last executing test programs: 1.484151144s ago: executing program 0 (id=2334): r0 = syz_io_uring_setup(0x7b, &(0x7f00000003c0)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000000, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001640)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="796100180000000000007e"], 0x1c}}, 0x0) shutdown(r1, 0x1) fremovexattr(0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu>\'\'\t|\t') epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@data_err_abort}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") r4 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) r5 = socket$phonet_pipe(0x23, 0x5, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) connect$phonet_pipe(r5, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x5}, 0x10) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) io_uring_enter(r0, 0x46f3, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001080)={0x38, 0x1403, 0x1, 0x702, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 1.368703073s ago: executing program 0 (id=2337): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) 1.29201904s ago: executing program 0 (id=2339): r0 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) 1.290199861s ago: executing program 0 (id=2340): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe2b, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x9, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.156461402s ago: executing program 0 (id=2343): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000080)=0x1, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000180)='/', 0x1}], 0x1}, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x193a, 0x4) recvmmsg(r0, &(0x7f00000005c0), 0x40000000000026c, 0x0, 0x0) 999.835635ms ago: executing program 2 (id=2348): r0 = syz_io_uring_setup(0x7b, &(0x7f00000003c0)={0x0, 0x0, 0x10100}, &(0x7f0000000000), &(0x7f0000000100)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000850000007d00000095"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000000, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001640)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="796100180000000000007e"], 0x1c}}, 0x0) shutdown(r1, 0x1) fremovexattr(0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu>\'\'\t|\t') epoll_create1(0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x11, &(0x7f0000000100)={[{@noblock_validity}, {@data_err_abort}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x71d}}, {@abort}]}, 0x1, 0x610, &(0x7f0000000a40)="$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") r4 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r4, 0x7, 0x0, 0x0, 0x0) r5 = socket$phonet_pipe(0x23, 0x5, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r6}, 0x10) connect$phonet_pipe(r5, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x5}, 0x10) ioctl$SIOCPNENABLEPIPE(r5, 0x89ed, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)) io_uring_enter(r0, 0x46f3, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000001080)={0x38, 0x1403, 0x1, 0x702, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 941.82747ms ago: executing program 2 (id=2349): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000000080)=0x8, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000005c0)={'ip6tnl0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000180)='7', 0x1, 0x0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @random="bf73a9e561c5"}, 0x14) 884.305965ms ago: executing program 2 (id=2350): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000008b"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x63, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r3, 0xe03, 0x70bd2d, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x4044050) 883.662725ms ago: executing program 2 (id=2360): r0 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) 764.116875ms ago: executing program 2 (id=2362): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000fffffffb000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000d000000b7020000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001200)='signal_generate\x00', r2}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004cc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000a40)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0xbb9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0xffffbfff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x4, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x1, 0x0, 0x0, 0x0, 0x7}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x488}}, 0x0) 741.976147ms ago: executing program 2 (id=2352): setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 358.919409ms ago: executing program 3 (id=2364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r3, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000001a0000000c00018008000100", @ANYRES32=r2], 0x20}}, 0x0) 357.7804ms ago: executing program 3 (id=2369): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0000006a0000000000bf983db853e8e8c17359c39fc5db8e9ea0e500163bb6b46bc883ea5d918cd57f37b85bb30a135d11e4c467d480e039f2ac07f28000000000000000b67aec650bd5bbcc272efb35b3e7267a8adcb431652bae79080de5220cebe7a1c9c8173e3a", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0xb, &(0x7f0000000a80)=ANY=[], &(0x7f0000000200)='GPL\x00', 0xd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f00000003c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000040)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@minixdf}, {@resgid}, {@grpquota}, {@usrjquota}]}, 0x3, 0x44a, &(0x7f0000000400)="$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") setxattr$trusted_overlay_upper(&(0x7f0000000300)='./file0\x00', &(0x7f0000000240), &(0x7f0000000380)=ANY=[], 0xff27, 0x0) chdir(&(0x7f0000000140)='./file0\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280), &(0x7f0000000340)={'0000000000000000000000000000000', 0x32}, 0x20, 0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505330, &(0x7f0000000bc0)={{0xfc, 0x1}, {0xe}}) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) sendmsg$inet(r3, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001600)}, 0x0) recvmsg(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x700) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000000000}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x214000, 0x800, 0x0, 0x3}, 0x20) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000c00)={0xd8, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x14, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x98, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x4}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1000}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x463044d5}]}]}]}, 0xd8}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 308.429854ms ago: executing program 0 (id=2370): ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0105500, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0xf, 0x0, 0x0, 0x0, 0x0, 0xafffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 296.472885ms ago: executing program 1 (id=2372): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000160a0103000000000000000002000000540003804000038014000100626f6e645f736c6176655f300000000014000100736974300000000000000000000000001400010073697430000000000000000000000000080002400000000008000140000000000900020073797a31000000000900010073797a30"], 0xa8}}, 0x0) 250.803779ms ago: executing program 4 (id=2373): creat(&(0x7f0000000440)='./file0\x00', 0x0) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 241.782059ms ago: executing program 1 (id=2374): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000180), 0x64, 0x526, &(0x7f0000000200)="$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") 180.130825ms ago: executing program 4 (id=2375): r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) writev(r1, &(0x7f0000002800)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) openat$vcsa(0xffffff9c, 0x0, 0x80, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fgetxattr(r0, &(0x7f0000000580)=ANY=[@ANYRES8=r0], 0x0, 0x0) 179.433625ms ago: executing program 1 (id=2376): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000140)='./bus\x00', 0x1a404ac, &(0x7f00000007c0)=ANY=[@ANYRES16, @ANYRESHEX, @ANYRESHEX], 0xfe, 0x0, &(0x7f0000000000)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./bus/file0\x00', 0x0) renameat2(r1, &(0x7f0000000240)='./bus/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x0) 176.389335ms ago: executing program 3 (id=2377): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001800)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x3, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x0, 0x0, 0x10, 0xfffffffd, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa486, 0x0, 0x0, 0x0, 0xfd91, 0x7, 0x0, 0x0, 0x0, 0x8e9, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffe, 0xfffffffc, 0x0, 0x0, 0x800, 0x6a4846db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x40}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x40}}}]}}]}, 0x45c}}, 0x0) 84.901163ms ago: executing program 4 (id=2378): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffff}, {0x0, 0xffff}}}, 0x24}}, 0x0) 84.545343ms ago: executing program 4 (id=2379): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r2) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x810100, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0x3}, 0x0) 84.332463ms ago: executing program 1 (id=2380): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x8, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}}}, 0x32) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) 84.107093ms ago: executing program 3 (id=2381): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000540), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendto$packet(r0, &(0x7f0000000000)="10060800", 0x4, 0x400c800, &(0x7f0000000040)={0x11, 0x8100, r1, 0x1, 0x0, 0x6, @local}, 0x14) 68.302754ms ago: executing program 1 (id=2382): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='signal_generate\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0x8000000000000000}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), r2) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01dfffffff0000000000210000000c000180080001"], 0x20}}, 0x0) 68.092934ms ago: executing program 4 (id=2383): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd63"], 0xfdef) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000140)={'nr0\x00', 0x6132}) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfe3a) 39.950846ms ago: executing program 3 (id=2384): r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x88, 0x67, &(0x7f00000002c0)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @multicast1=0xe0000003}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000800)="e9", 0x1}, {&(0x7f0000000040)='\x00\x00\x00\x00', 0x4}], 0x2, &(0x7f0000000300)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x40}, @loopback}}}], 0x20}, 0x0) 34.811107ms ago: executing program 3 (id=2385): write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001040)={0xe, {"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", 0xfffffffffffffd6f}}, 0x1006) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000008c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000d80)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000001680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001500000008000300", @ANYRES32=r2, @ANYBLOB="20002b80080001000000040014000380"], 0x3c}}, 0x0) 10.473089ms ago: executing program 1 (id=2386): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) getgroups(0x0, 0x0) 0s ago: executing program 4 (id=2387): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000180), 0x64, 0x526, &(0x7f0000000200)="$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") kernel console