last executing test programs: 8.186284109s ago: executing program 4 (id=383): syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0xffffffffffffffc0, &(0x7f0000000180)) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000, 0x20}, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_script(r4, &(0x7f0000000100), 0xfffffecd) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000400)=@gcm_256={{0x304}, "ca7ee2b1848ae337", "4b5b154869939154798f82be7dcae38bcdcab75bc2d1dcb3b28921cb75aab36d", "899d6e3a", "90167d3ae79ca2c5"}, 0x38) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000b40), 0x4) socket$inet(0x2, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) io_submit(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x20) 6.555375749s ago: executing program 3 (id=387): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f00000000c0)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000009780)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000100)={0x10, 0xffffffda, 0x3}, 0x10) gettid() r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) inotify_init() close(0xffffffffffffffff) inotify_init1(0x0) read(0xffffffffffffffff, 0x0, 0x2600) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_create(0x0, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x24, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x62) fcntl$setlease(r4, 0x400, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 6.463915129s ago: executing program 2 (id=388): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) unshare(0x2040400) r0 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x10, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, &(0x7f0000000340)={0x2000, r1}, 0x0) (fail_nth: 2) 6.350725041s ago: executing program 3 (id=389): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f00000000c0)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0xffffffda, 0x3}, 0x10) gettid() r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r2 = inotify_init() ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) inotify_init1(0x0) read(r3, 0x0, 0x2600) 5.859344257s ago: executing program 2 (id=390): r0 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000002c0)={0x0, 0x0, r1, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000440)={r2, 0x0, 0x0, 0x0, 0x0, [0x0]}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={r3, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETFB2(r4, 0x40046201, 0x0) 5.813350459s ago: executing program 1 (id=391): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2}, 0x18) connect$can_j1939(r1, &(0x7f0000000140)={0x1d, r2, 0x0, {}, 0xfe}, 0x18) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan1\x00'}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000200)={'wg0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r3, &(0x7f0000003700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)={0x1c, r4, 0x415, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}}, 0x1c}}, 0x24008000) r6 = socket(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000800)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_etf={{0x8}, {0x14, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0x0, 0x0, 0x7}}}}]}, 0x40}}, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f00000002c0)=@nullb, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r9 = creat(&(0x7f0000000380)='./bus\x00', 0x196) r10 = socket(0x200000100000011, 0x3, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r11, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) bind$packet(r10, &(0x7f0000000040)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @multicast}, 0x14) setsockopt$packet_int(r10, 0x107, 0xf, &(0x7f0000000100)=0x800b, 0x4) sendmsg$netlink(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000030000000000d96e6c8d78850800"], 0x18}], 0x1}, 0x0) fcntl$setstatus(r9, 0x4, 0x4000) io_submit(0x0, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x8, 0x1, 0x0, r9, &(0x7f0000000000), 0x100000}]) socket$nl_route(0x10, 0x3, 0x0) sendmsg$can_j1939(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)="70dc148c1dad2dd508c7d86319a975f3e2ed8cea1373be8221f1385466fca1f02b2d22c3b4e0881f5cbc29d7e6934d12af3dc89aae4bec132b71088fd8612fff206a486c7702730579f9ab", 0x4b}, 0x1, 0x0, 0x0, 0x24000001}, 0x4001) 5.63087318s ago: executing program 2 (id=392): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000580), &(0x7f00000003c0), &(0x7f0000000400)={0x0, "a754900b76d1ffbae49d53805d9a500bf282eb34c09e735cf630efc4cf915adc6dc55d524a7f5a5a1c334efedb5e2b94ae1a66c19cbf9264ecbaffea1056dc96"}, 0x48, r1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20040, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/dev\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000100)=""/4096, 0x1004}], 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = syz_usb_connect$uac1(0x0, 0xa4, &(0x7f00000000c0)=ANY=[@ANYBLOB="2a01000020000040b708000000000000030109029200030172e5000904000000010100000a24010000000201020c0d24070000030769dc000049c40c240000e9fffff5ffffffff092403f3ff000005024524", @ANYRES8=r2, @ANYBLOB="05"], 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000280)={0x14, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0003040000002203"]}, 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000680)={0x14, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="00032a0000002a03"]}, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) io_submit(0x0, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r5, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) request_key(0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r6, r1) ftruncate(0xffffffffffffffff, 0x2000009) r7 = socket(0xa, 0x3, 0x4) ioctl$sock_SIOCBRDELBR(r7, 0x89a2, &(0x7f0000000880)='veth0_virt_wifi\x00') r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x32) sendmmsg$sock(r8, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 5.503493764s ago: executing program 1 (id=393): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="050000000000000000002100000008000300", @ANYRES32, @ANYBLOB="10007d80", @ANYRES16], 0x2c}}, 0x0) userfaultfd(0x180001) r3 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000140)=ANY=[@ANYRES32], 0x0) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000048000), 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$DRM_IOCTL_MODE_GET_LEASE(0xffffffffffffffff, 0xc01064c8, &(0x7f0000000240)={0x8, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000280)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_SETPLANE(0xffffffffffffffff, 0xc03064b7, &(0x7f00000003c0)={r4, r5, r6, 0x9, 0x1, 0xfffffffb, 0xa, 0x4, 0x200, 0x2, 0x7, 0xffffffff}) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$dsp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0x11, r7, 0x0) ioctl$SNDCTL_DSP_SETFMT(r7, 0xc0045005, &(0x7f0000000080)=0x3f) syz_usb_control_io(r3, 0x0, &(0x7f0000000300)={0x84, &(0x7f0000001a80)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_GETVERSION(r8, 0x40045b0a, 0x0) 5.283925853s ago: executing program 0 (id=394): ioprio_set$pid(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)=[0x0], 0x0, 0x0, &(0x7f0000000200), 0x0, 0x10, &(0x7f0000000480), &(0x7f00000002c0), 0x8, 0x8a, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000670000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0xfe53, &(0x7f0000000440)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x88, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0xb, 0x3, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast2}}}}}}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000340)=""/69, 0x623c41ea}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/disk', 0x169a82, 0x0) sendfile(r2, r2, 0x0, 0x30) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'syz_tun\x00'}) socket$inet_sctp(0x2, 0x400000000001, 0x84) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b7000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000800)) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043ef50d"], 0xf8) syz_io_uring_setup(0x5e2, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000106010100000000000000f4ff00"/28], 0x1c}}, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r8, 0x80045530, &(0x7f00000000c0)=""/87) io_uring_enter(0xffffffffffffffff, 0xa3d, 0x0, 0x0, 0x0, 0x0) 5.273172703s ago: executing program 3 (id=395): madvise(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xe) madvise(&(0x7f0000e3a000/0x2000)=nil, 0x2000, 0x17) syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x8601) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x8}, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000008c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="110d27bd7000000000000c000000180001801400020067656e6576653000000000000000000010000380080002000800000004000100e057e6fb2fe6667f86bb61aab0652acf312e21b222afed4c6de987b41ef71f1ef8713b220235aed4a99438177fe551f727263202651e346fd432e2dc75006e1aacc2c600f6091044568aa6cd3b099eb7"], 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)={0x14, r4, 0x1}, 0x14}}, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) madvise(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x8) mbind(&(0x7f0000f33000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x0) syz_open_dev$vim2m(&(0x7f0000000000), 0x7, 0x2) syz_open_dev$mouse(&(0x7f0000000180), 0x3, 0x484000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r1) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r7, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="6c00000000010104000000000000000000000000240001801400018008000100e000000108000200e00000010c00028005000100000000002c00028014000180080001000000000108000200ac1e00010c000280050001000000000006ea0340000200000800074000000000dfd21617b290d2f40ab1"], 0x6c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x48882, 0x0) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x14d802, 0x0) r9 = dup(r8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r9, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 4.951342126s ago: executing program 3 (id=396): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x11000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="fd4c", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000011c0)={'ip6tnl0\x00', &(0x7f0000001140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @remote}}) 4.789875213s ago: executing program 4 (id=397): mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000440)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000140), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000033a80)=""/102386, 0x18ff2}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}], 0x4, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000008900)=[{{&(0x7f0000000200)={0xa, 0x4e23, 0x2, @local, 0xffffff01}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000640)="b6b56d6102a4abe6cb5f0241c33ec362a6c27b552867a8ad826138110e65ef765ae8ae49a502f7d37d05ecc7e7219db83ed2478fe7422518f3fe98e0335d9f7d3094a3ed234290a3649053ce996bca00dfd8f594759c3f7bf0e9bdebd185f79baca732f4ee810c72e170ebfbdb39b8f6b7217838c7b0db66622356c02eced38adb63460e8d1ccc7bfad5d4753603ef13723456ca4ccbda36833158f95168358d16685c207c498548c070fe953c7edb0f628f9ac0f5cedb5cac2a361bcda1953fbc214a30d35c7c980b6a95f72c99df1822fff4b4071171f3dd31be1f32084af429363195f7e2673eb9c056cad4213b05e0444a", 0xf3}, {&(0x7f0000000240)="f67e78237457", 0x6}, {&(0x7f0000000480)="4ef5e4d8d4edb5d45a6a752292f93aebd594aa8ea21f9777bdc999d425d6c811d223ad2bcac0d5d9a2efb9ec5ce78f38678640aa814569cabc190bd1a77466803151d4a6a132123a7f129116b6feba6d69a6f083294533d10a140f115158397dbc937b25de0cfdc7456d7f30249badc79c061510c8a7d2058feb07506d75dd74", 0x80}, {&(0x7f0000000740)="e02141188d6ad86c40679739027496d28ac3b0fb00974eefe53eeb0a7286c7f8f74334c1e83cbee32266ee5ea1adc425a5dff6d024e07d88f2152b2c413cf060808da6606a3f210aca0f315a5f814b4ea413e2143a4e38d9774af34bc722563477f68cc2bba38dbcac52dd2baaa796891e7646947de4a20075fb8664dfbf9d64c4472e4f50efe62cd82b245d751371bc460a657fcc7d7d2651ee3800d5f5a368d2f82d1f6a87bcc248", 0xa9}], 0x4, &(0x7f0000000800)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @rthdrdstopts={{0x98, 0x29, 0x37, {0x6c, 0xf, '\x00', [@ra={0x5, 0x2, 0xa}, @enc_lim, @pad1, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @generic={0x4, 0x6, "b29a4686faad"}, @ra={0x5, 0x2, 0x255}, @jumbo={0xc2, 0x4, 0x6}, @enc_lim={0x4, 0x1, 0x2}, @calipso={0x7, 0x40, {0x3, 0xe, 0x1, 0x8000, [0x80000001, 0x5, 0x0, 0x80000000000000, 0x800, 0xd1, 0x5]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @dstopts={{0x20, 0x29, 0x37, {0x37ec79d933ce7e30, 0x0, '\x00', [@ra={0x5, 0x2, 0x9}]}}}], 0xe8}}, {{&(0x7f0000000900)={0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}, 0x1c, 0x0, 0x0, &(0x7f0000008ac0)=[@dstopts_2292={{0xb8, 0x29, 0x4, {0x2b, 0x13, '\x00', [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x16}, @calipso={0x7, 0x50, {0x1, 0x12, 0x9, 0x0, [0x200, 0x1, 0x6, 0x81, 0x2, 0x48b573cf, 0x5, 0xca, 0x0]}}, @pad1, @calipso={0x7, 0x38, {0x3, 0xc, 0x9, 0x8, [0x9, 0x8000000000000000, 0xffffffffffffffff, 0x1, 0x83a, 0xd6]}}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @dstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x76}, @enc_lim={0x4, 0x1, 0x8}, @pad1, @ra]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @flowinfo={{0x14, 0x29, 0xb, 0xcd3e}}, @dstopts={{0x108, 0x29, 0x37, {0xa7, 0x1d, '\x00', [@calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x3, [0xc, 0x100000000000005, 0x3, 0x8]}}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x9, 0x6, [0x46, 0x80000001, 0xea67, 0x72]}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x9, [0x8f2, 0x0, 0x6, 0x8000, 0x2, 0xfffffffffffffffa, 0x3, 0xfffffffffffffff9]}}, @calipso={0x7, 0x20, {0x1, 0x6, 0x9, 0x0, [0x4ec2, 0x2, 0x7a4d197c]}}]}}}, @rthdrdstopts={{0x1058, 0x29, 0x37, {0x2b, 0x208, '\x00', [@generic={0x74, 0x30, "5a59ae66bb1d4f122fda8709156e060d315080e2ffece1d2612f2013995bc48db23a14b8901fa440588876f9d25dd8c0"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0xf4, 0x1000, "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"}]}}}], 0x1298}}, {{&(0x7f0000000980)={0xa, 0x4e24, 0x1ff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0xffff}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000006240)="dbe366b68870eaea7466ce73559fee9f030682bee47200708707808f13deacd3d7e9f92b7e3d4bb8aca02ba858f2ed21fa340b5a35b9555cb2598912bc32afbed2baa7196ff1368849ea006c0631a0ecd3c0c0f7d09b6ba04d5a443257f97c3759caa240c06c62d02bbb5471adebc014a2d23d62da193c931ce389", 0x7b}], 0x1, &(0x7f00000062c0)=[@hopopts_2292={{0x310, 0x29, 0x36, {0xff, 0x5e, '\x00', [@jumbo={0xc2, 0x4, 0x2efe}, @generic={0xa, 0xf5, "a0b5782a71db01d9a6df144ff97b055362aa3142bcf85fb1224440b627e6087c4a34badb9c5c72c20eccd9711e278fe0d5ac4a0b4db45e6b94b9b7da5883a7d5cc2a65d876f054fd0cc90e3458f4dfcf81ec4f8a5d3b5b6ae8e6e4f1c67b1c8c569625c314c8271141bb217a2e6f85c97e6b9b28133fc07f4c7f1f59ac4b15c73fd0e229789d12e8a82afe8d6f01f07cda12734b05978464cac31e8d10f25603a73c7ec60b7e62df5965d7fa2f108f60192ced5e01f4d508aab6451488c94860ec1e01fdbcb831d527565e626e9fc72d2734f7562c15b56c509e4d046c512ecfe0da1864777fe947ad28b34821d272c3c1cf84863e"}, @generic={0x7, 0xfc, "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"}, @pad1, @hao={0xc9, 0x10, @private2}, @generic={0x18, 0xd9, "cacce1f028f9bf4a610acd580f0bdc39f7c23d838ad161a31008f42fb947a41e8bfe8e5dd4d177e14a2e79a0c7ad9f30153b2f05554535a12a863da9baa078970f11976f37b849d68ca063e24bddb0f09063afcea079e5c9332de52039a3286ae8f376e0f2e1898876555086944367a1c34cc2073b0ba129400e2108922bc45522058c33ada8fe2a00aadb070aa7da67e35928fb60c566f623c284ff243645cb3d6d7d87fcb881bb697dcde6b7362579a67e61a67dee7ee6261c5aa8dc1d4893c809d5e0a8f6b68f6b2bc88ed1d7e7c93ea81d4897558381a5"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x81}]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x88}}}, @rthdr={{0x98, 0x29, 0x39, {0x2c, 0x10, 0x0, 0x8, 0x0, [@rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}, @remote, @mcast2, @local, @mcast1, @ipv4={'\x00', '\xff\xff', @empty}, @loopback]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3b8}}], 0x3f0}}, {{&(0x7f0000006740)={0xa, 0x4e21, 0x7d9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000007a80)=[{&(0x7f0000006800)="c22c21c45fc1cebf0ccfcb64a2ffde5f95d46771c018dfd43f377155a71e3397f1523e690a75752b54e296d7c897eb3219aad6fc3dc29f25c8c85da2daaafd30479efb981d437c3f56aa6d2eb5791bdceee72a810cfbf2570ef4df192dfdca2e929b64ba12577140f4a80408de5d4b46154dd4cd483e", 0x76}, {&(0x7f0000006900)="02110870a8eaf35319e250e6d2d5f4b3c90ccd1084a1aef3091636ef2ccff14072c9fb19dc8d5fad8c5d5fcf920af7817effe359d9289f8b778cc365bfbff9c8ceeecf923124309ffcc196e7f971ec01cc3f56bcc45086ce20ccc516cbfae1183f7986522eb6587cc379dc740f9ad131144b55d34a982642f35f7904f091a03be5dfe8bd1d4bdf47ac8ed8669d122c2e6af507abbbb8850b4e9f46e5467e77e02760740a4fc060c663ff435ffc1a6febbdc9dd07e0915285984c5a699a214a06ff297d1d4f6b4581627144b50bce45a7b2d2", 0xd2}, {&(0x7f0000006a00)="3d932972397156604fa6125c5b28858f18a1dc22c416b0c79b2db4f87a774fbfd3dffb5f5a75b3ef7d8574e0e249102649f573f321f20858dc9f44afd2cd5261acf6628f61297fed5a1abc2e7a0ca71d3dcd8008af1ff8f4808726d87575d7744d3ad3", 0x63}], 0x3, &(0x7f00000053c0)=ANY=[@ANYBLOB="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"], 0x280}}, {{&(0x7f0000007d80)={0xa, 0x4e20, 0x80000001, @private2, 0x80000001}, 0x1c, &(0x7f0000007e00), 0x0, &(0x7f0000007e40)}}], 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000001200000008000300", @ANYRES32=r3, @ANYBLOB="0a00060008021100000100000c004300d2"], 0x34}}, 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r4, 0xc0403d08, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 3.973553945s ago: executing program 3 (id=398): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x2, 0x0) ftruncate(0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000007bc0), 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80044520, &(0x7f0000000000)=""/85) r3 = getpid() ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000180)={0xfdc, 0x0, {r3}, {}, 0x0, 0x6bd4}) prctl$PR_SCHED_CORE(0x3e, 0x1, r4, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee6, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x0, 0x0) r9 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCSETD(r8, 0x5423, &(0x7f0000000500)=0x19) sendfile(0xffffffffffffffff, r9, 0x0, 0x0) socket(0x8, 0x2, 0x1f) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r11 = openat$cgroup_procs(r10, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f00000000c0), 0x12) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140), 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010", @ANYRES32, @ANYBLOB="0000000000000000280012000900010076"], 0x48}}, 0x0) 3.706517514s ago: executing program 4 (id=399): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f00000000c0)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000009780)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000100)={0x10, 0xffffffda, 0x3}, 0x10) gettid() r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) inotify_init() close(0xffffffffffffffff) inotify_init1(0x0) read(0xffffffffffffffff, 0x0, 0x2600) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_create(0x0, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x24, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x62) fcntl$setlease(r4, 0x400, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 3.679309056s ago: executing program 0 (id=400): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x40000) getsockname(r0, &(0x7f0000000000)=@alg, &(0x7f00000000c0)=0x80) unshare(0x2040400) r1 = landlock_create_ruleset(&(0x7f00000002c0)={0x2001}, 0x10, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r1, 0x1, &(0x7f0000000340)={0x2000, r2}, 0x0) 3.493671755s ago: executing program 0 (id=401): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)='%pi6 \x00'}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) connect$qrtr(0xffffffffffffffff, &(0x7f0000000080)={0x2a, 0xffffffff, 0xfffffffe}, 0xc) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9, 0x8010, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4d) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'team0\x00', 0x44}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x9a, 0x80000009, 0x2, 0x1, 0x85}) socket$l2tp6(0xa, 0x2, 0x73) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x1}, 0x70) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x7, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) r2 = socket(0x10, 0x3, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000180)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000004c0)={0x0}) syz_open_dev$vim2m(&(0x7f0000000040), 0x7fff, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000200)=""/152, 0x98}, {&(0x7f0000000540)=""/118, 0x76}, {&(0x7f0000000400)=""/103, 0x67}], 0x3, 0x19df, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000080)={r5, 0x3, r1}) connect$unix(r2, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0xffffff89) write(r2, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000003c0000000000000008000f0001000000", 0x24) pipe2$watch_queue(&(0x7f0000000040), 0x80) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 3.37917175s ago: executing program 4 (id=402): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x1000003}) 3.181131058s ago: executing program 4 (id=403): r0 = socket$inet_sctp(0x2, 0x1, 0x84) fcntl$setstatus(r0, 0x4, 0xb970acdd662fb944) r1 = open(&(0x7f0000000300)='./bus\x00', 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbee3, 0x110, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x2c) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000340)={{{@in=@private, @in6=@ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x7}}, 0xe8) sendmmsg(r7, &(0x7f0000000480), 0x2e9, 0xffd8) 2.815601644s ago: executing program 2 (id=404): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="02064000020000000000000000010000"], 0x10}}, 0x0) close(0xffffffffffffffff) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x42, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) open(0x0, 0x80181, 0x20a) creat(0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) getpid() sched_setscheduler(0x0, 0x0, 0x0) r2 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r2, &(0x7f0000000000)={0xa0000001}) epoll_wait(r5, &(0x7f0000000340)=[{}], 0x1, 0x1000) 2.411665758s ago: executing program 0 (id=405): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f00000000c0)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) read$FUSE(0xffffffffffffffff, &(0x7f0000009780)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0xffffffda, 0x3}, 0x10) gettid() r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r2 = inotify_init() ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) inotify_init1(0x0) read(r3, 0x0, 0x2600) 2.330294581s ago: executing program 1 (id=406): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@ptr, @func_proto={0x0, 0x0, 0x0, 0xa, 0x2}]}}, 0x0, 0x32}, 0x20) r0 = syz_open_dev$video4linux(&(0x7f0000000ac0), 0x2, 0x0) syz_emit_vhci(&(0x7f0000001980)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x5, 0x0, 0x428}}}, 0x7) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f00000000c0)) syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000b00)={0x2c, &(0x7f0000000180)=ANY=[@ANYBLOB="5aa49a705c2746cc465bdf02b06f44cfb5063596fa08064c6b2340cf7b21ff81ee4a777b6647eabd80b9aa8120cde62aba58bd5230e5e02379eb7ae38387c97dd4b9e739c049d1a297948681269d3694f9", @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000080)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x4c0340, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000100)) r2 = dup(0xffffffffffffffff) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000000)={0x1, r2}) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) r4 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, 0x80, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000100100000100000070"], 0x18}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r5, r4) writev(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)='?', 0x20000081}], 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_FREE_STREAMS(r6, 0x8008551d, &(0x7f0000000000)={0x0, 0x1, [{0x1, 0x1}]}) 1.841130017s ago: executing program 3 (id=407): syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ptrace$PTRACE_GETSIGMASK(0x420a, 0x0, 0xffffffffffffffc0, &(0x7f0000000180)) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x0, 0x0, 0x8000, 0x20}, 0x48) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r4, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_script(r4, &(0x7f0000000100), 0xfffffecd) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x2, &(0x7f0000000400)=@gcm_256={{0x304}, "ca7ee2b1848ae337", "4b5b154869939154798f82be7dcae38bcdcab75bc2d1dcb3b28921cb75aab36d", "899d6e3a", "90167d3ae79ca2c5"}, 0x38) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000b40), 0x4) socket$inet(0x2, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) io_submit(0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x20) 1.479411924s ago: executing program 1 (id=408): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x11000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001b40)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)="fd4c", 0x2}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000000) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'lo\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000011c0)={'ip6tnl0\x00', &(0x7f0000001140)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @empty}}) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @remote}}) 1.339300575s ago: executing program 0 (id=409): mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) userfaultfd(0x0) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000440)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_dev$video4linux(&(0x7f0000000140), 0x0, 0x0) preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000340)=""/163, 0xa3}, {&(0x7f0000033a80)=""/102386, 0x18ff2}, {0x0}, {&(0x7f0000000540)=""/194, 0xc2}], 0x4, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000080), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000008900)=[{{&(0x7f0000000200)={0xa, 0x4e23, 0x2, @local, 0xffffff01}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000640)="b6b56d6102a4abe6cb5f0241c33ec362a6c27b552867a8ad826138110e65ef765ae8ae49a502f7d37d05ecc7e7219db83ed2478fe7422518f3fe98e0335d9f7d3094a3ed234290a3649053ce996bca00dfd8f594759c3f7bf0e9bdebd185f79baca732f4ee810c72e170ebfbdb39b8f6b7217838c7b0db66622356c02eced38adb63460e8d1ccc7bfad5d4753603ef13723456ca4ccbda36833158f95168358d16685c207c498548c070fe953c7edb0f628f9ac0f5cedb5cac2a361bcda1953fbc214a30d35c7c980b6a95f72c99df1822fff4b4071171f3dd31be1f32084af429363195f7e2673eb9c056cad4213b05e0444a", 0xf3}, {&(0x7f0000000240)="f67e78237457", 0x6}, {&(0x7f0000000480)="4ef5e4d8d4edb5d45a6a752292f93aebd594aa8ea21f9777bdc999d425d6c811d223ad2bcac0d5d9a2efb9ec5ce78f38678640aa814569cabc190bd1a77466803151d4a6a132123a7f129116b6feba6d69a6f083294533d10a140f115158397dbc937b25de0cfdc7456d7f30249badc79c061510c8a7d2058feb07506d75dd74", 0x80}, {&(0x7f0000000740)="e02141188d6ad86c40679739027496d28ac3b0fb00974eefe53eeb0a7286c7f8f74334c1e83cbee32266ee5ea1adc425a5dff6d024e07d88f2152b2c413cf060808da6606a3f210aca0f315a5f814b4ea413e2143a4e38d9774af34bc722563477f68cc2bba38dbcac52dd2baaa796891e7646947de4a20075fb8664dfbf9d64c4472e4f50efe62cd82b245d751371bc460a657fcc7d7d2651ee3800d5f5a368d2f82d1f6a87bcc248", 0xa9}], 0x4, &(0x7f0000000800)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @rthdrdstopts={{0x98, 0x29, 0x37, {0x6c, 0xf, '\x00', [@ra={0x5, 0x2, 0xa}, @enc_lim, @pad1, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @generic={0x4, 0x6, "b29a4686faad"}, @ra={0x5, 0x2, 0x255}, @jumbo={0xc2, 0x4, 0x6}, @enc_lim={0x4, 0x1, 0x2}, @calipso={0x7, 0x40, {0x3, 0xe, 0x1, 0x8000, [0x80000001, 0x5, 0x0, 0x80000000000000, 0x800, 0xd1, 0x5]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @dstopts={{0x20, 0x29, 0x37, {0x37ec79d933ce7e30, 0x0, '\x00', [@ra={0x5, 0x2, 0x9}]}}}], 0xe8}}, {{&(0x7f0000000900)={0xa, 0x4e24, 0x5, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}, 0x1c, 0x0, 0x0, &(0x7f0000008ac0)=[@dstopts_2292={{0xb8, 0x29, 0x4, {0x2b, 0x13, '\x00', [@padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x16}, @calipso={0x7, 0x50, {0x1, 0x12, 0x9, 0x0, [0x200, 0x1, 0x6, 0x81, 0x2, 0x48b573cf, 0x5, 0xca, 0x0]}}, @pad1, @calipso={0x7, 0x38, {0x3, 0xc, 0x9, 0x8, [0x9, 0x8000000000000000, 0xffffffffffffffff, 0x1, 0x83a, 0xd6]}}, @pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, @dstopts={{0x28, 0x29, 0x37, {0x2f, 0x1, '\x00', [@enc_lim={0x4, 0x1, 0x76}, @enc_lim={0x4, 0x1, 0x8}, @pad1, @ra]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @flowinfo={{0x14, 0x29, 0xb, 0xcd3e}}, @dstopts={{0x108, 0x29, 0x37, {0xa7, 0x1d, '\x00', [@calipso={0x7, 0x28, {0x0, 0x8, 0x0, 0x3, [0xc, 0x100000000000005, 0x3, 0x8]}}, @padn={0x1, 0x1, [0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x9, 0x6, [0x46, 0x80000001, 0xea67, 0x72]}}, @calipso={0x7, 0x48, {0x3, 0x10, 0x0, 0x9, [0x8f2, 0x0, 0x6, 0x8000, 0x2, 0xfffffffffffffffa, 0x3, 0xfffffffffffffff9]}}, @calipso={0x7, 0x20, {0x1, 0x6, 0x9, 0x0, [0x4ec2, 0x2, 0x7a4d197c]}}]}}}, @rthdrdstopts={{0x1058, 0x29, 0x37, {0x2b, 0x208, '\x00', [@generic={0x74, 0x30, "5a59ae66bb1d4f122fda8709156e060d315080e2ffece1d2612f2013995bc48db23a14b8901fa440588876f9d25dd8c0"}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0xf4, 0x1000, "8effe4fa8dacd634e7e09cc6c3261b16c444e93b46e9072412556b4b1bd98455cfb9f59e6f2b7fd5c24bc797fa3eccd79fac4e43339c4e6391c678c6fa32f363d8ee0acc1c419a19eb760a348d7e7cd62275081ff003c569dfdaa044f9bb7e43e8cf22b403b9d2336e2dae40f0afc02c138238e59a58915d7be3896599019c63a6d4af1672f623286d22c6eb298e0aea30ffb7b9a18a537347963b14bdf303b2a3289f67396e81c30a67ef564f11b9b485b80d0083a36b176211088320a233e8e2fec64cd20660ca547ffbd15d866d0ed48dd18057b66c12531502023ee05e04a44de2bb32a1d17390804c62fc0c7ac309536c5bda4d84ffbf967130097e5c24d0359ef1040e9a0e28d92e2bd7683e46d875bccc0e28b5998b5c3237e5aa268fb9b81fbd9ea5712a78f6dead279a08b5f3a9d414443c0d14faac02295b470f7e72476bef8bdc90a897b43501b577646294490de7f6778715b2306bc1d05c76d2d045298dfa614a842b9b0ccca26f10fbea5e3d7243eb0fae154a30710b732d8597c14a51ebdb1eeaa709d28e6c620feae3af0917555a593fb6a83e7c8cf8ec99a092c4a4a49254bfaf2feab3e63a2392fcfc86b53ae8d6b199d16fc84ac31d95c1ec64570b7467754eb810a5a48737c4e30da9979da626c3ef6346e9fa303ec03f9c0cdd0fa13d78bea3f7141b332683516607d166c5bade723e3cd18b2f8735e33dc943153511721df2dc248599c996321f7f236102268365d847ca123e801f6f20a51725bd8e70b6da6e61116cb43bfec0c6500e1e8770175ac83fdc47ada211b837874e59f59e349eed5bb2d140e1db4a08b6f5744ce806fb81b84de83df36278449a93cdab6ef64ff72fe7ec733a16ba80707602855cd996e727a526c4dfb4dffdad9dc3c1d2f9dde12ab0d84acc31e5057dee3a3fafb020d0cdc160c6e7d8ed7c2559f07445b5c0dccbfa09cf0f0fa8b2b5a86afb33995073e46f657e0c621eb0896e0d1c44df471260780aef3118fad1feaf9cd1e259d71eaaa641eade9992231b8dc1ce93e6b54f6f78051b6ec0f655ae676214840efab7b5071ee5c9acf0ce403fe888c44661958ce244e40dedf13e4de7814d73832676fcc6b981ab95f96b5129c1cd7b0260aaa551804c54ac41a0fcce92cfe286b8dcac4270705989e17bf8f2df9217f164bdc44c570bb7f57d1311d5d258b534a6cff7d90ef511177a3c0cc5908275c2342759218b2f16681e4452c3496636ca2987dcda0d7c2cf336771f15e82dfe53b7440ec1aedcb88989f341eaaad8bb7ffc073d71bf56bc149dd5905a7ee3d763e621854526c35a31e5d4739de00626752182ad2871dba0543835ad16f2ee26cfa51c15537f60686aa091f4757ebb328e0fb91dd3a58f87f2624cbddacd8679eb2b668b0cb62ccd8ea2aa7975e700843b2531db67659fbb01849bfa40bc22c3b4f9ad9eef2bb1e2c532a50829159a2196b52adf4f00daa5f952484ac14ef79b2c94cb1b84fe7e65b83e9008f75085bcde494aa4d58f408bf1b91fb09d0b0b8e857dcdf7e068f3c2bf90b2e2bdacbe05562e3548f4d48deff5bfc12946e64476a810ca5490a2a52830969e9d0feb13e74e0aff3997a2aa9f360d366a0f52b91d11398b99498e497aecb987853e9c5844591bf721566f50ed70c011419ae0480c596c57b90eb2a132071c53ca05a766e9d3e49f6f6d831925d275806840484efd766c5169999bacf25ad5a8acb09c4fc8bdb7ccc23b175f1547674d2eb73651b50f703a6af61d72c06df7e03af8197d379abcf928ebd39e04bb0ac7036ae92cb64518f12ce53775ae63b33943653cf0bb1328dd1d036d37140176bc141546597968a915a2e93f32f2a0cb50f8e6933050734b3e725c6edc17f8dc5a1ec9c5e46b722db8c3aaf1fe008247678613b2901a883c32d416c631a0b28dd1f1ca46710466ebba188dd8e17be0330da8aa935ac89c1e0d910e124e3a219ce8c85fdc661648f8af50bae3f757e0d70904fcdf3440d5ede5cd09bae7d25b68b27965d1b44aa816e043796227466a84d1e614f3957db2286431c704c4b9ac4329195b871c291efa3dc0fa9d99814417c744b1a77f1926fd492b7715c89f28d1f5bd94dd9aa27f02c68e7017cfe99e3ba938d990f2d0b116aeab294cda865d42883ab8dbf1e11dbc413e4eae2dcfea907e65e47010a2d7c7c5199dc1d7cae799604f365463c060303e309d64d5a1b4926b3193d178e88922c7e84879c62555ed882ac66d0d1c7cdad64b28883c6ab9a255cf05ca4a2091a309202849acff851d41a7433575451336da22ffc8a8f7d35896fa06646707ba90cb0919687edacd297dcef7a22f875d6739918f8c770778b1a5e018e598455f929d84e0fa6ee8100088a710086dbabda2e5c635fd7ca7630d4a702524d60a78de5fd41706511c052cad18cd596a3d8d7d7df4d46d2cf54f4be138056f6e6b331e34d562a53cd08f7a81d7966bc49052b19693bac18fb558b057335aed22f4bd77231cfdc10540a9b07d4418229c4b3d09d0bc5ecb7fe1a3b10d8de21fc5c4c5bc2bafc268d300446bf9bfad326e860e28315fb449b3319f904610ec851c20772df27a48fd791d0902c12268e5868758c38cbd06ba39341d3527814443a4a7d87502c21fc68df77581a6bfb93280903982d0ef579ef710b3bf61a6e434f1896df153de9037dca96e8f6dac4060ded0b0cf32b4484b5b1ea51d21646227f2a2d29cda96006ca46fe3d3d06ea6fd510a7318554776defbf12f78869b59a022f5f7f077fc8c679d2f3534ff14b696293cf633f6ecacf882325012d558ac2821065b9b0f8b0622a74d91381340156c85b664e26feeb859fc1da7987e7eb7caab9a7e387e9f4da294ea1d0b29bd050e38ca0a9dba9c7f24076fc47b979137ad9f4f74a13a98c123842c24cdcb6915ff49e4be037d254c5bea18170cafaa662d4c94845854a9747de9dc03944ddaee86279c233dbb639217e61859b23a9ab35ab5389e066fb60ae0419776a570e05d3524c2641ab451714d957888f3e68a30cad45857fe9b6eb02f68dfa9130e97fb47f451baac22f04265d9903bd9c0007db94867f277b87a2d0f70b00b2e48e8d270446f7da9e8021f3cd65d1239a2d538f01de2ae7d387e9022de800e7120cad1cee6362bd11377c4345f7088cb2f06791e9ee3cdc13c0f552bd3505bcee1ccfadbaf7f6e952d9e187e2a20ff36182b25aeb1e549016750e927420d1d303f8f862484693c63feb49cca49f7f8677b4fe2db19b1a86a72d2a3d1410d9b729464eaa2ea2dccf1960f05ed18d4770505d0d8846a7c02f2d9dfcb892b799299e445162bbe9e461beb0e6b0432428c5bc8a8c8107be513465ab92597588fc8d6f652bc4fa6f3426ec3cd8189c2e5498433520022faea7f8fc977ba454ddae381b294bd9e50e381895d50b76460076ff024fa1c17686b7fad266aedbc83e292fcfc29e50440a12b7f34be3567438de633b08c2b77171de5806c07c9ac344cdfb8f95c08b98156647f6c901c8832913f701804fec25854277fb0a3aea0ddcdfff578706657ee4eb30076845ab049796d7d3344f4ed7e821b482b2d0abced0df3d0a5be2876b924fd9f49dd2fe4187185a4cc9930a81a7c5ab45f8a1b3afa7f2cf77c32e60b180fe49f571fca2504912070ca408c0ca846c8db7d9c31ac3baa0c8a461b3c5d3bce5f72e19139c8a6d31211179b10c2c53cd7c5ba39b1ffee4f4db618cdb600db8583cde3d9de2c061c0b5f682eff5b9e1a957d0684f005b5e6b214ed49514906b9eefcb516d2a45d65e7922c19c20933d53cd533d2cda140649cbdcb138144b48ba93b10b882d4d4dd95cc97af839b3ddfa89b353e9f77ffb93356130dc2503a7c3799d1dd545f24bc40c5432a26dd11d955ffed1dbf8567dca54e07134bf2141200496ff309873119a6c0f6f629aebfe1c66b7aa393cb6155a8b66505b4385cfc2c044b4a69e119004796a6deaf465968a2361eda000d6527e3a56e9d6716de464d6e2b24bf7aaa824b5bfdf55084eee6d120aeac4a9e755f60013dc41c3c8c17dcf57a951a5ccd3be025b66cc9ee4384d0c7c2cab97bd5c40352a09dc0952c02a0d57a5703faf7e7b6c906faa9d0b184f0f59f86ab1f3aa28e9fc453d1ea886b0c2b8c0b7209da2decb8e5c5cdbcc609acc7dc809ffe1deffecbd8424480a87af027e49ed600e3cdbf65659323fc2ac7d103f43650da639db48c1f53ff298f7f4d6b69b6c8615c483e67a9142fbc3ab90b01108c22a239083df35a00c877c19262b350a5811f8dd7ccca49242bb35e93c026b45daf8d6ac316a3e9dcfa6a50eb60fb2ab00bd75847885842917dcc55417c980b15f79e2ef8b940f2ae97309dbde70ec63b63329fa597fbaa6d60c06a06c5fe11d9c49d48aa77c3cb634c3ed3a2e647a5095c9417e3dd934531b29bbfa860072385510869c00b86e4dee3821340241aa4f1afd2ed5b68cfebd046db1187b600609591fe7a23de32fbec06c2e0962347156aabafb05a1359df515f7a31514789c8beb8aeb3e7b733d32123088b257b8d59164846d130011567e90509bc7f3fab60959dc54f3184d8331c94fe82ad95b4ddd26257f76ffc1cbb1eaf9e4425fc54f059bc7e480e5d2cb0fb5e367628b6c017e3308008219b690c1c0afc4cfd6895851e46c284299497ddcb69df3e07ced0df3631836aff90ad526d783749f8869539c9270a918c9e9c6504e1b7488cdb4e7660741b5a6ebefc6a198ca909f2bcd42c85c0cb0f44f49f0ff56075d36a5035f11b61f5b7ef6b6eb9f5120c1f990d60eb39d5bee9bf994398fa690f97ebacac528d676b08b156b26494253ceab57742f4a4fe15fad101d76d53e725215ff5e12420103c80c57fdc274b70f5a9b1b6d2f35f08210f105b501efc8deb910d47c21fe31a85e9940c6da09c0f678c5bec3d5812921e0ad582a1b3277e310b5c55b902649094ac06fa8ad2ddec468372a3353b88f19df9860ec1708c0938095051895f636397ab35c642f27db7243f22f09241b7e14e6f06ec73ac509cb3763c244d335c1e2a90438ffa2b00c893a7100ac3072f1195201f8caf01519607b79764ef4c022a8353cff347b195c11c70538decda9903ae24986119fd33904d3c6ca60d79ada54da2dc0e3ec33aa8be0993910592a0a8cbb9cd92544ab35f63f780943711f6102e057218dcd415c6bf511384b8c1492b9564c1f24960fcc5c2f9d1c43d7e57d79ebb91ccab44cd13522be75d06bbe9bd59e6f7884b3f748a43978ff85cdc50f32005eda4a181d0974c94f2156a4870eb8446f51bf14c831f22a8b175912e08e5807973a56d72f90290b8c15db64f94620ab88b38f576d99fccdca6bab8a0e738a2f70de0ee12cf063a8a51da19471811177e626899641685424abab049a989fdb37e711c535cb15a5933b6e785e3d1216d5b141bc216bfff4b403cc5e8956a8609041d3c47ceb0efda2db3eb554909807391b0fba3420fcc37452614a5d00b190bcfbf026d360730dc4aa4022c2bc06f29773774ec0a2c19e7c5d864713bc42413cb497ae5c2c2eba95b7d15ce003800a1baa40f7ee0b6cd0e4c2d62fa193565860323be5c62eca6cfb5b6a6f0c23e22e7e2b031dba0a543e7bd7c1c4f211cdf7448526541405280aadca4f0e396b10edde09f303d9bebe02e38409e67f7afdbf4359da77f8571c009d81ff36a362d1ddf517b4a12c15a1e24efada381d660d0e2d037676041e7ce497e9378ad18a90947b352"}]}}}], 0x1298}}, {{&(0x7f0000000980)={0xa, 0x4e24, 0x1ff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0xffff}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000006240)="dbe366b68870eaea7466ce73559fee9f030682bee47200708707808f13deacd3d7e9f92b7e3d4bb8aca02ba858f2ed21fa340b5a35b9555cb2598912bc32afbed2baa7196ff1368849ea006c0631a0ecd3c0c0f7d09b6ba04d5a443257f97c3759caa240c06c62d02bbb5471adebc014a2d23d62da193c931ce389", 0x7b}], 0x1, &(0x7f00000062c0)=[@hopopts_2292={{0x310, 0x29, 0x36, {0xff, 0x5e, '\x00', [@jumbo={0xc2, 0x4, 0x2efe}, @generic={0xa, 0xf5, "a0b5782a71db01d9a6df144ff97b055362aa3142bcf85fb1224440b627e6087c4a34badb9c5c72c20eccd9711e278fe0d5ac4a0b4db45e6b94b9b7da5883a7d5cc2a65d876f054fd0cc90e3458f4dfcf81ec4f8a5d3b5b6ae8e6e4f1c67b1c8c569625c314c8271141bb217a2e6f85c97e6b9b28133fc07f4c7f1f59ac4b15c73fd0e229789d12e8a82afe8d6f01f07cda12734b05978464cac31e8d10f25603a73c7ec60b7e62df5965d7fa2f108f60192ced5e01f4d508aab6451488c94860ec1e01fdbcb831d527565e626e9fc72d2734f7562c15b56c509e4d046c512ecfe0da1864777fe947ad28b34821d272c3c1cf84863e"}, @generic={0x7, 