last executing test programs: 4m40.817136158s ago: executing program 0 (id=629): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000001fee)='R\x10rust\xe3c*s\xa8rVid:\xc4e', 0x0) 4m39.040656011s ago: executing program 0 (id=630): getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) sendmsg$nl_xfrm(r2, 0x0, 0x4000000) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) 4m37.827478123s ago: executing program 0 (id=631): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan1\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000200)={0x1d, r2}, 0x10) sendmsg$nl_route_sched(r0, 0x0, 0x0) recvfrom(r1, 0x0, 0x0, 0x10100, 0x0, 0x0) 4m34.292955147s ago: executing program 0 (id=632): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000002100)=@newtaction={0x894, 0x30, 0x12f, 0x0, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0xfffffffc, 0xb, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff35, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x1]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x6, 0xffffffff, 0x7f, 0x401, 0x2, 0x0, 0x2, 0x80000000, 0x7fffffff, 0x5, 0x8, 0x0, 0x7fff, 0x75ba, 0x7fffffff, 0x5, 0xffffffff, 0x7ff, 0x2, 0x9, 0x2, 0x0, 0x1000, 0x1, 0x3, 0x6, 0x0, 0xfa, 0x4, 0x0, 0xf, 0x80000001, 0x7, 0xfffffffb, 0x1, 0x20, 0x5, 0x8, 0x1, 0x2f2, 0x7fff, 0x0, 0x81, 0x206, 0x1ff, 0x7, 0x3, 0x5, 0x3, 0x9, 0x1000, 0x401, 0x1, 0x6, 0x7, 0x2, 0x4, 0x7f, 0x5, 0xfffffffb, 0x1, 0x4, 0x5, 0x8, 0x2000009, 0x9, 0x10, 0x9, 0x7, 0xffffff00, 0x97, 0x0, 0x4, 0x8, 0x8, 0x1, 0x958, 0x1fe, 0x4, 0x6, 0x7, 0x80, 0x5, 0xe53, 0x0, 0xfffffffe, 0x4, 0x8, 0x9, 0x7fff, 0x30, 0x8, 0xfffffff7, 0x4, 0x9, 0x1, 0x4, 0x7, 0x9, 0x5, 0x7, 0x6, 0x0, 0x5, 0x2, 0x7, 0x3, 0xcdd, 0x2, 0xd67, 0x7, 0x4, 0x25, 0x9dc5, 0x7, 0xfffffff7, 0x2, 0x400, 0x8, 0x0, 0x7, 0x5, 0x9, 0xa, 0xa, 0x9, 0x5, 0xdb5, 0x101, 0x4, 0x74e4, 0x7fff, 0x7, 0x7ff, 0x1, 0xd70, 0x1, 0x8, 0xa, 0x800007, 0x1, 0x82, 0x52e, 0x7, 0x1, 0x5, 0x26, 0x1, 0x1b2a, 0x81, 0x9, 0x1c, 0x767, 0x7, 0x9, 0x10, 0xc2a, 0xff, 0x7, 0x6, 0x7, 0x3, 0xfffffff4, 0x8, 0x3, 0xfff, 0x8, 0x2, 0x5, 0x6, 0x3, 0xd7c3, 0x2, 0x10000, 0x7fff, 0x5, 0x5, 0x0, 0xfffffff7, 0x4, 0x2, 0x0, 0x6ee1847d, 0x10001, 0x7ff, 0x1, 0xf0, 0x7, 0x2, 0x7, 0x4, 0x6, 0x4, 0x7, 0x2, 0x0, 0x1, 0x4, 0x3, 0xfff, 0x80000001, 0x7, 0x676, 0x3, 0x9, 0x4, 0x4, 0x7fff, 0x4a5, 0x23, 0x4, 0x9, 0x8, 0x4000000, 0x8000, 0xa, 0x9, 0xca000000, 0x3, 0xfffffffa, 0x3, 0x7, 0x9, 0x7, 0x65fe, 0x9, 0x6, 0x4, 0x80000000, 0x5, 0x801, 0xb848, 0x6, 0x6, 0x800, 0x7, 0x1, 0xb, 0x80, 0x2, 0x3, 0x6, 0x9, 0x4, 0x4, 0xc, 0x80000001, 0x5, 0x5, 0x10000002, 0xb, 0x7, 0x5, 0x2, 0x4]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x9}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x1, 0x7, 0x4, 0x1, {0x7, 0x0, 0x3, 0x7, 0x7, 0x80000001}, {0x4, 0x2, 0x1, 0xa, 0x1ff, 0x1c0000}, 0x9, 0xbc, 0xdf72c67}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x0) 4m33.395967314s ago: executing program 0 (id=633): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000680)={0x0, 0x200000, 0x800, 0x2, 0xf0000}, 0x20) 4m32.939323088s ago: executing program 0 (id=635): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f00000001c0)=0x1000000, 0x4) 3m47.030852956s ago: executing program 32 (id=635): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f00000001c0)=0x1000000, 0x4) 10.160380351s ago: executing program 2 (id=1023): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xf, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x3}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757811"], 0x65) 9.684174466s ago: executing program 2 (id=1024): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x70bd29, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe, 0x9}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}}, 0x0) 8.06798021s ago: executing program 2 (id=1027): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060102000034e40000000000000003050001000600000005000400000000000900020073797a3100000000050005000200000011000300686173683a69702c706f7274"], 0x58}, 0x1, 0x0, 0x0, 0xc5dff1b4c279acea}, 0x2) syz_open_dev$usbfs(0x0, 0xb, 0x101301) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="50000000090601020000000000000000020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 6.284010633s ago: executing program 2 (id=1029): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newlink={0x5c, 0x10, 0x403, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x74, r2, 0x800, 0x55007}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERIER={0x5, 0x19, 0x2}, @IFLA_BR_MCAST_STARTUP_QUERY_INTVL={0xc, 0x23, 0xf}, @IFLA_BR_MCAST_QUERY_RESPONSE_INTVL={0xc, 0x22, 0x6}, @IFLA_BR_NF_CALL_IPTABLES={0x5, 0x24, 0x1}]}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r4, &(0x7f0000000040)=""/148, 0xffffff96) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa1780c206050086dd60"], 0x0) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0xffffffffffffff62, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000400180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001"], 0xfc}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r4) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'syztnl0\x00', &(0x7f0000000340)={'gre0\x00', 0x0, 0x20, 0x20, 0x1, 0x8, {{0x18, 0x4, 0x1, 0x38, 0x60, 0x67, 0x0, 0xff, 0x2, 0x0, @rand_addr=0x64010100, @empty, {[@timestamp_prespec={0x44, 0xc, 0x2d, 0x3, 0x0, [{@multicast1, 0x7}]}, @lsrr={0x83, 0x3, 0x8}, @ra={0x94, 0x4}, @cipso={0x86, 0x38, 0xffffffffffffffff, [{0x0, 0xd, "bc0a12bb6ce410a0b8d164"}, {0x6, 0x9, "5c1f633676f3bc"}, {0x7, 0x7, "65838fffaa"}, {0x1, 0x4, 'pZ'}, {0x34941c15ba19259c, 0xb, "bfb0599dc0ab0b4fc6"}, {0x6, 0x6, "5acb21cb"}]}]}}}}}) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000d40)={0x1fc, r13, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x6c, 0x2, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x9}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x104, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xf}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_STRSET_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x4}, @ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x8080}, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r15}, 0x10) pwritev2(r7, &(0x7f0000000700)=[{&(0x7f0000000600)="e31473f4fe59bd2af864cd404b19c874b85989c06a12af8f46b80f25b9f754c1d0286d96d77703d7e7fefafee14f2ce90854ca0ced1c59785aad0f30a349f169a8c53cb263a79057f28009467c157caa4aa089d2e621d97c5e8bf6e8462350bb10e91dfd5d5ccd1f6f3e9bd94885ea4560ab2fc29754a70a2de8d90a7fb351e967", 0x81}, {&(0x7f00000006c0)}, {&(0x7f0000000c80)="910e2e6e96f7173dd253e30a2db3f0cb094f090121ba12261d5780e1eb33950830b9dd9c7ece816b8ed81492da1df96c5769e8df5510533cceed71ab03ab4227c62637ba9dd7e2ba1917ed1f5ced33e696148e6ccb40f9a4803b82a8d1f8f387b636d3a3199efa83555a5c40329efc652fb22de207d0267110779d22ff59d97937c04cd5b76548278917856acb1b1194c1a63856999def0aa3f997c9bd69ebdbc0ee8cb885e6cdca9d67a9226f6413b8ab43ea3129d9961821febddb", 0xbc}], 0x3, 0x7fffffff, 0x18, 0x1b) close(r11) 1.994829116s ago: executing program 1 (id=1036): bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x3, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x4000880) 1.710525041s ago: executing program 1 (id=1037): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_usb_connect(0x2, 0x4a, &(0x7f0000000040)=ANY=[], 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000000)) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffff7f}]}) close_range(r0, 0xffffffffffffffff, 0x0) 1.411515576s ago: executing program 1 (id=1038): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)=@ccm_128={{0x303}, "5525b137ba2ead4f", "aa764a1b09ad21687594081893a037ec", "0606fa47", "c375e7d1b22ce51f"}, 0x28) write$binfmt_script(r0, &(0x7f0000000200), 0xfffffd9d) 1.042307555s ago: executing program 1 (id=1039): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) flock(r1, 0x2) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x100000000000000) 930.166882ms ago: executing program 2 (id=1040): r0 = io_uring_setup(0x1612, &(0x7f0000000200)={0x0, 0x0, 0x800}) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=[0x2]}, 0x20) 744.029591ms ago: executing program 2 (id=1041): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x42202) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_io_uring_setup(0x88f, &(0x7f00000001c0)={0x0, 0xb1ce, 0x0, 0x2, 0xbfdffffd}, 0x0, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick=0xffffff3f, {}, {}, @raw32}], 0xffc8) r1 = socket(0x10, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffff0000}, 0xffffffffffffffd2}, 0x48) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000580)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x1}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000d00)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd24, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {0xb, 0x9}, {}, {0xfff2, 0x2}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8, 0x1, {0x1, 0xc}}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8848}, 0x20004804) r8 = open(&(0x7f00000005c0)='./bus\x00', 0x60842, 0x0) pwritev2(r8, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x30, 0x3) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/power/sync_on_suspend', 0x143b02, 0x1c0) r10 = dup(r9) r11 = open(&(0x7f0000000040)='./bus\x00', 0x40d00, 0x20) sendfile(r10, r11, 0x0, 0x8000fffffffe) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r12}, 0x10) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) write$binfmt_script(r2, &(0x7f0000000780)={'#! ', './file0'}, 0xb) close_range(r1, r2, 0x0) 561.192301ms ago: executing program 1 (id=1042): sendmsg$inet(0xffffffffffffffff, 0x0, 0x240040c1) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x111000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x87}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r1, 0x0, 0x3}, 0x18) io_setup(0x3, &(0x7f0000000340)) 0s ago: executing program 1 (id=1043): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0xffffffff, 0x0, 0x0, 0x4, 0x2, 0x1}}) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)=0x6, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000063014800000000009500000000000000f33f"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) getpid() madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0xff, 0x0, 0x0, 0x0, 0x3}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x100}) kernel console output (not intermixed with test programs): tlink: 32 bytes leftover after parsing attributes in process `syz.1.192'. [ 399.356814][ T3909] IPv6: Can't replace route, no match found [ 399.828675][ T3913] syz.0.202 uses obsolete (PF_INET,SOCK_PACKET) [ 400.694856][ T30] audit: type=1326 audit(400.110:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.718339][ T30] audit: type=1326 audit(400.130:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.751712][ T30] audit: type=1326 audit(400.160:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.752681][ T30] audit: type=1326 audit(400.160:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.766515][ T30] audit: type=1326 audit(400.160:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.773806][ T30] audit: type=1326 audit(400.190:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.802945][ T30] audit: type=1326 audit(400.220:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.833269][ T30] audit: type=1326 audit(400.240:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.859089][ T30] audit: type=1326 audit(400.270:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 400.889630][ T30] audit: type=1326 audit(400.300:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 407.011580][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 407.012321][ T30] audit: type=1400 audit(406.430:164): avc: denied { create } for pid=3954 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 407.038325][ T30] audit: type=1400 audit(406.450:165): avc: denied { write } for pid=3954 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 413.339536][ T30] audit: type=1400 audit(412.750:166): avc: denied { allowed } for pid=3968 comm="syz.1.