last executing test programs: 28.951227414s ago: executing program 3 (id=4): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x405, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x100000, 0x5dd8, 0x3, 0x0, 0x0, 0x8, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) creat(&(0x7f0000000080)='./bus\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000140)={[{@nolazytime}, {@lazytime}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@bsdgroups}, {@errors_remount}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") 28.255565185s ago: executing program 3 (id=22): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000716f00000000000033"], 0xfc}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000440)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a8435", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 28.225726094s ago: executing program 3 (id=24): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800710, &(0x7f0000000100)={[{@quota}, {@bsdgroups}, {@nouid32}, {@user_xattr}, {@errors_remount}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x462, &(0x7f0000000d80)="$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") rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='./file0/file0\x00') quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) 27.871318805s ago: executing program 3 (id=41): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x5, 0x400, 0x0, {0x77359400}, {0x77359400}, {0x0, 0x0, 0x1}, 0x1, @can={{0x0, 0x0, 0x1}, 0x0, 0x2, 0x0, 0x0, "8d416cfa6fc2313e"}}, 0x48}}, 0x0) 27.673529235s ago: executing program 3 (id=47): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000280)=0x10) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 27.606697006s ago: executing program 3 (id=49): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000540)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000200)=0x1, r1, 0x0, 0x1, 0xff55}}, 0x20) 11.366911976s ago: executing program 32 (id=49): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000540)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000200)=0x1, r1, 0x0, 0x1, 0xff55}}, 0x20) 1.431673638s ago: executing program 5 (id=813): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a40), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000001be3fcdbdf25120000001800018014000200766574683000000000000000000000000800090000000013080006"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x2004c0a0) 1.229781658s ago: executing program 5 (id=818): perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000feb000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20071026}, &(0x7f00000001c0)) 1.122390409s ago: executing program 4 (id=823): r0 = mq_open(&(0x7f0000000640)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r0) 1.059766549s ago: executing program 4 (id=826): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b"], 0x24}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="2000000069000b00000000000a00000000000000000000000800010002"], 0x20}, 0x1, 0x0, 0x0, 0x200008c4}, 0x0) 1.040893198s ago: executing program 4 (id=827): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x66082, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, @perf_bp={0x0, 0x15}, 0x1016c7, 0x8, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='cpu\t&0&&\t') 1.009386979s ago: executing program 5 (id=828): syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="636865636b3d7374726963742c756e686964652c63727566742c696f636861727365743d63a08033322c636865636b3d72656c617865642c6e6f6a6f6c6965742c636865636b3d72656c617865642c6e6f6a6f6c6965742c00"], 0x3d, 0x55d, &(0x7f0000000b00)="$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") mount(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 970.413908ms ago: executing program 2 (id=829): syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1008002, &(0x7f0000000d40)={[{@grpquota}, {@delalloc}, {@resuid}, {@errors_remount}, {@dioread_nolock}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@nomblk_io_submit}, {@data_err_abort}]}, 0x1, 0x5d8, &(0x7f00000005c0)="$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") r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000540)=@isofs_parent={0x14, 0x2, {0x2, 0x1, 0x8, 0x27, 0x6, 0x7ff}}, 0x191300) 825.418319ms ago: executing program 4 (id=833): r0 = memfd_create(&(0x7f0000000940)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'e\xe5\x8f\xf8\xd2\x1c\xc0\xfb\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6\x03\x00\x00\x00A\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\xfe@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xf2\xde\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\x91\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7yn\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xefCGa\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcas\xf4D\xd4\xd0s\r3\xcb\x9a&\xdf+(\xc9S\x9eL5\x84\xb1\x90pN\xe7/\r\b\x9a\xf13Q\xf9\xdf\x7fX\xa0\xafK\xefh\xbfOv\x9bh\xb3\xc0\xf5\x80\xba\"@\'\x02\xafi\xeaE\xa6a6F\xde\xd4\xfa\x84\xe4+A\xb7\xa2\x8f\xc9\xee|xxn\xefw\x93]%\xd0\x19\x132\x86\xabn\xfe\x91\xb6Cl\xcf\x04\x1cq\xc1\x1d~\x8d\x01\x83\x93_\x83\x8a`v\xb0K,|S\xe4\xba\xb1\f\xc8`\xa6s\xad\x11\xd4wG\x80u\x87u\xff\x87\xee', 0x6) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x940a, 0x1000007}) fcntl$addseals(r0, 0x409, 0xb) 824.875749ms ago: executing program 5 (id=834): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210090, &(0x7f0000000400)={[{@errors_remount}, {}, {@barrier_val={'barrier', 0x3d, 0x6a}}, {@norecovery}, {@grpid}, {@lazytime}, {@nodelalloc}, {@quota}, {@dioread_lock}]}, 0xfc, 0x572, &(0x7f0000003780)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x441, 0x108) fallocate(r0, 0x20, 0x200000000000000, 0x8000) 784.991209ms ago: executing program 4 (id=837): capset(&(0x7f00000020c0)={0x19980330}, &(0x7f00000001c0)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') setns(r0, 0x0) 684.080019ms ago: executing program 4 (id=838): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000000)={[0xffffffffffffffff]}, 0x0, 0x0, 0x8) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 603.577829ms ago: executing program 2 (id=841): r0 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, r1) 583.908989ms ago: executing program 1 (id=842): mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) madvise(&(0x7f0000f7c000/0x3000)=nil, 0x3000, 0x14) 570.868429ms ago: executing program 0 (id=843): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x200000c0, 0xffffffff, 0xfffffff8}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@ipv4_newroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x20, 0x20, 0x0, 0x0, 0x0, 0xfe}}, 0x1c}}, 0x0) 549.075949ms ago: executing program 2 (id=844): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x401, 0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 472.473349ms ago: executing program 0 (id=845): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x66) unshare(0x22020600) syz_clone(0x10eb22b000, 0x0, 0x0, 0x0, 0x0, 0x0) 371.71092ms ago: executing program 1 (id=846): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380), r0) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8084}, 0x4) 336.12617ms ago: executing program 1 (id=847): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)='9', 0x1}, {&(0x7f00000019c0)="b0", 0x1}], 0x2) 312.42279ms ago: executing program 2 (id=848): r0 = syz_io_uring_setup(0x70ca, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x3, 0x179}, &(0x7f0000000100)=0x0, &(0x7f00000007c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x0, 0x2000, @fd_index, 0x9, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000540)='))', 0x2}], 0x2, 0x0, 0x0, {0xfffc}}) io_uring_enter(r0, 0x4d10, 0x2, 0x2, 0x0, 0x0) 309.237439ms ago: executing program 5 (id=849): mkdir(&(0x7f0000000400)='./file0\x00', 0x100) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x44000, 0x0) 245.44962ms ago: executing program 0 (id=850): r0 = syz_open_procfs(0x0, &(0x7f0000000340)='attr/prev\x00') setrlimit(0x1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x7fffffffffffffff) 158.05703ms ago: executing program 1 (id=851): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000380)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0xfffffffffffffe09}, 0x10) 157.90212ms ago: executing program 0 (id=852): capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000400)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000100)="a8ef615f0a98", 0x0, 0x0, 0x0, 0x0, 0x0}) 140.89249ms ago: executing program 2 (id=853): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) writev(r0, &(0x7f0000000580)=[{&(0x7f0000000080)="268292", 0xfff6}], 0x1) 140.51016ms ago: executing program 1 (id=854): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000018c0)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x49920d862a92153b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x15001}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gtp={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GTP_FD1={0x8}]}}}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x40}}, 0x2400c080) 28.30512ms ago: executing program 5 (id=855): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0}, 0x10) sync() 28.01361ms ago: executing program 0 (id=856): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000ec0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r1}}, 0x18) 27.73927ms ago: executing program 2 (id=857): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000680)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000600000004010c00080008000c4004480000035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300"/216, 0xd8}], 0x1}, 0x0) 27.56364ms ago: executing program 0 (id=858): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0xfb36b7c5eda090f7, 0x0, 0x0, 0x0, &(0x7f0000000800)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r0, 0x4b4c, &(0x7f0000000080)) 0s ago: executing program 1 (id=859): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, r1, 0xb2b, 0x70bd26}, 0x14}}, 0x8814) kernel console output (not intermixed with test programs): mestamps until 2038-01-19 (0x7fffffff) [ 45.980063][ T3299] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.014563][ T4570] netlink: 28 bytes leftover after parsing attributes in process `syz.0.504'. [ 46.056196][ T4575] loop2: detected capacity change from 0 to 512 [ 46.071287][ T4575] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 46.072806][ T4578] netlink: 108 bytes leftover after parsing attributes in process `syz.0.506'. [ 46.092813][ T4579] loop1: detected capacity change from 0 to 2048 [ 46.102236][ T3400] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.119986][ T4575] EXT4-fs (loop2): 1 truncate cleaned up [ 46.133200][ T4579] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.157721][ T4578] vlan2: entered allmulticast mode [ 46.162892][ T4578] bond0: entered allmulticast mode [ 46.164386][ T4575] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.168073][ T4578] bond_slave_0: entered allmulticast mode [ 46.186276][ T4578] bond_slave_1: entered allmulticast mode [ 46.192246][ T29] audit: type=1400 audit(1733967818.388:334): avc: denied { rename } for pid=4576 comm="syz.1.507" name="file1" dev="loop1" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 [ 46.229002][ T3297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.241533][ T4575] EXT4-fs: Ignoring removed orlov option [ 46.247620][ T29] audit: type=1400 audit(1733967818.443:335): avc: denied { remount } for pid=4574 comm="syz.2.505" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 46.269686][ T4575] EXT4-fs error (device loop2): __ext4_remount:6749: comm syz.2.505: Abort forced by user [ 46.281864][ T3400] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.295333][ T4575] EXT4-fs (loop2): Remounting filesystem read-only [ 46.301889][ T4575] EXT4-fs (loop2): re-mounted 00000000-0000-0000-0000-000000000000 r/w. Quota mode: writeback. [ 46.351086][ T3299] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.373135][ T3400] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.387953][ T4591] loop1: detected capacity change from 0 to 512 [ 46.388459][ T4592] loop0: detected capacity change from 0 to 512 [ 46.395014][ T4591] EXT4-fs: Ignoring removed orlov option [ 46.420953][ T4591] EXT4-fs: Ignoring removed oldalloc option [ 46.435823][ T4591] EXT4-fs error (device loop1): ext4_xattr_inode_iget:436: comm syz.1.512: Parent and EA inode have the same ino 15 [ 46.456088][ T4591] EXT4-fs error (device loop1): ext4_xattr_inode_iget:436: comm syz.1.512: Parent and EA inode have the same ino 15 [ 46.499106][ T3400] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 46.517902][ T4591] EXT4-fs (loop1): 1 orphan inode deleted [ 46.525778][ T4592] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 46.540923][ T4591] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.553548][ T4592] ext4 filesystem being mounted at /156/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 46.556322][ T4552] chnl_net:caif_netlink_parms(): no params data found [ 46.592820][ T29] audit: type=1400 audit(1733967818.757:336): avc: denied { read } for pid=4589 comm="syz.1.512" dev="loop1" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 [ 46.614131][ T29] audit: type=1400 audit(1733967818.757:337): avc: denied { open } for pid=4589 comm="syz.1.512" path="/" dev="loop1" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 [ 46.712912][ T4552] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.720170][ T4552] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.747161][ T3297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.762161][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 46.763891][ T4552] bridge_slave_0: entered allmulticast mode [ 46.801926][ T4552] bridge_slave_0: entered promiscuous mode [ 46.837186][ T4552] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.844363][ T4552] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.890159][ T4552] bridge_slave_1: entered allmulticast mode [ 46.896593][ T29] audit: type=1400 audit(1733967819.043:338): avc: denied { remount } for pid=4615 comm="syz.2.519" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 46.923259][ T4552] bridge_slave_1: entered promiscuous mode [ 46.965785][ T29] audit: type=1400 audit(1733967819.099:339): avc: denied { unmount } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 47.005966][ T4552] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.015240][ T3400] bridge_slave_1: left allmulticast mode [ 47.020922][ T3400] bridge_slave_1: left promiscuous mode [ 47.026668][ T3400] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.096612][ T3400] bridge_slave_0: left allmulticast mode [ 47.102303][ T3400] bridge_slave_0: left promiscuous mode [ 47.108152][ T3400] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.326219][ T3400] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 47.337662][ T3400] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 47.347900][ T3400] bond0 (unregistering): Released all slaves [ 47.357665][ T4552] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.399094][ T3400] hsr_slave_0: left promiscuous mode [ 47.409250][ T3400] hsr_slave_1: left promiscuous mode [ 47.415637][ T29] audit: type=1400 audit(1733967819.523:340): avc: denied { getopt } for pid=4633 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 47.443365][ T3400] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 47.450873][ T3400] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 47.468567][ T4586] syz.4.509 (4586) used greatest stack depth: 8128 bytes left [ 47.504147][ T3400] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 47.511622][ T3400] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 47.538331][ T3400] veth1_macvtap: left promiscuous mode [ 47.543959][ T3400] veth0_macvtap: left promiscuous mode [ 47.549563][ T3400] veth1_vlan: left promiscuous mode [ 47.554832][ T3400] veth0_vlan: left promiscuous mode [ 47.612191][ T4648] netlink: 32 bytes leftover after parsing attributes in process `syz.1.535'. [ 47.654872][ T4641] loop0: detected capacity change from 0 to 8192 [ 47.688139][ T4641] FAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 47.727078][ T4641] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 47.735686][ T4641] FAT-fs (loop0): Filesystem has been set read-only [ 47.774965][ T3400] team0 (unregistering): Port device team_slave_1 removed [ 47.818748][ T3400] team0 (unregistering): Port device team_slave_0 removed [ 47.912056][ T4552] team0: Port device team_slave_0 added [ 47.918720][ T4552] team0: Port device team_slave_1 added [ 48.008118][ T4552] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 48.015116][ T4552] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.041189][ T4552] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 48.057784][ T4670] loop4: detected capacity change from 0 to 512 [ 48.098016][ T4552] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 48.105031][ T4552] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 48.131122][ T4552] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 48.141236][ T4670] EXT4-fs: Ignoring removed oldalloc option [ 48.173366][ T4677] loop0: detected capacity change from 0 to 512 [ 48.192260][ T4677] EXT4-fs: Ignoring removed orlov option [ 48.212377][ T4677] EXT4-fs: Ignoring removed oldalloc option [ 48.213795][ T4670] EXT4-fs (loop4): 1 truncate cleaned up [ 48.227055][ T4670] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.258829][ T4670] EXT4-fs error (device loop4): ext4_free_branches:1023: inode #13: comm syz.4.543: invalid indirect mapped block 234881024 (level 0) [ 48.291095][ T4677] EXT4-fs error (device loop0): ext4_xattr_inode_iget:436: comm syz.0.545: Parent and EA inode have the same ino 15 [ 48.346633][ T4552] hsr_slave_0: entered promiscuous mode [ 48.372595][ T4670] EXT4-fs (loop4): Remounting filesystem read-only [ 48.379511][ T4552] hsr_slave_1: entered promiscuous mode [ 48.391543][ T4677] EXT4-fs error (device loop0): ext4_xattr_inode_iget:436: comm syz.0.545: Parent and EA inode have the same ino 15 [ 48.415801][ T4677] EXT4-fs (loop0): 1 orphan inode deleted [ 48.441364][ T4697] netlink: 'syz.1.550': attribute type 13 has an invalid length. [ 48.488350][ T4677] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 48.503916][ T4697] gretap0: refused to change device tx_queue_len [ 48.510347][ T4697] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 48.517704][ T4701] loop2: detected capacity change from 0 to 128 [ 48.594673][ T4701] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 548, start 00000401) [ 48.604950][ T4701] FAT-fs (loop2): Filesystem has been set read-only [ 48.648691][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.689903][ T4716] loop1: detected capacity change from 0 to 128 [ 48.711123][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.729829][ T4552] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 48.758825][ T4552] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 48.770200][ T4552] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 48.779677][ T4552] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 48.824812][ T4552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 48.836144][ T4552] 8021q: adding VLAN 0 to HW filter on device team0 [ 48.859608][ T3400] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.866848][ T3400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.875950][ T3400] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.883101][ T3400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.906111][ T4716] FAT-fs (loop1): Directory bread(block 32) failed [ 48.912884][ T4716] FAT-fs (loop1): Directory bread(block 33) failed [ 48.949418][ T4716] FAT-fs (loop1): Directory bread(block 34) failed [ 48.952298][ T4552] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 48.956537][ T4716] FAT-fs (loop1): Directory bread(block 35) failed [ 49.009385][ T4716] FAT-fs (loop1): Directory bread(block 36) failed [ 49.025396][ T4716] FAT-fs (loop1): Directory bread(block 37) failed [ 49.052199][ T4716] FAT-fs (loop1): Directory bread(block 38) failed [ 49.079319][ T4716] FAT-fs (loop1): Directory bread(block 39) failed [ 49.104894][ T4760] loop2: detected capacity change from 0 to 512 [ 49.114171][ T4716] FAT-fs (loop1): Directory bread(block 40) failed [ 49.124531][ T4760] EXT4-fs: Ignoring removed oldalloc option [ 49.137609][ T4716] FAT-fs (loop1): Directory bread(block 41) failed [ 49.157868][ T4760] EXT4-fs (loop2): 1 truncate cleaned up [ 49.163886][ T4760] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.211990][ T4760] EXT4-fs error (device loop2): ext4_free_branches:1023: inode #13: comm syz.2.564: invalid indirect mapped block 234881024 (level 0) [ 49.274797][ T4552] veth0_vlan: entered promiscuous mode [ 49.290701][ T4760] EXT4-fs (loop2): Remounting filesystem read-only [ 49.309223][ T4552] veth1_vlan: entered promiscuous mode [ 49.346922][ T4552] veth0_macvtap: entered promiscuous mode [ 49.361782][ T4552] veth1_macvtap: entered promiscuous mode [ 49.371632][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.382163][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.392001][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.402491][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.412343][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.422805][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.432661][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 49.443149][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.468663][ T3299] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 49.471629][ T4552] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.514682][ T4788] netlink: 100 bytes leftover after parsing attributes in process `syz.2.570'. [ 49.577563][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.588089][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.597992][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.608471][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.618446][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.628929][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.638785][ T4552] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 49.649313][ T4552] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 49.667043][ T4552] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.676695][ T4796] netlink: 256 bytes leftover after parsing attributes in process `syz.4.572'. [ 49.696769][ T4796] netlink: 3 bytes leftover after parsing attributes in process `syz.4.572'. [ 49.747374][ T4552] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.756345][ T4552] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.765208][ T4552] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.773993][ T4552] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.797644][ T4803] loop4: detected capacity change from 0 to 512 [ 49.839665][ T4803] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a842e098, mo2=0002] [ 49.855635][ T4803] System zones: 0-2, 18-18, 34-35 [ 49.925500][ T4803] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 49.931754][ T4825] netlink: 28 bytes leftover after parsing attributes in process `syz.0.581'. [ 49.977619][ T4803] ext4 filesystem being mounted at /115/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 50.085111][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 50.085129][ T29] audit: type=1400 audit(1733967821.977:377): avc: denied { bind } for pid=4833 comm="syz.0.