0xfc, "39ddf9212f302824dfc0bd7314ddb4e2bcc06972e14911f5403fdc39da4899b85e775cbb2071f75ea4b7129516a84863748449f52219e971818c1fb0e4f6ae89a2f9c83423bc69c7279cd67b4a090209409ac3f956760709c85986060ceaaaad649590cbafb0259029c5330b46dd1b819846018d4d5f6f44b77eff552f200d9dc54130dfe8a25a49cb9516214f2f4f57c00d8dfd95884e75a125b6bbf1f0de51eb6eeb9038725a455fff95e602c66fa95d1928ca81b9dab5bf14da9e8761efd90dfe8b6a4480e276cfecdf496e782a9bb377684c666edde56fbd29b9dca8e672401a729f16205f759378ce620c7b47a5f65a732803eb354d1dcddc9c"}, @pad1, @hao={0xc9, 0x10, @private2}, @generic={0x18, 0xd9, "cacce1f028f9bf4a610acd580f0bdc39f7c23d838ad161a31008f42fb947a41e8bfe8e5dd4d177e14a2e79a0c7ad9f30153b2f05554535a12a863da9baa078970f11976f37b849d68ca063e24bddb0f09063afcea079e5c9332de52039a3286ae8f376e0f2e1898876555086944367a1c34cc2073b0ba129400e2108922bc45522058c33ada8fe2a00aadb070aa7da67e35928fb60c566f623c284ff243645cb3d6d7d87fcb881bb697dcde6b7362579a67e61a67dee7ee6261c5aa8dc1d4893c809d5e0a8f6b68f6b2bc88ed1d7e7c93ea81d4897558381a5"}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x81}]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x88}}}, @rthdr={{0x98, 0x29, 0x39, {0x2c, 0x10, 0x0, 0x8, 0x0, [@rand_addr=' \x01\x00', @private2={0xfc, 0x2, '\x00', 0x1}, @remote, @mcast2, @local, @mcast1, @ipv4={'\x00', '\xff\xff', @empty}, @loopback]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x3b8}}], 0x3f0}}, {{&(0x7f0000006740)={0xa, 0x4e21, 0x7d9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c, &(0x7f0000007a80)=[{&(0x7f0000006800)="c22c21c45fc1cebf0ccfcb64a2ffde5f95d46771c018dfd43f377155a71e3397f1523e690a75752b54e296d7c897eb3219aad6fc3dc29f25c8c85da2daaafd30479efb981d437c3f56aa6d2eb5791bdceee72a810cfbf2570ef4df192dfdca2e929b64ba12577140f4a80408de5d4b46154dd4cd483e", 0x76}, {&(0x7f0000006900)="02110870a8eaf35319e250e6d2d5f4b3c90ccd1084a1aef3091636ef2ccff14072c9fb19dc8d5fad8c5d5fcf920af7817effe359d9289f8b778cc365bfbff9c8ceeecf923124309ffcc196e7f971ec01cc3f56bcc45086ce20ccc516cbfae1183f7986522eb6587cc379dc740f9ad131144b55d34a982642f35f7904f091a03be5dfe8bd1d4bdf47ac8ed8669d122c2e6af507abbbb8850b4e9f46e5467e77e02760740a4fc060c663ff435ffc1a6febbdc9dd07e0915285984c5a699a214a06ff297d1d4f6b4581627144b50bce45a7b2d2", 0xd2}, {&(0x7f0000006a00)="3d932972397156604fa6125c5b28858f18a1dc22c416b0c79b2db4f87a774fbfd3dffb5f5a75b3ef7d8574e0e249102649f573f321f20858dc9f44afd2cd5261acf6628f61297fed5a1abc2e7a0ca71d3dcd8008af1ff8f4808726d87575d7744d3ad3", 0x63}], 0x3, &(0x7f00000053c0)=ANY=[@ANYBLOB="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"], 0x280}}, {{&(0x7f0000007d80)={0xa, 0x4e20, 0x80000001, @private2, 0x80000001}, 0x1c, &(0x7f0000007e00), 0x0, &(0x7f0000007e40)}}], 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="010000000000000000001200000008000300", @ANYRES32=r3, @ANYBLOB="0a00060008021100000100000c004300d2"], 0x34}}, 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r4, 0xc0403d08, &(0x7f0000000280)) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) 927.338993ms ago: executing program 4 (id=410): ioprio_set$pid(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000140)=[0x0], 0x0, 0x0, &(0x7f0000000200), 0x0, 0x10, &(0x7f0000000480), &(0x7f00000002c0), 0x8, 0x8a, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000670000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) syz_emit_ethernet(0xfe53, &(0x7f0000000440)={@broadcast, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x88, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @parameter_prob={0xc, 0x0, 0x0, 0x0, 0xb, 0x3, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast2}}}}}}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000340)=""/69, 0x623c41ea}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/disk', 0x169a82, 0x0) sendfile(r2, r2, 0x0, 0x30) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'syz_tun\x00'}) socket$inet_sctp(0x2, 0x400000000001, 0x84) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000084000000b7000000000000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb010509000b000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000800)) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="043ef50d"], 0xf8) syz_io_uring_setup(0x5e2, &(0x7f00000003c0), &(0x7f0000000040)=0x0, &(0x7f0000000180)) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000106010100000000000000f4ff00"/28], 0x1c}}, 0x0) syz_io_uring_submit(r6, 0x0, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r8, 0x80045530, &(0x7f00000000c0)=""/87) io_uring_enter(0xffffffffffffffff, 0xa3d, 0x0, 0x0, 0x0, 0x0) 511.419268ms ago: executing program 0 (id=411): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020100000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c0000001a000100000000000000000002000000000000000000000008001900", @ANYRES32=0x0, @ANYBLOB="082d9d7f00000027271e2afa2058d0044839", @ANYRES32=0x0, @ANYBLOB], 0x2c}}, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000500)=""/164, 0xa4, 0x0, &(0x7f0000000240)=""/7, 0x7}}, 0x10) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @auto=[0x62, 0x66, 0x30, 0x33, 0x65, 0x35, 0x34, 0x31, 0x32, 0x30, 0x36, 0x62, 0x33, 0x33, 0x63, 0x61]}, &(0x7f0000000080)={0x0, "5d9bc136c963254c661fb620148b6f72ca6ae2a44829bfa79ec13499f8ec9077d85d879711d98bb1687ad36dfe5f14a7b0ce15c1e6be0e7ecabfdfde0dfa00b1"}, 0x48, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r5 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "8cae5c2ba870cf8332c44080390ccfab55a54fcdb1e936e9f7cb93da03274b08aa62ae5494c2171c241f22fe0a4229b07a204683ae863556b3b5a0e2f3515ee2"}, 0x48, 0xfffffffffffffffc) keyctl$KEYCTL_WATCH_KEY(0x20, r5, r3, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r2, r3, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000600), 0x67, 0x8000) r6 = openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) pwritev(r6, &(0x7f00000003c0), 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xd77546ea) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a60000000160a01010000000000000000020000000900020073797a31000000000c00054000000000000000032c000380080002400000000008000140000000001800038014000100776c616e3000000000000000000000000800074000000001140000001100010000000000000000000000001a"], 0x88}}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r7, 0x0, 0x275a, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x14966b1b6ad12b53, 0x12, 0x9, 0x5, 0x0, @loopback, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x0, 0x10, 0x9}}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0x10}, 0x90) r8 = syz_open_dev$sndctrl(&(0x7f00000000c0), 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYRESHEX, @ANYRESDEC=r0, @ANYRES64=r2, @ANYRESOCT=r4, @ANYRESHEX=r1, @ANYRES8=0x0, @ANYRESDEC=r1], 0x0}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r8, 0xc4c85513, &(0x7f0000000080)={0x4, 0x0, 0x7, 0x0, 'syz1\x00', 0x3}) 504.740599ms ago: executing program 1 (id=412): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) sched_setscheduler(0x0, 0x6, &(0x7f00000000c0)=0x7) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r1, &(0x7f0000009780)={0x2020}, 0x2020) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000100)={0x10, 0xffffffda, 0x3}, 0x10) gettid() r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close(r3) inotify_init1(0x0) read(r3, 0x0, 0x2600) read$msr(0xffffffffffffffff, &(0x7f0000019680)=""/102392, 0x18ff8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_create(0x0, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000004, 0x4000010, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r4, 0x6, 0x24, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2000, 0x1) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x62) fcntl$setlease(r5, 0x400, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) 483.079702ms ago: executing program 2 (id=413): r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendmmsg$unix(r0, &(0x7f0000002fc0)=[{{0x0, 0x13, &(0x7f0000000140)=[{&(0x7f0000000200)="643c87cf2bd21d995e613d73613b1e78334efea0", 0x14}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 259.36191ms ago: executing program 2 (id=414): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = getpid() process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000580), &(0x7f00000003c0), &(0x7f0000000400)={0x0, "a754900b76d1ffbae49d53805d9a500bf282eb34c09e735cf630efc4cf915adc6dc55d524a7f5a5a1c334efedb5e2b94ae1a66c19cbf9264ecbaffea1056dc96"}, 0x48, r1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x20040, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/dev\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000100)=""/4096, 0x1004}], 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = syz_usb_connect$uac1(0x0, 0xa4, &(0x7f00000000c0)=ANY=[@ANYBLOB="2a01000020000040b708000000000000030109029200030172e5000904000000010100000a24010000000201020c0d24070000030769dc000049c40c240000e9fffff5ffffffff092403f3ff000005024524", @ANYRES8=r2, @ANYBLOB="05"], 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000280)={0x14, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0003040000002203"]}, 0x0) syz_usb_control_io$uac1(r4, &(0x7f0000000680)={0x14, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="00032a0000002a03"]}, 0x0) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) io_submit(0x0, 0x0, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r5, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) request_key(0x0, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r6, r1) ftruncate(0xffffffffffffffff, 0x2000009) r7 = socket(0xa, 0x3, 0x4) ioctl$sock_SIOCBRDELBR(r7, 0x89a2, &(0x7f0000000880)='veth0_virt_wifi\x00') r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r8, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x32) sendmmsg$sock(r8, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 0s ago: executing program 1 (id=415): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)='%pi6 \x00'}, 0x20) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40082, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) connect$qrtr(0xffffffffffffffff, &(0x7f0000000080)={0x2a, 0xffffffff, 0xfffffffe}, 0xc) mmap$dsp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9, 0x8010, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x4d) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, &(0x7f0000000040)={'team0\x00', 0x44}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000000)={0x9a, 0x80000009, 0x2, 0x1, 0x85}) socket$l2tp6(0xa, 0x2, 0x73) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x100, 0x1}, 0x70) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x7, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x0, 0x1}, 0xe) r2 = socket(0x10, 0x3, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r3, 0xc0182101, &(0x7f0000000180)={r4}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000004c0)={0x0}) syz_open_dev$vim2m(&(0x7f0000000040), 0x7fff, 0x2) preadv(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000200)=""/152, 0x98}, {&(0x7f0000000540)=""/118, 0x76}, {&(0x7f0000000400)=""/103, 0x67}], 0x3, 0x19df, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000080)={r5, 0x3, r1}) connect$unix(r2, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0xffffff89) write(r2, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000003c0000000000000008000f0001000000", 0x24) pipe2$watch_queue(&(0x7f0000000040), 0x80) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): nk_file permissive=0 kern.info kernel: [ 196.757198][ T1100] vhci_hcd: stop threads Aug 4 16:05:56 syzkaller kern.info kernel: [ 196.777264][ T1100] vhci_hcd: release socket [ 196.861529][ T1100] vhci_hcd: disconnect device Aug 4 16:05:56 syzkaller kern.notice kernel: [ 196.789761][ T30] audit: type=1400 audit(1722787556.323:274): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:05:56 syzkaller kern.info kernel: [ 196.861529][ T1100] vhci_hcd: disconnect device [ 197.160042][ T30] audit: type=1400 audit(1722787556.323:275): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:05:56 syzkaller kern.notice kernel: [ 197.160042][ T30] audit: type=1400 audit(1722787556.323:275): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 197.255705][ T30] audit: type=1400 audit(1722787556.333:276): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:05:56 syzkaller kern.notice kernel: [ 197.255705][ T30] audit: type=1400 audit(1722787556.333:276): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 197.402915][ T30] audit: type=1400 audit(1722787556.473:277): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 197.424910][ C1] vkms_vblank_simulate: vblank timer overrun Aug 4 16:05:56 syzkaller kern.notice kernel: [ 197.402915][ T30] audit: type=1400 audit(1722787556.473:277): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:05:56 syzkaller kern.warn kernel: [ 197.424910][ C1] vkms_vblank_simulate: vblank timer overrun [ 197.632481][ T30] audit: type=1400 audit(1722787556.473:278): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 197.654651][ C1] vkms_vblank_simulate: vblank timer overrun Aug 4 16:05:57 syzkaller kern.notice kernel: [ 197.632481][ T30] audit: type=1400 audit(1722787556.473:278): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:05:57 syzkaller kern.warn kernel: [ 197.654651][ C1] vkms_vblank_simulate: vblank timer overrun [ 197.883707][ T30] audit: type=1400 audit(1722787556.743:279): avc: denied { module_request } for pid=5840 comm="syz.2.121" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 197.905799][ C1] vkms_vblank_simulate: vblank timer overrun Aug 4 16:05:57 syzkaller kern.notice kernel: [ 197.883707][ T30] audit: type=1400 audit(1722787556.743:279): avc: denied { module_request } for pid=5840 comm="syz.2.121" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclas Aug 4 16:05:57 syzkaller kern.warn kernel: [ 197.905799][ C1] vkms_vblank_simulate: vblank timer overrun [ 198.254826][ T30] audit: type=1400 audit(1722787556.743:280): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 198.278656][ T5860] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:05:57 syzkaller kern.notice kernel: [ 198.254826][ T30] audit: type=1400 audit(1722787556.743:280):[ 198.516956][ T30] audit: type=1400 audit(1722787556.803:281): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:05:57 syzkaller kern.err kernel: [ 198.278656][ T5860] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:05:58 syzkaller kern.notice kernel: [ 198.516956][ T30] audit: type=1400 audit(1722787556.803:281): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 198.854613][ T5863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5863 comm=syz.2.126 Aug 4 16:05:58 syzkaller kern.warn kernel: [ 198.854613][ T5863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5863 comm=syz.2.126 [ 199.234857][ T5870] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 199.241454][ T5870] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:05:58 syzkaller kern.info kernel: [ 199.234857][ T5870] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) Aug 4 16:05:58 syzkaller kern.info kernel: [ 199.241454][ T5870] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 199.300789][ T5870] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:05:59 syzkaller kern.info kernel: [ 199.300789][ T5870] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:05:59 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg[ 199.521945][ T1615] vhci_hcd: vhci_device speed not set : Connection refused Aug 4 16:05:59 syzkaller daemon.err dhcpcd[4883]: ps_root_recvmsgcb: failed to send message to pid 5425: Connection refused Aug 4 16:05:59 syzkaller kern.err kernel: [ 199.521945][ T1615] vhci_hcd: vhci_device speed not set [ 199.641046][ T1615] usb 17-1: new full-speed USB device number 2 using vhci_hcd Aug 4 16:05:59 syzkaller kern.info kernel: [ 199.641046][ T1615] usb 17-1: new full-speed USB device number 2 using vhci_hcd [ 199.966075][ T5872] vhci_hcd: connection reset by peer [ 199.988537][ T142] vhci_hcd: stop threads Aug 4 16:05:59 syzkaller kern.info kernel: [ 199.966075][ T5872] vhci_hcd: con[ 200.001430][ T142] vhci_hcd: release socket nection reset by peer Aug 4 16:05:59 syzkaller kern.info kernel: [ 199.988537][ T142] vhci_hcd: stop threads[ 200.015723][ T142] vhci_hcd: disconnect device Aug 4 16:05:59 syzkaller kern.info kernel: [ 200.001430][ T142] vhci_hcd: release socket Aug 4 16:05:59 syzkaller kern.info kernel: [ 200.015723][ T142] vhci_hcd: disconnect device [ 200.107842][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 [ 200.115126][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 Aug 4 16:05:59 syzkaller kern.warn kernel: [ 200.107842][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 Aug 4 16:05:59 syzkaller kern.warn kernel: [ 200.115126][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 Aug 4 16:05:59 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg: Connection refused Aug 4 16:05:59 syzkaller daemon.err dhcpcd[4883]: ps_root_recvmsgcb: failed to send message to pid 5434: Connection refused [ 200.282768][ T5298] vhci_hcd: vhci_device speed not set Aug 4 16:05:59 syzkaller kern.err kernel: [ 200.282768][ T5298] vhci_hcd: vhci_device speed not set [ 200.545461][ T30] kauditd_printk_skb: 80 callbacks suppressed [ 200.545486][ T30] audit: type=1400 audit(1722787560.093:362): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:00 syzkaller kern.warn kernel: [ 200.545461][ T30] kauditd_printk_skb: 80 callbacks suppressed Aug 4 16:06:00 syzkaller kern.notice kernel: [ 200.545486][ T30] audit: type=1400 audit(1722787560.093:362): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Aug 4 16:06:00 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg: Connection refused Aug 4 16:06:00 syzkaller daemon.err dhcpcd[4883]: ps_[ 200.665962][ T30] audit: type=1400 audit(1722787560.163:363): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 root_recvmsgcb: failed to send message to pid 5432: Connection refused Aug 4 16:06:00 syzkaller kern.notice kernel: [ 200.665962][ T30] audit: type=1400 audit(1722787560.163:363): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 200.775390][ T30] audit: type=1400 audit(1722787560.163:364): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 200.775390][ T30] audit: type=1400 audit(1722787560.163:364): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 200.888028][ T30] audit: type=1400 audit(1722787560.173:365): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 200.888028][ T30] audit: type=1400 audit(1722787560.173:365): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 201.040083][ T30] audit: type=1400 audit(1722787560.173:366): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 201.040083][ T30] audit: type=1400 audit(1722787560.173:366): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 201.134328][ T30] audit: type=1400 audit(1722787560.233:367): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 201.134328][ T30] audit: type=1400 audit(1722787560.233:367): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 201.219031][ T30] audit: type=1400 audit(1722787560.243:368): avc: denied { read } for pid=5879 comm="syz.4.131" dev="nsfs" ino=4026533135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 201.219031][ T30] audit: type=1400 audit(1722787560.243:368): avc: denied { read } for pid=5879 comm="syz.4.131" dev="nsfs" ino=4026533135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file per [ 201.293533][ T30] audit: type=1400 