm0 [ 584.945598][T10508] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration Aug 9 15:12:09 syzkaller kern.err kernel: [ 584.945598][T10508] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 585.387705][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 585.387724][ T29] audit: type=1400 audit(1723216329.753:5471): avc: denied { prog_load } for pid=10512 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 585.395079][ T29] audit: type=1400 audit(1723216329.763:5472): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 585.456220][ T29] audit: type=1400 audit(1723216329.823:5473): avc: denied { create } for pid=10512 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 585.509205][ C1] vkms_vblank_simulate: vblank timer overrun [ 585.579036][ T29] audit: type=1400 audit(1723216329.943:5474): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 585.662930][ T29] audit: type=1400 audit(1723216330.023:5475): avc: denied { read } for pid=10515 comm="syz.4.1335" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 585.669345][ T29] audit: type=1400 audit(1723216330.033:5476): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 585.679013][ T29] audit: type=1400 audit(1723216330.043:5477): avc: denied { read } for pid=10515 comm="syz.4.1335" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 585.724045][ T29] audit: type=1400 audit(1723216330.093:5478): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 585.763641][ T29] audit: type=1400 audit(1723216330.133:5479): avc: denied { create } for pid=10517 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 585.773404][ T29] audit: type=1400 audit(1723216330.143:5480): avc: denied { create } for pid=10517 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Aug 9 15:12:09 syzkaller kern.warn kernel: [ 585.387705][ T29] kauditd_printk_skb: 107 callbacks suppressed Aug 9 15:12:09 syzkaller kern.notice kernel: [ 585.387724][ T29] audit: type=1400 audit(1723216329.753:5471): avc: denied { prog_load } for pid=10512 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:09 syzkaller kern.notice kernel: [ 585.395079][ T29] audit: type=1400 audit(1723216329.763:5472): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:09 syzkaller kern.notice kernel: [ 585.456220][ T29] audit: type=1400 audit(1723216329.823:5473): avc: denied { create } for pid=10512 comm="syz.1.1334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Aug 9 15:12:09 syzkaller kern.warn kernel: [ 585.509205][ C1] vkms_vblank_simulate: vblank timer overrun Aug 9 15:12:09 syzkaller kern.notice kernel: [ 585.579036][ T29] audit: type=1400 audit(1723216329.943:5474): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.662930][ T29] audit: type=1400 audit(1723216330.023:5475): avc: denied { read } for pid=10515 comm="syz.4.1335" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.669345][ T29] audit: type=1400 audit(1723216330.033:5476): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.679013][ T29] audit: type=1400 audit(1723216330.043:5477): avc: denied { read } for pid=10515 comm="syz.4.1335" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.724045][ T29] audit: type=1400 audit(1723216330.093:5478): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.763641][ T29] audit: type=1400 audit(1723216330.133:5479): avc: denied { create } for pid=10517 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Aug 9 15:12:10 syzkaller kern.notice kernel: [ 585.773404][ T29] audit: type=1400 audit(1723216330.143:5480): avc: denied { create } for pid=10517 comm="syz.2.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 586.488919][T10537] TCP: TCP_TX_DELAY enabled Aug 9 15:12:10 syzkaller kern.info kernel: [ 586.488919][T10537] TCP: TCP_TX_DELAY enabled [ 590.405937][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 590.405950][ T29] audit: type=1400 audit(1723216334.775:5599): avc: denied { execmem } for pid=10573 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 9 15:12:14 syzkaller kern.warn kernel: [ 590.405937][ T29] kauditd_printk_skb: 118 callbacks suppressed Aug 9 15:12:14 syzkaller kern.notice kernel: [ 590.405950][ T29] audit: type=1400 audit(1723216334.775:5599): avc: denied { execmem } for pid=10573 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 590.507505][ T29] audit: type=1400 audit(1723216334.815:5600): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:14 syzkaller kern.notice kernel: [ 590.507505][ T29] audit: type=1400 audit(1723216334.815:5600): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 590.640218][ T29] audit: type=1400 audit(1723216334.815:5601): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.640218][ T29] audit: type=1400 audit(1723216334.815:5601): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 590.774865][ T29] audit: type=1400 audit(1723216334.825:5602): avc: denied { create } for pid=10573 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.774865][ T29] audit: type=1400 audit(1723216334.825:5602): avc: denied { create } for [ 590.818886][ T29] audit: type=1400 audit(1723216334.865:5603): avc: denied { create } for pid=10573 comm="syz.3.1356" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 pid=10573 comm="syz.3.1356" scontext=root:sysadm[ 590.844595][ T29] audit: type=1400 audit(1723216334.915:5604): avc: denied { read write } for pid=10573 comm="syz.3.1356" name="video8" dev="devtmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 _r:sysadm_t tcontext=root:sysadm[ 590.870796][ T29] audit: type=1400 audit(1723216334.915:5605): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _r:sysadm_t tclass=netlink_netfilter_socket permis Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.818886][ T29] audit: type=1400 audit(1723216334.865:5603): avc: denied { create } for pid=10573 comm="syz.3.1356" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.844595][ T29] audit: type=1400 audit(1723216334.915:5604): avc: denied { read write } for pid=10573 comm="syz.3.1356" name="video8" dev="devtmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tco[ 590.943893][ T29] audit: type=1400 audit(1723216334.925:5606): avc: denied { write } for pid=10573 comm="syz.3.1356" name="unix" dev="proc" ino=4026533464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 ntext=system_u:object_r:v4 Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.870796][ T29] audit: type=1400 audit(1723216334.915:5605): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:15 syzkaller kern.notice kernel: [ 590.943893][ T29] audit: type=1400 audit(1723216334.925:5606): avc: denied { write } for pid=10573 comm="syz.3.1356" name=[ 591.008511][ T29] audit: type=1400 audit(1723216334.955:5607): avc: denied { prog_load } for pid=10573 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 "unix" dev="proc" ino=4026533464 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_n Aug 9 15:12:15 syzkaller kern.notice kernel: [ 591.008511][ T29] audit: type=1400 audit(1723216334.955:5607): avc: denied { prog_load } for pid=10573 comm="syz.3.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 591.117965][ T29] audit: type=1400 audit(1723216335.035:5608): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:15 syzkaller kern.notice kernel: [ 591.117965][ T29] audit: type=1400 audit(1723216335.035:5608): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 593.432808][T10620] i2c i2c-0: Invalid block write size 34 Aug 9 15:12:17 syzkaller kern.err kernel: [ 593.432808][T10620] i2c i2c-0: Invalid block write size 34 [ 595.447513][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 595.447533][ T29] audit: type=1400 audit(1723216339.808:5736): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:19 syzkaller kern.warn kernel: [ 595.447513][ T29] kauditd_printk_skb: 127 callbacks suppressed Aug 9 15:12:19 syzkaller kern.notice kernel: [ 595.447533][ T29] audit: type=1400 audit(1723216339.808:5736): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 595.541394][ T29] audit: type=1400 audit(1723216339.848:5737): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:19 syzkaller kern.notice kernel: [ 595.541394][ T29] audit: type=1400 audit(1723216339.848:5737): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.607770][ T29] audit: type=1400 audit(1723216339.848:5738): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 595.607838][ T29] audit: type=1400 audit(1723216339.938:5739): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 595.618553][ T29] audit: type=1400 audit(1723216339.978:5740): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:19 syzkaller kern.notice kernel: [ 595.607770][ T29] audit: type=1400 audit(1723216339.848:5738): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:19 syzkaller kern.notice kernel: [ 595.607838][ T29] audit: type=1400 audit(1723216339.938:5739): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.805654][ T29] audit: type=1400 audit(1723216340.048:5741): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:20 syzkaller kern.notice kernel: [ 595.618553][ T29] audit: type=1400 audit(1723216339.978:5740): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:20 syzkaller kern.notice kernel: [ 595.805654][ T29] audit: type=1400 audit(1723216340.048:5741): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 595.896813][ T29] audit: type=1400 audit(1723216340.058:5742): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:20 syzkaller kern.notice kernel: [ 595.896813][ T29] audit: type=1400 audit(1723216340.058:5742): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 596.023225][ T29] audit: type=1400 audit(1723216340.108:5743): avc: denied { read } for pid=10646 comm="syz.4.1383" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 9 15:12:20 syzkaller kern.notice kernel: [ 596.023225][ T29] audit: type=1400 audit(1723216340.108:5743): avc: denied { read } for pid=10646 comm="syz.4.1383" dev="nsfs" ino=4026532974 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 596.114832][ T29] audit: type=1400 audit(1723216340.148:5744): avc: denied { prog_load } for pid=10646 comm="syz.4.