last executing test programs: 8m8.391737007s ago: executing program 1 (id=206): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r4}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) 8m6.178388701s ago: executing program 1 (id=209): r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000031401000000000000000000090002002f797a2f0000000008"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x2300000000000000, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) 8m5.127060349s ago: executing program 1 (id=211): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0x200000000000006}, 0x18) r2 = socket(0x11, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'gre0\x00', 0x0}) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xe9, 0x4) sendmsg$netlink(r2, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000004c0)=ANY=[@ANYBLOB="02017d29012918000e3580009f0001140000002f0600ac141414e0000003808a89723a0b72e41082b1a3d2061fd7fdfe4b88942a31f48597e36e039b1c599db6e466749c2d4c8303a0f7fbda34fb88b425f80200e3c0ab"], 0xdd12}], 0x1}, 0x0) 8m3.510075564s ago: executing program 1 (id=213): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = epoll_create1(0x80000) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000003c0)='/sys/power/wakeup_count', 0x0, 0x10) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)={0xe000001a}) read$char_usb(r3, &(0x7f0000000100)=""/177, 0x39) epoll_pwait(r2, &(0x7f0000000200)=[{}], 0x1, 0x80007, 0x0, 0x0) 7m59.268902868s ago: executing program 1 (id=219): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001980)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010028bd7040010000000f00000005002e000000000008000300", @ANYRES32=r4, @ANYBLOB="08002b000800000005002f00"], 0x4c}}, 0x18) 7m56.358159336s ago: executing program 1 (id=222): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) 7m11.275970565s ago: executing program 32 (id=222): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) 59.161104476s ago: executing program 2 (id=631): fsopen(0x0, 0x1) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) 58.663608719s ago: executing program 2 (id=632): r0 = timerfd_create(0x1, 0x800) pwritev2(r0, &(0x7f0000000300)=[{&(0x7f0000000c40)="c7b36ae4047e0d381dd3b0627f020821f8980a9f9764e9578e036768ca3e49e86cb7c7ab3f964a1aa5351e012ed10c0da434ccef882efd0f2a248bb63e04df12a569b00e4eac820783fc4f483802b83fb2a24e9f", 0x54}], 0x1, 0x200, 0x7, 0x0) socket$xdp(0x2c, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) sched_setscheduler(r1, 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) 58.371046868s ago: executing program 2 (id=633): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x7800, 0x8000, 0x1, 0x5, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x3, 0x0, 0x1, 0x4, 0x0, @local, @private=0x10000}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f3, &(0x7f0000000940)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', r1, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x24}, @local}}}}) 57.773838788s ago: executing program 2 (id=634): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x20000, 0x54) r1 = open_tree(r0, &(0x7f0000000040)='.\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0/../file0/../file0/../file0/file0\x00') 57.330576487s ago: executing program 2 (id=636): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x56, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r0, 0x0, 0x1034}, 0x18) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) mount_setattr(r1, &(0x7f0000001d80)='.\x00', 0x1000, &(0x7f0000001dc0)={0x8b, 0x0, 0x80000}, 0x20) 54.934168736s ago: executing program 2 (id=637): r0 = timerfd_create(0x1, 0x800) pwritev2(r0, &(0x7f0000000300)=[{&(0x7f0000000c40)="c7b36ae4047e0d381dd3b0627f020821f8980a9f9764e9578e036768ca3e49e86cb7c7ab3f964a1aa5351e012ed10c0da434ccef882efd0f2a248bb63e04df12a569b00e4eac820783fc4f483802b83fb2a24e9f", 0x54}], 0x1, 0x200, 0x7, 0x0) socket$xdp(0x2c, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) 54.933771976s ago: executing program 33 (id=637): r0 = timerfd_create(0x1, 0x800) pwritev2(r0, &(0x7f0000000300)=[{&(0x7f0000000c40)="c7b36ae4047e0d381dd3b0627f020821f8980a9f9764e9578e036768ca3e49e86cb7c7ab3f964a1aa5351e012ed10c0da434ccef882efd0f2a248bb63e04df12a569b00e4eac820783fc4f483802b83fb2a24e9f", 0x54}], 0x1, 0x200, 0x7, 0x0) socket$xdp(0x2c, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x421, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc35d4f6d52288271}, 0x200048c4) 17.090771919s ago: executing program 0 (id=647): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) personality(0x500006) 15.991327562s ago: executing program 0 (id=648): socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8000f28, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7f, 0xe) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0xffffe000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents(r2, &(0x7f0000002380)=""/130, 0x82) socket$nl_generic(0x10, 0x3, 0x10) 3.32007946s ago: executing program 0 (id=649): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000040)) 2.4088388s ago: executing program 0 (id=650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="160000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) close_range(r2, 0xffffffffffffffff, 0x0) 1.100929857s ago: executing program 0 (id=651): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='xen_mc_entry_alloc\x00', 0xffffffffffffffff, 0x0, 0x7fffffffffffffff}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) bpf$MAP_CREATE(0x0, 0x0, 