audit(1722787560.343:369): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 201.293533][ T30] audit: type=1400 audit(1722787560.343:369): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 201.389222][ T30] audit: type=1400 audit(1722787560.393:370): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:00 syzkaller kern.notice kernel: [ 201.389222][ T30] audit: type=1400 audit(1722787560.393:370): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 201.492738][ T30] audit: type=1400 audit(1722787560.463:371): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:01 syzkaller kern.notice kernel: [ 201.492738][ T30] audit: type=1400 audit(1722787560.463:371): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:02 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg: Connection refused Aug 4 16:06:02 syzkaller daemon.err dhcpcd[4883]: ps_root_recvmsgcb: failed to send message to pid 5442: Connection refused [ 203.196191][ T5905] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:06:02 syzkaller kern.err kernel: [ 203.196191][ T5905] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:06:02 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg: Connection refused Aug 4 16:06:02 syzkaller daemon.err dhcpcd[4883]: ps_root_recvmsgcb: failed to send message to pid 5441: Connection refused Aug 4 16:06:03 syzkaller daemon.err dhcpcd[4883]: ps_sendpsmmsg: Connection refused Aug 4 16:06:03 syzkaller daemon.err dhcpcd[4883]: ps_root_recvmsgcb: failed to send message to pid 5443: Connection refused [ 203.804178][ T5915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5915 comm=syz.0.143 Aug 4 16:06:03 syzkaller kern.warn kernel: [ 203.804178][ T5915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5915 comm=syz.0.143 [ 204.821236][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:04 syzkaller kern.err kernel: [ 204.821236][ T1615] vhci_hcd: vhci_device speed not set [ 205.597242][ T30] kauditd_printk_skb: 122 callbacks suppressed [ 205.597259][ T30] audit: type=1400 audit(1722787565.143:494): avc: denied { bpf } for pid=5928 comm="syz.4.148" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Aug 4 16:06:05 syzkaller kern.warn kernel: [ 205.597242][ T30] kauditd_printk_skb: 122 callbacks suppressed Aug 4 16:06:05 syzkaller kern.notice kernel: [ 205.597259][ T30] audit: type=1400 audit(1722787565.143:494): avc: denied { bpf } for pid=5928 comm="syz.4.148" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive [ 205.759681][ T30] audit: type=1400 audit(1722787565.173:495): avc: denied { prog_load } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:05 syzkaller kern.notice kernel: [ 205.759681][ T30] audit: type=1400 audit(1722787565.173:495): avc: denied { prog_load } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 205.844786][ T30] audit: type=1400 audit(1722787565.173:496): avc: denied { prog_load } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:05 syzkaller kern.notice kernel: [ 205.844786][ T30] audit: type=1400 audit(1722787565.173:496): avc: denied { prog_load } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 205.930540][ T30] audit: type=1400 audit(1722787565.173:497): avc: denied { checkpoint_restore } for pid=5928 comm="syz.4.148" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 Aug 4 16:06:05 syzkaller kern.notice kernel: [ 205.930540][ T30] audit: type=1400 audit(1722787565.173:497): avc: denied { checkpoint_restore } for pid=5928 comm="syz.4.148" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capabil [ 205.979088][ T30] audit: type=1400 audit(1722787565.173:498): avc: denied { create } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Aug 4 16:06:05 syzkaller kern.notice kernel: [ 205.979088][ T30] audit: type=1400 audit(1722787565.173:498): avc: denied { create } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= [ 206.060905][ T30] audit: type=1400 audit(1722787565.183:499): avc: denied { create } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 206.087493][ T30] audit: type=1400 audit(1722787565.193:500): avc: denied { read write } for pid=5928 comm="syz.4.148" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 206.087586][ T30] audit: type=1400 audit(1722787565.243:501): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.087672][ T30] audit: type=1400 audit(1722787565.263:502): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 206.087762][ T30] audit: type=1400 audit(1722787565.263:503): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:05 syzkaller kern.notice kernel: [ 206.060905][ T30] audit: type=1400 audit(1722787565.183:499): avc: denied { create } for pid=5928 comm="syz.4.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Aug 4 16:06:05 syzkaller kern.notice kernel: [ 206.087493][ T30] audit: type=1400 audit(1722787565.193:500): avc: denied { read write } for pid=5928 comm="syz.4.148" name="raw-gadget" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:d Aug 4 16:06:05 syzkaller kern.notice kernel: [ 206.087586][ T30] audit: type=1400 audit(1722787565.243:501): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix Aug 4 16:06:05 syzkaller kern.notice kernel: [ 206.087672][ T30] audit: type=1400 audit(1722787565.263:502): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:05 syzkaller kern.notice kernel: [ 206.087762][ T30] audit: type=1400 audit(1722787565.263:503): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 208.160485][ T5952] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:06:07 syzkaller kern.err kernel: [ 208.160485][ T5952] devtmpfs: Unknown parameter 'posixacl' [ 209.514120][ T5962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5962 comm=syz.2.160 Aug 4 16:06:09 syzkaller kern.warn kernel: [ 209.514120][ T5962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=5962 comm=syz.2.160 [ 210.082212][ T5226] Bluetooth: hci3: SCO packet for unknown connection handle 968 [ 210.625614][ T30] kauditd_printk_skb: 97 callbacks suppressed [ 210.625640][ T30] audit: type=1400 audit(1722787570.173:601): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:10 syzkaller kern.err kernel: [ 210.082212][ T5226] Bluetooth: hci3: SCO packet for unknown connection handle 968 Aug 4 16:06:10 syzkaller kern.warn kernel: [ 210.625614][ T30] kauditd_printk_skb: 97 callbacks suppressed Aug 4 16:06:10 syzkaller kern.notice kernel: [ 210.625640][ T30] audit: type=1400 audit(1722787570.173:601): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 210.743515][ T30] audit: type=1400 audit(1722787570.233:602): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 210.743515][ T30] audit: type=1400 audit(1722787570.233:602): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sys[ 210.799204][ T30] audit: type=1400 audit(1722787570.243:603): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:10 syzkaller kern.notice kernel: [ 210.799204][ T30] audit: type=1400 audit(1722787570.243:603): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 210.998524][ T30] audit: type=1400 audit(1722787570.243:604): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 210.998524][ T30] audit: type=1400 audit(1722787570.243:604): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 211.140595][ T30] audit: type=1400 audit(1722787570.243:605): avc: denied { create } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.140595][ T30] audit: type=1400 audit(1722787570.243:605): avc: denied { create } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 211.207720][ T30] audit: type=1400 audit(1722787570.243:606): avc: denied { execmem } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.207720][ T30] audit: type=1400 audit(1722787570.243:606): avc: denied { execmem } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permiss[ 211.267057][ T30] audit: type=1400 audit(1722787570.293:607): avc: denied { map_create } for pid=5973 comm="syz.4.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 ive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.267057][ T30] audit: type=1400 audit(1722787570.293:607): avc: denied { map_create } for pid=5973 comm="syz.4.164" scontext=root:sysadm_r:sysadm_t tco[ 211.305955][ T30] audit: type=1400 audit(1722787570.333:608): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ntext=root:sysadm_r:sysadm_t tclass=bpf permissi[ 211.332714][ T30] audit: type=1400 audit(1722787570.343:609): avc: denied { create } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 ve=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.305955][ T30] audit: type=1400 audit(1722787570.333:608): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.332714][ T30] audit: type=1400 audit(1722787570.343:609): avc: denied { create } for pid=5971 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 211.401539][ T30] audit: type=1400 audit(1722787570.373:610): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:10 syzkaller kern.notice kernel: [ 211.401539][ T30] audit: type=1400 audit(1722787570.373:610): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 212.930637][ T6000] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 212.937217][ T6000] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:12 syzkaller kern.i[ 212.949070][ T6000] vhci_hcd vhci_hcd.0: Device attached nfo kernel: [ 212.930637][ T6000] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) Aug 4 16:06:12 syzkaller kern.info kernel: [ 212.937217][ T6000] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:12 syzkaller kern.info kernel: [ 212.949070][ T6000] vhci_hcd vhci_hcd.0: Device attached [ 213.162276][ T5270] vhci_hcd: vhci_device speed not set Aug 4 16:06:12 syzkaller kern.err kernel: [ 213.162276][ T5270] vhci_hcd: vhci_device speed not set [ 213.244094][ T5270] usb 11-1: new full-speed USB device number 2 using vhci_hcd Aug 4 16:06:12 syzkaller kern.info kernel: [ 213.244094][ T5270] usb 11-1: new full-speed USB device number 2 using vhci_hcd [ 213.750754][ T6001] vhci_hcd: connection reset by peer [ 213.777961][ T142] vhci_hcd: stop threads [ 213.784510][ T142] vhci_hcd: release socket [ 213.789348][ T142] vhci_hcd: disconnect device Aug 4 16:06:13 syzkaller kern.info kernel: [ 213.750754][ T6001] vhci_hcd: connection reset by peer Aug 4 16:06:13 syzkaller kern.info kernel: [ 213.777961][ T142] vhci_hcd: stop threads Aug 4 16:06:13 syzkaller kern.info kernel: [ 213.784510][ T142] vhci_hcd: release socket Aug 4 16:06:13 syzkaller kern.info kernel: [ 213.789348][ T142] vhci_hcd: disconnect device [ 215.709416][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 215.709441][ T30] audit: type=1400 audit(1722787575.253:735): avc: denied { read } for pid=6025 comm="syz.0.182" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 Aug 4 16:06:15 syzkaller kern.warn kernel: [ 215.709416][ T30] kauditd_printk_skb: 124 callbacks suppressed Aug 4 16:06:15 syzkaller kern.notice kernel: [ 215.709441][ T30] audit: type=1400 audit(1722787575.253:735): avc: denied { read } for pid=6025 comm="syz.0.182" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_devic [ 215.814336][ T30] audit: type=1400 audit(1722787575.283:736): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 215.814336][ T30] audit: type=1400 audit(1722787575.283:736): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 215.901936][ T30] audit: type=1400 audit(1722787575.283:737): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 215.901936][ T30] audit: type=1400 audit(1722787575.283:737): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 215.966719][ T6028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6028 comm=syz.0.182 [ 215.991511][ T30] audit: type=1400 audit(1722787575.323:738): avc: denied { execmem } for pid=6025 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 4 16:06:15 syzkaller kern.warn kernel: [ 215.966719][ T6028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6028 comm=syz.0.182 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 215.991511][ T30] audit: type=1400 audit(1722787575.323:738): avc: denied { execmem } for pid=6025 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 216.104714][ T30] audit: type=1400 audit(1722787575.363:739): avc: denied { create } for pid=6027 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 216.104714][ T30] audit: type=1400 audit(1722787575.363:739): avc: denied { create } for pid=6027 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= [ 216.250398][ T30] audit: type=1400 audit(1722787575.383:740): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 216.250398][ T30] audit: type=1400 audit(1722787575.383:740): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 216.334986][ T30] audit: type=1400 audit(1722787575.393:741): avc: denied { prog_load } for pid=6025 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 216.334986][ T30] audit: type=1400 audit(1722787575.393:741): avc: denied { prog_load } for pid=6025 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.422629][ T30] audit: type=1400 audit(1722787575.413:742): avc: denied { read } for pid=6023 comm="syz.3.181" dev="nsfs" ino=4026533975 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 4 16:06:15 syzkaller kern.notice kernel: [ 216.422629][ T30] audit: type=1400 audit(1722787575.413:742): avc: denied { read } for pid=6023 comm="syz.3.181" dev="nsfs" ino=4026533975 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file per [ 216.496494][ T30] audit: type=1400 audit(1722787575.413:743): avc: denied { create } for pid=6023 comm="syz.3.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Aug 4 16:06:16 syzkaller kern.notice kernel: [ 216.496494][ T30] audit: type=1400 audit(1722787575.413:743): avc: denied { create } for pid=6023 comm="syz.3.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= [ 216.639334][ T30] audit: type=1400 audit(1722787575.473:744): avc: denied { read } for pid=6027 comm="syz.1.183" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 Aug 4 16:06:16 syzkaller kern.notice kernel: [ 216.639334][ T30] audit: type=1400 audit(1722787575.473:744): avc: denied { read } for pid=6027 comm="syz.1.183" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t [ 217.470798][ T6044] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 217.477379][ T6044] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:17 syzkaller kern.info kernel: [ 217.470798][ T6044] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) Aug 4 16:06:17 syzkaller kern.info kernel: [ 217.477379][ T6044] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 217.543684][ T6044] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:17 syzkaller kern.info kernel: [ 217.543684][ T6044] vhci_hcd vhci_hcd.0: Device attached [ 217.741662][ T5298] vhci_hcd: vhci_device speed not set Aug 4 16:06:17 syzkaller kern.err kernel: [ 217.741662][ T5298] vhci_hcd: vhci_device speed not set [ 217.851222][ T5298] usb 15-1: new full-speed USB device number 2 using vhci_hcd Aug 4 16:06:17 syzkaller kern.info kernel: [ 217.851222][ T5298] usb 15-1: new full-speed USB device number 2 using vhci_hcd [ 218.203383][ T6046] vhci_hcd: connection reset by peer [ 218.224624][ T2988] vhci_hcd: stop threads Aug 4 16:06:17 syzkaller kern.info kernel: [ 218.203383][ T6046] vhci_hcd: connection reset by peer [ 218.261171][ T2988] vhci_hcd: release socket [ 218.286106][ T2988] vhci_hcd: disconnect device Aug 4 16:06:17 syzkaller kern.info kernel: [ 218.224624][ T2988] vhci_hcd: stop threads Aug 4 16:06:17 syzkaller kern.info kernel: [ 218.261171][ T2988] vhci_hcd: release socket Aug 4 16:06:17 syzkaller kern.info kernel: [ 218.286106][ T2988] vhci_hcd: disconnect device [ 218.423852][ T5270] vhci_hcd: vhci_device speed not set Aug 4 16:06:17 syzkaller kern.err kernel: [ 218.423852][ T5270] vhci_hcd: vhci_device speed not set [ 220.842062][ T30] kauditd_printk_skb: 102 callbacks suppressed [ 220.842085][ T30] audit: type=1400 audit(1722787580.393:847): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:20 syzkaller kern.warn kernel: [ 220.842062][ T30] kauditd_printk_skb: 102 callbacks suppressed Aug 4 16:06:20 syzkaller kern.notice kernel: [ 220.842085][ T30] audit: type=1400 audit(1722787580.393:847): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 220.932284][ T30] audit: type=1400 audit(1722787580.403:848): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:20 syzkaller kern.notice kernel: [ 220.932284][ T30] audit: type=1400 audit(1722787580.403:848): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fix [ 220.990580][ T30] audit: type=1400 audit(1722787580.443:849): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:20 syzkaller kern.notice kernel: [ 220.990580][ T30] audit: type=1400 audit(1722787580.443:849): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sys[ 221.033990][ T30] audit: type=1400 audit(1722787580.443:850): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.033990][ T30] audit: type=1400 audit(1722787580.443:850): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 221.105639][ T30] audit: type=1400 audit(1722787580.503:851): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 221.144175][ T30] audit: type=1400 audit(1722787580.533:852): avc: denied { create } for pid=6069 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.105639][ T30] audit: type=1400 audit(1722787580.503:851): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:objec[ 221.197060][ T30] audit: type=1400 audit(1722787580.543:853): avc: denied { create } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 t_r:var_t tclass=l Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.144175][ T30] audit: type=1400 audit([ 221.225750][ T30] audit: type=1400 audit(1722787580.563:854): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1722787580.533:852): avc: denied { create } for pid=6069 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tco[ 221.256745][ T30] audit: type=1400 audit(1722787580.583:855): avc: denied { create } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 ntext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.197060][ T30] audit: type=1400 audit(1722787580.543:853): avc: denied { create } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.225750][ T30] audit: type=1400 audit(1722787580.563:854): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.256745][ T30] audit: type=1400 audi[ 221.338586][ T30] audit: type=1400 audit(1722787580.583:856): avc: denied { execmem } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 t(1722787580.583:855): avc: denied { create } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Aug 4 16:06:20 syzkaller kern.notice kernel: [ 221.338586][ T30] audit: type=1400 audit(1722787580.583:856): avc: denied { execmem } for pid=6070 comm="syz.3.