output (not intermixed with test programs): led with error -2 [ 131.168708][ T9157] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 131.374772][ T9190] netlink: 56 bytes leftover after parsing attributes in process `syz.4.2040'. [ 131.379827][ T9189] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2041'. [ 131.393408][ T9189] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 131.394092][ T9192] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 131.410963][ T9192] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 131.457290][ T9189] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 131.458958][ T9198] vhci_hcd: invalid port number 16 [ 131.469119][ T9198] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 131.557574][ T29] kauditd_printk_skb: 320 callbacks suppressed [ 131.557590][ T29] audit: type=1400 audit(1728691586.468:5435): avc: denied { mount } for pid=9205 comm="syz.0.2050" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 131.604473][ T29] audit: type=1400 audit(1728691586.498:5436): avc: denied { unmount } for pid=9205 comm="syz.0.2050" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 131.639557][ T29] audit: type=1400 audit(1728691586.548:5437): avc: denied { ioctl } for pid=9218 comm="syz.0.2055" path="socket:[23287]" dev="sockfs" ino=23287 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 131.664402][ T29] audit: type=1400 audit(1728691586.548:5438): avc: denied { bind } for pid=9218 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 131.694476][ T9223] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 131.702497][ T9223] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 131.803919][ T9236] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2062'. [ 131.813201][ T9236] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 131.832538][ T9236] loop3: detected capacity change from 0 to 1024 [ 131.841507][ T9236] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 131.851391][ T9236] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 131.863459][ T9236] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 131.874472][ T9236] EXT4-fs error (device loop3): ext4_get_journal_inode:5762: inode #5: comm syz.3.2062: unexpected bad inode w/o EXT4_IGET_BAD [ 131.889830][ T9236] EXT4-fs (loop3): no journal found [ 131.895083][ T9236] EXT4-fs (loop3): can't get journal size [ 131.909387][ T9236] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 131.924768][ T9236] EXT4-fs error (device loop3): __ext4_remount:6522: comm syz.3.2062: Abort forced by user [ 131.935691][ T9236] EXT4-fs (loop3): ext4_remount: Checksum for group 0 failed (42152!=20869) [ 131.946740][ T29] audit: type=1400 audit(1728691586.858:5439): avc: denied { setopt } for pid=9247 comm="syz.4.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 131.949357][ T9236] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 131.990122][ T29] audit: type=1400 audit(1728691586.898:5440): avc: denied { shutdown } for pid=9251 comm="syz.4.2071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 132.010050][ T29] audit: type=1400 audit(1728691586.898:5441): avc: denied { getopt } for pid=9251 comm="syz.4.2071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 132.029761][ T29] audit: type=1400 audit(1728691586.898:5442): avc: denied { name_connect } for pid=9251 comm="syz.4.2071" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 132.059294][ T29] audit: type=1400 audit(1728691586.958:5443): avc: denied { sqpoll } for pid=9256 comm="syz.4.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 132.080973][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 132.103979][ T9266] loop3: detected capacity change from 0 to 512 [ 132.115374][ T29] audit: type=1326 audit(1728691587.018:5444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9267 comm="syz.1.2077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f45d46adff9 code=0x7ffc0000 [ 132.152831][ T9266] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 132.167064][ T9266] ext4 filesystem being mounted at /258/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 132.208276][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 132.233482][ T9281] netlink: 'syz.4.2082': attribute type 10 has an invalid length. [ 132.245117][ T9281] 8021q: adding VLAN 0 to HW filter on device team0 [ 132.254280][ T9281] bond0: (slave team0): Enslaving as an active interface with an up link [ 132.305660][ T9293] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 132.355160][ T9295] loop3: detected capacity change from 0 to 512 [ 132.356499][ T9293] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 132.365217][ T9295] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 132.377343][ T9295] EXT4-fs (loop3): invalid journal inode [ 132.383002][ T9295] EXT4-fs (loop3): can't get journal size [ 132.396527][ T9295] EXT4-fs (loop3): 1 truncate cleaned up [ 132.402864][ T9295] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 132.427541][ T9302] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9302 comm=syz.4.2089 [ 132.440875][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 132.522458][ T9316] bpf_get_probe_write_proto: 20 callbacks suppressed [ 132.522480][ T9316] syz.4.2096[9316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.544292][ T9316] syz.4.2096[9316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.556442][ T9316] syz.4.2096[9316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.590283][ T9326] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 132.617813][ T9327] netlink: 'syz.4.2103': attribute type 4 has an invalid length. [ 132.619894][ T9326] loop3: detected capacity change from 0 to 1024 [ 132.636216][ T9326] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 132.646141][ T9326] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 132.668243][ T9326] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 132.680935][ T9326] EXT4-fs error (device loop3): ext4_get_journal_inode:5762: inode #5: comm syz.3.2101: unexpected bad inode w/o EXT4_IGET_BAD [ 132.694896][ T9326] EXT4-fs (loop3): no journal found [ 132.700230][ T9326] EXT4-fs (loop3): can't get journal size [ 132.707563][ T9326] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 132.721559][ T9326] EXT4-fs error (device loop3): __ext4_remount:6522: comm syz.3.2101: Abort forced by user [ 132.736766][ T9326] EXT4-fs (loop3): ext4_remount: Checksum for group 0 failed (42152!=20869) [ 132.749919][ T9326] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 132.828774][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 132.838671][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x7 [ 132.846106][ T3328] hid-generic 0000:0000:0000.0008: ignoring exceeding usage max [ 132.857917][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.874711][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.882238][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.889725][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.897229][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.904723][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.912196][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.919753][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.927223][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.934784][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.942225][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.949690][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.957205][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.964657][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.972212][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.979670][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.987192][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 132.995060][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 133.002537][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 133.009962][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 133.017441][ T3328] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 133.027453][ T3328] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz0 [ 133.111756][ T9369] syz.1.2130[9369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.111889][ T9369] syz.1.2130[9369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.136512][ T9369] syz.1.2130[9369] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.198564][ T9377] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 133.237338][ T9377] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 133.405609][ T9407] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'syz0' [ 133.438947][ T9411] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 133.468291][ T9411] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 133.488422][ T9417] syz.1.2147[9417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.488568][ T9417] syz.1.2147[9417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.503226][ T9417] syz.1.2147[9417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 133.507958][ T9419] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 133.554577][ T9425] program syz.1.2150 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 133.662438][ T9442] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 133.687190][ T9442] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 133.780114][ T9458] SELinux: Context system_u:object_r:initctl_t:s0 is not valid (left unmapped). [ 133.900816][ T9468] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 133.925299][ T9468] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 134.123100][ T9499] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 134.148492][ T9499] loop3: detected capacity change from 0 to 1024 [ 134.157113][ T9499] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 134.167040][ T9499] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (42152!=20869) [ 134.183628][ T9499] EXT4-fs (loop3): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 134.194586][ T9499] EXT4-fs error (device loop3): ext4_get_journal_inode:5762: inode #5: comm syz.3.2186: unexpected bad inode w/o EXT4_IGET_BAD [ 134.208367][ T9499] EXT4-fs (loop3): no journal found [ 134.213697][ T9499] EXT4-fs (loop3): can't get journal size [ 134.220492][ T9499] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 134.234378][ T9499] EXT4-fs error (device loop3): __ext4_remount:6522: comm syz.3.2186: Abort forced by user [ 134.245693][ T9499] EXT4-fs (loop3): ext4_remount: Checksum for group 0 failed (42152!