0x48) creat(0x0, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) syz_emit_ethernet(0xfa, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x4040001) fsync(r1) r2 = socket(0x10, 0x3, 0x9) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x48) fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0xfe44, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={{0x14, 0x3fa, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x6}, [@NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x75a16047}]}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}]}], {0x14}}, 0x5c}, 0x1, 0x0, 0x0, 0x64049}, 0x40000) 0s ago: executing program 0 (id=652): socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8000f28, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x7f, 0xe) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0xffffe000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents(r2, &(0x7f0000002380)=""/130, 0x82) socket$nl_generic(0x10, 0x3, 0x10) kernel console output (not intermixed with test programs): 82][ T30] audit: type=1326 audit(439.480:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 440.130154][ T30] audit: type=1326 audit(439.490:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 440.136450][ T30] audit: type=1326 audit(439.500:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 440.143883][ T30] audit: type=1326 audit(439.500:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 440.153505][ T30] audit: type=1326 audit(439.510:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 440.160725][ T30] audit: type=1326 audit(439.520:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 440.161606][ T30] audit: type=1326 audit(439.520:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 440.161976][ T30] audit: type=1326 audit(439.530:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3760 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 441.969912][ T3765] mmap: syz.1.115 (3765) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 444.100945][ T3767] siw: device registration error -23 [ 444.836330][ T3770] lo speed is unknown, defaulting to 1000 [ 449.658888][ T3779] syzkaller0: entered promiscuous mode [ 449.663061][ T3779] syzkaller0: entered allmulticast mode [ 457.616565][ T3799] capability: warning: `syz.0.127' uses deprecated v2 capabilities in a way that may be insecure [ 457.733050][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 457.740034][ T30] audit: type=1400 audit(457.100:278): avc: denied { create } for pid=3797 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 457.768644][ T30] audit: type=1400 audit(457.130:279): avc: denied { bind } for pid=3797 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 457.804314][ T30] audit: type=1400 audit(457.170:280): avc: denied { write } for pid=3797 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 461.710414][ T3815] syzkaller0: entered promiscuous mode [ 461.713334][ T3815] syzkaller0: entered allmulticast mode [ 471.855091][ T3826] loop9: detected capacity change from 0 to 7 [ 471.876314][ T3826] Buffer I/O error on dev loop9, logical block 0, async page read [ 471.921887][ T3826] Buffer I/O error on dev loop9, logical block 0, async page read [ 471.926195][ T3826] loop9: unable to read partition table [ 471.941572][ T3826] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 471.941572][ T3826] ) failed (rc=-5) [ 472.005001][ T3824] Buffer I/O error on dev loop9, logical block 0, async page read [ 472.014119][ T3824] Buffer I/O error on dev loop9, logical block 0, async page read [ 472.022170][ T3824] Buffer I/O error on dev loop9, logical block 0, async page read [ 472.031573][ T3824] Buffer I/O error on dev loop9, logical block 0, async page read [ 472.037169][ T3824] Buffer I/O error on dev loop9, logical block 0, async page read [ 473.109252][ T30] audit: type=1400 audit(472.470:281): avc: denied { mount } for pid=3831 comm="syz.1.138" name="/" dev="ramfs" ino=5137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 473.201655][ T3832] netlink: 28 bytes leftover after parsing attributes in process `syz.1.138'. [ 473.295919][ T3832] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 473.298312][ T3832] IPv6: NLM_F_CREATE should be set when creating new route [ 473.298856][ T3832] IPv6: NLM_F_CREATE should be set when creating new route [ 473.782864][ T30] audit: type=1400 audit(473.150:282): avc: denied { name_bind } for pid=3834 comm="syz.0.139" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 478.238891][ T30] audit: type=1326 audit(477.580:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 478.274903][ T30] audit: type=1326 audit(477.640:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 478.319361][ T30] audit: type=1326 audit(477.680:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 478.323750][ T30] audit: type=1326 audit(477.680:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 478.324189][ T30] audit: type=1326 audit(477.680:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 478.350147][ T30] audit: type=1326 audit(477.680:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 478.361302][ T30] audit: type=1326 audit(477.720:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 478.402913][ T30] audit: type=1326 audit(477.760:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 478.450028][ T30] audit: type=1326 audit(477.800:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 478.505208][ T30] audit: type=1326 audit(477.810:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3841 comm="syz.0.141" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 481.962383][ T3853] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.682364][ T3853] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.082759][ T3853] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.559929][ T3853] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.046935][ T3858] syz.0.147 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 485.294553][ T3860] SELinux: Context system_u:object_r:ppp_device_t:s0 is not valid (left unmapped). [ 485.305831][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 485.309699][ T30] audit: type=1400 audit(484.670:305): avc: denied { relabelto } for pid=3859 comm="syz.1.146" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:ppp_device_t:s0" [ 485.316944][ T30] audit: type=1400 audit(484.680:306): avc: denied { associate } for pid=3859 comm="syz.1.146" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ppp_device_t:s0" [ 485.431685][ T30] audit: type=1400 audit(484.800:307): avc: denied { setopt } for pid=3861 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 488.220450][ T30] audit: type=1326 audit(487.580:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 488.265444][ T30] audit: type=1326 audit(487.630:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 488.286094][ T30] audit: type=1326 audit(487.630:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 488.316833][ T30] audit: type=1326 audit(487.660:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=298 compat=1 ip=0x132320 code=0x7ffc0000 [ 488.326710][ T30] audit: type=1326 audit(487.690:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 488.340639][ T30] audit: type=1326 audit(487.700:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 488.366004][ T30] audit: type=1326 audit(487.720:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3873 comm="syz.1.153" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 489.620497][ T3880] netlink: 4 bytes leftover after parsing attributes in process `syz.0.156'. [ 492.460094][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 492.468889][ T30] audit: type=1326 audit(491.820:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 492.603253][ T30] audit: type=1326 audit(491.970:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 492.624281][ T30] audit: type=1326 audit(491.990:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 492.651636][ T30] audit: type=1326 audit(492.020:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 492.655380][ T30] audit: type=1326 audit(492.020:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=108 compat=1 ip=0x132320 code=0x7ffc0000 [ 492.671599][ T30] audit: type=1326 audit(492.040:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 492.674888][ T30] audit: type=1326 audit(492.040:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 492.685982][ T30] audit: type=1326 audit(492.050:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 492.697363][ T30] audit: type=1326 audit(492.060:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 492.706301][ T30] audit: type=1326 audit(492.070:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3888 comm="syz.1.159" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=1 ip=0x132320 code=0x7ffc0000 [ 497.643839][ T3909] netlink: 'syz.0.165': attribute type 21 has an invalid length. [ 497.646135][ T3909] netlink: 'syz.0.165': attribute type 6 has an invalid length. [ 497.659716][ T3909] netlink: 132 bytes leftover after parsing attributes in process `syz.0.165'. [ 500.018809][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 500.022618][ T30] audit: type=1326 audit(499.380:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 500.033881][ T30] audit: type=1326 audit(499.400:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 500.044725][ T30] audit: type=1326 audit(499.410:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 500.056297][ T30] audit: type=1326 audit(499.420:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=335 compat=1 ip=0x132320 code=0x7ffc0000 [ 500.151543][ T30] audit: type=1326 audit(499.490:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 500.162725][ T30] audit: type=1326 audit(499.520:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 500.172178][ T30] audit: type=1326 audit(499.540:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.167" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 502.824678][ T3927] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 503.858696][ T30] audit: type=1326 audit(503.220:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.1.174" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 503.863483][ T30] audit: type=1326 audit(503.230:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.1.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 503.872322][ T30] audit: type=1326 audit(503.240:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3930 comm="syz.1.174" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 504.771736][ T3935] process 'syz.1.175' launched './file0' with NULL argv: empty string added [ 505.226004][ T3937] netlink: 8 bytes leftover after parsing attributes in process `syz.0.176'. [ 505.230619][ T3937] netlink: 8 bytes leftover after parsing attributes in process `syz.0.176'. [ 505.911497][ T3942] netlink: 4 bytes leftover after parsing attributes in process `syz.0.178'. [ 505.924522][ T3942] netlink: 4 bytes leftover after parsing attributes in process `syz.0.178'. [ 507.064533][ T30] kauditd_printk_skb: 82 callbacks suppressed [ 507.071349][ T30] audit: type=1326 audit(506.430:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 507.092076][ T30] audit: type=1326 audit(506.460:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 507.102023][ T30] audit: type=1326 audit(506.470:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 507.124630][ T30] audit: type=1326 audit(506.490:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 507.148658][ T30] audit: type=1326 audit(506.510:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 507.152013][ T30] audit: type=1326 audit(506.520:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 507.159264][ T30] audit: type=1326 audit(506.520:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 507.163513][ T30] audit: type=1326 audit(506.530:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 507.168066][ T30] audit: type=1326 audit(506.530:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 507.171596][ T30] audit: type=1326 audit(506.530:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3946 comm="syz.0.180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 512.444983][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 512.448642][ T30] audit: type=1400 audit(511.810:506): avc: denied { unlink } for pid=3970 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1489 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 516.410017][ T30] audit: type=1400 audit(515.780:507): avc: denied { map } for pid=3973 comm="syz.0.187" path="socket:[5343]" dev="sockfs" ino=5343 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 517.203774][ T3981] pimreg: entered allmulticast mode [ 517.375936][ T3975] pimreg: left allmulticast mode [ 517.602229][ T3984] syzkaller0: entered promiscuous mode [ 517.604899][ T3984] syzkaller0: entered allmulticast mode [ 519.696416][ T30] audit: type=1400 audit(519.060:508): avc: denied { append } for pid=3989 comm="syz.0.193" name="loop6" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 521.423539][ T30] audit: type=1326 audit(520.790:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 521.434664][ T30] audit: type=1326 audit(520.800:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 521.452698][ T30] audit: type=1326 audit(520.820:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 521.460626][ T30] audit: type=1326 audit(520.830:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 521.473547][ T30] audit: type=1326 audit(520.840:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 521.495083][ T30] audit: type=1326 audit(520.860:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 521.506286][ T30] audit: type=1326 audit(520.870:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 521.528304][ T30] audit: type=1326 audit(520.890:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 521.535218][ T30] audit: type=1326 audit(520.900:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 522.754868][ T4000] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.197'. [ 522.792214][ T3999] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.197'. [ 526.068885][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 526.069706][ T30] audit: type=1400 audit(525.430:536): avc: denied { create } for pid=3987 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 526.118900][ T30] audit: type=1400 audit(525.480:537): avc: denied { sys_admin } for pid=3987 comm="syz.1.192" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 526.340987][ T3991] lo speed is unknown, defaulting to 1000 [ 526.659853][ T4009] ucma_write: process 247 (syz.1.192) changed security contexts after opening file descriptor, this is not allowed. [ 528.742643][ T4024] netlink: 28 bytes leftover after parsing attributes in process `syz.1.206'. [ 528.744544][ T4024] netlink: 32 bytes leftover after parsing attributes in process `syz.1.206'. [ 540.126280][ T30] audit: type=1400 audit(539.490:538): avc: denied { connect } for pid=4063 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 544.513553][ T30] audit: type=1400 audit(543.810:539): avc: denied { read write } for pid=4072 comm="syz.0.225" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 544.557330][ T30] audit: type=1400 audit(543.910:540): avc: denied { open } for pid=4072 comm="syz.0.225" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 547.465534][ T30] audit: type=1400 audit(546.830:541): avc: denied { create } for pid=4074 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 547.494380][ T30] audit: type=1400 audit(546.860:542): avc: denied { create } for pid=4074 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 547.520340][ T30] audit: type=1400 audit(546.880:543): avc: denied { getopt } for pid=4074 comm="syz.0.226" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 547.533818][ T30] audit: type=1400 audit(546.900:544): avc: denied { write } for pid=4074 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 547.543332][ T30] audit: type=1400 audit(546.910:545): avc: denied { module_request } for pid=4074 comm="syz.0.226" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 548.182941][ T30] audit: type=1400 audit(547.550:546): avc: denied { read } for pid=4074 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 548.272204][ T30] audit: type=1400 audit(547.640:547): avc: denied { prog_load } for pid=4065 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 548.294786][ T30] audit: type=1400 audit(547.660:548): avc: denied { bpf } for pid=4065 comm="syz.1.222" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 548.305982][ T30] audit: type=1400 audit(547.670:549): avc: denied { perfmon } for pid=4065 comm="syz.1.222" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 548.680182][ T30] audit: type=1400 audit(548.000:550): avc: denied { ioctl } for pid=4074 comm="syz.0.226" path="socket:[5556]" dev="sockfs" ino=5556 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 552.052213][ T4093] netlink: 28 bytes leftover after parsing attributes in process `syz.0.232'. [ 554.629469][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 554.634947][ T30] audit: type=1400 audit(553.990:564): avc: denied { prog_run } for pid=4102 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 555.429613][ T30] audit: type=1400 audit(554.790:565): avc: denied { mounton } for pid=4106 comm="syz.0.239" path="/124/file0" dev="tmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 555.475295][ T30] audit: type=1400 audit(554.840:566): avc: denied { mount } for pid=4106 comm="syz.0.239" name="/" dev="ramfs" ino=6583 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 555.698964][ T30] audit: type=1400 audit(555.060:567): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 556.063506][ T4109] netlink: 4 bytes leftover after parsing attributes in process `syz.0.240'. [ 556.451426][ T30] audit: type=1400 audit(555.820:568): avc: denied { allowed } for pid=4110 comm="syz.0.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 556.459321][ T30] audit: type=1400 audit(555.830:569): avc: denied { create } for pid=4110 comm="syz.0.241" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 556.464498][ T30] audit: type=1400 audit(555.830:570): avc: denied { map } for pid=4110 comm="syz.0.241" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6592 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 556.465010][ T30] audit: type=1400 audit(555.830:571): avc: denied { read write } for pid=4110 comm="syz.0.241" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6592 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 557.825921][ T30] audit: type=1400 audit(557.190:572): avc: denied { create } for pid=4115 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 557.841256][ T30] audit: type=1400 audit(557.210:573): avc: denied { ioctl } for pid=4115 comm="syz.0.243" path="socket:[6596]" dev="sockfs" ino=6596 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 560.400884][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 560.405653][ T30] audit: type=1400 audit(559.760:575): avc: denied { execmem } for pid=4125 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 566.390698][ T30] audit: type=1400 audit(565.760:576): avc: denied { create } for pid=4137 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 566.442273][ T30] audit: type=1400 audit(565.810:577): avc: denied { write } for pid=4137 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 567.326922][ T30] audit: type=1326 audit(566.690:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 567.340353][ T30] audit: type=1326 audit(566.690:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 567.344323][ T30] audit: type=1326 audit(566.700:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 567.349154][ T30] audit: type=1326 audit(566.710:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 567.357146][ T30] audit: type=1326 audit(566.720:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 567.367165][ T30] audit: type=1326 audit(566.720:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 567.371663][ T30] audit: type=1326 audit(566.730:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 567.372796][ T30] audit: type=1326 audit(566.730:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.254" exe="/syz-executor" sig=0 arch=40000028 syscall=75 compat=1 ip=0x132320 code=0x7ffc0000 [ 572.365882][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 572.374619][ T30] audit: type=1400 audit(571.730:588): avc: denied { read } for pid=4156 comm="syz.0.260" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 572.386789][ T30] audit: type=1400 audit(571.750:589): avc: denied { open } for pid=4156 comm="syz.0.260" path="net:[4026532707]" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 572.423009][ T4157] netlink: 128 bytes leftover after parsing attributes in process `syz.0.260'. [ 572.425227][ T4157] netlink: 16 bytes leftover after parsing attributes in process `syz.0.260'. [ 573.065492][ T30] audit: type=1400 audit(572.430:590): avc: denied { name_bind } for pid=4158 comm="syz.0.261" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 573.080796][ T30] audit: type=1400 audit(572.450:591): avc: denied { node_bind } for pid=4158 comm="syz.0.261" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 573.686577][ T30] audit: type=1326 audit(573.050:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 573.699133][ T30] audit: type=1326 audit(573.050:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 573.700332][ T30] audit: type=1326 audit(573.060:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 573.708443][ T30] audit: type=1326 audit(573.070:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=1 ip=0x132320 code=0x7ffc0000 [ 573.714985][ T30] audit: type=1326 audit(573.080:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 573.721619][ T30] audit: type=1326 audit(573.080:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4160 comm="syz.0.