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 413.392204][ T30] audit: type=1400 audit(412.810:167): avc: denied { create } for pid=3968 comm="syz.1.225" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 414.062235][ T30] audit: type=1400 audit(413.480:168): avc: denied { prog_load } for pid=3970 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 414.065861][ T30] audit: type=1400 audit(413.480:169): avc: denied { bpf } for pid=3970 comm="syz.1.226" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 414.099899][ T30] audit: type=1400 audit(413.510:170): avc: denied { perfmon } for pid=3970 comm="syz.1.226" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 414.121429][ T30] audit: type=1400 audit(413.530:171): avc: denied { read } for pid=3970 comm="syz.1.226" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 414.145563][ T30] audit: type=1400 audit(413.560:172): avc: denied { open } for pid=3970 comm="syz.1.226" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 414.185969][ T30] audit: type=1400 audit(413.580:173): avc: denied { ioctl } for pid=3970 comm="syz.1.226" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 415.633420][ T30] audit: type=1400 audit(415.050:174): avc: denied { map_create } for pid=3975 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 415.638957][ T30] audit: type=1400 audit(415.050:175): avc: denied { map_read map_write } for pid=3975 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 419.452180][ T30] audit: type=1400 audit(418.870:176): avc: denied { create } for pid=3981 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 419.485461][ T30] audit: type=1400 audit(418.900:177): avc: denied { create } for pid=3981 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 419.512206][ T30] audit: type=1400 audit(418.930:178): avc: denied { write } for pid=3981 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 419.529165][ T30] audit: type=1400 audit(418.940:179): avc: denied { module_request } for pid=3981 comm="syz.1.231" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 419.931283][ T30] audit: type=1400 audit(419.350:180): avc: denied { read } for pid=3981 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 419.963431][ T30] audit: type=1400 audit(419.380:181): avc: denied { ioctl } for pid=3981 comm="syz.1.231" path="socket:[4874]" dev="sockfs" ino=4874 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 420.650239][ T30] audit: type=1400 audit(420.040:182): avc: denied { sys_module } for pid=3981 comm="syz.1.231" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 422.164904][ T30] audit: type=1400 audit(421.580:183): avc: denied { prog_run } for pid=3989 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 426.191725][ T30] audit: type=1400 audit(425.610:184): avc: denied { read } for pid=4005 comm="syz.1.239" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 426.202169][ T30] audit: type=1400 audit(425.610:185): avc: denied { open } for pid=4005 comm="syz.1.239" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 426.219834][ T30] audit: type=1400 audit(425.630:186): avc: denied { ioctl } for pid=4005 comm="syz.1.239" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 433.063509][ T30] audit: type=1400 audit(432.480:187): avc: denied { create } for pid=4031 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 433.111757][ T30] audit: type=1400 audit(432.530:188): avc: denied { write } for pid=4031 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 438.095685][ T4050] siw: device registration error -23 [ 439.034168][ T30] audit: type=1400 audit(438.450:189): avc: denied { map } for pid=4057 comm="syz.1.258" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4985 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 439.035101][ T30] audit: type=1400 audit(438.450:190): avc: denied { read write } for pid=4057 comm="syz.1.258" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4985 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 439.922027][ T30] audit: type=1400 audit(439.330:191): avc: denied { mount } for pid=4059 comm="syz.1.259" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 439.992866][ T30] audit: type=1400 audit(439.410:192): avc: denied { create } for pid=4059 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 440.024151][ T30] audit: type=1400 audit(439.440:193): avc: denied { ioctl } for pid=4059 comm="syz.1.259" path="socket:[4986]" dev="sockfs" ino=4986 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 441.081813][ T30] audit: type=1400 audit(440.500:194): avc: denied { mounton } for pid=4063 comm="syz.1.261" path="/168/file0" dev="tmpfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 441.089762][ T30] audit: type=1400 audit(440.500:195): avc: denied { mount } for pid=4063 comm="syz.1.261" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 441.360841][ T30] audit: type=1400 audit(440.780:196): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 442.288646][ T30] audit: type=1400 audit(441.680:197): avc: denied { read write } for pid=4067 comm="syz.1.263" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 442.300866][ T30] audit: type=1400 audit(441.720:198): avc: denied { open } for pid=4067 comm="syz.1.263" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 446.113646][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 446.136557][ T30] audit: type=1400 audit(445.530:201): avc: denied { create } for pid=4098 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 446.728568][ T30] audit: type=1400 audit(446.080:202): avc: denied { execmem } for pid=4103 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 448.315300][ T30] audit: type=1400 audit(447.730:203): avc: denied { name_bind } for pid=4108 comm="syz.1.282" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 448.342428][ T30] audit: type=1400 audit(447.750:204): avc: denied { node_bind } for pid=4108 comm="syz.1.282" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 452.082601][ T4116] mmap: syz.0.280 (4116) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 452.439678][ T30] audit: type=1400 audit(451.700:205): avc: denied { execute } for pid=4103 comm="syz.0.280" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=6068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 457.966007][ T30] audit: type=1400 audit(457.380:206): avc: denied { read write } for pid=4120 comm="syz.1.285" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 457.972178][ T30] audit: type=1400 audit(457.390:207): avc: denied { open } for pid=4120 comm="syz.1.285" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 458.018330][ T30] audit: type=1400 audit(457.430:208): avc: denied { ioctl } for pid=4120 comm="syz.1.285" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 458.090600][ T4121] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 458.122365][ T4121] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 460.338961][ T30] audit: type=1400 audit(459.750:209): avc: denied { create } for pid=4129 comm="syz.1.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 460.363901][ T30] audit: type=1400 audit(459.780:210): avc: denied { setopt } for pid=4129 comm="syz.1.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 460.783361][ T30] audit: type=1400 audit(460.200:211): avc: denied { write } for pid=4133 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 462.299947][ T30] audit: type=1400 audit(461.720:212): avc: denied { connect } for pid=4145 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 462.409046][ T30] audit: type=1400 audit(461.820:213): avc: denied { read } for pid=4145 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 462.650295][ T30] audit: type=1400 audit(462.060:214): avc: denied { create } for pid=4148 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 462.713513][ T30] audit: type=1400 audit(462.130:215): avc: denied { write } for pid=4148 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 464.825607][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 464.826655][ T30] audit: type=1400 audit(464.240:217): avc: denied { bind } for pid=4161 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 464.836119][ T30] audit: type=1400 audit(464.250:218): avc: denied { setopt } for pid=4161 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 465.794732][ T30] audit: type=1400 audit(465.210:219): avc: denied { create } for pid=4170 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 465.811174][ T30] audit: type=1400 audit(465.230:220): avc: denied { bind } for pid=4170 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 465.835773][ T30] audit: type=1400 audit(465.250:221): avc: denied { write } for pid=4170 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 466.891309][ T4178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=4178 comm=syz.0.310 [ 467.075509][ T30] audit: type=1400 audit(466.490:222): avc: denied { mount } for pid=4179 comm="syz.1.312" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 467.101869][ T30] audit: type=1400 audit(466.510:223): avc: denied { mounton } for pid=4179 comm="syz.1.312" path="/198/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 467.120707][ T4180] ======================================================= [ 467.120707][ T4180] WARNING: The mand mount option has been deprecated and [ 467.120707][ T4180] and is ignored by this kernel. Remove the mand [ 467.120707][ T4180] option from the mount to silence this warning. [ 467.120707][ T4180] ======================================================= [ 467.266500][ T30] audit: type=1400 audit(466.680:224): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 469.325072][ T30] audit: type=1400 audit(468.740:225): avc: denied { ioctl } for pid=4190 comm="syz.1.318" path="socket:[7169]" dev="sockfs" ino=7169 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 480.731957][ T4209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=4209 comm=syz.1.321 [ 483.746217][ T30] audit: type=1400 audit(483.160:226): avc: denied { create } for pid=4216 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 483.799374][ T30] audit: type=1400 audit(483.210:227): avc: denied { connect } for pid=4216 comm="syz.1.325" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 483.821481][ T30] audit: type=1400 audit(483.220:228): avc: denied { write } for pid=4216 comm="syz.1.325" path="socket:[7208]" dev="sockfs" ino=7208 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 485.499719][ T30] audit: type=1400 audit(484.920:229): avc: denied { append } for pid=4230 comm="syz.1.332" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 485.709664][ T30] audit: type=1400 audit(485.120:230): avc: denied { name_bind } for pid=4231 comm="syz.0.333" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 486.531695][ T4239] netlink: 'syz.1.336': attribute type 5 has an invalid length. [ 488.002856][ T30] audit: type=1400 audit(487.420:231): avc: denied { name_bind } for pid=4251 comm="syz.1.343" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 488.636899][ T30] audit: type=1400 audit(488.050:232): avc: denied { create } for pid=4256 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 489.502583][ T30] audit: type=1400 audit(488.920:233): avc: denied { write } for pid=4260 comm="syz.0.347" name="raw" dev="proc" ino=4026532639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 490.458857][ T30] audit: type=1400 audit(489.870:234): avc: denied { read } for pid=4264 comm="syz.0.349" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 490.460082][ T30] audit: type=1400 audit(489.870:235): avc: denied { open } for pid=4264 comm="syz.0.349" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 490.486532][ T30] audit: type=1400 audit(489.900:236): avc: denied { mounton } for pid=4264 comm="syz.0.349" path="/proc/274/cgroup" dev="proc" ino=7281 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 491.374177][ T30] audit: type=1400 audit(490.790:237): avc: denied { read write } for pid=4270 comm="syz.0.352" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 491.399202][ T30] audit: type=1400 audit(490.790:238): avc: denied { open } for pid=4270 comm="syz.0.352" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 491.498889][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.503005][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.505316][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.516056][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.520520][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.524662][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.528360][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.539841][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.542294][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.544353][ T3603] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 491.590212][ T3603] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 492.776670][ T30] audit: type=1326 audit(492.180:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4278 comm="syz.1.355" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 492.789077][ T30] audit: type=1326 audit(492.190:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4278 comm="syz.1.355" exe="/syz-executor" sig=0 arch=c00000b7 syscall=6 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 492.854375][ T30] audit: type=1326 audit(492.190:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4278 comm="syz.1.355" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 492.855659][ T30] audit: type=1326 audit(492.210:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4278 comm="syz.1.355" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 493.981288][ T4277] fido_id[4277]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 495.665312][ T30] audit: type=1400 audit(495.080:243): avc: denied { write } for pid=4295 comm="syz.0.