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:20 syzkaller kern.notice kernel: [ 596.114832][ T29] audit: type=1400 audit(1723216340.148:5744): avc: denied { prog_load } for pid=10646 comm="syz.4.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t t[ 596.163795][ T29] audit: type=1400 audit(1723216340.158:5745): avc: denied { map_create } for pid=10646 comm="syz.4.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 class=bpf permissive=0 Aug 9 15:12:20 syzkaller kern.notice kernel: [ 596.163795][ T29] audit: type=1400 audit(1723216340.158:5745): avc: denied { map_create } for pid=10646 comm="syz.4.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 596.786720][ T9271] libceph: connect (1)[c::]:6789 error -101 [ 596.843510][ T9271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:12:21 syzkaller kern.err kernel: [ 596.786720][ T9271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:12:21 syzkaller kern.warn kernel: [ 596.843510][ T9271] libceph: mon0 (1)[c::]:6789 connect error [ 597.147592][ T46] libceph: connect (1)[c::]:6789 error -101 [ 597.185417][ T46] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:12:21 syzkaller kern.err kernel: [ 597.147592][ T46] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:12:21 syzkaller kern.warn kernel: [ 597.185417][ T46] libceph: mon0 (1)[c::]:6789 connect error [ 597.595612][T10666] ceph: No mds server is up or the cluster is laggy Aug 9 15:12:21 syzkaller kern.info kernel: [ 597.595612][T10666] ceph: No mds server is up or the cluster is laggy [ 597.651910][T10683] syzkaller0: entered promiscuous mode [ 597.696706][T10683] syzkaller0: entered allmulticast mode Aug 9 15:12:22 syzkaller kern.info kernel: [ 597.651910][T10683] syzkaller0: entered promiscuous mode Aug 9 15:12:22 syzkaller kern.info kernel: [ 597.696706][T10683] syzkaller0: entered allmulticast mode [ 597.789096][T10694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10694 comm=syz.2.1399 Aug 9 15:12:22 syzkaller kern.warn kernel: [ 597.789096][T10694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10694 comm=syz.2.1399 [ 600.597118][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 600.597135][ T29] audit: type=1400 audit(1723216344.960:5904): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:25 [ 600.632182][ T29] audit: type=1400 audit(1723216345.000:5905): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.warn kernel: [ 600.597118][ T2[ 600.657798][ T29] audit: type=1400 audit(1723216345.000:5906): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 600.684294][ T29] audit: type=1400 audit(1723216345.030:5907): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 158 callb[ 600.707370][ T29] audit: type=1400 audit(1723216345.050:5908): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 600.731206][ T29] audit: type=1400 audit(1723216345.080:5909): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:25 syzkaller kern.[ 600.756002][ T29] audit: type=1400 audit(1723216345.090:5910): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 600.597135][ T29] audit: type=1400 audit(1723216344.960:5904): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" d[ 600.807267][ T29] audit: type=1400 audit(1723216345.100:5911): avc: denied { bpf } for pid=10732 comm="syz.0.1414" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 ev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r[ 600.844696][ T29] audit: type=1400 audit(1723216345.130:5912): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :fi Aug 9 15:12:25 syzkaller k[ 600.869951][ T29] audit: type=1400 audit(1723216345.150:5913): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ern.notice kernel: [ 600.632182][ T29] audit: type=1400 audit(1723216345.000:5905): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.657798][ T29] audit: type=1400 audit(1723216345.000:5906): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.684294][ T29] audit: type=1400 audit(1723216345.030:5907): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.707370][ T29] audit: type=1400 audit(1723216345.050:5908): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.731206][ T29] audit: type=1400 audit(1723216345.080:5909): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.756002][ T29] audit: type=1400 audit(1723216345.090:5910): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.807267][ T29] audit: type=1400 audit(1723216345.100:5911): avc: denied { bpf } for pid=10732 comm="syz.0.1414" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permiss Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.844696][ T29] audit: type=1400 audit(1723216345.130:5912): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:25 syzkaller kern.notice kernel: [ 600.869951][ T29] audit: type=1400 audit(1723216345.150:5913): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 604.532946][T10785] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration Aug 9 15:12:28 syzkaller kern.err