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 50.156680][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.174768][ T29] audit: type=1400 audit(1733967821.977:378): avc: denied { getopt } for pid=4833 comm="syz.0.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 50.194105][ T29] audit: type=1400 audit(1733967822.024:379): avc: denied { execute } for pid=4832 comm="syz.2.585" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=9008 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 50.243675][ T4843] netlink: 'syz.2.588': attribute type 30 has an invalid length. [ 50.251547][ T4843] netlink: 32 bytes leftover after parsing attributes in process `syz.2.588'. [ 50.295420][ T4851] loop4: detected capacity change from 0 to 512 [ 50.377399][ T4851] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 50.403117][ T4851] ext4 filesystem being mounted at /116/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 50.485660][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 50.499348][ T4877] loop5: detected capacity change from 0 to 1024 [ 50.512645][ T29] audit: type=1400 audit(1733967822.383:380): avc: denied { append } for pid=4875 comm="syz.2.598" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 50.514232][ T4878] program syz.2.598 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 50.592547][ T4877] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 50.648205][ T29] audit: type=1400 audit(1733967822.503:381): avc: denied { create } for pid=4876 comm="syz.5.599" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.653305][ T4890] netlink: 'syz.0.601': attribute type 1 has an invalid length. [ 50.695860][ T29] audit: type=1400 audit(1733967822.549:382): avc: denied { bind } for pid=4888 comm="syz.4.596" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 50.703849][ T4877] msdos: Unknown parameter 'a?eIWYwE幦U7Ve@LSa-}jz3B. [ 50.703849][ T4877] p;q+a8P?cez-i@../PAI(3#V#LJd-]!h> qXx餉[A3V5^' [ 50.717733][ T29] audit: type=1400 audit(1733967822.549:383): avc: denied { name_bind } for pid=4888 comm="syz.4.596" src=20010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 50.763167][ T29] audit: type=1400 audit(1733967822.549:384): avc: denied { node_bind } for pid=4888 comm="syz.4.596" saddr=fe80::aa src=20010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 50.840343][ T29] audit: type=1400 audit(1733967822.559:385): avc: denied { mounton } for pid=4876 comm="syz.5.599" path="/5/file1/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="loop5" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.885114][ T29] audit: type=1400 audit(1733967822.605:386): avc: denied { rename } for pid=4876 comm="syz.5.599" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="loop5" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 50.953587][ T4905] netlink: 56 bytes leftover after parsing attributes in process `syz.2.606'. [ 50.962823][ T4905] netlink: 8 bytes leftover after parsing attributes in process `syz.2.606'. [ 50.978763][ T4552] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 51.554653][ T4977] sctp: [Deprecated]: syz.5.635 (pid 4977) Use of struct sctp_assoc_value in delayed_ack socket option. [ 51.554653][ T4977] Use struct sctp_sack_info instead [ 51.585892][ T4980] program syz.4.636 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 51.719511][ T4997] loop4: detected capacity change from 0 to 2048 [ 51.762332][ T5001] loop0: detected capacity change from 0 to 1024 [ 51.802040][ T4997] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 51.822231][ T5001] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 51.901659][ T5001] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 51.958115][ T5001] EXT4-fs (loop0): orphan cleanup on readonly fs [ 51.979950][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.005298][ T5001] EXT4-fs error (device loop0): ext4_map_blocks:705: inode #3: block 3: comm syz.0.644: lblock 3 mapped to illegal pblock 3 (length 1) [ 52.012769][ T5024] PM: Enabling pm_trace changes system date and time during resume. [ 52.012769][ T5024] PM: Correct system time has to be restored manually after resume. [ 52.032947][ T5001] EXT4-fs error (device loop0): ext4_acquire_dquot:6938: comm syz.0.644: Failed to acquire dquot type 0 [ 52.104093][ T5001] EXT4-fs error (device loop0): ext4_map_blocks:671: inode #3: block 3: comm syz.0.644: lblock 3 mapped to illegal pblock 3 (length 1) [ 52.162648][ T5033] loop2: detected capacity change from 0 to 256 [ 52.169692][ T5001] EXT4-fs error (device loop0): ext4_acquire_dquot:6938: comm syz.0.644: Failed to acquire dquot type 0 [ 52.214184][ T5001] EXT4-fs error (device loop0): ext4_free_blocks:6589: comm syz.0.644: Freeing blocks not in datazone - block = 0, count = 4096 [ 52.268580][ T5001] EXT4-fs error (device loop0): ext4_map_blocks:671: inode #3: block 3: comm syz.0.644: lblock 3 mapped to illegal pblock 3 (length 1) [ 52.346905][ T5001] EXT4-fs error (device loop0): ext4_acquire_dquot:6938: comm syz.0.644: Failed to acquire dquot type 0 [ 52.426113][ T5001] EXT4-fs (loop0): 1 orphan inode deleted [ 52.466331][ T5001] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 52.553488][ T5001] EXT4-fs error (device loop0): ext4_search_dir:1505: inode #2: block 16: comm syz.0.644: bad entry in directory: inode out of bounds - offset=44, inode=40, rec_len=16, size=1024 fake=0 [ 52.562041][ C1] hrtimer: interrupt took 37030 ns [ 52.608072][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 52.698332][ T5089] netlink: 16 bytes leftover after parsing attributes in process `syz.0.674'. [ 52.858202][ T5104] loop1: detected capacity change from 0 to 512 [ 52.876701][ T5115] pim6reg: entered allmulticast mode [ 52.903840][ T5118] loop5: detected capacity change from 0 to 512 [ 52.915004][ T5104] EXT4-fs error (device loop1): ext4_free_branches:1023: inode #11: comm syz.1.683: invalid indirect mapped block 256 (level 2) [ 52.947220][ T5118] EXT4-fs error (device loop5): ext4_orphan_get:1415: comm syz.5.690: bad orphan inode 13 [ 52.957995][ T5104] EXT4-fs (loop1): 2 truncates cleaned up [ 53.004791][ T5118] ext4_test_bit(bit=12, block=4) = 1 [ 53.010132][ T5118] is_bad_inode(inode)=0 [ 53.014384][ T5118] NEXT_ORPHAN(inode)=0 [ 53.018454][ T5118] max_ino=32 [ 53.021670][ T5118] i_nlink=1 [ 53.028202][ T5104] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.122246][ T5118] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 53.151814][ T5118] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 216 vs 220 free clusters [ 53.166675][ T5137] loop2: detected capacity change from 0 to 256 [ 53.201914][ T3297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.257010][ T4552] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 53.349982][ T5153] netlink: 8 bytes leftover after parsing attributes in process `syz.2.703'. [ 53.419368][ T5154] netlink: 28 bytes leftover after parsing attributes in process `syz.5.701'. [ 53.492344][ T5169] netlink: 28 bytes leftover after parsing attributes in process `syz.1.711'. [ 53.678278][ T5192] loop5: detected capacity change from 0 to 512 [ 53.712553][ T5192] EXT4-fs error (device loop5): ext4_free_branches:1023: inode #11: comm syz.5.720: invalid indirect mapped block 256 (level 2) [ 53.744949][ T5197] loop0: detected capacity change from 0 to 256 [ 53.755889][ T5192] EXT4-fs (loop5): 2 truncates cleaned up [ 53.767010][ T5197] msdos: Unknown parameter '"' [ 53.772232][ T5192] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 53.870725][ T4552] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.035220][ T5226] vcan0: MTU too low for tipc bearer [ 54.040560][ T5226] tipc: Enabling of bearer rejected, failed to enable media [ 54.079487][ T5233] loop5: detected capacity change from 0 to 164 [ 54.264200][ T5258] netlink: 8 bytes leftover after parsing attributes in process `syz.2.752'. [ 54.351869][ T5271] netlink: 'syz.2.758': attribute type 7 has an invalid length. [ 54.359657][ T5271] netlink: 'syz.2.758': attribute type 8 has an invalid length. [ 54.451304][ T5284] loop4: detected capacity change from 0 to 512 [ 54.476290][ T5284] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 54.517230][ T5284] ext4 filesystem being mounted at /152/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 54.638973][ T3304] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 54.888771][ T5321] netlink: 'syz.0.782': attribute type 30 has an invalid length. [ 55.134435][ T5349] loop0: detected capacity change from 0 to 1024 [ 55.164600][ T5349] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 55.194432][ T5349] ext4 filesystem being mounted at /215/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 55.296512][ T5365] loop2: detected capacity change from 0 to 256 [ 55.307892][ T5365] tmpfs: Bad value for 'mpol' [ 55.333315][ T3302] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 55.477603][ T5375] loop5: detected capacity change from 0 to 256 [ 55.519077][ T5375] vfat: Unknown parameter '' [ 55.578999][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 55.579017][ T29] audit: type=1400 audit(1733967827.052:419): avc: denied { execmem } for pid=5383 comm="syz.0.811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 55.637168][ T29] audit: type=1326 audit(1733967827.089:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.660524][ T29] audit: type=1326 audit(1733967827.089:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.683813][ T29] audit: type=1326 audit(1733967827.089:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.707305][ T29] audit: type=1326 audit(1733967827.089:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.730633][ T29] audit: type=1326 audit(1733967827.089:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.754039][ T29] audit: type=1326 audit(1733967827.089:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=256 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.777596][ T29] audit: type=1326 audit(1733967827.089:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.801272][ T29] audit: type=1326 audit(1733967827.089:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.2.810" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f331a7e5d19 code=0x7ffc0000 [ 55.924725][ T5403] process 'syz.4.819' launched '/dev/fd/3' with NULL argv: empty string added [ 55.940459][ T29] audit: type=1400 audit(1733967827.375:428): avc: denied { execute } for pid=5402 comm="syz.4.819" dev="tmpfs" ino=41 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 56.109938][ T5421] netlink: 'syz.1.824': attribute