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 578.120021][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 578.122863][ T30] audit: type=1326 audit(577.490:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 578.128358][ T30] audit: type=1326 audit(577.490:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 578.137174][ T30] audit: type=1326 audit(577.500:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 578.141416][ T30] audit: type=1326 audit(577.510:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=1 ip=0x132320 code=0x7ffc0000 [ 578.152463][ T30] audit: type=1326 audit(577.520:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 578.163370][ T30] audit: type=1326 audit(577.520:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 578.175321][ T30] audit: type=1326 audit(577.540:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 581.546557][ T30] audit: type=1400 audit(580.910:606): avc: denied { create } for pid=4178 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 581.564754][ T30] audit: type=1400 audit(580.930:607): avc: denied { ioctl } for pid=4178 comm="syz.0.271" path="socket:[6712]" dev="sockfs" ino=6712 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 581.580819][ T30] audit: type=1400 audit(580.950:608): avc: denied { bind } for pid=4178 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 583.212003][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 583.222831][ T30] audit: type=1400 audit(582.580:612): avc: denied { ioctl } for pid=4188 comm="syz.0.276" path="socket:[6721]" dev="sockfs" ino=6721 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 583.763852][ T4191] netlink: 4 bytes leftover after parsing attributes in process `syz.0.276'. [ 585.199823][ T30] audit: type=1400 audit(584.560:613): avc: denied { execute } for pid=4195 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 585.210738][ T30] audit: type=1400 audit(584.570:614): avc: denied { execute_no_trans } for pid=4195 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 585.435657][ T30] audit: type=1400 audit(584.800:615): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 585.725441][ T30] audit: type=1400 audit(585.090:616): avc: denied { execute } for pid=4196 comm="syz.0.278" name="file0" dev="tmpfs" ino=841 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 585.782743][ T30] audit: type=1400 audit(585.150:617): avc: denied { execute_no_trans } for pid=4196 comm="syz.0.278" path="/163/file0" dev="tmpfs" ino=841 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 588.519352][ T30] audit: type=1400 audit(587.870:618): avc: denied { read write } for pid=4209 comm="syz.0.281" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 588.520281][ T30] audit: type=1400 audit(587.870:619): avc: denied { open } for pid=4209 comm="syz.0.281" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 588.631635][ T30] audit: type=1400 audit(588.000:620): avc: denied { name_bind } for pid=4209 comm="syz.0.281" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 590.156807][ T30] audit: type=1326 audit(589.520:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 590.163431][ T30] audit: type=1326 audit(589.530:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 590.182235][ T30] audit: type=1326 audit(589.550:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 590.200517][ T30] audit: type=1326 audit(589.550:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 590.204779][ T30] audit: type=1326 audit(589.570:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 590.224305][ T30] audit: type=1326 audit(589.590:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 590.238738][ T30] audit: type=1326 audit(589.600:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.0.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 590.626137][ T4197] lo speed is unknown, defaulting to 1000 [ 592.461475][ T4227] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 593.731878][ T4231] 8021q: adding VLAN 0 to HW filter on device bond1 [ 598.575870][ T4197] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 598.676771][ T4197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 601.734709][ T4250] syzkaller0: entered promiscuous mode [ 601.735162][ T4250] syzkaller0: entered allmulticast mode [ 601.891991][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 601.894647][ T30] audit: type=1400 audit(601.260:636): avc: denied { write } for pid=4248 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 603.782829][ T30] audit: type=1400 audit(603.150:637): avc: denied { bind } for pid=4256 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 604.361433][ T4197] hsr_slave_0: entered promiscuous mode [ 604.378762][ T4197] hsr_slave_1: entered promiscuous mode [ 608.866104][ T4197] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 608.958898][ T4197] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 609.082645][ T4197] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 609.317247][ T4197] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 614.155254][ T4197] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.929309][ T4197] veth0_vlan: entered promiscuous mode [ 630.090295][ T4197] veth1_vlan: entered promiscuous mode [ 630.730373][ T4197] veth0_macvtap: entered promiscuous mode [ 630.867213][ T4197] veth1_macvtap: entered promiscuous mode [ 631.687250][ T41] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.692082][ T41] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.693505][ T41] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.694632][ T41] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 632.474633][ T30] audit: type=1400 audit(631.840:638): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/syzkaller.mqHVXK/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 632.626411][ T30] audit: type=1400 audit(631.990:639): avc: denied { mount } for pid=4197 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 