kernel: [ 604.532946][T10785] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 605.598422][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 605.598439][ T29] audit: type=1400 audit(1723216349.973:6031): avc: denied { create } for pid=10806 comm="syz.1.1441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Aug 9 15:12:30 syzkaller kern.warn kernel: [ 605.598422][ T29] kauditd_printk_skb: 117 callbacks suppressed Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.598439][ T29] audit: type=1400 audit(1723216349.973:6031): avc: denied { create } for pid=10806 comm="syz.1.1441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissi [ 605.672194][ T29] audit: type=1400 audit(1723216350.003:6032): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.672194][ T29] audit: type=1400 audit(1723216350.003:6032): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 605.751525][ T29] audit: type=1400 audit(1723216350.003:6033): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.751525][ T29] audit: type=1400 audit(1723216350.003:6033): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 605.809054][ T29] audit: type=1400 audit(1723216350.013:6034): avc: denied { prog_load } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.809054][ T29] audit: type=1400 audit(1723216350.013:6034): avc: denied { prog_load } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.894861][ T29] audit: type=1400 audit(1723216350.013:6035): avc: denied { map_create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.894861][ T29] audit: type=1400 audit(1723216350.013:6035)[ 605.940999][ T29] audit: type=1400 audit(1723216350.023:6036): avc: denied { map_create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 : avc: denied { map_create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.940999][ T29] audit: type=1400 audit(1723216350.023:6036): avc: denied { map_create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontex[ 605.993236][ T29] audit: type=1400 audit(1723216350.083:6037): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:30 syzkaller kern.notice kernel: [ 605.993236][ T29] audit: type=1400 audit(1723216350.083:6037): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=[ 606.037475][ T29] audit: type=1400 audit(1723216350.093:6038): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:30 syzkaller kern.notice kernel: [ 606.037475][ T29] audit: type=1400 audit(1723216350.093:6038): avc: denied [ 606.089307][ T29] audit: type=1400 audit(1723216350.093:6039): avc: denied { create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:30 syzkaller kern.notice kernel[ 606.127746][ T29] audit: type=1400 audit(1723216350.103:6040): avc: denied { block_suspend } for pid=10809 comm="syz.4.1442" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 : [ 606.089307][ 606.150466][ C0] vkms_vblank_simulate: vblank timer overrun [ T29] audit: type=1400 audit(1723216350.093:6039): avc: denied { create } for pid=10804 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissiv Aug 9 15:12:30 syzkaller kern.notice kernel: [ 606.127746][ T29] audit: type=1400 audit(1723216350.103:6040): avc: denied { block_suspend } for pid=10809 comm="syz.4.1442" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capabilit Aug 9 15:12:30 syzkaller kern.warn kernel: [ 606.150466][ C0] vkms_vblank_simulate: vblank timer overrun [ 610.634264][ T29] kauditd_printk_skb: 137 callbacks suppressed [ 610.634278][ T29] audit: type=1400 audit(1723216355.015:6178): avc: denied { mounton } for pid=10887 comm="syz.4.1469" path="/145/file0" dev="tmpfs" ino=776 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 Aug 9 15:12:35 syzkaller kern.warn kernel: [ 610.634264][ T29] kauditd_printk_skb: 137 callbacks suppressed Aug 9 15:12:35 syzkaller kern.notice kernel: [ 610.634278][ T29] audit: type=1400 audit(1723216355.015:6178): avc: denied { mounton } for pid=10887 comm="syz.4.1469" path="/145/file0" dev="tmpfs" ino=776 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmp [ 610.722841][ T29] audit: type=1400 audit(1723216355.025:6179): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 610.722841][ T29] audit: type=1400 audit(1723216355.025:6179): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 610.806756][ T29] audit: type=1400 audit(1723216355.045:6180): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 610.806756][ T29] audit: type=1400 audit(1723216355.045:6180): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 610.893307][ T29] audit: type=1400 audit(1723216355.125:6181): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 610.893307][ T29] audit: type=1400 audit(1723216355.125:6181): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 611.004133][ T29] audit: type=1400 audit(1723216355.185:6182): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.004133][ T29] audit: type=1400 audit(1723216355.185:6182): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 611.067172][ T29] audit: type=1400 