type 1 has an invalid length. [ 56.158251][ T5425] loop5: detected capacity change from 0 to 164 [ 56.225055][ T5427] loop2: detected capacity change from 0 to 1024 [ 56.287356][ T5427] EXT4-fs: Ignoring removed nomblk_io_submit option [ 56.369981][ T5427] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 56.403440][ T5442] loop5: detected capacity change from 0 to 1024 [ 56.490575][ T3299] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 56.635921][ T5442] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 56.863484][ T4552] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5232: Connection refused Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5167: Connection refused Dec 12 01:43:49 syzkaller daemon.info dhcpcd[3038]: eth4: probing for an IPv4LL address Dec 12 01:43:49 syzkaller daemon.err dhcpcd[5495]: ps_dropprivs: chroot: /: Operation not permitted Dec 12 01:43:49 syzkaller daemon.err dhcpcd[5495]: failed to drop privileges: Operation not permitted Dec 12 01:43:49 syzkaller daemon.info dhcpcd[3038]: eth1: probing for an IPv4LL address Dec 12 01:43:49 syzkaller daemon.err dhcpcd[5496]: ps_dropprivs: chroot: /: Operation not permitted Dec 12 01:43:49 syzkaller daemon.err dhcpcd[5496]: failed to drop privileges: Operation not permitted Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:49 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5170: Connection refused Dec 12 01:43:50 syzkaller daemon.info dhcpcd[3038]: lapb7: probing for an IPv4LL address Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5497]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5497]: ps_root_recvmsg: Invalid argument Dec 12 01:43:50 syzkaller daemon.info dhcpcd[3038]: lapb6: probing for an IPv4LL address Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5498]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5498]: ps_root_recvmsg: Invalid argument Dec 12 01:43:50 syzkaller daemon.info dhcpcd[3038]: eth3: probing for an IPv4LL address Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5499]: ps_dropprivs: chroot: /: Operation not permitted Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5499]: failed to drop privileges: Operation not permitted Dec 12 01:43:50 syzkaller daemon.info dhcpcd[3038]: lapb5: probing for an IPv4LL address Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5500]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5500]: ps_root_recvmsg: Invalid argument Dec 12 01:43:50 syzkaller daemon.info dhcpcd[3038]: lapb4: probing for an IPv4LL address Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5501]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:50 syzkaller daemon.err dhcpcd[5501]: ps_root_recvmsg: Invalid argument Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5498: Connection refused Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5500: Connection refused Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:43:51 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5497: Connection refused [ 61.024239][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 61.024256][ T29] audit: type=1400 audit(1733967832.081:535): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:43:52 syzkaller daemon[ 61.054875][ T29] audit: type=1400 audit(1733967832.099:536): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3038[ 61.077463][ T29] audit: type=1400 audit(1733967832.099:537): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 61.100788][ T29] audit: type=1400 audit(1733967832.099:538): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection refused Dec 12 01:43:52 syzkaller daemon.err dhcpc[ 61.128490][ T29] audit: type=1400 audit(1733967832.173:539): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3038]: ps_root[ 61.151457][ T29] audit: type=1400 audit(1733967832.173:540): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 61.174743][ T29] audit: type=1400 audit(1733967832.173:541): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send message to pid 5501: [ 61.200253][ T29] audit: type=1400 audit(1733967832.238:542): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Connection refus[ 61.222607][ T29] audit: type=1400 audit(1733967832.238:543): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed Dec 12 01:43[ 61.245880][ T29] audit: type=1400 audit(1733967832.238:544): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :52 syzkaller kern.warn kernel: [ 61.024239][ T29] kauditd_printk_skb: 106 callbacks suppressed Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.024256][ T29] audit: type=1400 audit(1733967832.081:535): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.054875][ T29] audit: type=1400 audit(1733967832.099:536): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.077463][ T29] audit: type=1400 audit(1733967832.099:537): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.100788][ T29] audit: type=1400 audit(1733967832.099:538): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.128490][ T29] audit: type=1400 audit(1733967832.173:539): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.151457][ T29] audit: type=1400 audit(1733967832.173:540): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.174743][ T29] audit: type=1400 audit(1733967832.173:541): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.200253][ T29] audit: type=1400 audit(1733967832.238:542): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.222607][ T29] audit: type=1400 audit(1733967832.238:543): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller kern.notice kernel: [ 61.245880][ T29] audit: type=1400 audit(1733967832.238:544): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Dec 12 01:43:52 syzkaller daemon.info dhcpcd[3038]: eth2: using IPv4LL address 169.254.38.85 Dec 12 01:43:52 syzkaller daemon.info dhcpcd[3038]: eth2: adding route to 169.254.0.0/16 Dec 12 01:43:52 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:52 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:53 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:53 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth3: using IPv4LL address 169.254.30.7 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth3: adding route to 169.254.0.0/16 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth1: using IPv4LL address 169.254.74.148 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth1: adding route to 169.254.0.0/16 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth4: using IPv4LL address 169.254.151.193 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: eth4: adding route to 169.254.0.0/16 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: lapb5: using IPv4LL address 169.254.96.198 Dec 12 01:43:54 syzkaller daemon.info dhcpcd[3038]: lapb5: adding route to 169.254.0.0/16 Dec 12 01:43:54 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb6: using IPv4LL address 169.254.96.198 Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb6: adding route to 169.254.0.0/16 Dec 12 01:43:55 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb4: using IPv4LL address 169.254.96.198 Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb4: adding route to 169.254.0.0/16 Dec 12 01:43:55 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb7: using IPv4LL address 169.254.96.198 Dec 12 01:43:55 syzkaller daemon.info dhcpcd[3038]: lapb7: adding route to 169.254.0.0/16 Dec 12 01:43:55 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:56 syzkaller daemon.warn dhcpcd[3038]: eth2: no IPv6 Routers available Dec 12 01:43:56 syzkaller daemon.err dhcpcd[5558]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:56 syzkaller daemon.err dhcpcd[5558]: ps_root_recvmsg: Invalid argument [ 66.657129][ T29] kauditd_printk_skb: 476 callbacks suppressed [ 66.657143][ T29] audit: type=1400 audit(1733967837.276:1021): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5559]: ps_bpf_start_bpf: bpf_open: I[ 66.693187][ T29] audit: type=1400 audit(1733967837.303:1022): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 66.715947][ T29] audit: type=1400 audit(1733967837.303:1023): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:43:57[ 66.739317][ T29] audit: type=1400 audit(1733967837.313:1024): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.warn kernel: [ 66.657129][ T[ 66.765944][ T29] audit: type=1400 audit(1733967837.368:1025): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] kauditd_prin[ 66.788743][ T29] audit: type=1400 audit(1733967837.368:1026): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tk_skb: 476 call[ 66.812175][ T29] audit: type=1400 audit(1733967837.368:1027): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 backs suppressed[ 66.835510][ T29] audit: type=1400 audit(1733967837.368:1028): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.862625][ T29] audit: type=1400 audit(1733967837.460:1029): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 66.657143][ [ 66.884978][ T29] audit: type=1400 audit(1733967837.460:1030): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1733967837.276:1021): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5559]: ps_root_recvmsg: Invalid argument Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.693187][ T29] audit: type=1400 audit(1733967837.303:1022): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.715947][ T29] audit: type=1400 audit(1733967837.303:1023): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.739317][ T29] audit: type=1400 audit(1733967837.313:1024): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller daemon.warn dhcpcd[3038]: eth1: no IPv6 Routers available Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.765944][ T29] audit: type=1400 audit(1733967837.368:1025): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.788743][ T29] audit: type=1400 audit(1733967837.368:1026): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.812175][ T29] audit: type=1400 audit(1733967837.368:1027): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.835510][ T29] audit: type=1400 audit(1733967837.368:1028): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5560]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5560]: ps_root_recvmsg: Invalid argument Dec 12 01:43:57 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsg: Invalid argument Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.862625][ T29] audit: type=1400 audit(1733967837.460:1029): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller kern.notice kernel: [ 66.884978][ T29] audit: type=1400 audit(1733967837.460:1030): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5561]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:43:57 syzkaller daemon.err dhcpcd[5561]: ps_root_recvmsg: Invalid argument Dec 12 01:43:58 syzkaller daemon.warn dhcpcd[3038]: eth4: no IPv6 Routers available Dec 12 01:43:58 syzkaller daemon.warn dhcpcd[3038]: eth3: no IPv6 Routers available Dec 12 01:44:03 [ 72.964922][ T29] kauditd_printk_skb: 13 callbacks suppressed syzkaller daemon[ 72.964939][ T29] audit: type=1400 audit(1733967843.089:1044): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[5562]: ps_bpf_start_bpf: bpf_open: Invalid argument[ 73.001154][ T29] audit: type=1400 audit(1733967843.126:1045): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:44:03[ 73.023768][ T29] audit: type=1400 audit(1733967843.126:1046): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 