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 222.249424][ T6085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6085 comm=syz.1.200 Aug 4 16:06:21 syzkaller kern.warn kernel: [ 222.249424][ T6085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6085 comm=syz.1.200 [ 222.857559][ T6089] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 222.864166][ T6089] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:22 syzkaller kern.info kernel: [ 222.857559][ T6089] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) Aug 4 16:06:22 syzkaller kern.info kernel: [ 222.864166][ T6089] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 222.930578][ T6089] vhci_hcd vhci_hcd.0: Device attached [ 222.991330][ T5298] vhci_hcd: vhci_device speed not set Aug 4 16:06:22 syzkaller kern.info kernel: [ 222.930578][ T6089] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:22 syzkaller kern.err kernel: [ 222.991330][ T5298] vhci_hcd: vhci_device speed not set [ 223.151545][ T5270] vhci_hcd: vhci_device speed not set Aug 4 16:06:22 syzkaller kern.err kernel: [ 223.151545][ T5270] vhci_hcd: vhci_device speed not set [ 223.251073][ T5270] usb 9-1: new full-speed USB device number 4 using vhci_hcd Aug 4 16:06:22 syzkaller kern.info kernel: [ 223.251073][ T5270] usb 9-1: new full-speed USB device number 4 using vhci_hcd [ 223.606177][ T6091] vhci_hcd: connection reset by peer Aug 4 16:06:23 syzkaller kern.info kernel: [ 223.606177][ T6091] vhci_hcd: connection reset by peer [ 223.650861][ T5660] vhci_hcd: stop threads [ 223.663926][ T5660] vhci_hcd: release socket Aug 4 16:06:23 syzkaller kern.info kernel: [ 223.650861][ T5660] vhci_hcd: stop threads Aug 4 16:06:23 syzka[ 223.701218][ T5660] vhci_hcd: disconnect device ller kern.info kernel: [ 223.663926][ T5660] vhci_hcd: release socket Aug 4 16:06:23 syzkaller kern.info kernel: [ 223.701218][ T5660] vhci_hcd: disconnect device [ 226.081504][ T30] kauditd_printk_skb: 107 callbacks suppressed [ 226.081528][ T30] audit: type=1400 audit(1722787585.623:964): avc: denied { read } for pid=6113 comm="syz.0.209" dev="nsfs" ino=4026532859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 4 16:06:25 syzkaller kern.w[ 226.118039][ T30] audit: type=1400 audit(1722787585.663:965): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 arn kernel: [ 226.081504][ T30] kauditd_printk_skb: 107 callb[ 226.145201][ T30] audit: type=1400 audit(1722787585.663:966): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 acks suppressed Aug 4 16:06:25 syzkaller kern.notice kernel: [ 226.081528][ T30] audit: type=1400 audit(1722787585.623:964): avc: denied { read } for pid=6113 comm="syz.0.209" dev="nsfs" ino=4026532859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file [ 226.193153][ T30] audit: type=1400 audit(1722787585.663:967): avc: denied { create } for pid=6113 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 per Aug 4 16:06:25 syzkaller kern.notice kernel: [ 226.118039][ T30] audit: type=1400 audit(1722787585.663:965): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:25 syzkaller kern.notice kernel: [ 226.145201][ T30] audit: type=1400 audit(1722787585.663:966): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug[ 226.261603][ T30] audit: type=1400 audit(1722787585.693:968): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 4 16:06:25 syzkaller kern.notice kernel: [ 226.193153][ T30] audit: type=1400 audit(1722787585.663:967): avc: denied { create } for pid=6113 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive= Aug 4 16:06:25 syzkaller kern.notice kernel: [ 226.261603][ T30] audit: type=1400 audit(1722787585.693:968): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 226.372777][ T30] audit: type=1400 audit(1722787585.723:969): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:25 syzkaller kern.notice kernel: [ 226.372777][ T30] audit: type=1400 audit(1722787585.723:969): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 226.447238][ T30] audit: type=1400 audit(1722787585.773:971): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:26 syzkaller kern.notice kernel: [ [ 226.478333][ T30] audit: type=1400 audit(1722787585.763:970): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 226.447238][ T30] audit: type=1400 audit(1722787585.773:971): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:26 syzkaller kern.notice kernel[ 226.525170][ T30] audit: type=1400 audit(1722787585.833:972): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : [ 226.478333][ T30] audit: type=1400 audit(1722787585.763:970): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext[ 226.565307][ T30] audit: type=1400 audit(1722787585.943:973): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 =system_u:object_r:fix Aug 4 16:06:26 syzkaller kern.notice kernel: [ 226.525170][ T30] audit: type=1400 audit(1722787585.833:972): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l Aug 4 16:06:26 syzkaller kern.notice kernel: [ 226.565307][ T30] audit: type=1400 audit(1722787585.943:973): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=l [ 227.464999][ T6137] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 227.471619][ T6137] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:27 syzkaller kern.info kernel: [ 227.464999][ T6137] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) Aug 4 16:06:27 syzkaller kern.info kernel: [ 227.471619][ T6137] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 227.506136][ T6137] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:27 syzkaller kern.info kernel: [ 227.506136][ T6137] vhci_hcd vhci_hcd.0: Device attached [ 227.608298][ T6142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6142 comm=syz.0.217 Aug 4 16:06:27 syzkaller kern.warn kernel: [ 227.608298][ T6142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6142 comm=syz.0.217 [ 227.731337][ T5268] vhci_hcd: vhci_device speed not set Aug 4 16:06:27 syzkaller kern.err kernel: [ 227.731337][ T5268] vhci_hcd: vhci_device speed not set [ 227.801697][ T5268] usb 15-1: new full-speed USB device number 3 using vhci_hcd Aug 4 16:06:27 syzkaller kern.info kernel: [ 227.801697][ T5268] usb 15-1: new full-speed USB device number 3 using vhci_hcd [ 228.242495][ T6139] vhci_hcd: connection reset by peer [ 228.260891][ T5660] vhci_hcd: stop threads Aug 4 16:06:27 syzkaller kern.info kernel: [ 228.242495][ T6139] vhci_hcd: connection reset by peer Aug 4 16:06:27 syzkaller[ 228.276784][ T5660] vhci_hcd: release socket kern.info kernel: [ 228.260891][ T5660] vhci_hcd: stop threads [ 228.299820][ T5660] vhci_hcd: disconnect device Aug 4 16:06:27 syzkaller kern.info kernel: [ 228.276784][ T5660] vhci_hcd: release socket Aug 4 16:06:27 syzkaller kern.info kernel: [ 228.299820][ T5660] vhci_hcd: disconnect device [ 228.432075][ T5270] vhci_hcd: vhci_device speed not set Aug 4 16:06:27 syzkaller kern.err kernel: [ 228.432075][ T5270] vhci_hcd: vhci_device speed not set [ 231.274619][ T30] kauditd_printk_skb: 116 callbacks suppressed [ 231.274637][ T30] audit: type=1400 audit(1722787590.823:1090): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:30 syzkaller kern.warn kernel: [ 231.274619][ T30] kauditd_printk_skb: 116 callbacks suppressed Aug 4 16:06:30 syzkaller kern.notice kernel: [ 231.274637][ T30] audit: type=1400 audit(1722787590.823:1090): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 231.426761][ T30] audit: type=1400 audit(1722787590.883:1091): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:30 syzkaller kern.notice kernel: [ 231.426761][ T30] audit: type=1400 audit(1722787590.883:1091): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 231.556779][ T30] audit: type=1400 audit(1722787590.883:1092): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.556779][ T30] audit: type=1400 audit(1722787590.883:1092): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 231.623495][ T30] audit: type=1400 audit(1722787590.993:1093): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 231.696334][ T30] audit: type=1400 audit(1722787591.013:1094): avc: denied { mounton } for pid=6170 comm="syz.3.227" path="/proc/85/task" dev="proc" ino=10228 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.623495][ T30] audit: type=1400 audit(1722787590.993:1093): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.696334][ 231.771223][ T30] audit: type=1400 audit(1722787591.013:1095): avc: denied { map_create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ T30] audit: type=1400 audit(1722787591.013:1094): avc: denied { mounton } for pid=6170 comm="syz.3.227" path="/proc/85/task" dev="proc" ino=10228 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.771223][ T30] audit: type=1400 audit(1722787591.013:1095): avc: denied { map_create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.854843][ T30] audit: type=1400 audit(1722787591.023:1096): avc: denied { read write } for pid=6170 comm="syz.3.227" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.854843][ T30] audit: type=1400 audit(1722787591.023:1096): avc: denied { read write } for pid=6170 comm="syz.3.227" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_dev [ 231.929941][ T30] audit: type=1400 audit(1722787591.023:1097): avc: denied { create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.929941][ T30] audit: type=1400 audit(1722787591.023:1097)[ 231.971520][ T30] audit: type=1400 audit(1722787591.033:1098): avc: denied { create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 : avc: denied { create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 231.971520][ T30] audit: type=1400 audit(1722787591.033:1098): avc: denied { create } for pid=6170 comm="syz.3.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 232.038896][ T30] audit: type=1400 audit(1722787591.043:1099): avc: denied { read } for pid=6170 comm="syz.3.227" dev="nsfs" ino=4026533975 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 Aug 4 16:06:31 syzkaller kern.notice kernel: [ 232.038896][ T30] audit: type=1400 audit(1722787591.043:1099): avc: denied { read } for pid=6170 comm="syz.3.227" dev="nsfs" ino=4026533975 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file pe [ 232.717351][ T6183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6183 comm=syz.3.231 Aug 4 16:06:32 syzkaller kern.warn kernel: [ 232.717351][ T6183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6183 comm=syz.3.231 [ 232.909229][ T6168] Bluetooth: hci0: command 0x0406 tx timeout [ 232.909256][ T5220] Bluetooth: hci4: command 0x0406 tx timeout [ 232.916120][ T6168] Bluetooth: hci2: command 0x0406 tx timeout [ 232.923161][ T5220] Bluetooth: hci1: command 0x0406 tx timeout [ 232.928328][ T6168] Bluetooth: hci3: command 0x0406 tx timeout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.909229][ T6168] Bluetooth: hci0: command 0x0406 tx timeout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.909256][ T5220] Bluetooth: hci4: command 0x0406 tx timeout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.916120][ T6168] Bluetooth: hci2: command 0x0406 tx timeout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.923161][ T5220] Bluetooth: hci1: command 0x0406 tx timeout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.928328][ T6168] Bluetooth: hci3: command 0x0406 tx tim[ 232.991236][ T5268] vhci_hcd: vhci_device speed not set eout Aug 4 16:06:32 syzkaller kern.err kernel: [ 232.991236][ T5268] vhci_hcd: vhci_device speed not set [ 233.906138][ T6190] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 233.912718][ T6190] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:33 syzkaller kern.info kernel: [ 233.906138][ T6190] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) Aug 4 16:06:33 syzkaller kern.info kernel: [ 233.912718][ T6190] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 233.963687][ T6190] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:33 syzkaller kern.info kernel: [ 233.963687][ T6190] vhci_hcd vhci_hcd.0: Device attached [ 234.201253][ T25] vhci_hcd: vhci_device speed not set Aug 4 16:06:33 syzkaller kern.err kernel: [ 234.201253][ T25] vhci_hcd: vhci_device speed not set [ 234.322061][ T25] usb 11-1: new full-speed USB device number 3 using vhci_hcd Aug 4 16:06:33 syzkaller kern.info kernel: [ 234.322061][ T25] usb 11-1: new full-speed USB device number 3 using vhci_hcd [ 234.658706][ T6192] vhci_hcd: connection reset by peer Aug 4 16:06:34 syzkaller kern.info kernel: [ 234.658706][ T6192] vhci_hcd: connection reset by[ 234.686299][ T2988] vhci_hcd: stop threads peer [ 234.698215][ T2988] vhci_hcd: release socket Aug 4 16:06:34 syzkaller kern.i[ 234.706154][ T2988] vhci_hcd: disconnect device nfo kernel: [ 234.686299][ T2988] vhci_hcd: stop threads Aug 4 16:06:34 syzkaller kern.info kernel: [ 234.698215][ T2988] vhci_hcd: release socket Aug 4 16:06:34 syzkaller kern.info kernel: [ 234.706154][ T2988] vhci_hcd: disconnect device [ 236.309367][ T30] kauditd_printk_skb: 111 callbacks suppressed [ 236.309391][ T30] audit: type=1400 audit(1722787595.853:1211): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:35 syzkaller kern.warn kernel: [ 236.309367][ T30] kauditd_printk_skb: 111 callbacks suppressed Aug 4 16:06:35 syzkaller kern.notice kernel: [ 236.309391][ T30] audit: type=1400 audit(172[ 236.383723][ T30] audit: type=1400 audit(1722787595.913:1212): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 2787595.853:1211): avc: denied { read write } for pid=5228 comm="syz-executor" name="loop1" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 4 16:06:35 syzkaller kern.notice kernel: [ 236.383723][ T30] audit: type=1400 audit(1722787595.913:1212): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 236.482006][ T30] audit: type=1400 audit(1722787595.923:1213): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.482006][ T30] audit: type=1400 audit(1722787595.923:1213): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 236.546055][ T30] audit: type=1400 audit(1722787595.923:1214): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.546055][ T30] audit: type=1400 audit(1722787595.923:1214): avc: denied { read } for pi[ 236.580786][ T30] audit: type=1400 audit(1722787595.983:1215): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 d=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 236.627158][ T30] audit: type=1400 audit(1722787595.993:1216): avc: denied { mounton } for pid=6218 comm="syz.3.241" path="/proc/98/task" dev="proc" ino=10680 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 236.673254][ T30] audit: type=1400 audit(1722787596.003:1217): avc: denied { map_create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 236.673322][ T30] audit: type=1400 audit(1722787596.013:1218): avc: denied { read write } for pid=6218 comm="syz.3.241" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 236.673390][ T30] audit: type=1400 audit(1722787596.013:1219): avc: denied { create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 236.673451][ T30] audit: type=1400 audit(1722787596.013:1220): avc: denied { create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.580786][ T30] audit: type=1400 audit(1722787595.983:1215): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.627158][ T30] audit: type=1400 audit(1722787595.993:1216): avc: denied { mounton } for pid=6218 comm="syz.3.241" path="/proc/98/task" dev="proc" ino=10680 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.673254][ T30] audit: type=1400 audit(1722787596.003:1217): avc: denied { map_create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.673322][ T30] audit: type=1400 audit(1722787596.013:1218): avc: denied { read write } for pid=6218 comm="syz.3.241" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_dev Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.673390][ T30] audit: type=1400 audit(1722787596.013:1219): avc: denied { create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:06:36 syzkaller kern.notice kernel: [ 236.673451][ T30] audit: type=1400 audit(1722787596.013:1220): avc: denied { create } for pid=6218 comm="syz.3.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 237.212722][ T6233] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6233 comm=syz.0.244 Aug 4 16:06:36 syzkaller kern.warn kernel: [ 237.212722][ T6233] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6233 comm=syz.0.244 [ 239.342166][ T6242] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 239.348759][ T6242] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:38 syzkaller kern.info kernel: [ 239.342166][ T6242] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) Aug 4 16:06:38 syzkaller kern.info kernel: [ 239.348759][ T6242] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 239.389507][ T6242] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:38 syzkaller kern.info kernel: [ 239.389507][ T6242] vhci_hcd vhci_hcd.0: Device attached [ 239.468042][ T25] vhci_hcd: vhci_device speed not set Aug 4 16:06:39 syzkaller kern.err kernel: [ 239.468042][ T25] vhci_hcd: vhci_device speed not set [ 239.591290][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:39 syzkaller kern.err kernel: [ 239.591290][ T1615] vhci_hcd: vhci_device speed not set [ 239.681062][ T1615] usb 17-1: new full-speed USB device number 3 using vhci_hcd Aug 4 16:06:39 syzkaller kern.info kernel: [ 239.681062][ T1615] usb 17-1: new full-speed USB device number 3 using vhci_hcd [ 240.118126][ T6243] vhci_hcd: connection reset by peer [ 240.130271][ T5660] vhci_hcd: stop threads Aug 4 16:06:39 syzkaller kern.i[ 240.141093][ T5660] vhci_hcd: release socket nfo kernel: [ 240.118126][ T6243] vhci_hcd: con[ 240.148892][ T5660] vhci_hcd: disconnect device nection reset by peer Aug 4 16:06:39 syzkaller kern.info kernel: [ 240.130271][ T5660] vhci_hcd: stop threads Aug 4 16:06:39 syzkaller kern.info kernel: [ 240.141093][ T5660] vhci_hcd: release socket Aug 4 16:06:39 syzkaller kern.info kernel: [ 240.148892][ T5660] vhci_hcd: disconnect device [ 241.312456][ T30] kauditd_printk_skb: 127 callbacks suppressed [ 241.312479][ T30] audit: type=1400 audit(1722787600.863:1348): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:40 syzkaller kern.warn kernel: [ 241.312456][ T30] kauditd_printk_skb: 127 callbacks suppressed Aug 4 16:06:40 syzkaller kern.notice kernel: [ 241.312479][ T30] audit: type=1400 audit(1722787600.863:1348): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 241.423061][ T30] audit: type=1400 audit(1722787600.933:1349): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:40 syzkaller kern.notice kernel: [ 241.423061][ T30] audit: type=1400 audit(1722787600.933:1349): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 241.510248][ T30] audit: type=1400 audit(1722787600.933:1350): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.510248][ T30] audit: type=1400 audit(1722787600.933:1350): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 241.586362][ T30] audit: type=1400 audit(1722787601.003:1351): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.586362][ T30] audit: type=1400 audit(1722787601.003:1351): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 241.662211][ T30] audit: type=1400 audit(1722787601.053:1352): avc: denied { read } for pid=6276 comm="syz.2.259" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.662211][ T30] audit: type=1400 audit(1722787601.053:1352): avc: denied { read } for pid=6276 comm="syz.2.259" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_devi [ 241.775458][ T30] audit: type=1400 audit(1722787601.083:1353): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.775458][ T30] audit: type=1400 audit(1722787601.083:1353): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 241.859551][ T6278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6278 comm=syz.2.259 [ 241.866725][ T30] audit: type=1400 audit(1722787601.083:1354): avc: denied { execmem } for pid=6276 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 4 16:06:41 syzkaller kern.warn kernel: [ 241.859551][ T6278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6278 comm=syz.2.259 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.866725][ T30] audit: type=1400 audit(1722787601.083:1354): avc: denied { execmem } for pid=6276 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 241.949469][ T30] audit: type=1400 audit(1722787601.153:1355): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.949469][ T30] audit: type=1400 audit(1722787601.153:1355): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 241.998481][ T30] audit: type=1400 audit(1722787601.243:1356): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:41 syzkaller kern.notice kernel: [ 241.998481][ T30] audit: type=1400 audit(1722787601.243:1356): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 242.081640][ T30] audit: type=1400 audit(1722787601.273:1357): avc: denied { prog_load } for pid=6276 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:41 syzkaller kern.notice kernel: [ 242.081640][ T30] audit: type=1400 audit(1722787601.273:1357): avc: denied { prog_load } for pid=6276 comm="syz.2.