=20869) [ 134.269213][ T9508] netlink: 'syz.0.2189': attribute type 10 has an invalid length. [ 134.271915][ T9499] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 134.298137][ T9508] bond0: (slave netdevsim1): no link monitoring support [ 134.319464][ T9508] bond0: (slave netdevsim1): MII and ETHTOOL support not available for slave, and arp_interval/arp_ip_target module parameters not specified, thus bonding will not detect link failures! see bonding.txt for details [ 134.341732][ T9508] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 134.354209][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 134.381395][ T9519] loop3: detected capacity change from 0 to 1024 [ 134.390090][ T9519] EXT4-fs: Ignoring removed orlov option [ 134.401154][ T9519] EXT4-fs: Ignoring removed nomblk_io_submit option [ 134.414747][ T9519] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=a842e018, mo2=0002] [ 134.423518][ T9519] System zones: 0-1, 3-12 [ 134.428745][ T9519] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 134.449013][ T9519] EXT4-fs warning (device loop3): ext4_expand_extra_isize_ea:2863: Unable to expand inode 12. Delete some EAs or run e2fsck. [ 134.464426][ T9519] EXT4-fs error (device loop3): ext4_expand_extra_isize_ea:2793: inode #14: comm syz.3.2194: corrupted in-inode xattr: bad magic number in in-inode xattr [ 134.480640][ T9519] EXT4-fs error (device loop3): ext4_clear_blocks:876: inode #14: comm syz.3.2194: attempt to clear invalid blocks 1886221359 len 1 [ 134.486967][ T9535] IPVS: Error joining to the multicast group [ 134.524203][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 134.557361][ T9539] 8021q: VLANs not supported on bridge0 [ 134.563091][ T9545] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 134.650388][ T273] I/O error, dev loop3, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 0 prio class 0 [ 134.718835][ T9563] __nla_validate_parse: 18 callbacks suppressed [ 134.718857][ T9563] netlink: 20 bytes leftover after parsing attributes in process `syz.4.2214'. [ 134.743546][ T9563] x_tables: ip_tables: udp match: only valid for protocol 17 [ 134.777220][ T9580] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2222'. [ 134.786329][ T9580] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 134.877242][ T9592] SELinux: failed to load policy [ 134.922081][ T9598] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2230'. [ 135.001306][ T9612] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2236'. [ 135.011561][ T9612] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 135.665670][ T9588] 9pnet_fd: p9_fd_create_tcp (9588): problem connecting socket to 127.0.0.1 [ 135.708788][ T9640] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2248'. [ 135.726867][ T9640] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 135.808661][ T9646] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2251'. [ 135.823934][ T9646] bond1: entered promiscuous mode [ 135.832145][ T9646] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2251'. [ 135.844222][ T9646] bond1 (unregistering): Released all slaves [ 135.910590][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x1 [ 135.918234][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.925793][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.933508][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.941004][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.948448][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.957698][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.962004][ T9665] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2260'. [ 135.965124][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x2 [ 135.974692][ T9665] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 135.981583][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 135.998453][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.006042][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.013548][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.021009][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x4 [ 136.028470][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.035993][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.043436][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.050963][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.058418][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.065821][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.073249][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.080817][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.088326][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.095727][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.103677][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.111118][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.118545][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.126050][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.133495][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.140933][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.148410][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.155884][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.163315][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.170759][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.178245][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.185770][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.193273][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.200734][ T3328] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 136.212346][ T3328] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz0 [ 136.300992][ T9677] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2265'. [ 136.417535][ T9696] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2274'. [ 136.427930][ T9696] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 136.450569][ T9696] rxe_newlink: 5 callbacks suppressed [ 136.450585][ T9696] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 136.760723][ T9729] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 136.790412][ T9729] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 136.807338][ T9733] SELinux: failed to load policy [ 136.826573][ T9735] 9pnet_fd: Insufficient options for proto=fd [ 137.036762][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 137.036779][ T29] audit: type=1326 audit(1728691591.938:5684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.066672][ T29] audit: type=1326 audit(1728691591.948:5685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.092213][ T29] audit: type=1326 audit(1728691591.948:5686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.115760][ T29] audit: type=1326 audit(1728691591.948:5687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.139276][ T29] audit: type=1326 audit(1728691591.948:5688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.162783][ T29] audit: type=1326 audit(1728691591.948:5689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.170777][ T9759] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 137.186616][ T29] audit: type=1326 audit(1728691591.948:5690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9756 comm="syz.0.2302" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.233184][ T9759] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 137.300872][ T29] audit: type=1326 audit(1728691592.208:5691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9764 comm="syz.0.2306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.324436][ T29] audit: type=1326 audit(1728691592.208:5692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9764 comm="syz.0.2306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.350476][ T9761] netlink: 'syz.3.2304': attribute type 2 has an invalid length. [ 137.358709][ T29] audit: type=1326 audit(1728691592.208:5693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9764 comm="syz.0.2306" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4ef34bdff9 code=0x7ffc0000 [ 137.440252][ T9777] syz.2.2312[9777] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.498298][ T9786] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 137.520063][ T9779] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 137.528070][ T9779] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 137.588815][ T9786] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 137.638312][ T9799] netlink: 'syz.0.2321': attribute type 2 has an invalid length. [ 137.813452][ T9811] bpf_get_probe_write_proto: 2 callbacks suppressed [ 137.813555][ T9811] syz.0.2327[9811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.827132][ T9811] syz.0.2327[9811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.838841][ T9797] syz.1.2322[9797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.850735][ T9811] syz.0.2327[9811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.862404][ T9797] syz.1.2322[9797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.878384][ T9797] syz.1.2322[9797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.001419][ T9824] netlink: 'syz.1.2332': attribute type 10 has an invalid length. [ 138.023781][ T9824] bond0: (slave netdevsim1): no link monitoring support [ 138.031862][ T9824] bond0: (slave netdevsim1): MII and ETHTOOL support not available for slave, and arp_interval/arp_ip_target module parameters not specified, thus bonding will not detect link failures! see bonding.txt for details [ 138.055100][ T9824] bond0: (slave netdevsim1): Enslaving as an active interface with an up link [ 138.064290][ T9828] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 138.089974][ T9828] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 138.123179][ T9833] syz.1.2336[9833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.123245][ T9833] syz.1.2336[9833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.143025][ T9833] syz.1.2336[9833] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.186027][ T9839] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.2339' sets config #0 [ 138.261847][ T9841] lo speed is unknown, defaulting to 1000 [ 138.465434][ T9856] netlink: 'syz.2.2346': attribute type 10 has an invalid length. [ 138.488430][ T3530] bond0: (slave netdevsim1): link status definitely down, disabling slave [ 138.514373][ T9860] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 138.534759][ T9860] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 138.628382][ T9866] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.2360' sets config #0 [ 138.775726][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x7 [ 138.783218][ T3327] hid-generic 0000:0000:0000.000A: ignoring exceeding usage max [ 138.794463][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.801915][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.809464][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.817087][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.824615][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.832314][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.839889][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.847558][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.855011][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.862449][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.869870][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.877380][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.884861][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.892330][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.899795][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.907372][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.914860][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.922479][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.929945][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.937437][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.944878][ T3327] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 138.954249][ T3327] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz0] on syz0 [ 138.989560][ T9883] loop3: detected capacity change from 0 to 512 [ 138.998971][ T9883] EXT4-fs (loop3): orphan cleanup on readonly fs [ 139.005551][ T9883] EXT4-fs error (device loop3): ext4_ext_check_inode:524: inode #4: comm syz.3.2368: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 139.025458][ T9883] EXT4-fs error (device loop3): ext4_quota_enable:7056: comm syz.3.2368: Bad quota inode: 4, type: 1 [ 139.037630][ T9883] EXT4-fs warning (device loop3): ext4_enable_quotas:7097: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 139.052736][ T9883] EXT4-fs (loop3): Cannot turn on quotas: error -117 [ 139.060813][ T9883] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 139.087224][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 139.157104][ T9905] loop3: detected capacity change from 0 to 512 [ 139.164197][ T9907] ALSA: seq fatal error: cannot create timer (-22) [ 139.172523][ T9905] EXT4-fs error (device loop3): ext4_xattr_ibody_find:2240: inode #15: comm syz.3.2369: corrupted in-inode xattr: invalid ea_ino [ 139.214327][ T9905] EXT4-fs error (device loop3): ext4_orphan_get:1393: comm syz.3.2369: couldn't read orphan inode 15 (err -117) [ 139.239733][ T9905] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 139.344345][ T5669] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 139.355042][ T9923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9923 comm=syz.4.2378 [ 142.607154][ T29] kauditd_printk_skb: 229 callbacks suppressed [ 142.607174][ T29] audit: type=1400 audit(1728691597.518:5923): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 142.638630][ T29] audit: type=1400 audit(1728691597.548:5924): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 Oct 12 00:06:37 [ 142.664759][ T29] audit: type=1400 audit(1728691597.548:5925): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 142.687456][ T29] audit: type=1400 audit(1728691597.568:5926): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 142.687491][ T29] audit: type=1400 audit(1728691597.568:5927): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 42.607154][ T2[ 142.687543][ T29] audit: type=1400 audit(1728691597.568:5928): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 142.758715][ T29] audit: type=1400 audit(1728691597.668:5929): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 229 callb[ 142.781018][ T29] audit: type=1400 audit(1728691597.668:5930): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed[ 142.804305][ T29] audit: type=1400 audit(1728691597.668:5931): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:06:37[ 142.828601][ T29] audit: type=1400 audit(1728691597.718:5932): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ 142.607174][ T29] audit: type=1400 audit(1728691597.518:5923): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.638630][ T29] audit: type=1400 audit(1728691597.548:5924): avc: denied { recv } for pid=29 comm="kauditd" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.664759][ T29] audit: type=1400 audit(1728691597.548:5925): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.687456][ T29] audit: type=1400 audit(1728691597.568:5926): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.687491][ T29] audit: type=1400 audit(1728691597.568:5927): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.687543][ T29] audit: type=1400 audit(1728691597.568:5928): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.758715][ T29] audit: type=1400 audit(1728691597.668:5929): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.781018][ T29] audit: type=1400 audit(1728691597.668:5930): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.804305][ T29] audit: type=1400 audit(1728691597.668:5931): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:37 syzkaller kern.notice kernel: [ 142.828601][ T29] audit: type=1400 audit(1728691597.718:5932): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 150.047396][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 150.047414][ T29] audit: type=1400 audit(1728691604.958:5940): avc: denied { egress } for pid=3530 comm="kworker/u8:12" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 150.077613][ T29] audit: type=1400 audit(1728691604.988:5941): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:06:44 [ 150.100471][ T29] audit: type=1400 audit(1728691605.008:5942): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 150.123325][ T29] audit: type=1400 audit(1728691605.008:5943): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 150.147349][ T29] audit: type=1400 audit(1728691605.058:5944): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 50.047396][ T2[ 150.170030][ T29] audit: type=1400 audit(1728691605.058:5945): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 150.193541][ T29] audit: type=1400 audit(1728691605.108:5946): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 7 callbac[ 150.216844][ T29] audit: type=1400 audit(1728691605.128:5947): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 150.240487][ T29] audit: type=1400 audit(1728691605.148:5948): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:06:44 s[ 150.263607][ T29] audit: type=1400 audit(1728691605.178:5949): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 150.047414][ T29] audit: type=1400 audit(1728691604.958:5940): avc: denied { egress } for pid=3530 comm="kworker/u8:12" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u: Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.077613][ T29] audit: type=1400 audit(1728691604.988:5941): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.100471][ T29] audit: type=1400 audit(1728691605.008:5942): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.123325][ T29] audit: type=1400 audit(1728691605.008:5943): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.147349][ T29] audit: type=1400 audit(1728691605.058:5944): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.170030][ T29] audit: type=1400 audit(1728691605.058:5945): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.193541][ T29] audit: type=1400 audit(1728691605.108:5946): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.216844][ T29] audit: type=1400 audit(1728691605.128:5947): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.240487][ T29] audit: type=1400 audit(1728691605.148:5948): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:06:45 syzkaller kern.notice kernel: [ 150.263607][ T29] audit: type=1400 audit(1728691605.178:5949): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 166.614773][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 166.614787][ T29] audit: type=1400 audit(1728691621.518:5954): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 166.645963][ T29] audit: type=1400 audit(1728691621.528:5955): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:07:01 [ 166.668559][ T29] audit: type=1400 audit(1728691621.578:5956): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 166.692362][ T29] audit: type=1400 audit(1728691621.598:5957): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 166.715038][ T29] audit: type=1400 audit(1728691621.598:5958): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 66.614773][ T2[ 166.738954][ T29] audit: type=1400 audit(1728691621.628:5959): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 166.761756][ T29] audit: type=1400 audit(1728691621.648:5960): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 166.761834][ T29] audit: type=1400 audit(1728691621.658:5961): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 166.809244][ T29] audit: type=1400 audit(1728691621.718:5962): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:01 s[ 166.831864][ T29] audit: type=1400 audit(1728691621.718:5963): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 166.614787][ T29] audit: type=1400 audit(1728691621.518:5954): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.645963][ T29] audit: type=1400 audit(1728691621.528:5955): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.668559][ T29] audit: type=1400 audit(1728691621.578:5956): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.692362][ T29] audit: type=1400 audit(1728691621.598:5957): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.715038][ T29] audit: type=1400 audit(1728691621.598:5958): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.738954][ T29] audit: type=1400 audit(1728691621.628:5959): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.761756][ T29] audit: type=1400 audit(1728691621.648:5960): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.761834][ T29] audit: type=1400 audit(1728691621.658:5961): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.809244][ T29] audit: type=1400 audit(1728691621.718:5962): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:01 syzkaller kern.notice kernel: [ 166.831864][ T29] audit: type=1400 audit(1728691621.718:5963): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 171.807060][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 171.807079][ T29] audit: type=1400 audit(1728691626.718:5967): avc: denied { egress } for pid=3328 comm="kworker/1:3" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:07:06 [ 171.838727][ T29] audit: type=1400 audit(1728691626.748:5968): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 171.862035][ T29] audit: type=1400 audit(1728691626.748:5969): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 171.885626][ T29] audit: type=1400 audit(1728691626.788:5970): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 71.807060][ T2[ 171.908883][ T29] audit: type=1400 audit(1728691626.788:5971): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 171.932359][ T29] audit: type=1400 audit(1728691626.838:5972): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 171.955961][ T29] audit: type=1400 audit(1728691626.868:5973): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 171.979160][ T29] audit: type=1400 audit(1728691626.868:5974): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:06 s[ 172.002395][ T29] audit: type=1400 audit(1728691626.888:5975): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 172.026132][ T29] audit: type=1400 audit(1728691626.928:5976): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 171.807079][ T29] audit: type=1400 audit(1728691626.718:5967): avc: denied { egress } for pid=3328 comm="kworker/1:3" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:ob Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.838727][ T29] audit: type=1400 audit(1728691626.748:5968): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.862035][ T29] audit: type=1400 audit(1728691626.748:5969): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.885626][ T29] audit: type=1400 audit(1728691626.788:5970): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.908883][ T29] audit: type=1400 audit(1728691626.788:5971): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.932359][ T29] audit: type=1400 audit(1728691626.838:5972): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.955961][ T29] audit: type=1400 audit(1728691626.868:5973): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 171.979160][ T29] audit: type=1400 audit(1728691626.868:5974): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 172.002395][ T29] audit: type=1400 audit(1728691626.888:5975): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:06 syzkaller kern.notice kernel: [ 172.026132][ T29] audit: type=1400 audit(1728691626.928:5976): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 177.568070][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 177.568085][ T29] audit: type=1400 audit(1728691632.478:5981): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:07:12 [ 177.598616][ T29] audit: type=1400 audit(1728691632.508:5982): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 177.621702][ T29] audit: type=1400 audit(1728691632.508:5983): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 177.645168][ T29] audit: type=1400 audit(1728691632.548:5984): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 77.568070][ T2[ 177.669133][ T29] audit: type=1400 audit(1728691632.578:5985): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 177.691723][ T29] audit: type=1400 audit(1728691632.578:5986): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 177.715711][ T29] audit: type=1400 audit(1728691632.628:5987): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 177.738508][ T29] audit: type=1400 audit(1728691632.628:5988): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:12 s[ 177.762028][ T29] audit: type=1400 audit(1728691632.668:5989): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 177.785885][ T29] audit: type=1400 audit(1728691632.698:5990): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 177.568085][ T29] audit: type=1400 audit(1728691632.478:5981): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.598616][ T29] audit: type=1400 