73.047118][ T29] audit: type=1400 audit(1733967843.135:1047): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 warn kernel: [ [ 73.071334][ T29] audit: type=1400 audit(1733967843.190:1048): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 72.964922][ T[ 73.094068][ T29] audit: type=1400 audit(1733967843.190:1049): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] kauditd_prin[ 73.117483][ T29] audit: type=1400 audit(1733967843.190:1050): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tk_skb: 13 callb[ 73.141647][ T29] audit: type=1400 audit(1733967843.264:1051): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 73.164178][ T29] audit: type=1400 audit(1733967843.264:1052): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:44:03[ 73.187420][ T29] audit: type=1400 audit(1733967843.264:1053): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 72.964939][ T29] audit: type=1400 audit(1733967843.089:1044): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller daemon.err dhcpcd[5562]: ps_root_recvmsg: Invalid argument Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.001154][ T29] audit: type=1400 audit(1733967843.126:1045): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.023768][ T29] audit: type=1400 audit(1733967843.126:1046): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.047118][ T29] audit: type=1400 audit(1733967843.135:1047): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.071334][ T29] audit: type=1400 audit(1733967843.190:1048): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.094068][ T29] audit: type=1400 audit(1733967843.190:1049): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.117483][ T29] audit: type=1400 audit(1733967843.190:1050): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.141647][ T29] audit: type=1400 audit(1733967843.264:1051): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.164178][ T29] audit: type=1400 audit(1733967843.264:1052): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller kern.notice kernel: [ 73.187420][ T29] audit: type=1400 audit(1733967843.264:1053): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:03 syzkaller daemon.err dhcpcd[5563]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:03 syzkaller daemon.err dhcpcd[5563]: ps_root_recvmsg: Invalid argument Dec 12 01:44:03 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:44:03 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5563: Connection refused Dec 12 01:44:03 syzkaller daemon.err dhcpcd[5564]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:03 syzkaller daemon.err dhcpcd[5564]: ps_root_recvmsg: Invalid argument Dec 12 01:44:04 syzkaller daemon.err dhcpcd[5565]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:04 syzkaller daemon.err dhcpcd[5565]: ps_root_recvmsg: Invalid argument [ 82.416620][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 82.416639][ T29] audit: type=1400 audit(1733967851.817:1065): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:44:11 syzkaller kern.w[ 82.448638][ T29] audit: type=1400 audit(1733967851.845:1066): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ [ 82.471969][ T29] audit: type=1400 audit(1733967851.845:1067): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 82.416620][ T29] kauditd_printk_skb: 11 callba[ 82.499212][ T29] audit: type=1400 audit(1733967851.891:1068): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 82.522049][ T29] audit: type=1400 audit(1733967851.891:1069): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:44:11 syzkaller kern.n[ 82.547352][ T29] audit: type=1400 audit(1733967851.937:1070): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ [ 82.570136][ T29] audit: type=1400 audit(1733967851.937:1071): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 82.416639][ T29] audit: type[ 82.595750][ T29] audit: type=1400 audit(1733967851.984:1072): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1733[ 82.618321][ T29] audit: type=1400 audit(1733967851.984:1073): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 967851.817:1065): avc: denied { egress } for [ 82.645987][ T29] audit: type=1400 audit(1733967852.030:1074): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.448638][ T29] audit: type=1400 audit(1733967851.845:1066): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.471969][ T29] audit: type=1400 audit(1733967851.845:1067): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.499212][ T29] audit: type=1400 audit(1733967851.891:1068): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.522049][ T29] audit: type=1400 audit(1733967851.891:1069): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.547352][ T29] audit: type=1400 audit(1733967851.937:1070): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:11 syzkaller kern.notice kernel: [ 82.570136][ T29] audit: type=1400 audit(1733967851.937:1071): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:12 syzkaller kern.notice kernel: [ 82.595750][ T29] audit: type=1400 audit(1733967851.984:1072): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:12 syzkaller kern.notice kernel: [ 82.618321][ T29] audit: type=1400 audit(1733967851.984:1073): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:12 syzkaller kern.notice kernel: [ 82.645987][ T29] audit: type=1400 audit(1733967852.030:1074): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:12 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:44:12 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5558: Connection refused Dec 12 01:44:12 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:44:12 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5560: Connection refused Dec 12 01:44:13 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:44:13 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5561: Connection refused Dec 12 01:44:13 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:44:13 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5559: Connection refused [ 89.352778][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 89.352797][ T29] audit: type=1400 audit(1733967858.221:1088): avc: denied { egress } for pid=0 comm="swapper/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:44:18 [ 89.384274][ T29] audit: type=1400 audit(1733967858.239:1089): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 89.407333][ T29] audit: type=1400 audit(1733967858.239:1090): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 89.352778][ T2[ 89.432614][ T29] audit: type=1400 audit(1733967858.295:1091): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 89.455556][ T29] audit: type=1400 audit(1733967858.295:1092): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 13 callbacks suppressed Dec 12 01:44:18 [ 89.482963][ T29] audit: type=1400 audit(1733967858.341:1093): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.n[ 89.505324][ T29] audit: type=1400 audit(1733967858.341:1094): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 89.352797][ [ 89.531078][ T29] audit: type=1400 audit(1733967858.378:1095): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type[ 89.553546][ T29] audit: type=1400 audit(1733967858.378:1096): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1733967858.221:1088)[ 89.578599][ T29] audit: type=1400 audit(1733967858.424:1097): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied { egress } for pid=0 comm="swapper/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_ Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.384274][ T29] audit: type=1400 audit(1733967858.239:1089): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.407333][ T29] audit: type=1400 audit(1733967858.239:1090): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.432614][ T29] audit: type=1400 audit(1733967858.295:1091): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.455556][ T29] audit: type=1400 audit(1733967858.295:1092): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.482963][ T29] audit: type=1400 audit(1733967858.341:1093): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.505324][ T29] audit: type=1400 audit(1733967858.341:1094): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.531078][ T29] audit: type=1400 audit(1733967858.378:1095): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.553546][ T29] audit: type=1400 audit(1733967858.378:1096): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:18 syzkaller kern.notice kernel: [ 89.578599][ T29] audit: type=1400 audit(1733967858.424:1097): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 94.902745][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 94.902761][ T29] audit: type=1400 audit(1733967863.342:1102): avc: denied { egress } for pid=2963 comm="kworker/0:2" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:44:23 [ 94.936232][ T29] audit: type=1400 audit(1733967863.370:1103): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 94.959858][ T29] audit: type=1400 audit(1733967863.370:1104): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 94.902745][ T2[ 94.985066][ T29] audit: type=1400 audit(1733967863.416:1105): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 95.007986][ T29] audit: type=1400 audit(1733967863.416:1106): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbacks suppressed D[ 95.032725][ T29] audit: type=1400 audit(1733967863.462:1107): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:44:23 s[ 95.056040][ T29] audit: type=1400 audit(1733967863.462:1108): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 94.902761][ T29] audit: type=[ 95.083757][ T29] audit: type=1400 audit(1733967863.499:1109): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1400 audit(17339[ 95.107033][ T29] audit: type=1400 audit(1733967863.499:1110): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67863.342:1102): avc: denied {[ 95.132534][ T29] audit: type=1400 audit(1733967863.554:1111): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 egress } for pid=2963 comm="kworker/0:2" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:ob Dec 12 01:44:23 syzkaller kern.notice kernel: [ 94.936232][ T29] audit: type=1400 audit(1733967863.370:1103): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 94.959858][ T29] audit: type=1400 audit(1733967863.370:1104): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 94.985066][ T29] audit: type=1400 audit(1733967863.416:1105): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.007986][ T29] audit: type=1400 audit(1733967863.416:1106): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.032725][ T29] audit: type=1400 audit(1733967863.462:1107): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.056040][ T29] audit: type=1400 audit(1733967863.462:1108): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.083757][ T29] audit: type=1400 audit(1733967863.499:1109): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.107033][ T29] audit: type=1400 audit(1733967863.499:1110): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:23 syzkaller kern.notice kernel: [ 95.132534][ T29] audit: type=1400 audit(1733967863.554:1111): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 101.144589][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 101.144605][ T29] audit: type=1400 audit(1733967869.100:1116): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:44:29 [ 101.176394][ T29] audit: type=1400 