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 243.838117][ T6296] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 243.844694][ T6296] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:43 syzkaller kern.info kernel: [ 243.838117][ T6296] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) Aug 4 16:06:43 syzkaller kern.info kernel: [ 243.844694][ T6296] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 243.876621][ T6296] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:43 syzkaller kern.info kernel: [ 243.876621][ T6296] vhci_hcd vhci_hcd.0: Device attached [ 244.088356][ T5268] vhci_hcd: vhci_device speed not set Aug 4 16:06:43 syzkaller kern.err kernel: [ 244.088356][ T5268] vhci_hcd: vhci_device speed not set [ 244.212157][ T5268] usb 13-1: new full-speed USB device number 2 using vhci_hcd Aug 4 16:06:43 syzkaller kern.info kernel: [ 244.212157][ T5268] usb 13-1: new full-speed USB device number 2 using vhci_hcd [ 244.634330][ T6298] vhci_hcd: connection reset by peer [ 244.646326][ T1100] vhci_hcd: stop threads [ 244.650722][ T1100] vhci_hcd: release socket [ 244.656788][ T1100] vhci_hcd: disconnect device Aug 4 16:06:44 syzkaller kern.info kernel: [ 244.634330][ T6298] vhci_hcd: connection reset by peer Aug 4 16:06:44 syzkaller kern.info kernel: [ 244.646326][ T1100] vhci_hcd: stop threads Aug 4 16:06:44 syzkaller kern.info kernel: [ 244.650722][ T1100] vhci_hcd: release socket Aug 4 16:06:44 syzkaller kern.info kernel: [ 244.656788][ T1100] vhci_hcd: disconnect device [ 244.821450][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:44 syzkaller kern.err kernel: [ 244.821450][ T1615] vhci_hcd: vhci_device speed not set [ 246.338618][ T30] kauditd_printk_skb: 111 callbacks suppressed [ 246.338671][ T30] audit: type=1400 audit(1722787605.883:1469): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:45 syzkaller kern.warn kernel: [ 246.338618][ T30] kauditd_printk_skb: 111 callbacks suppressed Aug 4 16:06:45 syzkaller kern.notice kernel: [ 246.338671][ T30] audit: type=1400 audit(1722787605.883:1469): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 246.471213][ T30] audit: type=1400 audit(1722787605.943:1470): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.471213][ T30] audit: type=1400 audit(1722787605.943:1470): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 246.577998][ T30] audit: type=1400 audit(1722787605.943:1471): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.577998][ T30] audit: type=1400 audit(1722787605.943:1471): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 246.663699][ T30] audit: type=1400 audit(1722787605.943:1472): avc: denied { create } for pid=6320 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.663699][ T30] audit: type=1400 audit(1722787605.943:1472): avc: denied { create } for pid=6320 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 246.795397][ T30] audit: type=1400 audit(1722787606.053:1473): avc: denied { create } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.795397][ T30] audit: type=1400 audit(1722787606.053:1473): avc: denied { create } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 246.877994][ T30] audit: type=1400 audit(1722787606.053:1474): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.877994][ T30] audit: type=1400 audit(1722787606.053:1474): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 246.986855][ T30] audit: type=1400 audit(1722787606.063:1475): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 246.986855][ T30] audit: type=1400 audit(1722787606.063:1475): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 247.061454][ T6332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6332 comm=syz.0.276 [ 247.110266][ T30] audit: type=1400 audit(1722787606.103:1476): avc: denied { create } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 Aug 4 16:06:46 syzkaller kern.warn kernel: [ 247.061454][ T6332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6332 comm=syz.0.276 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 247.110266][ T30] audit: type=1400 audit(1722787606.103:1476): avc: denied { create } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 247.231411][ T30] audit: type=1400 audit(1722787606.103:1477): avc: denied { execmem } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 247.231411][ T30] audit: type=1400 audit(1722787606.103:1477): avc: denied { execmem } for pid=6323 comm="syz.3.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 247.314104][ T30] audit: type=1400 audit(1722787606.153:1478): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:46 syzkaller kern.notice kernel: [ 247.314104][ T30] audit: type=1400 audit(1722787606.153:1478): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 248.428077][ T6342] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 248.434656][ T6342] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:47 syzkaller kern.info kernel: [ 2[ 248.455347][ T6342] vhci_hcd vhci_hcd.0: Device attached 48.428077][ T6342] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) Aug 4 16:06:47 syzkaller kern.info kernel: [ 248.434656][ T6342] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:48 syzkaller kern.info kernel: [ 248.455347][ T6342] vhci_hcd vhci_hcd.0: Device attached [ 248.681089][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:48 syzkaller kern.err kernel: [ 248.681089][ T1615] vhci_hcd: vhci_device speed not set [ 248.762100][ T1615] usb 11-1: new full-speed USB device number 4 using vhci_hcd Aug 4 16:06:48 syzkaller kern.info kernel: [ 248.762100][ T1615] usb 11-1: new full-speed USB device number 4 using vhci_hcd [ 249.127835][ T6343] vhci_hcd: connection reset by peer Aug 4 16:06:48 [ 249.142647][ T142] vhci_hcd: stop threads syzkaller kern.i[ 249.148187][ T142] vhci_hcd: release socket nfo kernel: [ 249.127835][ T6343] vhci_hcd: connection reset by peer Aug 4 16:06:48 syzkaller kern.info kernel: [ 2[ 249.164245][ T142] vhci_hcd: disconnect device 49.142647][ T142] vhci_hcd: stop threads Aug 4 16:06:48 syzkaller kern.info kernel: [ 249.148187][ T142] vhci_hcd: release socket Aug 4 16:06:48 syzkaller kern.info kernel: [ 249.164245][ T142] vhci_hcd: disconnect device [ 249.382381][ T5268] vhci_hcd: vhci_device speed not set Aug 4 16:06:48 syzkaller kern.err kernel: [ 249.382381][ T5268] vhci_hcd: vhci_device speed not set [ 251.419145][ T30] kauditd_printk_skb: 118 callbacks suppressed [ 251.419169][ T30] audit: type=1400 audit(1722787610.963:1597): avc: denied { read write } for pid=6375 comm="syz.3.291" name="vhost-vsock" dev="devtmpfs" ino=1086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 Aug 4 16:06:50 syzkaller kern.warn kernel: [ 251.419145][ T30] kauditd_printk_skb: 118 callbacks suppressed Aug 4 16:06:50 syzkaller kern.notice kernel: [ 251.419169][ T30] audit: type=1400 audit(1722787610.963:1597): avc: denied { read write } for pid=6375 comm="syz.3.291" name="vhost-vsock" dev="devtmpfs" ino=1086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_ [ 251.601033][ T30] audit: type=1400 audit(1722787610.973:1598): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 251.601033][ T30] audit: type=1400 audit(1722787610.973:1598): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 251.714902][ T30] audit: type=1400 audit(1722787611.013:1599): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 251.714902][ T30] audit: type=1400 audit(1722787611.013:1599): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 251.779992][ T30] audit: type=1400 audit(1722787611.013:1600): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 251.779992][ T30] audit: type=1400 audit(1722787611.013:1600): avc: denied { read } for pid=4651 comm="syslogd" name="log"[ 251.819477][ T30] audit: type=1400 audit(1722787611.073:1601): avc: denied { create } for pid=6375 comm="syz.3.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclas[ 251.846977][ T30] audit: type=1400 audit(1722787611.083:1602): avc: denied { prog_load } for pid=6375 comm="syz.3.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 s= Aug 4 16:06:51 syzkaller kern.notice kernel: [ 251.819477][ T30] audit: [ 251.874020][ T6379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6379 comm=syz.0.292 type=1400 audit(1722787611.073:1601): avc: denied { create } for pid=6375 comm="syz.3.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 Aug 4 16:06:5[ 251.904842][ T30] audit: type=1400 audit(1722787611.083:1603): avc: denied { read } for pid=6377 comm="syz.0.292" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 1 syzkaller kern.notice kernel: [ 251.846977][ T30] audit: type=1400 audit(1722787611.083:1602): avc: denied { prog_load } for pid=6375 comm="syz.3.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:51 syzkalle[ 251.951545][ T30] audit: type=1400 audit(1722787611.083:1604): avc: denied { read } for pid=6375 comm="syz.3.291" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 r kern.warn kernel: [ 251.874020][ T6379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6379 comm=syz.0.292 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 251.904842][ T30] audit: type=1400 audit(1722787611.083:1603): avc: denied { read } for pid=6377 comm="syz.0.292" name="event0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_devi Aug 4 16:06:51 syzkaller[ 252.015315][ T30] audit: type=1400 audit(1722787611.093:1605): avc: denied { execmem } for pid=6377 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 kern.notice kernel: [ 251.951545][ T30] audit: type=1400 audit(1722787611.083:1604): avc: denied { read } for pid=6375 comm="syz.3.291" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t t [ 252.071715][ T30] audit: type=1400 audit(1722787611.103:1606): avc: denied { read write } for pid=6375 comm="syz.3.291" name="video8" dev="devtmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 252.015315][ T30] audit: type=1400 audit(1722787611.093:1605): avc: denied { execmem } for pid=6377 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 Aug 4 16:06:51 syzkaller kern.notice kernel: [ 252.071715][ T30] audit: type=1400 audit(1722787611.103:1606): avc: denied { read write } for pid=6375 comm="syz.3.291" name="video8" dev="devtmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_ [ 252.306988][ T6384] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 252.313569][ T6384] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:51 syzkaller kern.info kernel: [ 252.306988][ T6384] vhci_hcd vhci_hcd.0: pdev(2) [ 252.331101][ T6384] vhci_hcd vhci_hcd.0: Device attached rhport(0) sockfd(3) Aug 4 16:06:51 syzkaller kern.info kernel: [ 252.313569][ T6384] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:51 syzkaller kern.info kernel: [ 252.331101][ T6384] vhci_hcd vhci_hcd.0: Device attached [ 252.421082][ T6387] vhci_hcd: connection closed [ 252.422979][ T3984] vhci_hcd: stop threads Aug 4 16:06:51 syzkaller kern.info kernel: [ 252.421082][ T6387] vhci_hcd: connection closed Aug 4 16:06:51 syzkaller kern.info kernel: [ 252.422979][ T3984] vhci_hcd: stop threads [ 252.481041][ T3984] vhci_hcd: release socket Aug 4 16:06:52 [ 252.496950][ T3984] vhci_hcd: disconnect device syzkaller kern.info kernel: [ 252.481041][ T3984] vhci_hcd: release socket [ 252.541716][ T25] vhci_hcd: vhci_device speed not set Aug 4 16:06:52 syzkaller kern.info kernel: [ 252.496950][ T3984] vhci_hcd: disconnect device Aug 4 16:06:52 syzkaller kern.err kernel: [ 252.541716][ T25] vhci_hcd: vhci_device speed not set [ 253.943208][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:53 syzkaller kern.err kernel: [ 253.943208][ T1615] vhci_hcd: vhci_device speed not set [ 256.551521][ T30] kauditd_printk_skb: 123 callbacks suppressed [ 256.551544][ T30] audit: type=1400 audit(1722787616.103:1730): avc: denied { prog_load } for pid=6428 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 Aug 4 16:06:56 syzkaller kern.warn kernel: [ 256.551521][ T30] kauditd_printk_skb: 123 callbacks suppressed Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.551544][ T30] audit: type=1400 audit(1722787616.103:1730): avc: denied { prog_load } for pid=6428 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.634955][ T6429] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 256.641547][ T6429] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) Aug 4 16:06:56 syzkaller kern.info kernel: [ 256.634955][ T6429] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) Aug 4 16:0[ 256.661063][ T30] audit: type=1400 audit(1722787616.133:1731): avc: denied { read } for pid=6428 comm="syz.1.308" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 6:56 syzkaller kern.info kernel: [ 256.641547][ T6429] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 256.700621][ T6429] vhci_hcd vhci_hcd.0: Device attached Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.661063][ T30] audit: type=1400 audit(1722787616.133:1731): avc: denied [ 256.734263][ T30] audit: type=1400 audit(1722787616.133:1732): avc: denied { read } for pid=6428 comm="syz.1.308" name="media9" dev="devtmpfs" ino=944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 { read } for pid=6428 comm="syz.1.308" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t t Aug 4 16:06:56 syzkaller kern.info kernel: [ 256.700621][ T6429] vhci_hcd vhci_hcd.0: Device attached [ 256.790171][ T30] audit: type=1400 audit(1722787616.143:1733): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.734263][ T30] audit: type=1400 audit(1722787616.133:1732): avc: denied { read } for pid=6428 comm="syz.1.308" name="media9" dev="devtmpfs" ino=944 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t t Aug 4 16:06[ 256.833672][ T6430] vhci_hcd: connection closed :56 syzkaller ke[ 256.839478][ T11] vhci_hcd: stop threads rn.notice kernel: [ 256.790171][ T30] audit: type=1400 audit(1722787616.143:1733): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:56 syzkaller kern.info kernel: [ 256.833672][ T6430] vhci_hcd: connection closed Aug 4 16:06:56 syzkaller kern.info kernel: [ 256.83947[ 256.885626][ T30] audit: type=1400 audit(1722787616.143:1734): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 8][ T11] vhci_hcd: stop thread[ 256.892920][ T11] vhci_hcd: release socket s Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.885626][ T30] audit: type=1400 audit(1722787616.143:1734)[ 256.940448][ T30] audit: type=1400 audit(1722787616.193:1735): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 : avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sy[ 256.971661][ T30] audit: type=1400 audit(1722787616.203:1736): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 stem_u:system_r:[ 256.971833][ T11] vhci_hcd: disconnect device syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06[ 257.005105][ T1615] vhci_hcd: vhci_device speed not set :56 syzkaller kern.info kernel: [ 256.892920][ T11] vhci_hcd: release socket Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.940448][ T30] audit: type=1400 audit(1722787616.193:1735): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcont[ 257.038712][ T30] audit: type=1400 audit(1722787616.243:1737): avc: denied { create } for pid=6428 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 ext=system_u:object_r:var_t tclass= Aug 4 16:06:56 syzkaller kern.notice kernel: [ 256.971661][ T30] audit: type=1400 audit(1722787616.203:[ 257.071492][ T30] audit: type=1400 audit(1722787616.273:1738): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1736): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:56 syzkaller kern.info ker[ 257.111725][ T30] audit: type=1400 audit(1722787616.273:1739): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 nel: [ 256.971833][ T11] vhci_hcd: disconnect device Aug 4 16:06:56 syzkaller kern.err kernel: [ 257.005105][ T1615] vhci_hcd: vhci_device speed not set Aug 4 16:06:56 syzkaller kern.notice kernel: [ 257.038712][ T30] audit: type=1400 audit(1722787616.243:1737): avc: denied { create } for pid=6428 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive Aug 4 16:06:56 syzkaller kern.notice kernel: [ 257.071492][ T30] audit: type=1400 audit(1722787616.273:1738): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:06:56 syzkaller kern.notice kernel: [ 257.111725][ T30] audit: type=1400 audit(1722787616.273:1739): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 257.370489][ T6436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6436 comm=syz.2.309 Aug 4 16:06:57 syzkaller kern.warn kernel: [ 257.370489][ T6436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6436 comm=syz.2.309 [ 261.550634][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 [ 261.557335][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 Aug 4 16:07:01 syzkaller kern.w[ 261.567364][ T30] kauditd_printk_skb: 113 callbacks suppressed arn kernel: [ 2[ 261.567387][ T30] audit: type=1400 audit(1722787621.113:1853): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 61.550634][ T1269] ieee802154 phy0 wpan0: encryption failed: -22 Aug 4 16:07:01 syzkaller kern.warn kernel: [ 261.557335][ T1269] ieee802154 phy1 wpan1: encryption failed: -22 Aug 4 16:07:01 syzkaller kern.warn kernel: [ 261.567364][ T30] kauditd_printk_skb: 113 callbacks suppressed Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.567387][ T30] audit: type=1400 audit(1722787621.113:[ 261.631346][ T30] audit: type=1400 audit(1722787621.113:1854): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 1853): avc: den[ 261.655080][ T30] audit: type=1400 audit(1722787621.123:1855): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ied { read } fo[ 261.678394][ T30] audit: type=1400 audit(1722787621.143:1856): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 sconte[ 261.706543][ T30] audit: type=1400 audit(1722787621.203:1857): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 xt=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.631346][ T30] audit: type=1400 audit(1722787621.113:1854): avc: denied { read [ 261.745610][ T30] audit: type=1400 audit(1722787621.223:1858): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 } for pid=4651 [ 261.770186][ T30] audit: type=1400 audit(1722787621.253:1859): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.655080][ T30] audit: type=1400 audit(1722787621.123:1855): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.678394][ T30] audit: type=1400 audit(1722787621.143:1856): avc: denied { read } for p[ 261.839330][ T30] audit: type=1400 audit(1722787621.293:1860): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 