audit(1723216355.185:6183): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.067172][ T29] audit: type=1400 audit(1723216355.185:6183): avc: denied { read write } for pid=8523 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 611.170464][ T29] audit: type=1400 audit(1723216355.215:6184): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.170464][ T29] audit: type=1400 audit(1723216355.215:6184): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 611.281677][ T29] audit: type=1400 audit(1723216355.305:6185): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.281677][ T29] audit: type=1400 audit(1723216355.305:6185): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 611.362800][ T29] audit: type=1400 audit(1723216355.415:6186): avc: denied { map } for pid=10894 comm="syz.4.1472" path="/dev/hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.362800][ T29] audit: type=1400 audit(1723216355.415:6186): avc: denied { map } for pid=10894 comm="syz.4.1472" path="/dev/hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random [ 611.433585][ T29] audit: type=1400 audit(1723216355.415:6187): avc: denied { prog_load } for pid=10894 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:35 syzkaller kern.notice kernel: [ 611.433585][ T29] audit: type=1400 audit(1723216355.415:6187): avc: denied { prog_load } for pid=10894 comm="syz.4.1472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 612.944834][ T5271] libceph: connect (1)[c::]:6789 error -101 [ 612.959207][ T5271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:12:37 syzkaller kern.err kernel: [ 612.944834][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:12:37 syzkaller kern.warn kernel: [ 612.959207][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 613.229641][ T5271] libceph: connect (1)[c::]:6789 error -101 [ 613.243872][ T5271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:12:37 syzkaller kern.err kernel: [ 613.229641][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:12:37 syzkaller kern.warn kernel: [ 613.243872][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 613.523748][T10935] trusted_key: encrypted_key: insufficient parameters specified Aug 9 15:12:37 syzkaller kern.err kernel: [ 613.523748][T10935] trusted_key: encrypted_key: insufficient parameters specified [ 613.678870][T10916] ceph: No mds server is up or the cluster is laggy Aug 9 15:12:38 syzkaller kern.info kernel: [ 613.678870][T10916] ceph: No mds server is up or the cluster is laggy [ 613.769197][ T5271] libceph: connect (1)[c::]:6789 error -101 [ 613.833821][ T5271] libceph: mon0 (1)[c::]:6789 connect error Aug 9 15:12:38 syzkaller kern.err kernel: [ 613.769197][ T5271] libceph: connect (1)[c::]:6789 error -101 Aug 9 15:12:38 syzkaller kern.warn kernel: [ 613.833821][ T5271] libceph: mon0 (1)[c::]:6789 connect error [ 615.655024][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 615.655042][ T29] audit: type=1400 audit(1723216360.028:6321): avc: denied { execmem } for pid=10960 comm="syz.3.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 9 15:12:40 syzkaller kern.warn kernel: [ 615.655024][ T29] kauditd_printk_skb: 133 callbacks suppressed Aug 9 15:12:40 syzkaller kern.notice kernel: [ 615.655042][ T29] audit: type=1400 audit(1723216360.028:6321): avc: denied { execmem } for pid=10960 comm="syz.3.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 615.731292][ T29] audit: type=1400 audit(1723216360.068:6322): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:40 syzkaller kern.notice kernel: [ 615.731292][ T29] audit: type=1400 audit(1723216360.068:6322): avc: denied [ 615.775245][ T29] audit: type=1400 audit(1723216360.068:6323): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:40 syzkaller kern.notice kernel: [ 615.775245][ T29] audit: type=1400 audit(1723216360.068:6323): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 615.896853][ T29] audit: type=1400 audit(1723216360.088:6324): avc: denied { create } for pid=10960 comm="syz.3.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 Aug 9 15:12:40 syzkaller kern.notice kernel: [ 615.896853][ T29] audit: type=1400 audit(1723216360.088:6324): avc: denied { create } for pid=10960 comm="syz.3.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 615.997624][ T29] audit: type=1400 audit(1723216360.088:6325): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 9 15:12:40 syzkaller kern.notice kernel: [ 615.997624][ T29] audit: type=1400 audit(1723216360.088:6325): avc: denied { read write } for pid=7643 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 616.102782][ T29] audit: type=1400 audit(1723216360.138:6326): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:40 syzkaller kern.notice kernel: [ 616.102782][ T29] audit: type=1400 audit(1723216360.138:6326): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 616.187222][ T29] audit: type=1400 audit(1723216360.188:6327): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 616.216604][ T29] audit: type=1400 audit(1723216360.188:6328): avc: denied { read