audit(1733967869.118:1117): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 101.199463][ T29] audit: type=1400 audit(1733967869.118:1118): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 101.144589][ T29] kauditd_print[ 101.226138][ T29] audit: type=1400 audit(1733967869.173:1119): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 101.248956][ T29] audit: type=1400 audit(1733967869.173:1120): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed Dec 12 01:44:29 s[ 101.274662][ T29] audit: type=1400 audit(1733967869.220:1121): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 101.297036][ T29] audit: type=1400 audit(1733967869.220:1122): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 101.144605][ T29] audit: type=[ 101.323998][ T29] audit: type=1400 audit(1733967869.266:1123): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1400 audit(17339[ 101.346698][ T29] audit: type=1400 audit(1733967869.266:1124): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67869.100:1116): avc: denied { egress } for p[ 101.372873][ T29] audit: type=1400 audit(1733967869.312:1125): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 id=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.176394][ T29] audit: type=1400 audit(1733967869.118:1117): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.199463][ T29] audit: type=1400 audit(1733967869.118:1118): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.226138][ T29] audit: type=1400 audit(1733967869.173:1119): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.248956][ T29] audit: type=1400 audit(1733967869.173:1120): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.274662][ T29] audit: type=1400 audit(1733967869.220:1121): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.297036][ T29] audit: type=1400 audit(1733967869.220:1122): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.323998][ T29] audit: type=1400 audit(1733967869.266:1123): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.346698][ T29] audit: type=1400 audit(1733967869.266:1124): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:29 syzkaller kern.notice kernel: [ 101.372873][ T29] audit: type=1400 audit(1733967869.312:1125): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 115.607204][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 115.607222][ T29] audit: type=1400 audit(1733967882.442:1129): avc: denied { recv } for pid=8 comm="kworker/0:0" saddr=10.128.0.163 src=30030 daddr=10.128.1.96 dest=33522 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 12 01:44:42 syzkaller kern.warn kernel: [ 1[ 115.641989][ T29] audit: type=1400 audit(1733967882.470:1130): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 15.607204][ T2[ 115.665137][ T29] audit: type=1400 audit(1733967882.470:1131): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 3 callbacks suppressed D[ 115.691374][ T29] audit: type=1400 audit(1733967882.525:1132): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:44:42 s[ 115.714769][ T29] audit: type=1400 audit(1733967882.525:1133): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 115.607222][ T29] audit: type=[ 115.742854][ T29] audit: type=1400 audit(1733967882.571:1134): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1400 audit(17339[ 115.765746][ T29] audit: type=1400 audit(1733967882.571:1135): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67882.442:1129): avc: denied { recv } for pid[ 115.792052][ T29] audit: type=1400 audit(1733967882.608:1136): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =8 comm="kworker[ 115.815183][ T29] audit: type=1400 audit(1733967882.608:1137): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 /0:0" saddr=10.128.0.163 src=30030 daddr=10.128.[ 115.841637][ T29] audit: type=1400 audit(1733967882.663:1138): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1.96 dest=33522 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.641989][ T29] audit: type=1400 audit(1733967882.470:1130): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.665137][ T29] audit: type=1400 audit(1733967882.470:1131): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.691374][ T29] audit: type=1400 audit(1733967882.525:1132): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.714769][ T29] audit: type=1400 audit(1733967882.525:1133): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.742854][ T29] audit: type=1400 audit(1733967882.571:1134): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.765746][ T29] audit: type=1400 audit(1733967882.571:1135): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.792052][ T29] audit: type=1400 audit(1733967882.608:1136): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.815183][ T29] audit: type=1400 audit(1733967882.608:1137): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:42 syzkaller kern.notice kernel: [ 115.841637][ T29] audit: type=1400 audit(1733967882.663:1138): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:44:44 syzkaller daemon.err dhcpcd[5567]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:44 syzkaller daemon.err dhcpcd[5567]: ps_root_recvmsg: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5568]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5568]: ps_root_recvmsg: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5569]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5569]: ps_root_recvmsg: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5570]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:44:45 syzkaller daemon.err dhcpcd[5570]: ps_root_recvmsg: Invalid argument [ 142.034557][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 142.034573][ T29] audit: type=1400 audit(1733967906.820:1152): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:45:06 syzkaller daemon.err dhcpcd[5571]: ps_bpf_start_[ 142.068492][ T29] audit: type=1400 audit(1733967906.847:1153): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 142.091149][ T29] audit: type=1400 audit(1733967906.847:1154): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 142.114534][ T29] audit: type=1400 audit(1733967906.847:1155): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:45:06 syzkaller kern.warn kernel: [ [ 142.141872][ T29] audit: type=1400 audit(1733967906.921:1156): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 142.034557][ T[ 142.164141][ T29] audit: type=1400 audit(1733967906.921:1157): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] kauditd_prin[ 142.187465][ T29] audit: type=1400 audit(1733967906.921:1158): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tk_skb: 13 callbacks suppressed[ 142.212784][ T29] audit: type=1400 audit(1733967906.995:1159): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:45:06[ 142.236006][ T29] audit: type=1400 audit(1733967906.995:1160): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 142.259366][ T29] audit: type=1400 audit(1733967906.995:1161): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 notice kernel: [ 142.034573][ T29] audit: type=1400 audit(1733967906.820:1152): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller daemon.err dhcpcd[5571]: ps_root_recvmsg: Invalid argument Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.068492][ T29] audit: type=1400 audit(1733967906.847:1153): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.091149][ T29] audit: type=1400 audit(1733967906.847:1154): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.114534][ T29] audit: type=1400 audit(1733967906.847:1155): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.141872][ T29] audit: type=1400 audit(1733967906.921:1156): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.164141][ T29] audit: type=1400 audit(1733967906.921:1157): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller kern.notice kernel: [ 142.187465][ T29] audit: type=1400 audit(1733967906.921:1158): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:06 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:06 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5564: Connection refused Dec 12 01:45:07 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:07 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5562: Connection refused Dec 12 01:45:07 syzkaller kern.notice kernel: [ 142.212784][ T29] audit: type=1400 audit(1733967906.995:1159): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:07 syzkaller kern.notice kernel: [ 142.236006][ T29] audit: type=1400 audit(1733967906.995:1160): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:07 syzkaller kern.notice kernel: [ 142.259366][ T29] audit: type=1400 audit(1733967906.995:1161): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:08 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:08 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5565: Connection refused [ 156.635943][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 156.635961][ T29] audit: type=1400 audit(1733967920.300:1171): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 156.665481][ T29] audit: type=1400 audit(1733967920.300:1172): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:45:20 syzkaller kern.w[ 156.691972][ T29] audit: type=1400 audit(1733967920.356:1173): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 156.714330][ T29] audit: type=1400 audit(1733967920.356:1174): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 56.635943][ T2[ 156.737697][ T29] audit: type=1400 audit(1733967920.356:1175): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 9 callbac[ 156.762263][ T29] audit: type=1400 audit(1733967920.411:1176): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 156.785903][ T29] audit: type=1400 audit(1733967920.411:1177): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:45:20 s[ 156.809266][ T29] audit: type=1400 audit(1733967920.411:1178): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ [ 156.835361][ T29] audit: type=1400 audit(1733967920.485:1179): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 156.635961][ T[ 156.857787][ T29] audit: type=1400 audit(1733967920.485:1180): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] audit: type=1400 audit(1733967920.300:1171): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.665481][ T29] audit: type=1400 audit(1733967920.300:1172): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.691972][ T29] audit: type=1400 audit(1733967920.356:1173): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.714330][ T29] audit: type=1400 audit(1733967920.356:1174): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.737697][ T29] audit: type=1400 audit(1733967920.356:1175): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.762263][ T29] audit: type=1400 audit(1733967920.411:1176): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.785903][ T29] audit: type=1400 audit(1733967920.411:1177): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.809266][ T29] audit: type=1400 audit(1733967920.411:1178): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.835361][ T29] audit: type=1400 audit(1733967920.485:1179): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:20 syzkaller kern.notice kernel: [ 156.857787][ T29] audit: type=1400 audit(1733967920.485:1180): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 162.187098][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 162.187114][ T29] audit: type=1400 audit(1733967925.421:1184): avc: denied { egress } for pid=9 comm="kworker/0:1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:45:25 syzkaller kern.warn kernel: [ 1[ 162.220537][ T29] audit: type=1400 audit(1733967925.449:1185): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 62.187098][ T2[ 162.243355][ T29] audit: type=1400 audit(1733967925.449:1186): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 3 callbac[ 162.269177][ T29] audit: type=1400 audit(1733967925.495:1187): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 162.291601][ T29] audit: type=1400 audit(1733967925.495:1188): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:45:25 syzkaller kern.notice kernel: [ 162.187114][ T[ 162.319384][ T29] audit: type=1400 audit(1733967925.541:1189): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] audit: type=[ 162.342462][ T29] audit: type=1400 audit(1733967925.541:1190): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1400 audit(1733967925.421:1184):[ 162.367266][ T29] audit: type=1400 audit(1733967925.587:1191): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 avc: denied {[ 162.390578][ T29] audit: type=1400 audit(1733967925.587:1192): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 egress } for p[ 162.414976][ T29] audit: type=1400 audit(1733967925.633:1193): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 id=9 comm="kworker/0:1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:objec Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.220537][ T29] audit: type=1400 audit(1733967925.449:1185): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.243355][ T29] audit: type=1400 audit(1733967925.449:1186): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.269177][ T29] audit: type=1400 audit(1733967925.495:1187): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.291601][ T29] audit: type=1400 audit(1733967925.495:1188): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.319384][ T29] audit: type=1400 audit(1733967925.541:1189): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.342462][ T29] audit: type=1400 audit(1733967925.541:1190): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.367266][ T29] audit: type=1400 audit(1733967925.587:1191): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.390578][ T29] audit: type=1400 audit(1733967925.587:1192): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:25 syzkaller kern.notice kernel: [ 162.414976][ T29] audit: type=1400 audit(1733967925.633:1193): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 167.733211][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 167.733226][ T29] audit: type=1400 audit(1733967930.542:1196): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 167.762741][ T29] audit: type=1400 audit(1733967930.542:1197): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 167.786267][ T29] audit: type=1400 audit(1733967930.542:1198): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:45:30 [ 167.810954][ T29] audit: type=1400 audit(1733967930.607:1199): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 167.833695][ T29] audit: type=1400 audit(1733967930.607:1200): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 167.856982][ T29] audit: type=1400 audit(1733967930.607:1201): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67.733211][ T2[ 167.880311][ T29] audit: type=1400 audit(1733967930.607:1202): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_printk_skb: 2 callbac[ 167.905055][ T29] audit: type=1400 audit(1733967930.690:1203): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 167.928583][ T29] audit: type=1400 audit(1733967930.690:1204): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:45:30 s[ 167.951722][ T29] audit: type=1400 audit(1733967930.699:1205): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 167.733226][ T29] audit: type=1400 audit(1733967930.542:1196): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.762741][ T29] audit: type=1400 audit(1733967930.542:1197): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.786267][ T29] audit: type=1400 audit(1733967930.542:1198): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.810954][ T29] audit: type=1400 audit(1733967930.607:1199): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.833695][ T29] audit: type=1400 audit(1733967930.607:1200): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.856982][ T29] audit: type=1400 audit(1733967930.607:1201): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.880311][ T29] audit: type=1400 audit(1733967930.607:1202): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.905055][ T29] audit: type=1400 audit(1733967930.690:1203): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.928583][ T29] audit: type=1400 audit(1733967930.690:1204): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:30 syzkaller kern.notice kernel: [ 167.951722][ T29] audit: type=1400 audit(1733967930.699:1205): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 174.994070][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 174.994088][ T29] audit: type=1400 audit(1733967937.241:1210): avc: denied { recv } for pid=8 comm="kworker/0:0" saddr=10.128.0.163 src=30030 daddr=10.128.1.96 dest=33522 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Dec 12 01:45:37 syzkaller kern.w[ 175.027414][ T29] audit: type=1400 audit(1733967937.269:1211): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 175.050688][ T29] audit: type=1400 audit(1733967937.269:1212): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 74.994070][ T29] kauditd_printk_skb: 4 callbac[ 175.077842][ T29] audit: type=1400 audit(1733967937.315:1213): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed D[ 175.100128][ T29] audit: type=1400 audit(1733967937.315:1214): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ec 12 01:45:37 syzkaller kern.no[ 175.125581][ T29] audit: type=1400 audit(1733967937.361:1215): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ [ 175.148306][ T29] audit: type=1400 audit(1733967937.361:1216): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 174.994088][ T29] audit: type=[ 175.173635][ T29] audit: type=1400 audit(1733967937.398:1217): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1400 audit(17339[ 175.196452][ T29] audit: type=1400 audit(1733967937.398:1218): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 67937.241:1210): avc: denied { recv } for pid=8 comm="kworker[ 175.225065][ T29] audit: type=1400 audit(1733967937.453:1219): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 /0:0" saddr=10.128.0.163 src=30030 daddr=10.128.1.96 dest=33522 netif=eth0 scontext=root:sysadm_r:sysadm_t tconte Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.027414][ T29] audit: type=1400 audit(1733967937.269:1211): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.050688][ T29] audit: type=1400 audit(1733967937.269:1212): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.077842][ T29] audit: type=1400 audit(1733967937.315:1213): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.100128][ T29] audit: type=1400 audit(1733967937.315:1214): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.125581][ T29] audit: type=1400 audit(1733967937.361:1215): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.148306][ T29] audit: type=1400 audit(1733967937.361:1216): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.173635][ T29] audit: type=1400 audit(1733967937.398:1217): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.196452][ T29] audit: type=1400 audit(1733967937.398:1218): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:37 syzkaller kern.notice kernel: [ 175.225065][ T29] audit: type=1400 audit(1733967937.453:1219): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 [ 186.720903][ T29] kauditd_printk_skb: 4 callbacks suppressed syzkaller daemon[ 186.720917][ T29] audit: type=1400 audit(1733967948.064:1224): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:[ 186.755925][ T29] audit: type=1400 audit(1733967948.092:1225): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 45:48 syzkaller [ 186.779319][ T29] audit: type=1400 audit(1733967948.092:1226): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 186.802919][ T29] audit: type=1400 audit(1733967948.092:1227): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3038]: ps_root_recvmsgcb: failed to send message to pid 5567: [ 186.830792][ T29] audit: type=1400 audit(1733967948.166:1228): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Connection refus[ 186.854296][ T29] audit: type=1400 audit(1733967948.166:1229): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed Dec 12 01:45[ 186.877700][ T29] audit: type=1400 audit(1733967948.166:1230): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 :48 syzkaller kern.warn kernel: [ 186.720903][ T29] kauditd_p[ 186.905284][ T29] audit: type=1400 audit(1733967948.230:1231): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rintk_skb: 4 cal[ 186.928646][ T29] audit: type=1400 audit(1733967948.230:1232): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 lbacks suppresse[ 186.951946][ T29] audit: type=1400 audit(1733967948.230:1233): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.720917][ T29] audit: type=1400 audit(1733967948.064:1224): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.755925][ T29] audit: type=1400 audit(1733967948.092:1225): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.779319][ T29] audit: type=1400 audit(1733967948.092:1226): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.802919][ T29] audit: type=1400 audit(1733967948.092:1227): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.830792][ T29] audit: type=1400 audit(1733967948.166:1228): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.854296][ T29] audit: type=1400 audit(1733967948.166:1229): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.877700][ T29] audit: type=1400 audit(1733967948.166:1230): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.905284][ T29] audit: type=1400 audit(1733967948.230:1231): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.928646][ T29] audit: type=1400 audit(1733967948.230:1232): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:48 syzkaller kern.notice kernel: [ 186.951946][ T29] audit: type=1400 audit(1733967948.230:1233): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:49 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:49 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5568: Connection refused Dec 12 01:45:49 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:49 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5569: Connection refused Dec 12 01:45:50 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:45:50 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5570: Connection refused [ 195.476460][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 195.476478][ T29] audit: type=1400 audit(1733967956.138:1244): avc: denied { egress } for pid=8 comm="kworker/0:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Dec 12 01:45:56 [ 195.511160][ T29] audit: type=1400 audit(1733967956.138:1245): avc: denied { egress } for pid=8 comm="kworker/0:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 syzkaller kern.w[ 195.535225][ T29] audit: type=1400 audit(1733967956.175:1246): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 195.558583][ T29] audit: type=1400 audit(1733967956.175:1247): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 95.476460][ T29] kauditd_print[ 195.584493][ T29] audit: type=1400 audit(1733967956.230:1248): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 10 callba[ 195.606765][ T29] audit: type=1400 audit(1733967956.230:1249): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 195.630124][ T29] audit: type=1400 audit(1733967956.239:1250): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.476478][ [ 195.658495][ T29] audit: type=1400 audit(1733967956.304:1251): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type[ 195.681109][ T29] audit: type=1400 audit(1733967956.304:1252): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =1400 audit(1733[ 195.704834][ T29] audit: type=1400 audit(1733967956.304:1253): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 967956.138:1244): avc: denied { egress } for pid=8 comm="kworker/0:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:objec Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.511160][ T29] audit: type=1400 audit(1733967956.138:1245): avc: denied { egress } for pid=8 comm="kworker/0:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:objec Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.535225][ T29] audit: type=1400 audit(1733967956.175:1246): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.558583][ T29] audit: type=1400 audit(1733967956.175:1247): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.584493][ T29] audit: type=1400 audit(1733967956.230:1248): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.606765][ T29] audit: type=1400 audit(1733967956.230:1249): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.630124][ T29] audit: type=1400 audit(1733967956.239:1250): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.658495][ T29] audit: type=1400 audit(1733967956.304:1251): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.681109][ T29] audit: type=1400 audit(1733967956.304:1252): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:45:56 syzkaller kern.notice kernel: [ 195.704834][ T29] audit: type=1400 audit(1733967956.304:1253): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 [ 211.134041][ T29] kauditd_printk_skb: 3 callbacks suppressed syzkaller daemon[ 211.134055][ T29] audit: type=1400 audit(1733967970.578:1257): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[5572]: ps_bpf_start_bpf: bpf_open: Invalid argument[ 211.169055][ T29] audit: type=1400 audit(1733967970.615:1258): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:46:10[ 211.192465][ T29] audit: type=1400 audit(1733967970.615:1259): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.[ 211.215772][ T29] audit: type=1400 audit(1733967970.615:1260): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 warn kernel: [ [ 211.240652][ T29] audit: type=1400 audit(1733967970.680:1261): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 211.134041][ T[ 211.263234][ T29] audit: type=1400 audit(1733967970.680:1262): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 29] kauditd_prin[ 211.286582][ T29] audit: type=1400 audit(1733967970.680:1263): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tk_skb: 3 callba[ 211.310869][ T29] audit: type=1400 audit(1733967970.754:1264): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 211.333447][ T29] audit: type=1400 audit(1733967970.754:1265): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Dec 12 01:46:10 [ 211.356804][ T29] audit: type=1400 audit(1733967970.754:1266): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 211.134055][ T29] audit: type=1400 audit(1733967970.578:1257): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller daemon.err dhcpcd[5572]: ps_root_recvmsg: Invalid argument Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.169055][ T29] audit: type=1400 audit(1733967970.615:1258): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.192465][ T29] audit: type=1400 audit(1733967970.615:1259): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.215772][ T29] audit: type=1400 audit(1733967970.615:1260): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.240652][ T29] audit: type=1400 audit(1733967970.680:1261): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.263234][ T29] audit: type=1400 audit(1733967970.680:1262): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.286582][ T29] audit: type=1400 audit(1733967970.680:1263): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.310869][ T29] audit: type=1400 audit(1733967970.754:1264): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.333447][ T29] audit: type=1400 audit(1733967970.754:1265): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:10 syzkaller kern.notice kernel: [ 211.356804][ T29] audit: type=1400 audit(1733967970.754:1266): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Dec 12 01:46:11 syzkaller daemon.err dhcpcd[3038]: ps_sendpsmmsg: Connection refused Dec 12 01:46:11 syzkaller daemon.err dhcpcd[3038]: ps_root_recvmsgcb: failed to send message to pid 5571: Connection refused Dec 12 01:46:11 syzkaller daemon.err dhcpcd[5573]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:46:11 syzkaller daemon.err dhcpcd[5573]: ps_root_recvmsg: Invalid argument Dec 12 01:46:12 syzkaller daemon.err dhcpcd[5574]: ps_bpf_start_bpf: bpf_open: Invalid argument Dec 12 01:46:12 syzkaller daemon.err dhcpcd[5574]: ps_root_recvmsg: Invalid argument [ 214.420142][ C0] ================================================================== [ 214.428260][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 214.436427][ C0] [ 214.438746][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: [ 214.446115][ C0] __tmigr_cpu_activate+0x55/0x200 [ 214.451243][ C0] tmigr_cpu_activate+0x8a/0xc0 [ 214.456122][ C0] timer_clear_idle+0x28/0x100 [ 214.460911][ C0] tick_nohz_restart_sched_tick+0x22/0x110 [ 214.466773][ C0] tick_nohz_idle_exit+0xfe/0x1d0 [ 214.471812][ C0] do_idle+0x1eb/0x230 [ 214.475890][ C0] cpu_startup_entry+0x25/0x30 [ 214.480671][ C0] start_secondary+0x96/0xa0 [ 214.485275][ C0] common_startup_64+0x12c/0x137 [ 214.490238][ C0] [ 214.492567][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: [ 214.500104][ C0] tmigr_handle_remote+0x26e/0x940 [ 214.505230][ C0] run_timer_softirq+0x5f/0x70 [ 214.510012][ C0] handle_softirqs+0xbf/0x280 [ 214.514694][ C0] __irq_exit_rcu+0x3a/0xc0 [ 214.519204][ C0] sysvec_apic_timer_interrupt+0x73/0x80 [ 214.524838][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 214.530849][ C0] _raw_spin_unlock_irq+0x2f/0x50 [ 214.535887][ C0] usb_hcd_submit_urb+0x552/0x1510 [ 214.541037][ C0] usb_submit_urb+0xa80/0xb70 [ 214.545717][ C0] usb_start_wait_urb+0x91/0x190 [ 214.550661][ C0] usb_control_msg+0x182/0x240 [ 214.555430][ C0] hub_ext_port_status+0xbf/0x480 [ 214.560477][ C0] hub_event+0x538/0x2910 [ 214.564815][ C0] process_scheduled_works+0x483/0x9a0 [ 214.570287][ C0] worker_thread+0x51d/0x6f0 [ 214.574887][ C0] kthread+0x1d1/0x210 [ 214.578953][ C0] ret_from_fork+0x4b/0x60 [ 214.583387][ C0] ret_from_fork_asm+0x1a/0x30 [ 214.588189][ C0] [ 214.590506][ C0] value changed: 0x00 -> 0x01 [ 214.595173][ C0] [ 214.597489][ C0] Reported by Kernel Concurrency Sanitizer on: [ 214.603646][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc2-syzkaller-00036-g231825b2e1ff #0 [ 214.614146][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 214.624208][ C0] Workqueue: usb_hub_wq hub_event [ 214.629241][ C0] ================================================================== Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.420142][ C0] ================================================================== Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.428260][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.436427][ C0] Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.438746][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.446115][ C0] __tmigr_cpu_activate+0x55/0x200 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.451243][ C0] tmigr_cpu_activate+0x8a/0xc0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.456122][ C0] timer_clear_idle+0x28/0x100 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.460911][ C0] tick_nohz_restart_sched_tick+0x22/0x110 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.466773][ C0] tick_nohz_idle_exit+0xfe/0x1d0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.471812][ C0] do_idle+0x1eb/0x230 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.475890][ C0] cpu_startup_entry+0x25/0x30 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.480671][ C0] start_secondary+0x96/0xa0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.485275][ C0] common_startup_64+0x12c/0x137 Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.490238][ C0] Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.492567][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.500104][ C0] tmigr_handle_remote+0x26e/0x940 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.505230][ C0] run_timer_softirq+0x5f/0x70 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.510012][ C0] handle_softirqs+0xbf/0x280 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.514694][ C0] __irq_exit_rcu+0x3a/0xc0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.519204][ C0] sysvec_apic_timer_interrupt+0x73/0x80 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.524838][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.530849][ C0] _raw_spin_unlock_irq+0x2f/0x50 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.535887][ C0] usb_hcd_submit_urb+0x552/0x1510 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.541037][ C0] usb_submit_urb+0xa80/0xb70 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.545717][ C0] usb_start_wait_urb+0x91/0x190 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.550661][ C0] usb_control_msg+0x182/0x240 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.555430][ C0] hub_ext_port_status+0xbf/0x480 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.560477][ C0] hub_event+0x538/0x2910 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.564815][ C0] process_scheduled_works+0x483/0x9a0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.570287][ C0] worker_thread+0x51d/0x6f0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.574887][ C0] kthread+0x1d1/0x210 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.578953][ C0] ret_from_fork+0x4b/0x60 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.583387][ C0] ret_from_fork_asm+0x1a/0x30 Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.588189][ C0] Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.590506][ C0] value changed: 0x00 -> 0x01 Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.595173][ C0] Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.597489][ C0] Reported by Kernel Concurrency Sanitizer on: Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.603646][ C0] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.13.0-rc2-syzkaller-00036-g231825b2e1ff #0 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.614146][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Dec 12 01:46:13 syzkaller kern.warn kernel: [ 214.624208][ C0] Workqueue: usb_hub_wq hub_event Dec 12 01:46:13 syzkaller kern.err kernel: [ 214.629241][ C0] ==================================================================