audit(1728691632.508:5982): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.621702][ T29] audit: type=1400 audit(1728691632.508:5983): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.645168][ T29] audit: type=1400 audit(1728691632.548:5984): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.669133][ T29] audit: type=1400 audit(1728691632.578:5985): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.691723][ T29] audit: type=1400 audit(1728691632.578:5986): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.715711][ T29] audit: type=1400 audit(1728691632.628:5987): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.738508][ T29] audit: type=1400 audit(1728691632.628:5988): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.762028][ T29] audit: type=1400 audit(1728691632.668:5989): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:12 syzkaller kern.notice kernel: [ 177.785885][ T29] audit: type=1400 audit(1728691632.698:5990): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 182.690669][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 182.690688][ T29] audit: type=1400 audit(1728691637.598:5994): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 182.720583][ T29] audit: type=1400 audit(1728691637.598:5995): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 182.720654][ T29] audit: type=1400 audit(1728691637.608:5996): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:07:17 [ 182.767488][ T29] audit: type=1400 audit(1728691637.678:5997): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 182.790170][ T29] audit: type=1400 audit(1728691637.678:5998): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 182.813545][ T29] audit: type=1400 audit(1728691637.678:5999): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 82.690669][ T2[ 182.837567][ T29] audit: type=1400 audit(1728691637.728:6000): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 182.860534][ T29] audit: type=1400 audit(1728691637.748:6001): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 182.860561][ T29] audit: type=1400 audit(1728691637.748:6002): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 182.860591][ T29] audit: type=1400 audit(1728691637.758:6003): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:17 syzkaller kern.notice kernel: [ 182.690688][ T29] audit: type=1400 audit(1728691637.598:5994): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.720583][ T29] audit: type=1400 audit(1728691637.598:5995): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.720654][ T29] audit: type=1400 audit(1728691637.608:5996): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.767488][ T29] audit: type=1400 audit(1728691637.678:5997): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.790170][ T29] audit: type=1400 audit(1728691637.678:5998): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.813545][ T29] audit: type=1400 audit(1728691637.678:5999): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.837567][ T29] audit: type=1400 audit(1728691637.728:6000): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.860534][ T29] audit: type=1400 audit(1728691637.748:6001): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.860561][ T29] audit: type=1400 audit(1728691637.748:6002): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:17 syzkaller kern.notice kernel: [ 182.860591][ T29] audit: type=1400 audit(1728691637.758:6003): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 192.930326][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 192.930345][ T29] audit: type=1400 audit(1728691647.838:6007): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:07:27 [ 192.961723][ T29] audit: type=1400 audit(1728691647.868:6008): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 192.984349][ T29] audit: type=1400 audit(1728691647.868:6009): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 1[ 193.008098][ T29] audit: type=1400 audit(1728691647.918:6010): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 92.930326][ T2[ 193.031235][ T29] audit: type=1400 audit(1728691647.918:6011): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 193.055286][ T29] audit: type=1400 audit(1728691647.968:6012): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 193.077948][ T29] audit: type=1400 audit(1728691647.968:6013): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 193.102015][ T29] audit: type=1400 audit(1728691648.008:6014): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:27 s[ 193.124976][ T29] audit: type=1400 audit(1728691648.008:6015): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ [ 193.149946][ T29] audit: type=1400 audit(1728691648.058:6016): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 192.930345][ T29] audit: type=1400 audit(1728691647.838:6007): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:27 syzkaller kern.notice kernel: [ 192.961723][ T29] audit: type=1400 audit(1728691647.868:6008): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:27 syzkaller kern.notice kernel: [ 192.984349][ T29] audit: type=1400 audit(1728691647.868:6009): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:27 syzkaller kern.notice kernel: [ 193.008098][ T29] audit: type=1400 audit(1728691647.918:6010): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:27 syzkaller kern.notice kernel: [ 193.031235][ T29] audit: type=1400 audit(1728691647.918:6011): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:28 syzkaller kern.notice kernel: [ 193.055286][ T29] audit: type=1400 audit(1728691647.968:6012): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:28 syzkaller kern.notice kernel: [ 193.077948][ T29] audit: type=1400 audit(1728691647.968:6013): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:28 syzkaller kern.notice kernel: [ 193.102015][ T29] audit: type=1400 audit(1728691648.008:6014): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:28 syzkaller kern.notice kernel: [ 193.124976][ T29] audit: type=1400 audit(1728691648.008:6015): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:28 syzkaller kern.notice kernel: [ 193.149946][ T29] audit: type=1400 audit(1728691648.058:6016): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 [ 197.950607][ T29] kauditd_printk_skb: 4 callbacks suppressed syzkaller daemon[ 197.950626][ T29] audit: type=1400 audit(1728691652.858:6021): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[9945[ 197.981282][ T29] audit: type=1400 audit(1728691652.858:6022): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_bpf_start_[ 198.004812][ T29] audit: type=1400 audit(1728691652.868:6023): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 bpf: bpf_open: I[ 198.028069][ T29] audit: type=1400 audit(1728691652.918:6024): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nvalid argument[ 198.052270][ T29] audit: type=1400 audit(1728691652.938:6025): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:07:32[ 198.062499][ T29] audit: type=1400 audit(1728691652.958:6026): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 syzkaller daemo[ 198.101307][ T29] audit: type=1400 audit(1728691653.008:6027): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.err dhcpcd[994[ 198.123529][ T29] audit: type=1400 audit(1728691653.008:6028): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 5]: ps_root_recv[ 198.123560][ T29] audit: type=1400 audit(1728691653.008:6029): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 msg: Invalid arg[ 198.170372][ T29] audit: type=1400 audit(1728691653.008:6030): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Oct 12 00:07:32 syzkaller kern.warn kernel: [ 197.950607][ T29] kauditd_printk_skb: 4 callbacks suppressed Oct 12 00:07:32 syzkaller kern.notice kernel: [ 197.950626][ T29] audit: type=1400 audit(1728691652.858:6021): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 syzkaller kern.notice kernel: [ 197.981282][ T29] audit: type=1400 audit(1728691652.858:6022): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 syzkaller kern.notice kernel: [ 198.004812][ T29] audit: type=1400 audit(1728691652.868:6023): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 syzkaller kern.notice kernel: [ 198.028069][ T29] audit: type=1400 audit(1728691652.918:6024): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 syzkaller kern.notice kernel: [ 198.052270][ T29] audit: type=1400 audit(1728691652.938:6025): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:32 syzkaller kern.notice kernel: [ 198.062499][ T29] audit: type=1400 audit(1728691652.958:6026): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:33 syzkaller kern.notice kernel: [ 198.101307][ T29] audit: type=1400 audit(1728691653.008:6027): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:33 syzkaller kern.notice kernel: [ 198.123529][ T29] audit: type=1400 audit(1728691653.008:6028): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:33 syzkaller kern.notice kernel: [ 198.123560][ T29] audit: type=1400 audit(1728691653.008:6029): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:33 syzkaller kern.notice kernel: [ 198.170372][ T29] audit: type=1400 audit(1728691653.008:6030): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:33 syzkaller daemon.err dhcpcd[9946]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:07:33 syzkaller daemon.err dhcpcd[9946]: ps_root_recvmsg: Invalid argument Oct 12 00:07:34 syzkaller daemon.err dhcpcd[9947]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:07:34 syzkaller daemon.err dhcpcd[9947]: ps_root_recvmsg: Invalid argument Oct 12 00:07:36 syzkaller daemon.err dhcpcd[9948]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:07:36 syzkaller daemon.err dhcpcd[9948]: ps_root_recvmsg: Invalid argument [ 203.168445][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 203.168515][ T29] audit: type=1400 audit(1728691658.078:6041): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:07:38 [ 203.198779][ T29] audit: type=1400 audit(1728691658.108:6042): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.warn kernel: [ 2[ 203.223949][ T29] audit: type=1400 audit(1728691658.138:6043): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 03.168445][ T2[ 203.247760][ T29] audit: type=1400 audit(1728691658.158:6044): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 203.270459][ T29] audit: type=1400 audit(1728691658.158:6045): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 10 callba[ 203.294380][ T29] audit: type=1400 audit(1728691658.208:6046): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 203.317103][ T29] audit: type=1400 audit(1728691658.208:6047): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:07:38 [ 203.341091][ T29] audit: type=1400 audit(1728691658.248:6048): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ [ 203.365873][ T29] audit: type=1400 audit(1728691658.278:6049): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 203.168515][ [ 203.389145][ T29] audit: type=1400 audit(1728691658.278:6050): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T29] audit: type=1400 audit(1728691658.078:6041): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.198779][ T29] audit: type=1400 audit(1728691658.108:6042): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.223949][ T29] audit: type=1400 audit(1728691658.138:6043): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.247760][ T29] audit: type=1400 audit(1728691658.158:6044): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.270459][ T29] audit: type=1400 audit(1728691658.158:6045): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.294380][ T29] audit: type=1400 audit(1728691658.208:6046): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.317103][ T29] audit: type=1400 audit(1728691658.208:6047): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.341091][ T29] audit: type=1400 audit(1728691658.248:6048): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.365873][ T29] audit: type=1400 audit(1728691658.278:6049): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:38 syzkaller kern.notice kernel: [ 203.389145][ T29] audit: type=1400 audit(1728691658.278:6050): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 213.407688][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 213.407706][ T29] audit: type=1400 audit(1728691668.318:6053): avc: denied { egress } for pid=0 comm="swapper/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 213.437461][ T29] audit: type=1400 audit(1728691668.348:6054): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:07:48 [ 213.460133][ T29] audit: type=1400 audit(1728691668.368:6055): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 213.483089][ T29] audit: type=1400 audit(1728691668.378:6056): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 213.507140][ T29] audit: type=1400 audit(1728691668.388:6057): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 13.407688][ T2[ 213.529842][ T29] audit: type=1400 audit(1728691668.418:6058): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 213.529880][ T29] audit: type=1400 audit(1728691668.428:6059): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 213.577385][ T29] audit: type=1400 audit(1728691668.488:6060): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 213.599975][ T29] audit: type=1400 audit(1728691668.488:6061): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:48 syzkaller kern.no[ 213.625070][ T29] audit: type=1400 audit(1728691668.538:6062): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 213.407706][ T29] audit: type=1400 audit(1728691668.318:6053): avc: denied { egress } for pid=0 comm="swapper/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_ Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.437461][ T29] audit: type=1400 audit(1728691668.348:6054): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.460133][ T29] audit: type=1400 audit(1728691668.368:6055): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.483089][ T29] audit: type=1400 audit(1728691668.378:6056): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.507140][ T29] audit: type=1400 audit(1728691668.388:6057): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.529842][ T29] audit: type=1400 audit(1728691668.418:6058): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.529880][ T29] audit: type=1400 audit(1728691668.428:6059): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.577385][ T29] audit: type=1400 audit(1728691668.488:6060): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.599975][ T29] audit: type=1400 audit(1728691668.488:6061): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:48 syzkaller kern.notice kernel: [ 213.625070][ T29] audit: type=1400 audit(1728691668.538:6062): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 218.529079][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 218.529105][ T29] audit: type=1400 audit(1728691673.438:6065): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:07:53 [ 218.559929][ T29] audit: type=1400 audit(1728691673.468:6066): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 218.583893][ T29] audit: type=1400 audit(1728691673.498:6067): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 218.607295][ T29] audit: type=1400 audit(1728691673.518:6068): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 18.529079][ T2[ 218.630832][ T29] audit: type=1400 audit(1728691673.538:6069): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 218.653876][ T29] audit: type=1400 audit(1728691673.548:6070): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 218.677727][ T29] audit: type=1400 audit(1728691673.588:6071): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 218.700556][ T29] audit: type=1400 audit(1728691673.588:6072): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:07:53 s[ 218.724701][ T29] audit: type=1400 audit(1728691673.628:6073): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 218.747446][ T29] audit: type=1400 audit(1728691673.628:6074): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 218.529105][ T29] audit: type=1400 audit(1728691673.438:6065): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.559929][ T29] audit: type=1400 audit(1728691673.468:6066): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.583893][ T29] audit: type=1400 audit(1728691673.498:6067): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.607295][ T29] audit: type=1400 audit(1728691673.518:6068): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.630832][ T29] audit: type=1400 audit(1728691673.538:6069): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.653876][ T29] audit: type=1400 audit(1728691673.548:6070): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.677727][ T29] audit: type=1400 audit(1728691673.588:6071): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.700556][ T29] audit: type=1400 audit(1728691673.588:6072): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.724701][ T29] audit: type=1400 audit(1728691673.628:6073): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:07:53 syzkaller kern.notice kernel: [ 218.747446][ T29] audit: type=1400 audit(1728691673.628:6074): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 233.887436][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 233.887454][ T29] audit: type=1400 audit(1728691688.798:6077): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 233.919057][ T29] audit: type=1400 audit(1728691688.828:6078): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:08:08 [ 233.941539][ T29] audit: type=1400 audit(1728691688.848:6079): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 233.965503][ T29] audit: type=1400 audit(1728691688.878:6080): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 233.988033][ T29] audit: type=1400 audit(1728691688.878:6081): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 33.887436][ T2[ 234.012234][ T29] audit: type=1400 audit(1728691688.918:6082): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 234.034786][ T29] audit: type=1400 audit(1728691688.918:6083): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbacks suppressed O[ 234.060733][ T29] audit: type=1400 audit(1728691688.968:6084): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:08:08 s[ 234.083489][ T29] audit: type=1400 audit(1728691688.968:6085): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 234.107184][ T29] audit: type=1400 audit(1728691689.018:6086): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 233.887454][ T29] audit: type=1400 audit(1728691688.798:6077): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:08:08 syzkaller kern.notice kernel: [ 233.919057][ T29] audit: type=1400 audit(1728691688.828:6078): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:08 syzkaller kern.notice kernel: [ 233.941539][ T29] audit: type=1400 audit(1728691688.848:6079): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:08 syzkaller kern.notice kernel: [ 233.965503][ T29] audit: type=1400 audit(1728691688.878:6080): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:08 syzkaller kern.notice kernel: [ 233.988033][ T29] audit: type=1400 audit(1728691688.878:6081): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:08 syzkaller kern.notice kernel: [ 234.012234][ T29] audit: type=1400 audit(1728691688.918:6082): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:08 syzkaller kern.notice kernel: [ 234.034786][ T29] audit: type=1400 audit(1728691688.918:6083): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:09 syzkaller kern.notice kernel: [ 234.060733][ T29] audit: type=1400 audit(1728691688.968:6084): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:09 syzkaller kern.notice kernel: [ 234.083489][ T29] audit: type=1400 audit(1728691688.968:6085): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:09 syzkaller kern.notice kernel: [ 234.107184][ T29] audit: type=1400 audit(1728691689.018:6086): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 249.247541][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 249.247560][ T29] audit: type=1400 audit(1728691704.158:6089): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 249.277168][ T29] audit: type=1400 audit(1728691704.158:6090): avc: denied { recv } for pid=3376 comm="kworker/u8:7" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=0 [ 249.302900][ T29] audit: type=1400 audit(1728691704.188:6091): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:08:24 [ 249.326158][ T29] audit: type=1400 audit(1728691704.238:6092): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 249.348804][ T29] audit: type=1400 audit(1728691704.238:6093): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 249.372176][ T29] audit: type=1400 audit(1728691704.238:6094): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 49.247541][ T2[ 249.395427][ T29] audit: type=1400 audit(1728691704.288:6095): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 249.418849][ T29] audit: type=1400 audit(1728691704.308:6096): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 249.442191][ T29] audit: type=1400 audit(1728691704.328:6097): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 249.465559][ T29] audit: type=1400 audit(1728691704.358:6098): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:08:24 syzkaller kern.notice kernel: [ 249.247560][ T29] audit: type=1400 audit(1728691704.158:6089): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.277168][ T29] audit: type=1400 audit(1728691704.158:6090): avc: denied { recv } for pid=3376 comm="kworker/u8:7" saddr=10.128.0.163 src=30030 daddr=10.128.0.14 dest=48050 netif=eth0 scontext=root:sysadm_r:sysadm_t tc Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.302900][ T29] audit: type=1400 audit(1728691704.188:6091): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.326158][ T29] audit: type=1400 audit(1728691704.238:6092): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.348804][ T29] audit: type=1400 audit(1728691704.238:6093): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.372176][ T29] audit: type=1400 audit(1728691704.238:6094): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.395427][ T29] audit: type=1400 audit(1728691704.288:6095): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.418849][ T29] audit: type=1400 audit(1728691704.308:6096): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.442191][ T29] audit: type=1400 audit(1728691704.328:6097): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:24 syzkaller kern.notice kernel: [ 249.465559][ T29] audit: type=1400 audit(1728691704.358:6098): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 261.997245][ T29] kauditd_printk_skb: 4 callbacks suppressed Oct 12 00:08:36 [ 261.997261][ T29] audit: type=1400 audit(1728691716.908:6103): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller daemon[ 262.027397][ T29] audit: type=1400 audit(1728691716.908:6104): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 .err dhcpcd[3006[ 262.050183][ T29] audit: type=1400 audit(1728691716.938:6105): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ]: ps_sendpsmmsg[ 262.073542][ T29] audit: type=1400 audit(1728691716.938:6106): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : Connection ref[ 262.096929][ T29] audit: type=1400 audit(1728691716.978:6107): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 used Oct 12 00:[ 262.120688][ T29] audit: type=1400 audit(1728691717.028:6108): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 08:36 syzkaller [ 262.144346][ T29] audit: type=1400 audit(1728691717.058:6109): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 daemon.err dhcpc[ 262.167053][ T29] audit: type=1400 audit(1728691717.058:6110): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d[3006]: ps_root[ 262.167106][ T29] audit: type=1400 audit(1728691717.058:6111): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 _recvmsgcb: fail[ 262.214096][ T29] audit: type=1400 audit(1728691717.128:6112): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ed to send message to pid 9946: Connection refused Oct 12 00:08:36 syzkaller kern.warn kernel: [ 261.997245][ T29] kauditd_printk_skb: 4 callbacks suppressed Oct 12 00:08:36 syzkaller kern.notice kernel: [ 261.997261][ T29] audit: type=1400 audit(1728691716.908:6103): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:36 syzkaller kern.notice kernel: [ 262.027397][ T29] audit: type=1400 audit(1728691716.908:6104): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:36 syzkaller kern.notice kernel: [ 262.050183][ T29] audit: type=1400 audit(1728691716.938:6105): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:36 syzkaller kern.notice kernel: [ 262.073542][ T29] audit: type=1400 audit(1728691716.938:6106): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.096929][ T29] audit: type=1400 audit(1728691716.978:6107): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.120688][ T29] audit: type=1400 audit(1728691717.028:6108): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.144346][ T29] audit: type=1400 audit(1728691717.058:6109): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.167053][ T29] audit: type=1400 audit(1728691717.058:6110): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.167106][ T29] audit: type=1400 audit(1728691717.058:6111): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller kern.notice kernel: [ 262.214096][ T29] audit: type=1400 audit(1728691717.128:6112): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:08:37 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Oct 12 00:08:37 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 9945: Connection refused Oct 12 00:08:38 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Oct 12 00:08:38 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 9947: Connection refused Oct 12 00:08:40 syzkaller daemon.err dhcpcd[3006]: ps_sendpsmmsg: Connection refused Oct 12 00:08:40 syzkaller daemon.err dhcpcd[3006]: ps_root_recvmsgcb: failed to send message to pid 9948: Connection refused [ 290.207262][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 290.207280][ T29] audit: type=1400 audit(1728691745.118:6122): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:09:05 [ 290.237404][ T29] audit: type=1400 audit(1728691745.148:6123): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 290.261322][ T29] audit: type=1400 audit(1728691745.168:6124): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 2[ 290.284518][ T29] audit: type=1400 audit(1728691745.168:6125): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 90.207262][ T2[ 290.308194][ T29] audit: type=1400 audit(1728691745.218:6126): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 290.331771][ T29] audit: type=1400 audit(1728691745.238:6127): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 9 callbac[ 290.354643][ T29] audit: type=1400 audit(1728691745.238:6128): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 290.378908][ T29] audit: type=1400 audit(1728691745.288:6129): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:09:05 s[ 290.402273][ T29] audit: type=1400 audit(1728691745.318:6130): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 290.425370][ T29] audit: type=1400 audit(1728691745.318:6131): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 290.207280][ T29] audit: type=1400 audit(1728691745.118:6122): avc: denied { egress } for pid=23 comm="ksoftirqd/1" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.237404][ T29] audit: type=1400 audit(1728691745.148:6123): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.261322][ T29] audit: type=1400 audit(1728691745.168:6124): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.284518][ T29] audit: type=1400 audit(1728691745.168:6125): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.308194][ T29] audit: type=1400 audit(1728691745.218:6126): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.331771][ T29] audit: type=1400 audit(1728691745.238:6127): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.354643][ T29] audit: type=1400 audit(1728691745.238:6128): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.378908][ T29] audit: type=1400 audit(1728691745.288:6129): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.402273][ T29] audit: type=1400 audit(1728691745.318:6130): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:05 syzkaller kern.notice kernel: [ 290.425370][ T29] audit: type=1400 audit(1728691745.318:6131): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 310.687977][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 310.688007][ T29] audit: type=1400 audit(1728691765.598:6134): avc: denied { egress } for pid=11 comm="kworker/u8:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 310.717678][ T29] audit: type=1400 audit(1728691765.598:6135): avc: denied { egress } for pid=11 comm="kworker/u8:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 310.741434][ T29] audit: type=1400 audit(1728691765.628:6136): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:09:25 syzkaller kern.w[ 310.765905][ T29] audit: type=1400 audit(1728691765.678:6137): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 310.788771][ T29] audit: type=1400 audit(1728691765.678:6138): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 10.687977][ T2[ 310.812166][ T29] audit: type=1400 audit(1728691765.678:6139): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 310.835499][ T29] audit: type=1400 audit(1728691765.718:6140): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 2 callbac[ 310.859768][ T29] audit: type=1400 audit(1728691765.768:6141): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 310.882384][ T29] audit: type=1400 audit(1728691765.768:6142): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:09:25 s[ 310.905900][ T29] audit: type=1400 audit(1728691765.768:6143): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 310.688007][ T29] audit: type=1400 audit(1728691765.598:6134): avc: denied { egress } for pid=11 comm="kworker/u8:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.717678][ T29] audit: type=1400 audit(1728691765.598:6135): avc: denied { egress } for pid=11 comm="kworker/u8:0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obj Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.741434][ T29] audit: type=1400 audit(1728691765.628:6136): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.765905][ T29] audit: type=1400 audit(1728691765.678:6137): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.788771][ T29] audit: type=1400 audit(1728691765.678:6138): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.812166][ T29] audit: type=1400 audit(1728691765.678:6139): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.835499][ T29] audit: type=1400 audit(1728691765.718:6140): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.859768][ T29] audit: type=1400 audit(1728691765.768:6141): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.882384][ T29] audit: type=1400 audit(1728691765.768:6142): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:25 syzkaller kern.notice kernel: [ 310.905900][ T29] audit: type=1400 audit(1728691765.768:6143): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 320.928858][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 320.928874][ T29] audit: type=1400 audit(1728691775.838:6147): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 320.958625][ T29] audit: type=1400 audit(1728691775.838:6148): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 320.982203][ T29] audit: type=1400 audit(1728691775.838:6149): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:09:35 syzkaller kern.w[ 321.008521][ T29] audit: type=1400 audit(1728691775.868:6150): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 321.030876][ T29] audit: type=1400 audit(1728691775.918:6151): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 20.928858][ T2[ 321.054261][ T29] audit: type=1400 audit(1728691775.918:6152): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 321.077690][ T29] audit: type=1400 audit(1728691775.918:6153): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 3 callbac[ 321.101231][ T29] audit: type=1400 audit(1728691775.958:6154): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 321.125406][ T29] audit: type=1400 audit(1728691776.038:6155): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:09:35 s[ 321.147998][ T29] audit: type=1400 audit(1728691776.038:6156): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.notice kernel: [ 320.928874][ T29] audit: type=1400 audit(1728691775.838:6147): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1c daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:35 syzkaller kern.notice kernel: [ 320.958625][ T29] audit: type=1400 audit(1728691775.838:6148): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:35 syzkaller kern.notice kernel: [ 320.982203][ T29] audit: type=1400 audit(1728691775.838:6149): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:35 syzkaller kern.notice kernel: [ 321.008521][ T29] audit: type=1400 audit(1728691775.868:6150): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:35 syzkaller kern.notice kernel: [ 321.030876][ T29] audit: type=1400 audit(1728691775.918:6151): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:36 syzkaller kern.notice kernel: [ 321.054261][ T29] audit: type=1400 audit(1728691775.918:6152): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:36 syzkaller kern.notice kernel: [ 321.077690][ T29] audit: type=1400 audit(1728691775.918:6153): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:36 syzkaller kern.notice kernel: [ 321.101231][ T29] audit: type=1400 audit(1728691775.958:6154): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:36 syzkaller kern.notice kernel: [ 321.125406][ T29] audit: type=1400 audit(1728691776.038:6155): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:36 syzkaller kern.notice kernel: [ 321.147998][ T29] audit: type=1400 audit(1728691776.038:6156): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 326.048165][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 326.048182][ T29] audit: type=1400 audit(1728691780.958:6161): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 [ 326.080332][ T29] audit: type=1400 audit(1728691780.988:6162): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:09:40 [ 326.104309][ T29] audit: type=1400 audit(1728691781.018:6163): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 326.127994][ T29] audit: type=1400 audit(1728691781.038:6164): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 326.150816][ T29] audit: type=1400 audit(1728691781.038:6165): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 26.048165][ T29] kauditd_print[ 326.176154][ T29] audit: type=1400 audit(1728691781.088:6166): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 4 callbac[ 326.199061][ T29] audit: type=1400 audit(1728691781.088:6167): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ks suppressed O[ 326.222492][ T29] audit: type=1400 audit(1728691781.088:6168): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ct 12 00:09:40 s[ 326.245850][ T29] audit: type=1400 audit(1728691781.088:6169): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 yzkaller kern.no[ 326.269214][ T29] audit: type=1400 audit(1728691781.088:6170): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tice kernel: [ 326.048182][ T29] audit: type=1400 audit(1728691780.958:6161): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:40 syzkaller daemon.err dhcpcd[9949]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:09:40 syzkaller daemon.err