write } for pid=10958 comm="syz.0.1493" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 616.216646][ T29] audit: type=1400 audit(1723216360.188:6329): avc: denied { mounton } for pid=10958 comm="syz.0.1493" path="/271/file0" dev="tmpfs" ino=1470 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 616.216684][ T29] audit: type=1400 audit(1723216360.188:6330): avc: denied { read } for pid=10960 comm="syz.3.1492" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 Aug 9 15:12:40 syzkaller kern.notice kernel: [ 616.187222][ T29] audit: type=1400 audit(1723216360.188:6327): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:40 syzkaller kern.notice kernel: [ 616.216604][ T29] audit: type=1400 audit(1723216360.188:6328): avc: denied { read write } for pid=10958 comm="syz.0.1493" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_ Aug 9 15:12:40 syzkaller kern.notice kernel: [ 616.216646][ T29] audit: type=1400 audit(1723216360.188:6329): avc: denied { mounton } for pid=10958 comm="syz.0.1493" path="/271/file0" dev="tmpfs" ino=1470 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tm Aug 9 15:12:40 syzkaller kern.notice kernel: [ 616.216684][ T29] audit: type=1400 audit(1723216360.188:6330): avc: denied { read } for pid=10960 comm="syz.3.1492" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t [ 618.256724][T10996] can0: slcan on ptm0. Aug 9 15:12:42 syzkaller kern.info kernel: [ 618.256724][T10996] can0: slcan on ptm0. [ 618.448597][T10995] can0 (unregistered): slcan off ptm0. Aug 9 15:12:42 syzkaller kern.info kernel: [ 618.448597][T10995] can0 (unregistered): slcan off ptm0. [ 620.687463][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 620.687482][ T29] audit: type=1400 audit(1723216365.070:6462): avc: denied { prog_load } for pid=11038 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:45 syzkaller kern.warn kernel: [ 620.687463][ T29] kauditd_printk_skb: 131 callbacks suppressed Aug 9 15:12:45 syzkaller kern.notice kernel: [ 620.687482][ T29] audit: type=1400 audit(1723216365.070:6462): avc: denied { prog_load } for pid=11038 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 620.791861][ T29] audit: type=1400 audit(1723216365.070:6463): avc: denied { execmem } for pid=11034 comm="syz.4.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 9 15:12:45 syzkaller kern.notice kernel: [ 620.791861][ T29] audit: type=1400 audit(1723216365.070:6463): avc: denied { execmem } for pid=11034 comm="syz.4.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 620.861947][ T29] audit: type=1400 audit(1723216365.100:6464): avc: denied { create } for pid=11038 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 Aug 9 15:12:45 syzkaller kern.notice kernel: [ [ 620.888650][ T29] audit: type=1400 audit(1723216365.110:6465): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 620.861947][ T29] audit: type=1400 audit(1723216365.100:6464): avc: denied { create } for pid=11038 comm="syz.1.1519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 Aug 9 15:12:45 syzkaller kern.notice kernel: [ 620.888650][ T29] audit: type=1400 audit(1723216365.110:6465): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 621.003510][ T29] audit: type=1400 audit(1723216365.120:6466): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:45 syzkaller kern.notice kernel: [ 621.003510][ T29] audit: type=1400 audit(1723[ 621.038445][ T29] audit: type=1400 audit(1723216365.140:6467): avc: denied { read write } for pid=11036 comm="syz.0.1520" name="video0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 216365.120:6466): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:45 syzkaller ke[ 621.081206][ T29] audit: type=1400 audit(1723216365.170:6468): avc: denied { node_bind } for pid=11036 comm="syz.0.1520" saddr=fe80::aa scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=0 rn.notice kernel: [ 621.038445][ T29] audit: type=1400 audit(1723216365.140:6467): avc: denied { read write[ 621.112146][ T29] audit: type=1400 audit(1723216365.200:6469): avc: denied { create } for pid=11034 comm="syz.4.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 } for pid=11036 comm="syz.0.1520" name="video0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 Aug 9 15:12:45 syzkaller kern.notice kernel: [ 621.081206][ T29] audit: type=1400 audit(1723216365.170:6468): avc: denied { node_bind } for pid=11036 comm="syz.0.1520" saddr=fe80::aa scontext=r[ 621.160885][ T29] audit: type=1400 audit(1723216365.200:6470): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 oot:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket Aug 9 15:12:45 syzkaller kern.notice kernel: [ 621.112146][ T29] audit: type=1400 audit(1723216365.200:6469): avc: denied { cr[ 621.200884][ T29] audit: type=1400 audit(1723216365.200:6471): avc: denied { read } for pid=11034 comm="syz.4.1518" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 eate } for pid=11034 comm="syz.4.