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 502.353438][ T30] audit: type=1400 audit(501.770:244): avc: denied { create } for pid=4314 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 502.415174][ T30] audit: type=1400 audit(501.830:245): avc: denied { getopt } for pid=4314 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 514.123028][ T4358] veth0_vlan: entered allmulticast mode [ 519.099727][ T30] audit: type=1400 audit(518.500:246): avc: denied { search } for pid=4385 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.102828][ T30] audit: type=1400 audit(518.520:247): avc: denied { search } for pid=4385 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=536 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.108874][ T30] audit: type=1400 audit(518.520:248): avc: denied { search } for pid=4385 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=689 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.109798][ T30] audit: type=1400 audit(518.520:249): avc: denied { search } for pid=4385 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.414685][ T30] audit: type=1400 audit(518.830:250): avc: denied { read open } for pid=4395 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 519.444068][ T30] audit: type=1400 audit(518.850:251): avc: denied { getattr } for pid=4395 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.135723][ T30] audit: type=1400 audit(519.550:252): avc: denied { add_name } for pid=4385 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 520.162494][ T30] audit: type=1400 audit(519.550:253): avc: denied { create } for pid=4385 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 520.175169][ T30] audit: type=1400 audit(519.590:254): avc: denied { write open } for pid=4385 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1068 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 520.198658][ T30] audit: type=1400 audit(519.610:255): avc: denied { append } for pid=4385 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1068 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 532.323361][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 532.369134][ T30] audit: type=1400 audit(531.710:260): avc: denied { write } for pid=4427 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 543.179820][ T30] audit: type=1400 audit(542.590:261): avc: denied { setopt } for pid=4447 comm="syz.0.425" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.364887][ T30] audit: type=1326 audit(542.780:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 543.376676][ T4449] pimreg: entered allmulticast mode [ 543.391277][ T30] audit: type=1326 audit(542.810:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 543.436388][ T30] audit: type=1326 audit(542.850:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 543.444815][ T4449] pimreg: left allmulticast mode [ 543.509152][ T30] audit: type=1326 audit(542.910:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 543.534147][ T30] audit: type=1326 audit(542.950:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 543.583509][ T30] audit: type=1326 audit(542.990:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 545.394488][ T30] audit: type=1400 audit(544.810:268): avc: denied { create } for pid=4457 comm="syz.1.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 545.442630][ T30] audit: type=1400 audit(544.860:269): avc: denied { ioctl } for pid=4457 comm="syz.1.431" path="socket:[6592]" dev="sockfs" ino=6592 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 545.480883][ T30] audit: type=1400 audit(544.890:270): avc: denied { bind } for pid=4457 comm="syz.1.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 545.530823][ T4458] netlink: 4 bytes leftover after parsing attributes in process `syz.1.431'. [ 546.972160][ T4460] netlink: 4 bytes leftover after parsing attributes in process `syz.0.430'. [ 547.021846][ T4460] netlink: 348 bytes leftover after parsing attributes in process `syz.0.430'. [ 547.776682][ T4460] syzkaller0: entered promiscuous mode [ 547.798837][ T4460] syzkaller0: entered allmulticast mode [ 547.832745][ T4464] netlink: 'syz.1.432': attribute type 3 has an invalid length. [ 549.586618][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 549.592698][ T30] audit: type=1326 audit(549.000:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.593875][ T30] audit: type=1326 audit(549.010:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.603179][ T30] audit: type=1326 audit(549.010:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.604068][ T30] audit: type=1326 audit(549.020:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.604485][ T30] audit: type=1326 audit(549.020:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.633152][ T30] audit: type=1326 audit(549.040:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.660691][ T30] audit: type=1326 audit(549.080:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.684426][ T30] audit: type=1326 audit(549.100:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.711304][ T30] audit: type=1326 audit(549.130:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.712320][ T30] audit: type=1326 audit(549.130:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4467 comm="syz.1.434" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 549.739626][ T4468] syz.1.434 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 557.449725][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 557.450534][ T30] audit: type=1326 audit(556.860:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.455105][ T30] audit: type=1326 audit(556.870:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.492923][ T30] audit: type=1326 audit(556.910:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.541879][ T30] audit: type=1326 audit(556.950:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.542978][ T30] audit: type=1326 audit(556.950:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.564329][ T30] audit: type=1326 audit(556.980:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.622932][ T30] audit: type=1326 audit(557.030:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.623963][ T30] audit: type=1326 audit(557.040:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.642727][ T30] audit: type=1326 audit(557.060:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 557.643706][ T30] audit: type=1326 audit(557.060:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4489 comm="syz.1.443" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 564.313864][ T4527] siw: device registration error -23 [ 564.696945][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 564.704788][ T30] audit: type=1400 audit(564.110:304): avc: denied { create } for pid=4528 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 564.719465][ T30] audit: type=1400 audit(564.130:305): avc: denied { setopt } for pid=4528 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 564.751904][ T30] audit: type=1400 audit(564.160:306): avc: denied { write } for pid=4528 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 565.210129][ T30] audit: type=1326 audit(564.620:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.222632][ T30] audit: type=1326 audit(564.640:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.238052][ T30] audit: type=1326 audit(564.650:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.256877][ T30] audit: type=1326 audit(564.670:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.266363][ T30] audit: type=1326 audit(564.680:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.274716][ T30] audit: type=1326 audit(564.680:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 565.288417][ T30] audit: type=1326 audit(564.700:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4530 comm="syz.0.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 566.361091][ T4538] siw: device registration error -23 [ 567.443041][ T4548] netlink: 4 bytes leftover after parsing attributes in process `syz.1.464'. [ 568.991442][ T4554] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.468' sets config #3 [ 574.005675][ T4568] netlink: 1868 bytes leftover after parsing attributes in process `syz.1.475'. [ 576.225896][ T4575] netlink: 68 bytes leftover after parsing attributes in process `syz.1.478'. [ 585.041082][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 585.048377][ T30] audit: type=1326 audit(584.460:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.052694][ T30] audit: type=1326 audit(584.470:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.070872][ T30] audit: type=1326 audit(584.490:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8d15a5d4 code=0x7ffc0000 [ 585.089932][ T30] audit: type=1326 audit(584.500:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8d15a5d4 code=0x7ffc0000 [ 585.098541][ T30] audit: type=1326 audit(584.510:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.113560][ T30] audit: type=1326 audit(584.530:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.135957][ T30] audit: type=1326 audit(584.550:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=38 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.165334][ T30] audit: type=1326 audit(584.580:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.174072][ T30] audit: type=1326 audit(584.590:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4608 comm="syz.1.495" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 585.906431][ T30] audit: type=1400 audit(585.320:329): avc: denied { setopt } for pid=4612 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 589.445451][ T4626] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.682621][ T4628] pimreg: entered allmulticast mode [ 589.688663][ T4628] pimreg: left allmulticast mode [ 590.066218][ T4626] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.459879][ T30] audit: type=1400 audit(589.870:330): avc: denied { getopt } for pid=4630 comm="syz.0.505" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 590.516849][ T4626] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.962789][ T4626] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 591.981113][ T3601] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.128567][ T3601] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.240805][ T1504] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 592.538522][ T3601] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 593.961268][ T4639] pimreg: entered allmulticast mode [ 593.985647][ T4639] pimreg: left allmulticast mode [ 596.261780][ T4645] netlink: 8 bytes leftover after parsing attributes in process `syz.1.511'. [ 596.263483][ T4645] netlink: 4 bytes leftover after parsing attributes in process `syz.1.511'. [ 597.674697][ T30] audit: type=1400 audit(597.090:331): avc: denied { read write } for pid=3320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1562 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.720438][ T30] audit: type=1400 audit(597.130:332): avc: denied { open } for pid=3320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1562 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 597.725263][ T30] audit: type=1400 audit(597.140:333): avc: denied { ioctl } for pid=3320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1562 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 598.965764][ T4652] pimreg: entered allmulticast mode [ 598.999892][ T4652] pimreg: left allmulticast mode [ 599.712620][ T30] audit: type=1326 audit(599.110:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.713485][ T30] audit: type=1326 audit(599.130:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.735965][ T30] audit: type=1326 audit(599.150:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.759098][ T30] audit: type=1326 audit(599.180:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.777067][ T30] audit: type=1326 audit(599.190:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.777907][ T30] audit: type=1326 audit(599.190:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 599.791182][ T30] audit: type=1326 audit(599.190:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4655 comm="syz.0.516" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 601.776309][ T4660] netlink: 8 bytes leftover after parsing attributes in process `syz.0.518'. [ 604.166038][ T4671] pimreg: entered allmulticast mode [ 604.211718][ T4671] pimreg: left allmulticast mode [ 605.379920][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 605.380681][ T30] audit: type=1326 audit(604.780:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.381285][ T30] audit: type=1326 audit(604.790:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.448187][ T30] audit: type=1326 audit(604.860:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.496164][ T30] audit: type=1326 audit(604.860:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.542986][ T30] audit: type=1326 audit(604.940:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=147 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.554319][ T30] audit: type=1326 audit(604.970:348): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.585763][ T30] audit: type=1326 audit(605.000:349): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.614139][ T30] audit: type=1326 audit(605.030:350): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.649305][ T30] audit: type=1326 audit(605.060:351): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 605.680769][ T30] audit: type=1326 audit(605.100:352): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4672 comm="syz.0.522" exe="/syz-executor" sig=0 arch=c00000b7 syscall=209 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 608.240165][ T4687] netlink: 24 bytes leftover after parsing attributes in process `syz.1.528'. [ 611.595288][ T4706] netlink: 5 bytes leftover after parsing attributes in process `syz.1.538'. [ 611.630390][ T4706] 0{X: renamed from gretap0 (while UP) [ 611.740283][ T4706] 0{X: entered allmulticast mode [ 611.760641][ T4706] A link change request failed with some changes committed already. Interface 30{X may have been left with an inconsistent configuration, please check. [ 615.120180][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 615.120891][ T30] audit: type=1400 audit(614.530:356): avc: denied { ioctl } for pid=4725 comm="syz.1.545" path="socket:[7168]" dev="sockfs" ino=7168 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 615.793214][ T4733] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.547'. [ 622.055603][ T30] audit: type=1326 audit(621.470:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.071719][ T30] audit: type=1326 audit(621.490:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.158640][ T30] audit: type=1326 audit(621.510:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.170204][ T30] audit: type=1326 audit(621.510:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.176149][ T30] audit: type=1326 audit(621.510:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=200 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.182844][ T30] audit: type=1326 audit(621.520:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 622.186611][ T30] audit: type=1326 audit(621.530:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4745 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 627.359093][ T30] audit: type=1326 audit(626.770:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.370933][ T30] audit: type=1326 audit(626.790:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.374658][ T30] audit: type=1326 audit(626.790:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.384989][ T30] audit: type=1326 audit(626.800:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.389196][ T30] audit: type=1326 audit(626.810:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.394241][ T30] audit: type=1326 audit(626.810:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.399742][ T30] audit: type=1326 audit(626.820:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.401578][ T30] audit: type=1326 audit(626.820:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.407126][ T30] audit: type=1326 audit(626.820:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=232 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 627.413282][ T30] audit: type=1326 audit(626.830:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4763 comm="syz.1.561" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 634.243423][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 634.251137][ T30] audit: type=1400 audit(633.660:391): avc: denied { write } for pid=4790 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 638.015824][ T4808] netlink: 132 bytes leftover after parsing attributes in process `syz.0.578'. [ 638.546441][ T4810] SELinux: Context is not valid (left unmapped). [ 638.546718][ T30] audit: type=1400 audit(637.960:392): avc: denied { mac_admin } for pid=4809 comm="syz.0.579" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 645.663815][ T4831] netlink: 4 bytes leftover after parsing attributes in process `syz.0.588'. [ 646.282305][ T30] audit: type=1400 audit(645.700:393): avc: denied { create } for pid=4832 comm="syz.1.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 646.330107][ T30] audit: type=1400 audit(645.730:394): avc: denied { connect } for pid=4832 comm="syz.1.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 654.492115][ T4854] netlink: 4 bytes leftover after parsing attributes in process `syz.1.597'. [ 655.182600][ T4856] netlink: 'syz.0.598': attribute type 3 has an invalid length. [ 655.212639][ T4856] netlink: 'syz.0.598': attribute type 3 has an invalid length. [ 657.868901][ T30] audit: type=1400 audit(657.280:395): avc: denied { bind } for pid=4863 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 658.130330][ T30] audit: type=1326 audit(657.520:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.134149][ T30] audit: type=1326 audit(657.550:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.173002][ T30] audit: type=1326 audit(657.570:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.203246][ T30] audit: type=1326 audit(657.620:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.218548][ T30] audit: type=1326 audit(657.630:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.233692][ T30] audit: type=1326 audit(657.650:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.240802][ T30] audit: type=1326 audit(657.660:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.248847][ T30] audit: type=1326 audit(657.660:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 658.253956][ T30] audit: type=1326 audit(657.660:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.1.601" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 659.232352][ T4870] netlink: 4 bytes leftover after parsing attributes in process `syz.1.603'. [ 665.341307][ T4880] netlink: 4 bytes leftover after parsing attributes in process `syz.0.606'. [ 674.984839][ T4884] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 675.481741][ T4888] netlink: 4 bytes leftover after parsing attributes in process `syz.0.611'. [ 675.669601][ T4889] netlink: 32 bytes leftover after parsing attributes in process `syz.1.610'. [ 678.235378][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 678.241185][ T30] audit: type=1400 audit(677.650:411): avc: denied { connect } for pid=4897 comm="syz.0.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 678.862889][ T4902] netlink: 8 bytes leftover after parsing attributes in process `syz.0.616'. [ 679.166459][ T30] audit: type=1326 audit(678.580:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.183033][ T30] audit: type=1326 audit(678.600:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.203268][ T30] audit: type=1326 audit(678.620:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.215967][ T30] audit: type=1326 audit(678.630:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.229137][ T30] audit: type=1326 audit(678.640:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.235506][ T30] audit: type=1326 audit(678.650:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.247775][ T30] audit: type=1326 audit(678.660:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.251505][ T30] audit: type=1326 audit(678.670:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.264504][ T30] audit: type=1326 audit(678.680:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 679.905778][ T4904] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 680.571442][ T4912] netlink: 4 bytes leftover after parsing attributes in process `syz.0.619'. [ 685.092428][ T4930] netlink: 4 bytes leftover after parsing attributes in process `syz.0.625'. [ 688.972766][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 688.973746][ T30] audit: type=1400 audit(688.290:451): avc: denied { create } for pid=4926 comm="syz.1.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 689.083053][ T30] audit: type=1400 audit(688.400:452): avc: denied { sys_admin } for pid=4926 comm="syz.1.626" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 693.070134][ T30] audit: type=1326 audit(692.400:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.070996][ T30] audit: type=1326 audit(692.430:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.071788][ T30] audit: type=1326 audit(692.430:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.072284][ T30] audit: type=1326 audit(692.450:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.072712][ T30] audit: type=1326 audit(692.450:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.073159][ T30] audit: type=1326 audit(692.460:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.140447][ T30] audit: type=1326 audit(692.540:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 693.176879][ T30] audit: type=1326 audit(692.580:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4941 comm="syz.0.630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=237 compat=0 ip=0xffffbb35c0a8 code=0x7ffc0000 [ 698.174835][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 698.175301][ T30] audit: type=1400 audit(697.590:463): avc: denied { setopt } for pid=4950 comm="syz.0.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 698.742625][ T30] audit: type=1400 audit(698.160:464): avc: denied { create } for pid=4952 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 706.549549][ T4971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4971 comm=syz.1.640 [ 706.553861][ T4971] netlink: 16 bytes leftover after parsing attributes in process `syz.1.640'. [ 706.554677][ T4971] tc_dump_action: action bad kind [ 712.330149][ T4985] netlink: 100 bytes leftover after parsing attributes in process `syz.1.647'. [ 721.309487][ T30] audit: type=1400 audit(720.720:465): avc: denied { unmount } for pid=5008 comm="syz.1.657" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 722.683530][ T30] audit: type=1326 audit(722.100:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.691930][ T30] audit: type=1326 audit(722.100:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.700605][ T30] audit: type=1326 audit(722.120:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=97 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.802096][ T30] audit: type=1326 audit(722.210:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.808898][ T30] audit: type=1326 audit(722.210:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=186 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.809799][ T30] audit: type=1326 audit(722.220:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.840850][ T30] audit: type=1326 audit(722.250:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=189 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.852171][ T30] audit: type=1326 audit(722.270:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 722.861505][ T30] audit: type=1326 audit(722.280:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5012 comm="syz.1.659" exe="/syz-executor" sig=0 arch=c00000b7 syscall=188 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 727.380646][ T5029] SELinux: policydb version 536870931 does not match my version range 15-35 [ 727.383164][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 727.384697][ T30] audit: type=1400 audit(726.790:476): avc: denied { load_policy } for pid=5028 comm="syz.1.666" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 727.389887][ T5029] SELinux: failed to load policy [ 729.644398][ T5039] netlink: 'syz.1.671': attribute type 12 has an invalid length. [ 729.858890][ T30] audit: type=1400 audit(729.270:477): avc: denied { map } for pid=5038 comm="syz.1.671" path="/dev/loop9" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 730.541906][ T30] audit: type=1326 audit(729.960:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.672" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 730.551875][ T30] audit: type=1326 audit(729.960:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.672" exe="/syz-executor" sig=0 arch=c00000b7 syscall=235 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 730.565994][ T30] audit: type=1326 audit(729.960:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.672" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 730.581274][ T30] audit: type=1326 audit(729.970:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.672" exe="/syz-executor" sig=0 arch=c00000b7 syscall=236 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 730.584842][ T30] audit: type=1326 audit(729.970:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5041 comm="syz.1.672" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.024107][ T30] audit: type=1326 audit(733.440:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.066712][ T30] audit: type=1326 audit(733.450:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.075317][ T30] audit: type=1326 audit(733.480:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.096592][ T30] audit: type=1326 audit(733.510:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.125678][ T30] audit: type=1326 audit(733.540:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.131804][ T30] audit: type=1326 audit(733.540:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.161395][ T30] audit: type=1326 audit(733.570:489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.172346][ T30] audit: type=1326 audit(733.580:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.209719][ T30] audit: type=1326 audit(733.610:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=219 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 734.235155][ T30] audit: type=1326 audit(733.650:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5051 comm="syz.1.676" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 743.986672][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 743.999588][ T30] audit: type=1326 audit(743.400:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.1.688" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 744.015164][ T30] audit: type=1326 audit(743.430:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.1.688" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 744.035035][ T30] audit: type=1326 audit(743.450:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.1.688" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 744.035941][ T30] audit: type=1326 audit(743.450:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.1.688" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 744.468977][ T30] audit: type=1400 audit(743.880:509): avc: denied { execute } for pid=5082 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 744.474420][ T30] audit: type=1400 audit(743.890:510): avc: denied { execute_no_trans } for pid=5082 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 745.359414][ T30] audit: type=1400 audit(744.740:511): avc: denied { mounton } for pid=5083 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 748.446836][ T30] audit: type=1400 audit(747.860:512): avc: denied { mount } for pid=5095 comm="syz.1.693" name="/" dev="ramfs" ino=9803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 761.474905][ T1504] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.033031][ T1504] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.492015][ T5083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 762.636563][ T1504] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.861303][ T5083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 763.306702][ T1504] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.875319][ T30] audit: type=1400 audit(764.290:513): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 766.814300][ T5128] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 766.836208][ T5128] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 769.986027][ T1504] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 770.143947][ T1504] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 770.306681][ T1504] bond0 (unregistering): Released all slaves [ 771.603588][ T1504] hsr_slave_0: left promiscuous mode [ 771.648278][ T1504] hsr_slave_1: left promiscuous mode [ 771.863985][ T1504] veth1_macvtap: left promiscuous mode [ 771.870397][ T1504] veth0_macvtap: left promiscuous mode [ 771.874956][ T1504] veth1_vlan: left promiscuous mode [ 771.880553][ T1504] veth0_vlan: left promiscuous mode [ 781.846871][ T5160] netlink: 104 bytes leftover after parsing attributes in process `syz.1.711'. [ 785.933569][ T5083] hsr_slave_0: entered promiscuous mode [ 785.974464][ T5083] hsr_slave_1: entered promiscuous mode [ 787.516858][ T3603] hid_parser_main: 22 callbacks suppressed [ 787.528420][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.530214][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.531712][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.533142][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.534570][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.535952][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.539189][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.540778][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.548318][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.550253][ T3603] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.588314][ T3603] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 791.135681][ T5191] fido_id[5191]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 791.188712][ T5198] netlink: 7 bytes leftover after parsing attributes in process `syz.1.723'. [ 791.195094][ T5198] netlink: 60 bytes leftover after parsing attributes in process `syz.1.723'. [ 791.211283][ T5198] netlink: 60 bytes leftover after parsing attributes in process `syz.1.723'. [ 791.946632][ T5083] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 792.064234][ T5083] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 792.134486][ T5198] netlink: 7 bytes leftover after parsing attributes in process `syz.1.723'. [ 792.136599][ T5198] netlink: 60 bytes leftover after parsing attributes in process `syz.1.723'. [ 792.165924][ T5083] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 792.219126][ T5198] netlink: 60 bytes leftover after parsing attributes in process `syz.1.723'. [ 792.355616][ T5083] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 798.254366][ T5083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 812.290440][ T30] audit: type=1326 audit(811.390:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 812.386935][ T30] audit: type=1326 audit(811.410:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 812.711950][ T30] audit: type=1326 audit(811.450:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 813.070568][ T30] audit: type=1326 audit(811.500:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 813.351896][ T30] audit: type=1326 audit(811.520:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 813.352562][ T30] audit: type=1326 audit(811.560:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 813.353058][ T30] audit: type=1326 audit(811.620:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 813.353326][ T30] audit: type=1326 audit(811.640:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5246 comm="syz.1.726" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 826.047631][ T30] audit: type=1326 audit(825.460:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.1.733" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 826.052031][ T30] audit: type=1326 audit(825.470:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.1.733" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 826.064094][ T30] audit: type=1326 audit(825.480:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.1.733" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 826.070699][ T30] audit: type=1326 audit(825.490:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.1.733" exe="/syz-executor" sig=0 arch=c00000b7 syscall=53 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 826.074595][ T30] audit: type=1326 audit(825.490:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.1.733" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 830.724583][ T5083] veth0_vlan: entered promiscuous mode [ 830.992393][ T5083] veth1_vlan: entered promiscuous mode [ 831.866177][ T30] audit: type=1400 audit(831.270:527): avc: denied { mount } for pid=5317 comm="syz.1.740" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 831.928342][ T5083] veth0_macvtap: entered promiscuous mode [ 832.220320][ T5083] veth1_macvtap: entered promiscuous mode [ 832.404759][ T30] audit: type=1400 audit(831.820:528): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 832.706826][ T30] audit: type=1326 audit(832.120:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5320 comm="syz.1.741" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 832.783285][ T30] audit: type=1326 audit(832.200:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5320 comm="syz.1.741" exe="/syz-executor" sig=0 arch=c00000b7 syscall=179 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 832.801022][ T30] audit: type=1326 audit(832.200:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5320 comm="syz.1.741" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 833.059894][ T3601] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.071874][ T3601] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.112993][ T3601] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.114253][ T3601] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.846143][ T30] audit: type=1400 audit(833.260:532): avc: denied { mounton } for pid=5083 comm="syz-executor" path="/syzkaller.88Ao8m/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 833.953149][ T30] audit: type=1400 audit(833.370:533): avc: denied { mount } for pid=5083 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 833.996084][ T30] audit: type=1400 audit(833.410:534): avc: denied { mounton } for pid=5083 comm="syz-executor" path="/syzkaller.88Ao8m/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 834.014784][ T30] audit: type=1400 audit(833.430:535): avc: denied { mounton } for pid=5083 comm="syz-executor" path="/syzkaller.88Ao8m/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=9159 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 834.054693][ T30] audit: type=1400 audit(833.470:536): avc: denied { unmount } for pid=5083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 835.724759][ T5338] syz_tun: entered allmulticast mode [ 835.851208][ T5337] syz_tun: left allmulticast mode [ 836.877919][ T30] kauditd_printk_skb: 74 callbacks suppressed [ 836.878894][ T30] audit: type=1326 audit(836.270:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb2eef818 code=0x7ffc0000 [ 836.893058][ T30] audit: type=1326 audit(836.310:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb2153b8c code=0x7ffc0000 [ 836.895930][ T30] audit: type=1326 audit(836.310:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb2eef818 code=0x7ffc0000 [ 836.904472][ T30] audit: type=1326 audit(836.310:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb2153b8c code=0x7ffc0000 [ 836.939754][ T30] audit: type=1326 audit(836.360:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb2eef818 code=0x7ffc0000 [ 836.942220][ T30] audit: type=1326 audit(836.360:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb2153b8c code=0x7ffc0000 [ 836.946658][ T30] audit: type=1326 audit(836.360:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb2eef818 code=0x7ffc0000 [ 836.949650][ T30] audit: type=1326 audit(836.360:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 836.998238][ T30] audit: type=1326 audit(836.400:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb2153b8c code=0x7ffc0000 [ 836.998734][ T30] audit: type=1326 audit(836.400:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.2.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb2eef818 code=0x7ffc0000 [ 841.690372][ T5365] syz.2.755: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 841.702641][ T5365] CPU: 1 UID: 0 PID: 5365 Comm: syz.2.755 Not tainted syzkaller #0 PREEMPT [ 841.702782][ T5365] Hardware name: linux,dummy-virt (DT) [ 841.703091][ T5365] Call trace: [ 841.703319][ T5365] show_stack+0x18/0x24 (C) [ 841.704299][ T5365] dump_stack_lvl+0xdc/0xf4 [ 841.704429][ T5365] dump_stack+0x1c/0x28 [ 841.704478][ T5365] warn_alloc+0x1c0/0x308 [ 841.704524][ T5365] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 841.704571][ T5365] vmalloc_user_noprof+0xe4/0x128 [ 841.704642][ T5365] xskq_create+0xd4/0x174 [ 841.704685][ T5365] xsk_setsockopt+0x430/0x624 [ 841.704723][ T5365] do_sock_setsockopt+0x17c/0x354 [ 841.704779][ T5365] __sys_setsockopt+0xcc/0x164 [ 841.704820][ T5365] __arm64_sys_setsockopt+0xa4/0x100 [ 841.704859][ T5365] invoke_syscall+0x6c/0x258 [ 841.704900][ T5365] el0_svc_common.constprop.0+0xac/0x230 [ 841.704940][ T5365] do_el0_svc+0x40/0x58 [ 841.704978][ T5365] el0_svc+0x50/0x1a0 [ 841.705019][ T5365] el0t_64_sync_handler+0xa0/0xe4 [ 841.705064][ T5365] el0t_64_sync+0x198/0x19c [ 841.705518][ T5365] Mem-Info: [ 841.706273][ T5365] active_anon:4226 inactive_anon:0 isolated_anon:0 [ 841.706273][ T5365] active_file:12511 inactive_file:1990 isolated_file:0 [ 841.706273][ T5365] unevictable:768 dirty:27 writeback:0 [ 841.706273][ T5365] slab_reclaimable:7207 slab_unreclaimable:29877 [ 841.706273][ T5365] mapped:2730 shmem:821 pagetables:744 [ 841.706273][ T5365] sec_pagetables:0 bounce:0 [ 841.706273][ T5365] kernel_misc_reclaimable:0 [ 841.706273][ T5365] free:296257 free_pcp:6031 free_cma:8000 [ 841.706664][ T5365] Node 0 active_anon:16904kB inactive_anon:0kB active_file:50044kB inactive_file:7960kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10920kB dirty:108kB writeback:0kB shmem:3284kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6144kB pagetables:2976kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 841.746475][ T5365] Node 0 DMA free:1184836kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:17072kB inactive_anon:0kB active_file:50044kB inactive_file:7960kB unevictable:3072kB writepending:108kB present:2097152kB managed:1532292kB mlocked:0kB bounce:0kB free_pcp:23972kB local_pcp:10436kB free_cma:32000kB [ 841.800604][ T5365] lowmem_reserve[]: 0 0 0 0 0 [ 841.801529][ T5365] Node 0 DMA: 1241*4kB (UM) 454*8kB (UM) 131*16kB (UME) 49*32kB (UME) 127*64kB (UM) 69*128kB (UME) 14*256kB (UMC) 8*512kB (UME) 3*1024kB (UMC) 5*2048kB (UMEC) 277*4096kB (UMC) = 1184804kB [ 841.972671][ T5365] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 841.972853][ T5365] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 841.972938][ T5365] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 841.973020][ T5365] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 841.973228][ T5365] 15319 total pagecache pages [ 841.973405][ T5365] 1 pages in swap cache [ 841.973518][ T5365] Free swap = 124992kB [ 841.973624][ T5365] Total swap = 124996kB [ 841.973879][ T5365] 524288 pages RAM [ 841.973969][ T5365] 0 pages HighMem/MovableOnly [ 841.974060][ T5365] 141215 pages reserved [ 841.974152][ T5365] 8192 pages cma reserved [ 841.974258][ T5365] 0 pages hwpoisoned [ 843.148340][ T30] kauditd_printk_skb: 204 callbacks suppressed [ 843.149091][ T30] audit: type=1326 audit(842.550:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.221724][ T30] audit: type=1326 audit(842.640:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.241497][ T30] audit: type=1326 audit(842.660:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.261281][ T5376] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 843.271894][ T30] audit: type=1326 audit(842.690:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.313908][ T30] audit: type=1326 audit(842.730:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.412894][ T30] audit: type=1326 audit(842.820:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.420639][ T30] audit: type=1326 audit(842.840:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.423727][ T30] audit: type=1326 audit(842.840:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.470862][ T30] audit: type=1326 audit(842.870:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 843.493755][ T30] audit: type=1326 audit(842.880:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5373 comm="syz.1.758" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 846.505782][ T5397] netlink: 'syz.2.765': attribute type 4 has an invalid length. [ 846.605119][ T5397] netlink: 'syz.2.765': attribute type 4 has an invalid length. [ 852.962794][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 852.971137][ T30] audit: type=1400 audit(852.380:843): avc: denied { write } for pid=5430 comm="syz.2.