id=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.706543][ T30] audit: type=1400 audit(1722787621.203:1857): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice k[ 261.901511][ T30] audit: type=1400 audit(1722787621.353:1861): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ernel: [ 261.745610][ T30] audit: type=1400 audit(1722787621.223:1858): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.770186][ T30] audit: type=1400 audit(1722787621.253:1859): a[ 261.954894][ T30] audit: type=1400 audit(1722787621.363:1862): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 vc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.839330][ T30] audit: type=1400 audit(1722787621.293:1860): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.901511][ T30] audit: type=1400 audit(1722787621.353:1861): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:01 syzkaller kern.notice kernel: [ 261.954894][ T30] audit: type=1400 audit(1722787621.363:1862): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 262.289783][ T6482] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:07:01 syzkaller kern.err kernel: [ 262.289783][ T6482] devtmpfs: Unknown parameter 'posixacl' [ 262.509588][ T6487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6487 comm=syz.0.325 Aug 4 16:07:02 syzkaller daemon.err dhcpcd[6489]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:02 syzkaller daemon.err dhcpcd[6489]: ps_root_recvmsg: Invalid argument Aug 4 16:07:02 syzkaller kern.warn kernel: [ 262.509588][ T6487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6487 comm=syz.0.325 Aug 4 16:07:04 syzkaller daemon.err dhcpcd[6502]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:04 syzkaller daemon.err dhcpcd[6502]: ps_root_recvmsg: Invalid argument Aug 4 16:07:04 syzkaller daemon.err dhcpcd[6504]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:04 syzkaller daemon.err dhcpcd[6504]: ps_root_recvmsg: Invalid argument [ 266.612911][ T30] kauditd_printk_skb: 83 callbacks suppressed [ 266.612936][ T30] audit: type=1400 audit(1722787626.163:1946): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:07:06 syzkaller kern.warn kernel: [ 266.612911][ T30] kauditd_printk_skb: 83 callbacks suppressed Aug 4 16:07:06 syzkaller kern.notice kernel: [ 266.612936][ T30] audit: type=1400 audit(1722787626.163:1946): avc: denied { read write } for pid=5543 comm="syz-executor" name="loop3" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 266.732560][ T30] audit: type=1400 audit(1722787626.203:1947): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:06 syzkaller kern.notice kernel: [ 266.732560][ T30] audit: type=1400 audit(1722787626.203:1947): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 266.848160][ T30] audit: type=1400 audit(1722787626.203:1948): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:06 syzkaller kern.notice kernel: [ 266.848160][ T30] audit: type=1400 audit(1722787626.203:1948): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 266.977130][ T30] audit: type=1400 audit(1722787626.203:1949): avc: denied { read } for pid=6520 comm="syz.1.336" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 Aug 4 16:07:06 [ 267.018048][ T30] audit: type=1400 audit(1722787626.243:1950): avc: denied { read } for pid=6522 comm="syz.2.337" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 syzkaller kern.notice kernel: [ 266.977130][ T30] audit: type=1400 audit(1722787626.203:1949): avc: denied { read } for pid=6520 comm="syz.1.336" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t t Aug 4 16:07:06 syzkaller kern.notice kernel: [ 267.018048][ T30] audit: type=1400 audit(1722787626.243:1950): avc: denied { read } for pid=6522 comm="syz.2.337" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t t [ 267.088547][ T30] audit: type=1400 audit(1722787626.243:1951): avc: denied { create } for pid=6522 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 267.109433][ T6532] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:07:06 syzkaller kern.notice kernel: [ [ 267.126317][ T30] audit: type=1400 audit(1722787626.243:1952): avc: denied { create } for pid=6522 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 267.088547][ T30] audit: type=1400 audit(1722787626.243:1951): avc: denied { create } for pid=6522 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 Aug 4[ 267.166530][ T30] audit: type=1400 audit(1722787626.263:1953): avc: denied { read } for pid=6520 comm="syz.1.336" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 16:07:06 syzkaller kern.err kernel: [ 267.109433][ T6532] devtmpfs: Unknown parameter 'posixacl' Aug 4 16:07:06 syzkaller kern.notice kernel: [ 267.126317][ T30] audit: type=1400 audit(1722787626.243:1952): avc: denied { create } for pid=6522 comm="syz.2.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_gen[ 267.220110][ T30] audit: type=1400 audit(1722787626.263:1954): avc: denied { read } for pid=6520 comm="syz.1.336" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 eric_socket permissive Aug 4 16:07:06 syzkaller kern.notice kernel: [ 267.166530][ T30] audit: type=1400 audit(1722787626.263:1953): avc: denied { read } for pid=6520 comm="syz.1.336" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t Aug 4 16:07:06 syzkaller kern.notice kernel: [ 267.220110][ T30] audit: type=1400 audit(1722787626.263:1954): avc: denied { read } for pid=6520 comm="syz.1.336" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t t Aug 4 16:07:06 syzkaller daemon.err dhcpcd[6533]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:06 syzkaller daemon.err dhcpcd[6533]: ps_root_recvmsg: Invalid arg[ 267.347844][ T30] audit: type=1400 audit(1722787626.313:1955): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ument Aug 4 16:07:06 syzkaller kern.notice kernel: [ 267.347844][ T30] audit: type=1400 audit(1722787626.313:1955): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:[ 267.406716][ T6537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6537 comm=syz.0.340 syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:06 syzkaller kern.warn kernel: [ 267.406716][ T6537] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6537 comm=syz.0.340 Aug 4 16:07:07 syzkaller daemon.err dhcpcd[6539]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:07 syzkaller daemon.err dhcpcd[6539]: ps_root_recvmsg: Invalid argument Aug 4 16:07:08 syzkaller daemon.err dhcpcd[6547]: ps_bpf_start_bpf: bpf_open: Invalid argument Aug 4 16:07:08 syzkaller daemon.err dhcpcd[6547]: ps_root_recvmsg: Invalid argument [ 271.621131][ T30] kauditd_printk_skb: 125 callbacks suppressed [ 271.621156][ T30] audit: type=1400 audit(1722787631.163:2081): avc: denied { mounton } for pid=6584 comm="syz.2.356" path="/proc/205/task" dev="proc" ino=11169 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 Aug 4 16:07:11 syzkaller kern.warn kernel: [ 271.621131][ T30] kauditd_printk_skb: 125 callbacks suppressed Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.621156][ T30] audit: type=1400 audit(1722787631.163:2081): avc: denied { mounton } for pid=6584 comm="syz.2.356" path="/proc/205/task[ 271.706148][ T30] audit: type=1400 audit(1722787631.203:2082): avc: denied { map_create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 " dev="proc" ino=11169 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysad Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.706148][ T30] audit: type=1400 audit(1722787631.203:2082): avc: denied { map_create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.765568][ T30] audit: type=1400 audit(1722787631.203:2083): avc: denied { read write } for pid=6584 comm="syz.2.356" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.765568][ T30] audit: type=1400 audit(1722787631.203:2083): avc: denied { read write } for pid=6584 comm="syz.2.356" name="ppp" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_dev [ 271.893183][ T30] audit: type=1400 audit(1722787631.203:2084): avc: denied { create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.893183][ [ 271.919722][ T30] audit: type=1400 audit(1722787631.203:2085): avc: denied { create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 T30] audit: type=1400 audit(1722787631.203:2084): avc: denied { create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass[ 271.954350][ T30] audit: type=1400 audit(1722787631.203:2086): avc: denied { read } for pid=6584 comm="syz.2.356" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 =sctp_socket permissive=0 Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.919722][ T30] audit: type=1400 audit(1722787631.203:2085): avc: denied { create } for pid=6584 comm="syz.2.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass[ 271.999430][ T30] audit: type=1400 audit(1722787631.223:2087): avc: denied { read } for pid=6584 comm="syz.2.356" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 =rawip_socket permissive=0 Aug 4 16:07:11 syzkaller kern.notice kernel: [ 271.954350][ T30] audit: type=1400 audit(17227876[ 272.031252][ T30] audit: type=1400 audit(1722787631.223:2088): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 31.203:2086): avc: denied { read } for pid=6584 comm="syz.2.356" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file pe Aug 4 16:07:11 syzkaller kern.n[ 272.086805][ T30] audit: type=1400 audit(1722787631.223:2089): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 otice kernel: [ 271.999430][ T30] audit: type=1400 audit(1722787631.223:2087): avc: denied { read } for pid=6584 comm="syz.2.356" dev="nsfs" ino=4026533140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file pe Aug 4 16:07:11 syzkaller kern.notice kernel: [ 272.031252][ T30] audit: type=1400 audit(1722787631.223:2088): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi Aug 4 16:07:11 syzkaller kern.notice kernel: [ 272.086805][ T30] audit: type=1400 audit(1722787631.223:2089): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 272.181340][ T30] audit: type=1400 audit(1722787631.233:2090): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:11 syzkaller kern.notice kernel: [ 272.181340][ T30] audit: type=1400 audit(1722787631.233:2090): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 272.604114][ T6599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6599 comm=syz.3.360 Aug 4 16:07:12 syzkaller kern.warn kernel: [ 272.604114][ T6599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6599 comm=syz.3.360 [ 273.861267][ T54] Bluetooth: hci5: command 0x0406 tx timeout Aug 4 16:07:13 syzkaller kern.err kernel: [ 273.861267][ T54] Bluetooth: hci5: command 0x0406 tx timeout [ 276.693680][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 276.693703][ T30] audit: type=1400 audit(1722787636.243:2215): avc: denied { append } for pid=6647 comm="syz.0.377" name="event3" dev="devtmpfs" ino=841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 Aug 4 16:07:16 syzkaller kern.warn kernel: [ 276.693680][ T30] kauditd_print[ 276.750819][ T30] audit: type=1400 audit(1722787636.293:2216): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 k_skb: 124 callbacks suppressed Aug 4 16:07:16 syzkaller kern.notice kernel: [ 276.693703][ T30] audit: type=1400 audit(1722787636.243:2215): avc: denied { append } for pid=6647 comm="syz.0.377" name="event3" dev="devtmpfs" ino=841 scontext=root:sy[ 276.795808][ T30] audit: type=1400 audit(1722787636.293:2217): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 sadm_r:sysadm_t tcontext=system_u:object_r:event_de Aug 4 16:07:16 syzkaller kern.notice kernel: [ 276.750819][ T30] audit: type=1400 audit(1722787636.293:2216): avc: den[ 276.833050][ T30] audit: type=1400 audit(1722787636.333:2218): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:16 syzkaller kern.notice kernel: [ 276.795808][ T30] audit: type=1400 audit(1722787636.293:2217): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 277.004614][ T30] audit: type=1400 audit(1722787636.373:2219): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:16 syzkaller kern.notice kernel: [ 276.833050][ T30] audit: type=1400 audit(1722787636.333:2218): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:16 syzkaller kern.notice kernel: [ 277.004614][ T30] audit: type=1400 audit(1722787636.373:2219): avc: denied { read } for pid=4651 comm=[ 277.073406][ T30] audit: type=1400 audit(1722787636.473:2220): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 "syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:16 syzkaller kern.notice kernel: [ 277.073406][ T30] audit: type=1400 audit(1722787636.473:2220): avc: denied { read write } for pid=5217 comm="syz-executor" name="loop0" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 277.324697][ T30] audit: type=1400 audit(1722787636.473:2221): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 Aug 4 16:07:16 syzkaller kern.notice kernel: [ 277.324697][ T30] audit: type=1400 audit(1722787636.473:2221): avc: denied { read write } for pid=5219 comm="syz-executor" name="loop2" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fi [ 277.447362][ T6656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6656 comm=syz.2.379 Aug 4 16:07:17 syzkaller kern.warn kernel: [ 277.447362][ T6656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6656 comm=syz.2.379 [ 277.753961][ T30] audit: type=1400 audit(1722787636.583:2222): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:17 syzkaller kern.notice kernel: [ 277.753961][ T30] audit: type=1400 audit(1722787636.583:2222): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 277.861147][ T30] audit: type=1400 audit(1722787636.583:2223): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:17 syzkaller kern.notice kernel: [ 277.861147][ T30] audit: type=1400 audit(1722787636.583:2223): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 278.059552][ T30] audit: type=1400 audit(1722787636.663:2224): avc: denied { read } for pid=6649 comm="syz.0.378" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 Aug 4 16:07:17 syzkaller kern.notice kernel: [ 278.059552][ T30] audit: type=1400 audit(1722787636.663:2224): avc: denied { read } for pid=6649 comm="syz.0.378" name="card1" dev="devtmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_ [ 280.008207][ T6686] FAULT_INJECTION: forcing a failure. [ 280.008207][ T6686] name failslab, interval 1, probability 0, space 0, times 0 [ 280.042412][ T6686] CPU: 1 UID: 0 PID: 6686 Comm: syz.2.388 Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 [ 280.053189][ T6686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 280.063468][ T6686] Call Trace: [ 280.066763][ T6686] [ 280.069725][ T6686] dump_stack_lvl+0x16c/0x1f0 [ 280.074446][ T6686] should_fail_ex+0x497/0x5b0 [ 280.079156][ T6686] ? fs_reclaim_acquire+0xae/0x160 [ 280.084422][ T6686] should_failslab+0xc2/0x120 [ 280.089334][ T6686] __kmalloc_cache_noprof+0x6b/0x300 [ 280.094645][ T6686] ? landlock_create_object+0x64/0x180 [ 280.100177][ T6686] landlock_create_object+0x64/0x180 [ 280.105506][ T6686] landlock_append_fs_rule+0x5ea/0x970 [ 280.111003][ T6686] ? do_raw_spin_lock+0x12d/0x2c0 [ 280.116056][ T6686] ? __pfx_landlock_append_fs_rule+0x10/0x10 [ 280.122061][ T6686] ? __might_fault+0xe3/0x190 [ 280.126754][ T6686] add_rule_path_beneath+0x439/0x510 [ 280.132071][ T6686] ? __pfx_add_rule_path_beneath+0x10/0x10 [ 280.137912][ T6686] ? __fget_light+0x173/0x210 [ 280.142623][ T6686] __x64_sys_landlock_add_rule+0x19f/0x230 [ 280.148458][ T6686] do_syscall_64+0xcd/0x250 [ 280.152999][ T6686] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 280.158949][ T6686] RIP: 0033:0x7f4cf67779f9 [ 280.163391][ T6686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.183023][ T6686] RSP: 002b:00007f4cf753b048 EFLAGS: 00000246 ORIG_RAX: 00000000000001bd [ 280.191480][ T6686] RAX: ffffffffffffffda RBX: 00007f4cf6905f80 RCX: 00007f4cf67779f9 [ 280.199464][ T6686] RDX: 0000000020000340 RSI: 0000000000000001 RDI: 0000000000000003 [ 280.207450][ T6686] RBP: 00007f4cf753b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 280.215435][ T6686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.223427][ T6686] R13: 000000000000000b R14: 00007f4cf6905f80 R15: 00007fffbbf4e3b8 [ 280.231447][ T6686] Aug 4 16:07:19 syzkaller kern.notice kernel: [ 280.008207][ T6686] FAULT_INJECTION: forcing a failure. Aug 4 16:07:19 syzkaller kern.notice kernel: [ 280.008207][ T6686] name failslab, interval 1, probability 0, space 0, times 0 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.042412][ T6686] CPU: 1 UID: 0 PID: 6686 Comm: syz.2.388 Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.053189][ T6686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.063468][ T6686] Call Trace: Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.066763][ T6686] Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.069725][ T6686] dump_stack_lvl+0x16c/0x1f0 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.074446][ T6686] should_fail_ex+0x497/0x5b0 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.079156][ T6686] ? fs_reclaim_acquire+0xae/0x160 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.084422][ T6686] should_failslab+0xc2/0x120 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.089334][ T6686] __kmalloc_cache_noprof+0x6b/0x300 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.094645][ T6686] ? landlock_create_object+0x64/0x180 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.100177][ T6686] landlock_create_object+0x64/0x180 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.105506][ T6686] landlock_append_fs_rule+0x5ea/0x970 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.111003][ T6686] ? do_raw_spin_lock+0x12d/0x2c0 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.116056][ T6686] ? __pfx_landlock_append_fs_rule+0x10/0x10 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.122061][ T6686] ? __might_fault+0xe3/0x190 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.126754][ T6686] add_rule_path_beneath+0x439/0x510 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.132071][ T6686] ? __pfx_add_rule_path_beneath+0x10/0x10 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.137912][ T6686] ? __fget_light+0x173/0x210 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.142623][ T6686] __x64_sys_landlock_add_rule+0x19f/0x230 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.148458][ T6686] do_syscall_64+0xcd/0x250 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.152999][ T6686] entry_SYSCALL_64_after_hwframe+0x77/0x7f Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.158949][ T6686] RIP: 0033:0x7f4cf67779f9 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.163391][ T6686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.183023][ T6686] RSP: 002b:00007f4cf753b048 EFLAGS: 00000246 ORIG_RAX: 00000000000001bd Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.191480][ T6686] RAX: ffffffffffffffda RBX: 00007f4cf6905f80 RCX: 00007f4cf67779f9 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.199464][ T6686] RDX: 0000000020000340 RSI: 0000000000000001 RDI: 0000000000000003 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.207450][ T6686] RBP: 00007f4cf753b0a0 R08: 0000000000000000 R09: 0000000000000000 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.215435][ T6686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.223427][ T6686] R13: 000000000000000b R14: 00007f4cf6905f80 R15: 00007fffbbf4e3b8 Aug 4 16:07:19 syzkaller kern.warn kernel: [ 280.231447][ T6686] [ 281.703084][ T30] kauditd_printk_skb: 145 callbacks suppressed [ 281.703108][ T30] audit: type=1400 audit(1722787641.253:2370): avc: denied { read } for pid=6705 comm="syz.4.397" name="ptp0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 Aug 4 16:07:21 syzkaller kern.warn kernel: [ 281.703084][ T30] kauditd_printk_skb: 145 callbacks suppressed Aug 4 16:07:21 syzkaller kern.notice kernel: [ 281.703108][ T30] audit: type=1400 audit(1722787641.253:2370): avc: denied { read } for pid=6705 comm="syz.4.397" name="ptp0" dev="devtmpfs" ino=1075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_devic [ 281.794960][ T30] audit: type=1400 audit(1722787641.293:2371): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:21 syzkaller kern.notice kernel: [ 281.794960][ T30] audit: type=1400 audit(1722787641.293:2371): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 281.856736][ T30] audit: type=1400 audit(1722787641.293:2372): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 Aug 4 16:07:21 syzkaller kern.notice kernel: [ 281.856736][ T30] audit: type[ 281.886785][ T30] audit: type=1400 audit(1722787641.293:2373): avc: denied { create } for pid=6705 comm="syz.4.