632.741492][ T30] audit: type=1400 audit(632.110:640): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/syzkaller.mqHVXK/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 632.774774][ T30] audit: type=1400 audit(632.140:641): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/syzkaller.mqHVXK/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 633.050581][ T30] audit: type=1400 audit(632.370:642): avc: denied { unmount } for pid=4197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 633.075746][ T30] audit: type=1400 audit(632.430:643): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 633.095779][ T30] audit: type=1400 audit(632.460:644): avc: denied { mount } for pid=4197 comm="syz-executor" name="/" dev="gadgetfs" ino=3502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 633.192365][ T30] audit: type=1400 audit(632.560:645): avc: denied { mount } for pid=4197 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 633.215631][ T30] audit: type=1400 audit(632.580:646): avc: denied { mounton } for pid=4197 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 633.224690][ T30] audit: type=1400 audit(632.590:647): avc: denied { mount } for pid=4197 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 637.616678][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 637.629339][ T30] audit: type=1400 audit(636.980:657): avc: denied { unlink } for pid=4197 comm="syz-executor" name="file0" dev="tmpfs" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 639.591459][ T30] audit: type=1326 audit(638.960:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 639.611640][ T30] audit: type=1326 audit(638.960:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 639.615854][ T30] audit: type=1326 audit(638.980:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 639.631227][ T30] audit: type=1326 audit(639.000:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132320 code=0x7ffc0000 [ 639.644918][ T30] audit: type=1326 audit(639.000:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 639.699158][ T30] audit: type=1326 audit(639.060:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 639.711544][ T30] audit: type=1326 audit(639.070:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 639.717253][ T30] audit: type=1326 audit(639.080:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=1 ip=0x132320 code=0x7ffc0000 [ 639.753898][ T30] audit: type=1326 audit(639.120:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4331 comm="syz.0.304" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 643.703252][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 643.704316][ T30] audit: type=1400 audit(643.070:681): avc: denied { ioctl } for pid=4343 comm="syz.2.310" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 646.322327][ T30] audit: type=1326 audit(645.690:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 646.323508][ T30] audit: type=1326 audit(645.690:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 646.334134][ T30] audit: type=1326 audit(645.700:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 646.335180][ T30] audit: type=1326 audit(645.700:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=1 ip=0x132320 code=0x7ffc0000 [ 646.346339][ T30] audit: type=1326 audit(645.710:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 646.351606][ T30] audit: type=1326 audit(645.710:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 646.353347][ T30] audit: type=1326 audit(645.710:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 646.403265][ T30] audit: type=1326 audit(645.740:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 646.416205][ T30] audit: type=1326 audit(645.770:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.2.312" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=1 ip=0x132320 code=0x7ffc0000 [ 649.510186][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 649.525362][ T30] audit: type=1400 audit(648.870:735): avc: denied { create } for pid=4353 comm="syz.2.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 652.322793][ T30] audit: type=1326 audit(651.690:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 652.340003][ T30] audit: type=1326 audit(651.690:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 652.346318][ T30] audit: type=1326 audit(651.710:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 652.355402][ T30] audit: type=1326 audit(651.720:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 652.372739][ T30] audit: type=1326 audit(651.720:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=384 compat=1 ip=0x132320 code=0x7ffc0000 [ 652.380916][ T30] audit: type=1326 audit(651.740:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 652.387272][ T30] audit: type=1326 audit(651.750:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4359 comm="syz.2.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 653.293736][ T30] audit: type=1400 audit(652.660:743): avc: denied { load_policy } for pid=4363 comm="syz.2.318" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 654.909274][ T4365] SELinux: failed to load policy [ 656.502474][ T30] audit: type=1400 audit(655.870:744): avc: denied { create } for pid=4369 comm="syz.2.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 656.544283][ T30] audit: type=1400 audit(655.910:745): avc: denied { setopt } for pid=4369 comm="syz.2.