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Aug 9 15:12:45 syzkaller kern.notice kernel: [ 621.160885][ T29] audit: type=1400 audit(1723216365.200:6470): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:45 syzkaller kern.notice kernel: [ 621.200884][ T29] audit: type=1400 audit(1723216365.200:6471): avc: denied { read } for pid=11034 comm="syz.4.1518" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_de [ 622.022377][T11053] xt_ecn: cannot match TCP bits for non-tcp packets Aug 9 15:12:46 syzkaller kern.info kernel: [ 622.022377][T11053] xt_ecn: cannot match TCP bits for non-tcp packets [ 623.619594][T11071] [U] [ 623.622328][T11071] [U] [ 623.625059][T11071] [U] [ 623.627798][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.619594][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.6223[ 623.648574][T11071] [U] 28][T11071] [U] [ 623.652549][T11071] [U] Aug 9 15:12:4[ 623.656595][T11071] [U] 8 syzkaller kern[ 623.660642][T11071] [U] .info kernel: [ 623.625059][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.627798][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.648574][T11071] [U] Aug 9 [ 623.681085][T11071] [U] 15:12:48 syzkall[ 623.684396][T11071] [U] er kern.info ker[ 623.688469][T11071] [U] nel: [ 623.652549][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.656595][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.660642][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.681085][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.684396][T11071] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 623.688469][T11071] [U] [ 624.281753][T11069] [U] Aug 9 15:12:48 syzkaller kern.info kernel: [ 624.281753][T11069] [U] [ 624.520576][T11092] trusted_key: encrypted_key: keyword 'ĝew' not recognized Aug 9 15:12:48 syzkaller kern.info kernel: [ 624.520576][T11092] trusted_key: encrypted_key: keyword 'ĝew' not recognized [ 625.249165][T11106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11106 comm=syz.2.1553 Aug 9 15:12:49 syzkaller kern.warn kernel: [ 625.249165][T11106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=11106 comm=syz.2.1553 [ 625.316720][ T1262] ieee802154 phy1 wpan1: encryption failed: -22 Aug 9 15:12:49 syzkaller kern.warn kernel: [ 625.316720][ T1262] ieee802154 phy1 wpan1: encryption failed: -22 [ 625.701896][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 625.701908][ T29] audit: type=1400 audit(1723216370.083:6617): avc: denied { create } for pid=11114 comm="syz.2.1548" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 Aug 9 15:12:50 syzkaller kern.warn kernel: [ 625.701896][ T29] kauditd_printk_skb: 145 callbacks suppressed Aug 9 15:12:50 syzkaller kern.notice kernel: [ 625.701908][ T29] audit: type=1400 audit(1723216370.083:6617): avc: denied { create } for pid=11114 comm="syz.2.1548" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode [ 625.852587][ T29] audit: type=1400 audit(1723216370.123:6618): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:50 syzkaller kern.notice kernel: [ 625.852587][ T29] audit: type=1400 audit(1723216370.123:6618): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 625.940849][ T29] audit: type=1400 audit(1723216370.123:6619): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:50 syzkaller kern.notice kernel: [ 625.940849][ T29] audit: type=1400 audit(1723216370.123:6619): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 626.023698][ T29] audit: type=1400 audit(1723216370.123:6620): avc: denied { prog_load } for pid=11114 comm="syz.2.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 626.042817][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.023698][ T29] audit: type=1400 audit(1723216370.123:6620): avc: denied { prog_load } for pid=11114 comm="syz.2.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 9 15:12:50 syzkaller kern.warn kernel: [ 626.042817][ C0] vkms_vblank_simulate: vblank timer ov[ 626.080702][ T29] audit: type=1400 audit(1723216370.123:6621): avc: denied { execmem } for pid=11114 comm="syz.2.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 errun Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.080702][ T29] audit: type=1400 audit(1723216370.123:6621): avc: denied { execmem } for pid=11114 comm="syz.2.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 626.152854][ T29] audit: type=1400 audit(1723216370.133:6622): avc: denied { read write } for pid=11114 comm="syz.2.1548" name="video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 626.176469][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.152854][ T29] audit: type=1400 audit(1723216370.133:6622): avc: denied { read write } for pid=11114 comm="syz.2.1548" name="video7" dev="devtmpfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4 Aug 9 15:12:50 syzkaller kern.warn kernel: [ 626.176469][ C0] vkms_vblank_simulate: vblank timer overrun [ 626.282375][ T29] audit: type=1400 audit(1723216370.133:6623): avc: denied { create } for pid=11114 comm="syz.2.1548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.282375][ T29] audit: type=1400 audit(1723216370.133:6623): avc: denied { create } for pid=11114 comm="syz.2.1548" scontext=root:sysadm[ 626.320375][T11128] ALSA: seq fatal error: cannot create timer (-22) _r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 626.339426][ T29] audit: type=1400 audit(1723216370.203:6624): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 626.363597][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:12:50 syzkaller kern.err kernel: [ 62[ 626.376071][T11128] ALSA: seq fatal error: cannot create timer (-22) 6.320375][T11128] ALSA: seq fatal error: cannot create timer (-22) Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.339426][ T29] audit: type=1400 audit(1723216370.203:6624): avc: denied { read write } for pid=7824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:50 syzkaller kern.warn kernel: [ 626.363597][ C0] vkms_[ 626.418002][ T29] audit: type=1400 audit(1723216370.263:6625): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vblank_simulate: vblank timer overrun Aug 9 15:12:50 syzkaller kern.err kernel: [ 626.376071][T11128] ALSA: s[ 626.450464][ T29] audit: type=1400 audit(1723216370.263:6626): avc: denied { read write } for pid=7789 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 eq fatal error: [ 626.475909][ C0] vkms_vblank_simulate: vblank timer overrun cannot create timer (-22) Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.418002][ T29] audit: type=1400 audit(1723216370.263:6625): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:50 syzkaller kern.notice kernel: [ 626.450464][ T29] audit: type=1400 audit(1723216370.263:6626): avc: denied { read write } for pid=7789 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 9 15:12:50 syzkaller kern.warn kernel: [ 626.475909][ C0] vkms_vblank_simulate: vblank timer overrun Aug 9 15:12:58 syzkaller daemon.err dhcpcd[11133]: ps_bpf_start_bpf: bpf_open: [ 634.486803][ T29] kauditd_printk_skb: 42 callbacks suppressed Invalid argument[ 634.486823][ T29] audit: type=1400 audit(1723216378.867:6669): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:58 syzkaller daem[ 634.518431][ T29] audit: type=1400 audit(1723216378.867:6670): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 on.err dhcpcd[11[ 634.518497][ T29] audit: type=1400 audit(1723216378.877:6671): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 133]: ps_root_recvmsg: Invalid argument Aug 9 [ 634.568286][ T29] audit: type=1400 audit(1723216378.957:6672): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 15:12:58 syzkaller kern.warn kernel: [ 634.486803][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 634.600281][ T29] audit: type=1400 audit(1723216378.987:6673): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 9 15:12:58 syzkaller kern.notice kernel: [ 634.486823][ [ 634.626743][ T29] audit: type=1400 audit(1723216379.007:6674): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1723216378.867:6669): avc: denied [ 634.654714][ T29] audit: type=1400 audit(1723216379.037:6675): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 634.684529][ T29] audit: type=1400 audit(1723216379.067:6676): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syslogd_t tcontext=system_u:obje[ 634.709495][ T29] audit: type=1400 audit(1723216379.067:6677): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct_r:var_t tclass= Aug 9 15:12[ 634.735006][ T29] audit: type=1400 audit(1723216379.067:6678): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :58 syzkaller kern.notice kernel: [ 634.518431][ T29] audit: type=1400 audit(1723216378.867:6670): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:58 syzkaller kern.notice kernel: [ 634.518497][ T29] audit: type=1400 audit(1723216378.877:6671): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:58 syzkaller kern.notice kernel: [ 634.568286][ T29] audit: type=1400 audit(1723216378.957:6672): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.600281][ T29] audit: type=1400 audit(1723216378.987:6673): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.626743][ T29] audit: type=1400 audit(1723216379.007:6674): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.654714][ T29] audit: type=1400 audit(1723216379.037:6675): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.684529][ T29] audit: type=1400 audit(1723216379.067:6676): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.709495][ T29] audit: type=1400 audit(1723216379.067:6677): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:12:59 syzkaller kern.notice kernel: [ 634.735006][ T29] audit: type=1400 audit(1723216379.067:6678): avc: denied { read } for pid=4654 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 9 15:13:00 syzkaller daemon.err dhcpcd[11134]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 9 15:13:00 syzkaller daemon.err dhcpcd[11134]: ps_root_recvmsg: Invalid argument Aug 9 15:13:00 syzkaller daemon.err dhcpcd[11135]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 9 15:13:00 syzkaller daemon.err dhcpcd[11135]: ps_root_recvmsg: Invalid argument