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 =1400 audit(1722787641.293:2372): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:21 syzkaller kern.notice kernel: [ 281.886785][ 281.928866][ T30] audit: type=1400 audit(1722787641.363:2374): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ T30] audit: type=1400 audit(1722787641.293:2373): avc: denied { create } for pid=6705 comm="syz.4.397" scontext=root:sysadm_r:sysadm_t tc[ 281.963845][ T30] audit: type=1400 audit(1722787641.423:2375): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 ontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 Aug 4 16:07:21 syzkaller kern.notice kernel: [ 281.928866][ T30] audit: type=1400 audit(1722787641.363:2374): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1[ 282.007715][ T30] audit: type=1400 audit(1722787641.453:2376): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:[ 282.038705][ T30] audit: type=1400 audit(1722787641.513:2377): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 21 syzkaller kern.notice kernel: [ 281.963845][ T30] audit: type=1400 audit(1722787641.423:2375): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" i[ 282.075921][ T30] audit: type=1400 audit(1722787641.533:2378): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 no=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:21 syzkaller kern.notice kernel: [ 282.007715][ T30] audit: type=1400 audit(1722787641.453:2376): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t[ 282.126313][ T30] audit: type=1400 audit(1722787641.623:2379): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:21 syzkaller kern.notice kernel: [ 282.038705][ T30] audit: type=1400 audit(1722787641.513:2377): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:21 syzkaller kern.notice kernel: [ 282.075921][ T30] audit: type=1400 audit(1722787641.533:2378): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:21 syzkaller kern.notice kernel: [ 282.126313][ T30] audit: type=1400 audit(1722787641.623:2379): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= [ 282.527351][ T6711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6711 comm=syz.3.398 Aug 4 16:07:22 syzkaller kern.warn kernel: [ 282.527351][ T6711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=6711 comm=syz.3.398 [ 284.072365][ T5222] Bluetooth: hci4: unexpected event for opcode 0x0428 Aug 4 16:07:23 syzkaller kern.err kernel: [ 284.072365][ T5222] Bluetooth: hci4: unexpected event for opcode 0x0428 [ 285.881659][ T6749] netlink: 8 bytes leftover after parsing attributes in process `syz.0.411'. Aug 4 16:07:25 syzkaller kern.warn kernel: [ 285.881659][ T6749] netlink: 8 bytes leftover after parsing attributes in process `syz.0.411'. [ 286.504099][ T31] INFO: task syz.3.33:5445 blocked for more than 143 seconds. [ 286.570211][ T31] Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 Aug 4 16:07:26 syzkaller kern.err kernel: [ 286.504099][ T31] INFO: task syz.3.33:5445 blocked for more than 143 seconds. Aug 4 16:07:26 s[ 286.611161][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. yzkaller kern.err kernel: [ 286.570211][ T31] Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 [ 286.629199][ T31] task:syz.3.33 state:D stack:26816 pid:5445 tgid:5444 ppid:5223 flags:0x00004006 Aug 4 16:07:26 syzkaller kern.err kernel: [ 286.611161][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables th[ 286.655782][ T31] Call Trace: is message. Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.629199][ T31] task:syz.3.33 state:D stack:26816 pid:5445 tgid:5444 ppid:5223 flags:0x00004006 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.6[ 286.679558][ T31] 55782][ T31] C[ 286.683783][ T31] __schedule+0xe37/0x5490 all Trace: Aug 4 16:07:26 [ 286.691205][ T31] ? __pfx___lock_acquire+0x10/0x10 syzkaller kern.i[ 286.698084][ T31] ? __pfx___schedule+0x10/0x10 nfo kernel: [ 286.679558][ T3[ 286.705313][ T31] ? schedule+0x298/0x350 1] Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.683783][ T31] [ 286.716970][ T31] ? __pfx_lock_release+0x10/0x10 __schedule+0xe37/0x5490 Aug 4 [ 286.724251][ T30] kauditd_printk_skb: 109 callbacks suppressed 16:07:26 syzkall[ 286.724274][ T30] audit: type=1400 audit(1722787646.273:2489): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 er kern.info kernel: [ 286.691205][ T31] ? __pfx___lock_acquire+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.698084][ T31] ? __pfx___schedule+0x10/0x10 Aug 4 16:07:26 syzkaller kern.[ 286.772574][ T31] ? __lock_acquire+0x1620/0x3cb0 info kernel: [ 286.705313][ T31] ? schedule+0x298/0x350 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.716970][ T31] ? __pfx_lock_release+0x10/0x10 Aug 4 16:07:26 syzkaller kern.warn kernel: [ 286.724251][ T30] kauditd_printk_skb: 109 callbacks suppressed[ 286.801324][ T31] schedule+0xe7/0x350 Aug 4 16:07:2[ 286.806507][ T31] schedule_timeout+0x258/0x2a0 6 syzkaller kern.notice kernel: [ 286.724274][ T30] audit: type=1400 audit(1722787646.273:2489): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcon[ 286.831377][ T31] ? __pfx_schedule_timeout+0x10/0x10 text=system_u:object_r:var_t tcl[ 286.840262][ T31] ? _raw_spin_unlock_irq+0x23/0x50 ass= Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.772574][ T31] ? __lock_acquire+0x1620/0x3cb0 Aug 4 16:07:26 syzkal[ 286.856442][ T31] __wait_for_common+0x3de/0x5f0 ler kern.info kernel: [ 286.801[ 286.864051][ T31] ? __pfx_schedule_timeout+0x10/0x10 324][ T31] sc[ 286.870210][ T31] ? __pfx___wait_for_common+0x10/0x10 hedule+0xe7/0x350 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.806507][ T31] schedule_timeout+0x258/0x2a0 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.831377][[ 286.891020][ T30] audit: type=1400 audit(1722787646.273:2490): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T31] ? __pfx_schedule_timeou[ 286.909504][ T31] ? lockdep_init_map_type+0x16d/0x7d0 t+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.840262][ T31] ? _raw_spin_unlock_irq+0x23/0x50 Aug 4 16:07:26 syzkaller ker[ 286.934838][ T30] audit: type=1400 audit(1722787646.313:2491): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 n.info kernel: [[ 286.948055][ T31] ? __pfx_vhost_net_release+0x10/0x10 286.856442][ [ 286.959261][ T30] audit: type=1400 audit(1722787646.313:2492): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 T31] __wait_fo[ 286.973061][ T31] __vhost_worker_flush+0x1aa/0x1e0 r_common+0x3de/0x5f0 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.864051][ T31] ? __pfx_schedule_timeout+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.870210][ T31] ? __pfx___wait_for_common+0x10/0x10 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 286.891020][ T30] audit: type=1400 audit(1722787646.273:2490): avc: denied { read } for pid=4651 co[ 287.026627][ T31] ? __pfx___vhost_worker_flush+0x10/0x10 mm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t[ 287.039241][ T31] ? __pfx_vhost_flush_work+0x10/0x10 tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.909504][ T31] ?[ 287.055029][ T31] ? __pfx___mutex_unlock_slowpath+0x10/0x10 lockdep_init_ma[ 287.057367][ T30] audit: type=1400 audit(1722787646.333:2493): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 p_type+0x16d/0x7d0 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 286.934838][ T30] audit: type=1400 audit([ 287.094721][ T31] vhost_dev_flush+0xad/0x120 1722787646.313:2491): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.948055][ T31] ? __pfx_vhost_net_release+0x10/0x10 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 286.959261][ T30] audit: type=1400 audit(172[ 287.132803][ T31] ? __pfx_vhost_dev_flush+0x10/0x10 [ 287.137226][ T30] audit: type=1400 audit(1722787646.363:2494): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 2787646.313:2492): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass= Aug 4 16:07:26 syzkaller kern.info kernel: [ 286.973061][ T31] __vhost_worker_flush+0x1aa/0x1e0 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.026627][ T31] ? __pfx___vhost_w[ 287.191034][ T31] vhost_net_flush+0x1d/0x1b0 orker_flush+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.039241][ T31] ? __pfx_vhost_flush_work+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.055029][ T31] ? __pfx___mutex_unlock_slowpa[ 287.217077][ T31] vhost_net_release+0xa9/0x260 th+0x10/0x10 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 2[ 287.227613][ T30] audit: type=1400 audit(1722787646.363:2495): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 87.057367][ T30] audit: type=1400 audit(1722787646.333:2493): avc: denied { read } for pid=4651 comm="syslogd" name="log" d[ 287.261945][ T31] ? __pfx_vhost_net_release+0x10/0x10 ev="sda1" ino=19[ 287.267828][ T31] ? __pfx_locks_remove_file+0x10/0x10 15 scontext=system_u:system_r:syslogd_t tcontext=system_u:object[ 287.278944][ T31] ? __pfx___might_resched+0x10/0x10 _r:var_t tclass= Aug 4 16:07:26 syzkaller kern.info kernel: [ [ 287.290716][ T30] audit: type=1400 audit(1722787646.373:2496): avc: denied { read write } for pid=5229 comm="syz-executor" name="loop4" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 287.094721][ [ 287.301167][ T31] ? evm_file_release+0xd6/0x1d0 T31] vhost_dev_flush+0xad/0x120 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.132803][ T31] ? __pfx_vhost_dev_flush+0x10/0x10 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 287.137226][ T30] audit: type=1400 audit(1722787646.363:2494): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="s[ 287.348676][ T30] audit: type=1400 audit(1722787646.393:2497): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 da1" ino=1915 sc[ 287.357443][ T31] __fput+0x408/0xbb0 ontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:va[ 287.382584][ T30] audit: type=1400 audit(1722787646.403:2498): avc: denied { read } for pid=4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 r_t tclass= Aug 4 16:07:26 syzkaller kern.info[ 287.408843][ T31] task_work_run+0x14e/0x250 kernel: [ 287.191034][ T31] vhost_net_flush[ 287.417265][ T31] ? __pfx_task_work_run+0x10/0x10 +0x1d/0x1b0 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.217077][ T31] vhost_net_release+0xa9/0x260 Aug 4 16:07:26 s[ 287.434302][ T31] get_signal+0x1ca/0x2770 yzkaller kern.no[ 287.439200][ T31] ? __pfx_get_signal+0x10/0x10 tice kernel: [ 287.227613][ T30] audit: type=[ 287.449156][ T31] arch_do_signal_or_restart+0x90/0x7e0 1400 audit(1722787646.363:2495):[ 287.456693][ T31] ? __pfx_arch_do_signal_or_restart+0x10/0x10 avc: denied { read } for pid[ 287.465609][ T31] syscall_exit_to_user_mode+0x150/0x2a0 =4651 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=sys[ 287.476664][ T31] do_syscall_64+0xda/0x250 tem_u:system_r:s[ 287.483406][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f yslogd_t tcontex[ 287.489973][ T31] RIP: 0033:0x7fd8b73779f9 t=system_u:object_r:var_t tclass= Aug 4 16:07:[ 287.490003][ T31] RSP: 002b:00007fd8b6dff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 26 syzkaller ker[ 287.508916][ T31] RAX: 0000000000000000 RBX: 00007fd8b7505f80 RCX: 00007fd8b73779f9 n.info kernel: [[ 287.518319][ T31] RDX: 0000000000000000 RSI: 000040000000af01 RDI: 0000000000000005 287.261945][ T31] ? __pfx_vhost_net_release+0x10/0x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.267828][ T31] ? __pfx_locks_remove_file+0x10/0[ 287.540580][ T31] RBP: 00007fd8b73e58ee R08: 0000000000000000 R09: 0000000000000000 x10 Aug 4 16:07:26 syzkaller kern.info kernel: [ 287.278944][ T31] ? __pfx___might_resched+0x10/0x10 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 287.290716][ T30] audit: type=1400 audit(1722787646.373:2496): av[ 287.569248][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 c: denied { read write } for pid=5229 comm="s[ 287.581240][ T31] R13: 000000000000000b R14: 00007fd8b7505f80 R15: 00007ffc00a0a128 yz-executor" nam[ 287.590432][ T31] e="loop4" dev="d[ 287.595024][ T31] [ 287.595024][ T31] Showing all locks held in the system: evtmpfs" ino=653[ 287.604216][ T31] 1 lock held by khungtaskd/31: scontext=root:s[ 287.604242][ T31] #0: ffffffff8ddb53a0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 ysadm_r:sysadm_t tcontext=system[ 287.623722][ T31] 1 lock held by syslogd/4651: _u:object_r:fi Aug 4 16:07:26 syzkaller kern.info kernel: [ 2[ 287.633836][ T31] 2 locks held by getty/4973: 87.301167][ T3[ 287.639590][ T31] #0: ffff88802b89c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 287.639700][ T31] #1: ffffc900031232f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfc8/0x1490 [ 287.639808][ T31] [ 287.639818][ T31] ============================================= [ 287.639818][ T31] [ 287.639842][ T31] NMI backtrace for cpu 1 [ 287.639859][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 [ 287.639900][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 287.639922][ T31] Call Trace: [ 287.639935][ T31] [ 287.639948][ T31] dump_stack_lvl+0x116/0x1f0 [ 287.640002][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 287.640043][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 287.640095][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 287.640140][ T31] watchdog+0xf4e/0x1280 [ 287.640192][ T31] ? __pfx_watchdog+0x10/0x10 [ 287.640238][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 287.640276][ T31] ? __kthread_parkme+0x148/0x220 [ 287.640331][ T31] ? __pfx_watchdog+0x10/0x10 [ 287.640378][ T31] kthread+0x2c1/0x3a0 [ 287.640409][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 287.640444][ T31] ? __pfx_kthread+0x10/0x10 [ 287.640476][ T31] ret_from_fork+0x45/0x80 [ 287.640536][ T31] ? __pfx_kthread+0x10/0x10 [ 287.640568][ T31] ret_from_fork_asm+0x1a/0x30 [ 287.640625][ T31] 1] ? evm_file_release+0xd6/0x1d0 Aug 4 16:07:26 syzkaller kern.notice kernel: [ 287.348676][ T30] audit: type=1400 audit(1722787646.393:2497): avc: denie[ 287.782768][ T31] Sending NMI from CPU 1 to CPUs 0: [ 287.782826][ C0] NMI backtrace for cpu 0 [ 287.782842][ C0] CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 [ 287.782875][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 287.782892][ C0] Workqueue: bat_events batadv_nc_worker [ 287.782929][ C0] RIP: 0010:check_preemption_disabled+0x2d/0xe0 [ 287.782966][ C0] Code: 53 48 83 ec 08 65 8b 1d 5d 0d f2 74 65 8b 05 52 0d f2 74 a9 ff ff ff 7f 74 0f 48 83 c4 08 89 d8 5b 5d 41 5c c3 cc cc cc cc 9c <58> f6 c4 02 74 ea 65 48 8b 05 25 0d f2 74 f6 40 2f 04 48 89 fd 74 [ 287.782992][ C0] RSP: 0018:ffffc90000107a98 EFLAGS: 00000046 [ 287.783012][ C0] RAX: 0000000080000000 RBX: 0000000000000000 RCX: ffffffff81686689 [ 287.783029][ C0] RDX: 1ffffffff1bb6a74 RSI: ffffffff8b4cc7c0 RDI: ffffffff8bb08500 [ 287.783048][ C0] RBP: ffffffff9012eb38 R08: 0000000000000000 R09: fffffbfff202574b [ 287.783065][ C0] R10: ffffffff9012ba5f R11: 0000000000000000 R12: ffffffff8ddb53a0 [ 287.783083][ C0] R13: 0000000000000000 R14: ffff888017a83c00 R15: 0000000000000001 [ 287.783100][ C0] FS: 0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000 [ 287.783127][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.783145][ C0] CR2: 000055eb4f6d6008 CR3: 000000000db7c000 CR4: 00000000003506f0 [ 287.783163][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.783179][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.783196][ C0] Call Trace: [ 287.783204][ C0] [ 287.783213][ C0] ? show_regs+0x8c/0xa0 [ 287.783254][ C0] ? nmi_cpu_backtrace+0x1d8/0x390 [ 287.783285][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 287.783325][ C0] ? nmi_handle+0x1a9/0x5c0 [ 287.783355][ C0] ? check_preemption_disabled+0x2d/0xe0 [ 287.783396][ C0] ? default_do_nmi+0x6a/0x160 [ 287.783444][ C0] ? exc_nmi+0x170/0x1e0 [ 287.783493][ C0] ? end_repeat_nmi+0xf/0x53 [ 287.783539][ C0] ? lock_release+0xa9/0x6f0 [ 287.783576][ C0] ? check_preemption_disabled+0x2d/0xe0 [ 287.783614][ C0] ? check_preemption_disabled+0x2d/0xe0 [ 287.783653][ C0] ? check_preemption_disabled+0x2d/0xe0 [ 287.783690][ C0] [ 287.783700][ C0] [ 287.783710][ C0] lock_release+0x187/0x6f0 [ 287.783747][ C0] ? batadv_nc_worker+0x8e9/0x10f0 [ 287.783786][ C0] ? __pfx_lock_release+0x10/0x10 [ 287.783824][ C0] ? __pfx___lock_acquire+0x10/0x10 [ 287.783864][ C0] batadv_nc_worker+0x8ee/0x10f0 [ 287.783906][ C0] ? __pfx_batadv_nc_worker+0x10/0x10 [ 287.783945][ C0] ? __pfx_lock_release+0x10/0x10 [ 287.783987][ C0] process_one_work+0x9c5/0x1b40 [ 287.784033][ C0] ? __pfx_batadv_nc_worker+0x10/0x10 [ 287.784071][ C0] ? __pfx_process_one_work+0x10/0x10 [ 287.784116][ C0] ? assign_work+0x1a0/0x250 [ 287.784153][ C0] worker_thread+0x6c8/0xf20 [ 287.784199][ C0] ? __pfx_worker_thread+0x10/0x10 [ 287.784240][ C0] kthread+0x2c1/0x3a0 [ 287.784267][ C0] ? _raw_spin_unlock_irq+0x23/0x50 [ 287.784298][ C0] ? __pfx_kthread+0x10/0x10 [ 287.784326][ C0] ret_from_fork+0x45/0x80 [ 287.784373][ C0] ? __pfx_kthread+0x10/0x10 [ 287.784400][ C0] ret_from_fork_asm+0x1a/0x30 [ 287.784451][ C0] [ 287.794071][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 287.794094][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc1-syzkaller-00293-gdefaf1a2113a #0 [ 287.794137][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 287.794157][ T31] Call Trace: [ 287.794170][ T31] [ 287.794183][ T31] dump_stack_lvl+0x3d/0x1f0 [ 287.794240][ T31] panic+0x6f5/0x7a0 [ 287.794280][ T31] ? __pfx_panic+0x10/0x10 [ 287.794317][ T31] ? preempt_schedule_thunk+0x1a/0x30 [ 287.794353][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 287.794405][ T31] ? preempt_schedule_thunk+0x1a/0x30 [ 287.794441][ T31] ? watchdog+0xd8a/0x1280 [ 287.794498][ T31] ? watchdog+0xd7d/0x1280 [ 287.794546][ T31] watchdog+0xd9b/0x1280 [ 287.794596][ T31] ? __pfx_watchdog+0x10/0x10 [ 287.794644][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 287.794684][ T31] ? __kthread_parkme+0x148/0x220 [ 287.794741][ T31] ? __pfx_watchdog+0x10/0x10 [ 287.794788][ T31] kthread+0x2c1/0x3a0 [ 287.794819][ T31] ? _raw_spin_unlock_irq+0x23/0x50 [ 287.794854][ T31] ? __pfx_kthread+0x10/0x10 [ 287.794885][ T31] ret_from_fork+0x45/0x80 [ 287.794940][ T31] ? __pfx_kthread+0x10/0x10 [ 287.794971][ T31] ret_from_fork_asm+0x1a/0x30 [ 287.795027][ T31] [ 287.800156][ T31] Kernel Offset: disabled