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 857.678271][ T30] audit: type=1326 audit(857.090:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.683588][ T30] audit: type=1326 audit(857.100:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.694446][ T30] audit: type=1326 audit(857.110:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=34 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.708168][ T30] audit: type=1326 audit(857.120:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.741076][ T30] audit: type=1326 audit(857.160:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=40 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.746470][ T30] audit: type=1326 audit(857.160:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.791526][ T30] audit: type=1326 audit(857.210:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=40 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.842765][ T30] audit: type=1326 audit(857.260:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.881993][ T30] audit: type=1326 audit(857.300:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=428 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 857.992654][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 857.994309][ T30] audit: type=1326 audit(857.410:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.1.787" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 858.552301][ T30] audit: type=1400 audit(857.960:856): avc: denied { read write } for pid=5460 comm="syz.2.789" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 858.554218][ T30] audit: type=1400 audit(857.970:857): avc: denied { open } for pid=5460 comm="syz.2.789" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 858.572495][ T30] audit: type=1400 audit(857.990:858): avc: denied { ioctl } for pid=5460 comm="syz.2.789" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 858.834032][ T30] audit: type=1326 audit(858.250:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 858.851831][ T30] audit: type=1326 audit(858.270:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff8d15e64c code=0x7ffc0000 [ 858.853817][ T30] audit: type=1326 audit(858.270:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 858.886544][ T30] audit: type=1326 audit(858.290:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 858.904600][ T30] audit: type=1326 audit(858.320:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 858.915663][ T30] audit: type=1326 audit(858.320:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.1.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 861.069843][ T5484] wireguard0: entered promiscuous mode [ 861.071886][ T5484] wireguard0: entered allmulticast mode [ 864.162170][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 864.162627][ T30] audit: type=1400 audit(863.570:887): avc: denied { create } for pid=5502 comm="syz.1.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 866.482380][ T5517] netlink: 536 bytes leftover after parsing attributes in process `syz.2.812'. [ 867.013054][ T5523] netlink: 'syz.2.814': attribute type 1 has an invalid length. [ 867.013534][ T5523] netlink: 'syz.2.814': attribute type 2 has an invalid length. [ 867.373105][ T5525] netlink: 12 bytes leftover after parsing attributes in process `syz.2.816'. [ 867.381663][ T5525] netlink: 8 bytes leftover after parsing attributes in process `syz.2.816'. [ 868.075066][ T5530] netlink: 16 bytes leftover after parsing attributes in process `syz.2.818'. [ 868.634152][ T5534] netlink: 'syz.2.820': attribute type 5 has an invalid length. [ 869.006399][ T5536] netlink: 4 bytes leftover after parsing attributes in process `syz.1.821'. [ 869.035744][ T5536] netlink: 32 bytes leftover after parsing attributes in process `syz.1.821'. [ 869.351626][ T30] audit: type=1400 audit(868.750:888): avc: denied { watch watch_reads } for pid=5537 comm="syz.2.822" path="/52" dev="tmpfs" ino=278 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 872.173026][ T5549] netlink: 4 bytes leftover after parsing attributes in process `syz.2.826'. [ 873.348911][ T30] audit: type=1326 audit(872.760:889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.350053][ T30] audit: type=1326 audit(872.760:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.362029][ T30] audit: type=1326 audit(872.770:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.363057][ T30] audit: type=1326 audit(872.780:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.391327][ T30] audit: type=1326 audit(872.790:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.393775][ T30] audit: type=1326 audit(872.790:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.394436][ T30] audit: type=1326 audit(872.800:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.406215][ T30] audit: type=1326 audit(872.820:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.421084][ T30] audit: type=1326 audit(872.840:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5554 comm="syz.2.829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 873.805176][ T5555] SELinux: policydb magic number 0x656b6177 does not match expected magic number 0xf97cff8c [ 873.805938][ T5555] SELinux: failed to load policy [ 873.881845][ T5555] netlink: 104 bytes leftover after parsing attributes in process `syz.2.829'. [ 876.301294][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 876.305979][ T30] audit: type=1400 audit(875.720:930): avc: denied { read write } for pid=5083 comm="syz-executor" name="loop2" dev="devtmpfs" ino=1568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.312528][ T30] audit: type=1400 audit(875.730:931): avc: denied { open } for pid=5083 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=1568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.325581][ T30] audit: type=1400 audit(875.740:932): avc: denied { ioctl } for pid=5083 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=1568 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.800432][ T30] audit: type=1400 audit(876.220:933): avc: denied { prog_load } for pid=5573 comm="syz.2.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 876.802232][ T30] audit: type=1400 audit(876.220:934): avc: denied { bpf } for pid=5573 comm="syz.2.838" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 876.822729][ T30] audit: type=1400 audit(876.220:935): avc: denied { perfmon } for pid=5573 comm="syz.2.838" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 876.844058][ T30] audit: type=1400 audit(876.260:936): avc: denied { create } for pid=5574 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 876.930261][ T30] audit: type=1400 audit(876.340:937): avc: denied { write } for pid=5574 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 876.953764][ T30] audit: type=1400 audit(876.370:938): avc: denied { read } for pid=5574 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 876.985105][ T30] audit: type=1400 audit(876.400:939): avc: denied { create } for pid=5574 comm="syz.1.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 881.948353][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 881.949425][ T30] audit: type=1400 audit(881.350:975): avc: denied { create } for pid=5614 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.966945][ T30] audit: type=1400 audit(881.380:976): avc: denied { setopt } for pid=5614 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 882.051695][ T30] audit: type=1400 audit(881.450:977): avc: denied { create } for pid=5616 comm="syz.2.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 882.056605][ T30] audit: type=1400 audit(881.470:978): avc: denied { connect } for pid=5614 comm="syz.1.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 882.198627][ T30] audit: type=1400 audit(881.570:979): avc: denied { write } for pid=5616 comm="syz.2.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 882.199665][ T30] audit: type=1400 audit(881.570:980): avc: denied { nlmsg_write } for pid=5616 comm="syz.2.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 886.224950][ T30] audit: type=1400 audit(885.640:981): avc: denied { create } for pid=5637 comm="syz.1.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 886.840637][ T5644] netlink: 4 bytes leftover after parsing attributes in process `syz.1.866'. [ 889.795497][ T30] audit: type=1400 audit(889.210:982): avc: denied { allowed } for pid=5660 comm="syz.1.876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 889.816202][ T30] audit: type=1400 audit(889.230:983): avc: denied { sqpoll } for pid=5660 comm="syz.1.876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 889.851339][ T30] audit: type=1400 audit(889.270:984): avc: denied { create } for pid=5660 comm="syz.1.876" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 889.860158][ T30] audit: type=1400 audit(889.280:985): avc: denied { map } for pid=5660 comm="syz.1.876" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 889.866573][ T30] audit: type=1400 audit(889.280:986): avc: denied { read write } for pid=5660 comm="syz.1.876" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 891.201238][ T30] audit: type=1400 audit(890.610:987): avc: denied { read write } for pid=5675 comm="syz.2.882" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 891.205708][ T30] audit: type=1400 audit(890.610:988): avc: denied { open } for pid=5675 comm="syz.2.882" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 891.220214][ T30] audit: type=1400 audit(890.620:989): avc: denied { ioctl } for pid=5675 comm="syz.2.882" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 892.145713][ T30] audit: type=1400 audit(891.540:990): avc: denied { create } for pid=5681 comm="syz.2.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 892.183154][ T30] audit: type=1400 audit(891.600:991): avc: denied { setopt } for pid=5681 comm="syz.2.885" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 892.512183][ T5682] pim6reg: entered allmulticast mode [ 892.530832][ T5682] pim6reg: left allmulticast mode [ 895.999594][ T30] audit: type=1400 audit(895.410:992): avc: denied { create } for pid=5697 comm="syz.2.893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 896.003368][ T30] audit: type=1400 audit(895.420:993): avc: denied { connect } for pid=5697 comm="syz.2.893" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 896.040151][ T30] audit: type=1400 audit(895.460:994): avc: denied { ioctl } for pid=5697 comm="wg1" path="socket:[10899]" dev="sockfs" ino=10899 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 896.045603][ T30] audit: type=1400 audit(895.460:995): avc: denied { write } for pid=5697 comm="wg1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 896.055425][ T30] audit: type=1400 audit(895.470:996): avc: denied { write } for pid=5697 comm="wg1" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 903.575909][ T5725] syzkaller1: entered promiscuous mode [ 903.576281][ T5725] syzkaller1: entered allmulticast mode [ 903.581138][ T30] audit: type=1400 audit(902.990:997): avc: denied { ioctl } for pid=5724 comm="syz.1.904" path="socket:[11894]" dev="sockfs" ino=11894 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 904.674344][ T30] audit: type=1400 audit(904.080:998): avc: denied { watch_reads } for pid=5726 comm="syz.2.905" path="/104" dev="tmpfs" ino=539 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 906.648675][ T30] audit: type=1400 audit(906.060:999): avc: denied { create } for pid=5739 comm="syz.2.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 906.681445][ T30] audit: type=1400 audit(906.100:1000): avc: denied { write } for pid=5739 comm="syz.2.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 907.345641][ T30] audit: type=1326 audit(906.750:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 907.360554][ T30] audit: type=1326 audit(906.750:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 907.379803][ T30] audit: type=1326 audit(906.790:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 907.380298][ T30] audit: type=1326 audit(906.790:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 907.395142][ T30] audit: type=1326 audit(906.810:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 907.478919][ T30] audit: type=1326 audit(906.890:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5743 comm="syz.2.