dhcpcd[9949]: ps_root_recvmsg: Invalid argument Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.080332][ T29] audit: type=1400 audit(1728691780.988:6162): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.104309][ T29] audit: type=1400 audit(1728691781.018:6163): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.127994][ T29] audit: type=1400 audit(1728691781.038:6164): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.150816][ T29] audit: type=1400 audit(1728691781.038:6165): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller daemon.err dhcpcd[9950]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:09:41 syzkaller daemon.err dhcpcd[9950]: ps_root_recvmsg: Invalid argument Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.176154][ T29] audit: type=1400 audit(1728691781.088:6166): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.199061][ T29] audit: type=1400 audit(1728691781.088:6167): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.222492][ T29] audit: type=1400 audit(1728691781.088:6168): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.245850][ T29] audit: type=1400 audit(1728691781.088:6169): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:41 syzkaller kern.notice kernel: [ 326.269214][ T29] audit: type=1400 audit(1728691781.088:6170): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:43 syzkaller daemon.err dhcpcd[9951]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:09:43 syzkaller daemon.err dhcpcd[9951]: ps_root_recvmsg: Invalid argument Oct 12 00:09:44 syzkaller daemon.err dhcpcd[9952]: ps_bpf_start_bpf: bpf_open: Invalid argument Oct 12 00:09:44 syzkaller daemon.err dhcpcd[9952]: ps_root_recvmsg: Invalid argument [ 332.066764][ C0] ================================================================== [ 332.074911][ C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote [ 332.083082][ C0] [ 332.085397][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: [ 332.092760][ C0] __tmigr_cpu_activate+0x55/0x200 [ 332.097873][ C0] tmigr_cpu_activate+0x8a/0xc0 [ 332.102738][ C0] timer_clear_idle+0x28/0x100 [ 332.107502][ C0] tick_nohz_restart_sched_tick+0x22/0x110 [ 332.113314][ C0] tick_nohz_idle_exit+0xfe/0x1d0 [ 332.118357][ C0] do_idle+0x1ee/0x230 [ 332.122431][ C0] cpu_startup_entry+0x25/0x30 [ 332.127208][ C0] start_secondary+0x96/0xa0 [ 332.131905][ C0] common_startup_64+0x12c/0x137 [ 332.136938][ C0] [ 332.139250][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: [ 332.146783][ C0] tmigr_handle_remote+0x26e/0x940 [ 332.151893][ C0] run_timer_softirq+0x5f/0x70 [ 332.156666][ C0] handle_softirqs+0xbf/0x280 [ 332.161354][ C0] irq_exit_rcu+0x3e/0x90 [ 332.165688][ C0] sysvec_apic_timer_interrupt+0x73/0x80 [ 332.171338][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 332.177339][ C0] acpi_safe_halt+0x21/0x30 [ 332.181850][ C0] acpi_idle_do_entry+0x1d/0x30 [ 332.186979][ C0] acpi_idle_enter+0x96/0xb0 [ 332.191606][ C0] cpuidle_enter_state+0xc5/0x260 [ 332.196640][ C0] cpuidle_enter+0x40/0x70 [ 332.201080][ C0] do_idle+0x195/0x230 [ 332.205177][ C0] cpu_startup_entry+0x25/0x30 [ 332.209971][ C0] rest_init+0xef/0xf0 [ 332.214038][ C0] start_kernel+0x586/0x5e0 [ 332.218538][ C0] x86_64_start_reservations+0x2a/0x30 [ 332.224023][ C0] x86_64_start_kernel+0x9a/0xa0 [ 332.228960][ C0] common_startup_64+0x12c/0x137 [ 332.233921][ C0] [ 332.236247][ C0] value changed: 0x00 -> 0x01 [ 332.240932][ C0] [ 332.243245][ C0] Reported by Kernel Concurrency Sanitizer on: [ 332.249398][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc2-syzkaller-00260-g9e4c6c1ad9a1 #0 [ 332.259736][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 332.269797][ C0] ================================================================== Oct 12 00:09:47 [ 332.280617][ T29] kauditd_printk_skb: 16 callbacks suppressed syzkaller kern.e[ 332.280632][ T29] audit: type=1400 audit(1728691787.188:6187): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 rr kernel: [ 332.066764][ C0[ 332.313546][ T29] audit: type=1400 audit(1728691787.198:6188): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ] ==============[ 332.336244][ T29] audit: type=1400 audit(1728691787.218:6189): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 332.359580][ T29] audit: type=1400 audit(1728691787.218:6190): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 332.383098][ T29] audit: type=1400 audit(1728691787.218:6191): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ================[ 332.383141][ T29] audit: type=1400 audit(1728691787.218:6192): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ==== Oct 12 00:[ 332.383168][ T29] audit: type=1400 audit(1728691787.218:6193): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 09:47 syzkaller [ 332.453511][ T29] audit: type=1400 audit(1728691787.218:6194): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 kern.err kernel:[ 332.476889][ T29] audit: type=1400 audit(1728691787.218:6195): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 332.074911][[ 332.500245][ T29] audit: type=1400 audit(1728691787.218:6196): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 C0] BUG: KCSAN: data-race in __tmigr_cpu_activate / tmigr_handle_remote Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.083082][ C0] Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.085397][ C0] write to 0xffff888237d205dc of 1 bytes by task 0 on cpu 1: Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.092760][ C0] __tmigr_cpu_activate+0x55/0x200 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.097873][ C0] tmigr_cpu_activate+0x8a/0xc0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.102738][ C0] timer_clear_idle+0x28/0x100 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.107502][ C0] tick_nohz_restart_sched_tick+0x22/0x110 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.113314][ C0] tick_nohz_idle_exit+0xfe/0x1d0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.118357][ C0] do_idle+0x1ee/0x230 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.122431][ C0] cpu_startup_entry+0x25/0x30 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.127208][ C0] start_secondary+0x96/0xa0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.131905][ C0] common_startup_64+0x12c/0x137 Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.136938][ C0] Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.139250][ C0] read to 0xffff888237d205dc of 1 bytes by interrupt on cpu 0: Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.146783][ C0] tmigr_handle_remote+0x26e/0x940 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.151893][ C0] run_timer_softirq+0x5f/0x70 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.156666][ C0] handle_softirqs+0xbf/0x280 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.161354][ C0] irq_exit_rcu+0x3e/0x90 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.165688][ C0] sysvec_apic_timer_interrupt+0x73/0x80 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.171338][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.177339][ C0] acpi_safe_halt+0x21/0x30 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.181850][ C0] acpi_idle_do_entry+0x1d/0x30 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.186979][ C0] acpi_idle_enter+0x96/0xb0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.191606][ C0] cpuidle_enter_state+0xc5/0x260 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.196640][ C0] cpuidle_enter+0x40/0x70 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.201080][ C0] do_idle+0x195/0x230 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.205177][ C0] cpu_startup_entry+0x25/0x30 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.209971][ C0] rest_init+0xef/0xf0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.214038][ C0] start_kernel+0x586/0x5e0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.218538][ C0] x86_64_start_reservations+0x2a/0x30 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.224023][ C0] x86_64_start_kernel+0x9a/0xa0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.228960][ C0] common_startup_64+0x12c/0x137 Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.233921][ C0] Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.236247][ C0] value changed: 0x00 -> 0x01 Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.240932][ C0] Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.243245][ C0] Reported by Kernel Concurrency Sanitizer on: Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.249398][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc2-syzkaller-00260-g9e4c6c1ad9a1 #0 Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.259736][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Oct 12 00:09:47 syzkaller kern.err kernel: [ 332.269797][ C0] ================================================================== Oct 12 00:09:47 syzkaller kern.warn kernel: [ 332.280617][ T29] kauditd_printk_skb: 16 callbacks suppressed Oct 12 00:09:47 syzkaller kern.notice kernel: [ 332.280632][ T29] audit: type=1400 audit(1728691787.188:6187): avc: denied { read } for pid=2950 comm="syslogd" name="log"Oct 12 00:09:47 [ 341.408384][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 341.408401][ T29] audit: type=1400 audit(1728691796.318:6240): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=0 Oct 12 00:09:56 [ 341.438794][ T29] audit: type=1400 audit(1728691796.348:6241): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.w[ 341.461953][ T29] audit: type=1400 audit(1728691796.348:6242): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 3[ 341.485428][ T29] audit: type=1400 audit(1728691796.388:6243): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 41.408384][ T2[ 341.508994][ T29] audit: type=1400 audit(1728691796.418:6244): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 9] kauditd_print[ 341.532298][ T29] audit: type=1400 audit(1728691796.438:6245): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 43 callba[ 341.555784][ T29] audit: type=1400 audit(1728691796.468:6246): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 cks suppressed [ 341.579114][ T29] audit: type=1400 audit(1728691796.488:6247): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Oct 12 00:09:56 [ 341.602658][ T29] audit: type=1400 audit(1728691796.518:6248): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 syzkaller kern.notice kernel: [ [ 341.625873][ T29] audit: type=1400 audit(1728691796.518:6249): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 341.408401][ T29] audit: type=1400 audit(1728691796.318:6240): avc: denied { egress } for pid=15 comm="ksoftirqd/0" saddr=fe80::1b daddr=ff02::2 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:obje Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.438794][ T29] audit: type=1400 audit(1728691796.348:6241): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.461953][ T29] audit: type=1400 audit(1728691796.348:6242): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.485428][ T29] audit: type=1400 audit(1728691796.388:6243): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.508994][ T29] audit: type=1400 audit(1728691796.418:6244): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.532298][ T29] audit: type=1400 audit(1728691796.438:6245): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.555784][ T29] audit: type=1400 audit(1728691796.468:6246): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.579114][ T29] audit: type=1400 audit(1728691796.488:6247): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.602658][ T29] audit: type=1400 audit(1728691796.518:6248): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Oct 12 00:09:56 syzkaller kern.notice kernel: [ 341.625873][ T29] audit: type=1400 audit(1728691796.518:6249): avc: denied { read } for pid=2950 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=