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 908.662013][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 908.662983][ T30] audit: type=1400 audit(908.080:1016): avc: denied { name_bind } for pid=5749 comm="syz.2.915" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 908.663622][ T30] audit: type=1400 audit(908.080:1017): avc: denied { node_bind } for pid=5749 comm="syz.2.915" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 910.249250][ T30] audit: type=1326 audit(909.660:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5757 comm="syz.2.919" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 910.271572][ T30] audit: type=1326 audit(909.670:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5757 comm="syz.2.919" exe="/syz-executor" sig=0 arch=c00000b7 syscall=229 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 910.272360][ T30] audit: type=1326 audit(909.670:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5757 comm="syz.2.919" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 910.294436][ T30] audit: type=1326 audit(909.710:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5757 comm="syz.2.919" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 914.888369][ T30] audit: type=1326 audit(914.300:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.904227][ T30] audit: type=1326 audit(914.310:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.904766][ T30] audit: type=1326 audit(914.320:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.929848][ T30] audit: type=1326 audit(914.340:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.938700][ T30] audit: type=1326 audit(914.350:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.949019][ T30] audit: type=1326 audit(914.360:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.977747][ T30] audit: type=1326 audit(914.390:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.981011][ T30] audit: type=1326 audit(914.400:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.983988][ T30] audit: type=1326 audit(914.400:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 914.984237][ T30] audit: type=1326 audit(914.400:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5774 comm="syz.1.926" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 920.055630][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 920.074539][ T30] audit: type=1400 audit(919.470:1051): avc: denied { create } for pid=5807 comm="syz.2.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 920.176107][ T30] audit: type=1400 audit(919.590:1052): avc: denied { setopt } for pid=5807 comm="syz.2.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 922.212269][ T30] audit: type=1400 audit(921.630:1053): avc: denied { bind } for pid=5816 comm="syz.2.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 922.276054][ T30] audit: type=1400 audit(921.690:1054): avc: denied { setopt } for pid=5816 comm="syz.2.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 925.633010][ T30] audit: type=1400 audit(925.050:1055): avc: denied { bind } for pid=5829 comm="syz.1.950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 929.474668][ T5846] loop9: detected capacity change from 0 to 7 [ 929.530791][ T5846] Buffer I/O error on dev loop9, logical block 0, async page read [ 929.533181][ T5846] Buffer I/O error on dev loop9, logical block 0, async page read [ 929.551714][ T5846] loop9: unable to read partition table [ 929.554236][ T5846] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 929.554236][ T5846] ) failed (rc=-5) [ 930.260477][ T30] audit: type=1400 audit(929.670:1056): avc: denied { create } for pid=5848 comm="syz.1.957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 930.320996][ T30] audit: type=1400 audit(929.740:1057): avc: denied { execute } for pid=5848 comm="syz.1.957" name="file1" dev="tmpfs" ino=2781 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 930.393836][ T30] audit: type=1400 audit(929.800:1058): avc: denied { execute_no_trans } for pid=5848 comm="syz.1.957" path="/546/file1" dev="tmpfs" ino=2781 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 932.851656][ T5868] netlink: 7 bytes leftover after parsing attributes in process `+}[@'. [ 932.852937][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 932.853296][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 933.444173][ T5868] netlink: 7 bytes leftover after parsing attributes in process `+}[@'. [ 933.484600][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 933.485932][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 934.335766][ T30] audit: type=1326 audit(933.750:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.337017][ T30] audit: type=1326 audit(933.750:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.350404][ T30] audit: type=1326 audit(933.760:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.368766][ T30] audit: type=1326 audit(933.770:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.396185][ T30] audit: type=1326 audit(933.810:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.431487][ T30] audit: type=1326 audit(933.830:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.465169][ T30] audit: type=1326 audit(933.880:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.558682][ T30] audit: type=1326 audit(933.940:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.571050][ T30] audit: type=1326 audit(933.980:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.616338][ T30] audit: type=1326 audit(934.030:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5873 comm="syz.1.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=203 compat=0 ip=0xffff8d15c0a8 code=0x7ffc0000 [ 934.636115][ T5868] netlink: 7 bytes leftover after parsing attributes in process `+}[@'. [ 934.666540][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 934.725507][ T5868] netlink: 60 bytes leftover after parsing attributes in process `+}[@'. [ 936.254213][ T5878] syzkaller0: entered promiscuous mode [ 936.270280][ T5878] syzkaller0: entered allmulticast mode [ 942.291731][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 942.302328][ T30] audit: type=1400 audit(941.710:1089): avc: denied { create } for pid=5891 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 942.323789][ T30] audit: type=1400 audit(941.730:1090): avc: denied { bind } for pid=5891 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 942.345829][ T30] audit: type=1400 audit(941.760:1091): avc: denied { write } for pid=5891 comm="syz.1.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 943.493897][ T30] audit: type=1400 audit(942.910:1092): avc: denied { ioctl } for pid=5897 comm="syz.1.977" path="socket:[12162]" dev="sockfs" ino=12162 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 943.513435][ T5898] dummy0: entered promiscuous mode [ 943.553595][ T5897] dummy0: left promiscuous mode [ 945.482275][ T30] audit: type=1326 audit(944.890:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5911 comm="syz.2.983" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 945.509201][ T30] audit: type=1326 audit(944.920:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5911 comm="syz.2.983" exe="/syz-executor" sig=0 arch=c00000b7 syscall=232 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 945.534730][ T30] audit: type=1326 audit(944.930:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5911 comm="syz.2.983" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 946.967675][ T30] audit: type=1400 audit(946.370:1096): avc: denied { execute } for pid=5925 comm="syz.1.990" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=12213 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 950.262644][ T5935] netlink: 'syz.2.994': attribute type 21 has an invalid length. [ 950.264958][ T5935] netlink: 132 bytes leftover after parsing attributes in process `syz.2.994'. [ 950.266699][ T5935] netlink: 'syz.2.994': attribute type 1 has an invalid length. [ 952.462645][ T30] audit: type=1400 audit(951.880:1097): avc: denied { mounton } for pid=5946 comm="syz.1.999" path="/" dev="tmpfs" ino=2878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 953.979204][ T30] audit: type=1326 audit(953.390:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 953.996770][ T30] audit: type=1326 audit(953.400:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.046996][ T30] audit: type=1326 audit(953.430:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.058399][ T30] audit: type=1326 audit(953.470:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.073772][ T30] audit: type=1326 audit(953.490:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.101083][ T30] audit: type=1326 audit(953.520:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.133324][ T30] audit: type=1326 audit(953.550:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.134282][ T30] audit: type=1326 audit(953.550:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 954.151671][ T30] audit: type=1326 audit(953.550:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5958 comm="syz.2.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb215c0a8 code=0x7ffc0000 [ 957.390640][ T5984] netlink: 'syz.1.1017': attribute type 4 has an invalid length. [ 957.399015][ T5984] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1017'. [ 957.502320][ T5984] A link change request failed with some changes committed already. Interface veth1_vlan may have been left with an inconsistent configuration, please check. [ 960.676130][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 960.681220][ T30] audit: type=1400 audit(960.090:1117): avc: denied { read write } for pid=5999 comm="syz.2.1021" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 960.695580][ T30] audit: type=1400 audit(960.110:1118): avc: denied { open } for pid=5999 comm="syz.2.1021" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 960.743938][ T30] audit: type=1400 audit(960.150:1119): avc: denied { ioctl } for pid=5999 comm="syz.2.1021" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 961.491187][ T30] audit: type=1400 audit(960.910:1120): avc: denied { load_policy } for pid=6003 comm="syz.2.1023" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 961.491333][ T6004] SELinux: security policydb version 17 (MLS) not backwards compatible [ 961.494998][ T6004] SELinux: failed to load policy [ 965.393596][ T6019] SELinux: failed to load policy [ 966.798387][ T30] audit: type=1400 audit(966.210:1121): avc: denied { create } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.822460][ T30] audit: type=1400 audit(966.240:1122): avc: denied { bind } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.823012][ T30] audit: type=1400 audit(966.240:1123): avc: denied { listen } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.838367][ T30] audit: type=1400 audit(966.250:1124): avc: denied { connect } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.874871][ T30] audit: type=1400 audit(966.290:1125): avc: denied { accept } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.894336][ T30] audit: type=1400 audit(966.310:1126): avc: denied { write } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 966.938267][ T30] audit: type=1400 audit(966.350:1127): avc: denied { read } for pid=6031 comm="syz.1.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 969.751465][ T30] audit: type=1400 audit(969.170:1128): avc: denied { read write } for pid=6044 comm="syz.1.1037" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 969.762100][ T30] audit: type=1400 audit(969.170:1129): avc: denied { open } for pid=6044 comm="syz.1.1037" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 969.762986][ T30] audit: type=1400 audit(969.180:1130): avc: denied { ioctl } for pid=6044 comm="syz.1.1037" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 969.779511][ T6045] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 969.785691][ T6045] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 971.325222][ T6056] ------------[ cut here ]------------ [ 971.325771][ T6056] verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x4000000, 0x0] s64=[0x4000000, 0x0] u32=[0x4000000, 0x0] s32=[0x4000000, 0x0] var_off=(0x0, 0x0)(1) [ 971.327124][ T6056] WARNING: CPU: 1 PID: 6056 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x550/0x176c [ 971.329261][ T6056] Modules linked in: [ 971.330148][ T6056] CPU: 1 UID: 0 PID: 6056 Comm: syz.2.1041 Not tainted syzkaller #0 PREEMPT [ 971.330402][ T6056] Hardware name: linux,dummy-virt (DT) [ 971.330656][ T6056] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 971.331186][ T6056] pc : reg_bounds_sanity_check+0x550/0x176c [ 971.331399][ T6056] lr : reg_bounds_sanity_check+0x550/0x176c [ 971.331588][ T6056] sp : ffff8000a0296fe0 [ 971.331773][ T6056] x29: ffff8000a0297010 x28: 1fffe00002d5e063 x27: 1fffe00002d5e064 [ 971.332169][ T6056] x26: 1fffe00002d5e064 x25: 0000000000000000 x24: 0000000004000000 [ 971.333014][ T6056] x23: ffff8000855681a0 x22: 0000000000000004 x21: 0000000000000004 [ 971.334113][ T6056] x20: ffff000012f98000 x19: ffff000016af02d0 x18: 0000000000000000 [ 971.334689][ T6056] x17: 000000002007ff0f x16: 00000000f1f1f1f1 x15: 0000000000000006 [ 971.334985][ T6056] x14: 0000000000000001 x13: 0000000000000000 x12: ffff700014052d73 [ 971.335258][ T6056] x11: 1ffff00014052d72 x10: ffff700014052d72 x9 : dfff800000000000 [ 971.335625][ T6056] x8 : ffff8000a0296b98 x7 : ffff8000a0296cc0 x6 : ffff8000a0296c10 [ 971.336070][ T6056] x5 : ffff8000a0296bf8 x4 : 0000000000000000 x3 : 1fffe0000d41773e [ 971.336379][ T6056] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000f7b9e40 [ 971.336765][ T6056] Call trace: [ 971.337127][ T6056] reg_bounds_sanity_check+0x550/0x176c (P) [ 971.337460][ T6056] reg_set_min_max+0x174/0x210 [ 971.337745][ T6056] check_cond_jmp_op+0x89c/0x5704 [ 971.337931][ T6056] do_check_common+0x8040/0x9338 [ 971.338097][ T6056] bpf_check+0x5f30/0x9508 [ 971.338255][ T6056] bpf_prog_load+0xe2c/0x1b74 [ 971.338421][ T6056] __sys_bpf+0x9c4/0x29c8 [ 971.338579][ T6056] __arm64_sys_bpf+0x70/0xa4 [ 971.338736][ T6056] invoke_syscall+0x6c/0x258 [ 971.338908][ T6056] el0_svc_common.constprop.0+0xac/0x230 [ 971.339136][ T6056] do_el0_svc+0x40/0x58 [ 971.339359][ T6056] el0_svc+0x50/0x1a0 [ 971.339532][ T6056] el0t_64_sync_handler+0xa0/0xe4 [ 971.339701][ T6056] el0t_64_sync+0x198/0x19c [ 971.339985][ T6056] irq event stamp: 588 [ 971.340143][ T6056] hardirqs last enabled at (587): [] __schedule+0x23b0/0x3180 [ 971.340390][ T6056] hardirqs last disabled at (588): [] el1_brk64+0x1c/0x48 [ 971.340624][ T6056] softirqs last enabled at (394): [] handle_softirqs+0x88c/0xdb4 [ 971.340883][ T6056] softirqs last disabled at (339): [] __do_softirq+0x14/0x20 [ 971.341196][ T6056] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 971.514395][ T6058] veth0_to_team: entered promiscuous mode [ 972.985611][ T1508] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 973.311063][ T1508] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 973.466508][ T1508] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 973.702071][ T1508] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 974.259593][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 974.260472][ T30] audit: type=1400 audit(973.670:1162): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 974.419177][ T30] audit: type=1400 audit(973.820:1163): avc: denied { search } for pid=3165 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 974.426383][ T30] audit: type=1400 audit(973.840:1164): avc: denied { search } for pid=3165 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 974.442651][ T30] audit: type=1400 audit(973.850:1165): avc: denied { search } for pid=3165 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 974.454102][ T30] audit: type=1400 audit(973.870:1166): avc: denied { read } for pid=3165 comm="dhcpcd" name="n22" dev="tmpfs" ino=2289 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 974.465007][ T30] audit: type=1400 audit(973.880:1167): avc: denied { open } for pid=3165 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=2289 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 974.484167][ T30] audit: type=1400 audit(973.890:1168): avc: denied { getattr } for pid=3165 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=2289 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 976.546655][ T1508] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 976.603199][ T1508] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 976.684830][ T1508] bond0 (unregistering): Released all slaves [ 977.076176][ T1508] hsr_slave_0: left promiscuous mode [ 977.088862][ T1508] hsr_slave_1: left promiscuous mode [ 977.314812][ T1508] veth1_macvtap: left promiscuous mode [ 977.316214][ T1508] veth0_macvtap: left promiscuous mode [ 977.331936][ T1508] veth0_vlan: left promiscuous mode [ 978.096298][ T30] audit: type=1400 audit(977.500:1169): avc: denied { read open } for pid=6064 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 978.106140][ T30] audit: type=1400 audit(977.510:1170): avc: denied { getattr } for pid=6064 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=690 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 978.228536][ T30] audit: type=1400 audit(977.630:1171): avc: denied { add_name } for pid=6063 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 982.663469][ T53] infiniband syz1: ib_query_port failed (-19) [ 983.563423][ T1508] ------------[ cut here ]------------ [ 983.563671][ T1508] WARNING: CPU: 0 PID: 1508 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0x84/0x154 [ 983.564756][ T1508] Modules linked in: [ 983.565806][ T1508] CPU: 0 UID: 0 PID: 1508 Comm: kworker/u8:7 Tainted: G W syzkaller #0 PREEMPT [ 983.566469][ T1508] Tainted: [W]=WARN [ 983.566776][ T1508] Hardware name: linux,dummy-virt (DT) [ 983.567597][ T1508] Workqueue: netns cleanup_net [ 983.568327][ T1508] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 983.568808][ T1508] pc : xfrm6_tunnel_net_exit+0x84/0x154 [ 983.569186][ T1508] lr : xfrm6_tunnel_net_exit+0x50/0x154 [ 983.569592][ T1508] sp : ffff80008f3a7900 [ 983.569879][ T1508] x29: ffff80008f3a7900 x28: dfff800000000000 x27: ffff8000888cdb40 [ 983.570512][ T1508] x26: ffff800088a81600 x25: ffff700011e74f5a x24: ffff00001e7221c0 [ 983.571138][ T1508] x23: dfff800000000000 x22: ffff000012c70000 x21: 000000000000000a [ 983.571719][ T1508] x20: ffff000012c70050 x19: 000000000000000a x18: 1ffff0001426eeb6 [ 983.572331][ T1508] x17: ffff7fffe2fe0000 x16: ffff00006a08a4c4 x15: ffff0000177d1000 [ 983.572921][ T1508] x14: 0000000000000001 x13: 0000000000000000 x12: ffff700011e74eb9 [ 983.573578][ T1508] x11: 1ffff00011e74eb8 x10: ffff700011e74eb8 x9 : dfff800000000000 [ 983.574230][ T1508] x8 : ffff80008f3a75c8 x7 : ffff80008f3a76f0 x6 : ffff80008f3a7640 [ 983.574855][ T1508] x5 : ffff80008f3a7628 x4 : 1fffe00001da6b59 x3 : 1fffe00001da6bd8 [ 983.575483][ T1508] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00001984d000 [ 983.576159][ T1508] Call trace: [ 983.576468][ T1508] xfrm6_tunnel_net_exit+0x84/0x154 (P) [ 983.577037][ T1508] ops_undo_list+0x1f4/0x71c [ 983.577469][ T1508] cleanup_net+0x31c/0x724 [ 983.577987][ T1508] process_one_work+0x7cc/0x18d4 [ 983.578390][ T1508] worker_thread+0x734/0xb84 [ 983.578741][ T1508] kthread+0x348/0x5fc [ 983.579096][ T1508] ret_from_fork+0x10/0x20 [ 983.579519][ T1508] irq event stamp: 1450878 [ 983.579829][ T1508] hardirqs last enabled at (1450877): [] _raw_spin_unlock_irq+0x30/0x8c [ 983.580393][ T1508] hardirqs last disabled at (1450878): [] el1_brk64+0x1c/0x48 [ 983.580891][ T1508] softirqs last enabled at (1450874): [] xfrm_state_flush+0x3bc/0x474 [ 983.581474][ T1508] softirqs last disabled at (1450872): [] xfrm_state_flush+0x50/0x474 [ 983.582034][ T1508] ---[ end trace 0000000000000000 ]--- [ 983.603016][ T1508] ------------[ cut here ]------------ [ 983.603207][ T1508] WARNING: CPU: 1 PID: 1508 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0xe0/0x154 [ 983.604318][ T1508] Modules linked in: [ 983.604857][ T1508] CPU: 1 UID: 0 PID: 1508 Comm: kworker/u8:7 Tainted: G W syzkaller #0 PREEMPT [ 983.605450][ T1508] Tainted: [W]=WARN [ 983.605742][ T1508] Hardware name: linux,dummy-virt (DT) [ 983.606116][ T1508] Workqueue: netns cleanup_net [ 983.606563][ T1508] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 983.607684][ T1508] pc : xfrm6_tunnel_net_exit+0xe0/0x154 [ 983.609467][ T1508] lr : xfrm6_tunnel_net_exit+0x50/0x154 [ 983.611212][ T1508] sp : ffff80008f3a7900 [ 983.612474][ T1508] x29: ffff80008f3a7900 x28: dfff800000000000 x27: ffff8000888cdb40 [ 983.613125][ T1508] x26: ffff800088a81600 x25: ffff700011e74f5a x24: ffff00001e7221c0 [ 983.613880][ T1508] x23: dfff800000000000 x22: ffff000012c70000 x21: ffff000012c70808 [ 983.614606][ T1508] x20: 0000000000000101 x19: 0000000000000001 x18: 1ffff0001426eeb6 [ 983.615303][ T1508] x17: ffff7fffe2fe0000 x16: ffff00006a08a4c4 x15: ffff0000177d1000 [ 983.616105][ T1508] x14: 0000000000000001 x13: 0000000000000000 x12: ffff700011e74eb9 [ 983.616794][ T1508] x11: 1ffff00011e74eb8 x10: ffff700011e74eb8 x9 : dfff800000000000 [ 983.618423][ T1508] x8 : ffff80008f3a75c8 x7 : ffff80008f3a76f0 x6 : ffff80008f3a7640 [ 983.619593][ T1508] x5 : ffff80008f3a7628 x4 : 1fffe00001da6b59 x3 : 1fffe00001da6bd8 [ 983.620245][ T1508] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00001984d010 [ 983.620871][ T1508] Call trace: [ 983.621163][ T1508] xfrm6_tunnel_net_exit+0xe0/0x154 (P) [ 983.621702][ T1508] ops_undo_list+0x1f4/0x71c [ 983.622059][ T1508] cleanup_net+0x31c/0x724 [ 983.622593][ T1508] process_one_work+0x7cc/0x18d4 [ 983.623033][ T1508] worker_thread+0x734/0xb84 [ 983.623430][ T1508] kthread+0x348/0x5fc [ 983.623743][ T1508] ret_from_fork+0x10/0x20 [ 983.624086][ T1508] irq event stamp: 1450904 [ 983.624429][ T1508] hardirqs last enabled at (1450903): [] exit_to_kernel_mode+0x38/0x118 [ 983.625000][ T1508] hardirqs last disabled at (1450904): [] el1_brk64+0x1c/0x48 [ 983.625482][ T1508] softirqs last enabled at (1450890): [] handle_softirqs+0x88c/0xdb4 [ 983.625967][ T1508] softirqs last disabled at (1450881): [] __do_softirq+0x14/0x20 [ 983.626393][ T1508] ---[ end trace 0000000000000000 ]--- [ 983.798327][ T1508] ------------[ cut here ]------------ [ 983.798556][ T1508] WARNING: CPU: 1 PID: 1508 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x1e8/0x330 [ 983.801187][ T1508] Modules linked in: [ 983.802382][ T1508] CPU: 1 UID: 0 PID: 1508 Comm: kworker/u8:7 Tainted: G W syzkaller #0 PREEMPT [ 983.804569][ T1508] Tainted: [W]=WARN [ 983.805533][ T1508] Hardware name: linux,dummy-virt (DT) [ 983.808221][ T1508] Workqueue: netns cleanup_net [ 983.809709][ T1508] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 983.810535][ T1508] pc : xfrm_state_fini+0x1e8/0x330 [ 983.810939][ T1508] lr : xfrm_state_fini+0x4c/0x330 [ 983.811648][ T1508] sp : ffff80008f3a78e0 [ 983.812612][ T1508] x29: ffff80008f3a78e0 x28: dfff800000000000 x27: ffff8000888cdb40 [ 983.814515][ T1508] x26: ffff800088a44580 x25: ffff700011e74f5a x24: ffff00001e7221c0 [ 983.815361][ T1508] x23: ffff8000888cdb40 x22: ffff80008f3a7ad0 x21: ffff800088a445a0 [ 983.816008][ T1508] x20: ffff00001e7233c0 x19: ffff00001e7221c0 x18: 0000000000000000 [ 983.816588][ T1508] x17: ffff800084d5bc64 x16: ffff800084d5b95c x15: ffff800084d5b580 [ 983.817168][ T1508] x14: ffff800084d5b2a0 x13: 0000000000000000 x12: ffff700011e74eb7 [ 983.817962][ T1508] x11: 1ffff00011e74eb6 x10: ffff700011e74eb6 x9 : dfff800000000000 [ 983.818673][ T1508] x8 : ffff80008f3a75b8 x7 : ffff80008f3a76e0 x6 : ffff80008f3a7630 [ 983.819415][ T1508] x5 : ffff80008f3a7618 x4 : 1fffe00001da6b59 x3 : 1fffe00001da6bd8 [ 983.824678][ T1508] x2 : 0000000000000000 x1 : 1fffe00003ce4678 x0 : ffff000019c58558 [ 983.825538][ T1508] Call trace: [ 983.825829][ T1508] xfrm_state_fini+0x1e8/0x330 (P) [ 983.826420][ T1508] xfrm_net_exit+0x30/0x70 [ 983.826774][ T1508] ops_undo_list+0x1f4/0x71c [ 983.827447][ T1508] cleanup_net+0x31c/0x724 [ 983.827848][ T1508] process_one_work+0x7cc/0x18d4 [ 983.828546][ T1508] worker_thread+0x734/0xb84 [ 983.828833][ T1508] kthread+0x348/0x5fc [ 983.829013][ T1508] ret_from_fork+0x10/0x20 [ 983.829272][ T1508] irq event stamp: 1452892 [ 983.829579][ T1508] hardirqs last enabled at (1452891): [] _raw_spin_unlock_irq+0x30/0x8c [ 983.829916][ T1508] hardirqs last disabled at (1452892): [] el1_brk64+0x1c/0x48 [ 983.830246][ T1508] softirqs last enabled at (1452888): [] xfrm_state_flush+0x3bc/0x474 [ 983.830563][ T1508] softirqs last disabled at (1452886): [] xfrm_state_flush+0x50/0x474 [ 983.830896][ T1508] ---[ end trace 0000000000000000 ]--- [ 984.351687][ T1508] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.735763][ T1508] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 985.176009][ T1508] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 985.683855][ T1508] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 989.819296][ T1508] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 989.900680][ T1508] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 989.989823][ T1508] bond0 (unregistering): Released all slaves [ 990.444165][ T1508] hsr_slave_0: left promiscuous mode [ 990.463146][ T1508] hsr_slave_1: left promiscuous mode [ 990.606688][ T1508] veth1_macvtap: left promiscuous mode [ 990.612040][ T1508] veth0_macvtap: left promiscuous mode [ 990.626313][ T1508] veth1_vlan: left promiscuous mode [ 990.632060][ T1508] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 07:01:26 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544400c X00=ffff800085444008 X01=ffff800083dfe2a8 X02=0000000000000000 X03=ffff8000804109c0 X04=ffff700011a3c969 X05=ffff80008d1e4b40 X06=ffff700011a3c968 X07=0000000000000001 X08=ffff80008d1e4b43 X09=dfff800000000000 X10=ffff700011a3c968 X11=1ffff00011a3c968 X12=ffff700011a3c969 X13=0000000000000000 X14=1fffe0000d4152e6 X15=ffff8000844dd428 X16=ffff800080000000 X17=ffff7fffe2fe0000 X18=0000000000000000 X19=ffff80008d1e4b40 X20=000000e1d8816400 X21=ffff800084b49eb8 X22=dfff800000000000 X23=000000000002f2b8 X24=ffff800084b49eb8 X25=ffff80008710df78 X26=ffff00002211c3e0 X27=0000000000000000 X28=0000000000000000 X29=ffff800080007330 X30=ffff800083dfe2c0 SP=ffff800080007330 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=07f769a2d86bcd75:b13d77a3624eddd3 Q19=6df6b10de12f6290:3855cb7eb984b921 Q20=0300080005900303:ffffffff04058003 Q21=00060e0284000800:05a0030008000598 Q22=0302800401800302:a810000380040a10 Q23=68637301ffffffff:ffffffffe5080280 Q24=0e08060190030068:63746977735f6465 Q25=d004100001a00300:0800019803010000 Q26=0a0166d430100001:8004221000060101 Q27=ffff0402080001ca:0800010000000806 Q28=7ec156a02e6f1313:f5b6a4480b28c83f Q29=764e5769467fdbcd:cc99c44d8d9257f0 Q30=60201f5c6885ca2b:5fb77e970993cd91 Q31=d3728e75ff30ac28:35acb6cff85444c1 info registers vcpu 1 CPU#1 PC=ffff80008031daf4 X00=00000000000003c0 X01=ffff7fffe3003000 X02=0000000000000000 X03=1fffe00001ef73c9 X04=00000000224c283e X05=0000000000048000 X06=ffff00000f7ba8f8 X07=38f42cf6781bf722 X08=0000000000000000 X09=ffff8000897e6000 X10=ffff00000f7ba8d0 X11=0000000000000000 X12=0000000000000152 X13=0000000000008000 X14=3066613631303030 X15=3a38317820306432 X16=3030303030303020 X17=3030303030303030 X18=0000000000000000 X19=ffff8000870aa548 X20=ffff800087ac2998 X21=0000000000000000 X22=0000000000000001 X23=0000000000000001 X24=0000000000000000 X25=ffff800081a37ce0 X26=0000000000000000 X27=00000000000003c0 X28=ffff8000a0296520 X29=ffff8000a0296540 X30=ffff80008031dad4 SP=ffff8000a0296520 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffd4112b40:92385c2c1f745b00 Q02=0000ffffd4112b20:ffffff80ffffffd8 Q03=0000ffffd4112bd0:0000ffffd4112bd0 Q04=0000ffffd4112bd0:0000ffffb2138188 Q05=0000ffffd4112ba0:0000ffffd4112bd0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd4112df0:0000ffffd4112df0 Q17=ffffff80ffffffd0:0000ffffd4112dc0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000