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 657.421387][ T30] audit: type=1400 audit(656.790:746): avc: denied { read write } for pid=4373 comm="syz.2.322" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 657.437946][ T30] audit: type=1400 audit(656.800:747): avc: denied { open } for pid=4373 comm="syz.2.322" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 658.029251][ T4376] syz.0.323 uses obsolete (PF_INET,SOCK_PACKET) [ 658.118325][ T30] audit: type=1400 audit(657.480:748): avc: denied { name_bind } for pid=4375 comm="syz.0.323" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 659.762893][ T30] audit: type=1400 audit(659.130:749): avc: denied { read write } for pid=4381 comm="syz.0.325" name="virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 659.799327][ T30] audit: type=1400 audit(659.160:750): avc: denied { open } for pid=4381 comm="syz.0.325" path="/dev/virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 660.531618][ T30] audit: type=1326 audit(659.900:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4385 comm="syz.2.326" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 660.569622][ T30] audit: type=1326 audit(659.930:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4385 comm="syz.2.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 660.594499][ T30] audit: type=1326 audit(659.960:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4385 comm="syz.2.326" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 663.335155][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 663.338582][ T30] audit: type=1326 audit(662.700:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 663.360765][ T30] audit: type=1326 audit(662.730:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 663.395078][ T30] audit: type=1326 audit(662.750:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 663.397028][ T30] audit: type=1326 audit(662.760:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=384 compat=1 ip=0x132320 code=0x7ffc0000 [ 663.413489][ T30] audit: type=1326 audit(662.780:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 663.415466][ T30] audit: type=1326 audit(662.780:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 663.468633][ T30] audit: type=1326 audit(662.830:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4392 comm="syz.2.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 663.565340][ T56] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 663.905279][ T3705] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 664.761470][ T12] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 664.969813][ T30] audit: type=1400 audit(664.340:786): avc: denied { kexec_image_load } for pid=4394 comm="syz.2.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 665.012098][ T3705] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.731762][ T30] audit: type=1400 audit(665.100:787): avc: denied { create } for pid=4396 comm="syz.2.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 665.755533][ T30] audit: type=1400 audit(665.120:788): avc: denied { write } for pid=4396 comm="syz.2.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 666.133037][ T4401] netlink: 12 bytes leftover after parsing attributes in process `syz.0.331'. [ 668.738201][ T30] audit: type=1400 audit(668.100:789): avc: denied { write } for pid=4409 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 670.009616][ T30] audit: type=1400 audit(669.380:790): avc: denied { setopt } for pid=4414 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 671.811782][ T4418] lo speed is unknown, defaulting to 1000 [ 682.961344][ T4439] lo speed is unknown, defaulting to 1000 [ 694.684197][ T105] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.000990][ T105] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.371639][ T105] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 695.466598][ T786] Process accounting resumed [ 695.649215][ T105] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 696.382858][ T30] audit: type=1400 audit(695.740:791): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 699.814219][ T105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 700.025415][ T105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 700.161310][ T105] bond0 (unregistering): Released all slaves [ 700.612829][ T30] audit: type=1400 audit(699.980:792): avc: denied { search } for pid=3167 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 700.615619][ T30] audit: type=1400 audit(699.980:793): avc: denied { search } for pid=3167 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 700.636641][ T30] audit: type=1400 audit(699.990:794): avc: denied { search } for pid=3167 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 700.663396][ T30] audit: type=1400 audit(699.990:795): avc: denied { read } for pid=3167 comm="dhcpcd" name="n18" dev="tmpfs" ino=1661 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 700.664468][ T30] audit: type=1400 audit(699.990:796): avc: denied { open } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1661 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 700.664844][ T30] audit: type=1400 audit(699.990:797): avc: denied { getattr } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1661 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 701.137149][ T105] veth1_macvtap: left promiscuous mode [ 701.140084][ T105] veth0_macvtap: left promiscuous mode [ 701.146266][ T105] veth1_vlan: left promiscuous mode [ 701.160290][ T105] veth0_vlan: left promiscuous mode [ 704.344910][ T4494] netlink: 4 bytes leftover after parsing attributes in process `syz.2.364'. [ 705.073471][ T4499] netlink: 4 bytes leftover after parsing attributes in process `syz.2.364'. [ 711.114384][ T787] lo speed is unknown, defaulting to 1000 [ 711.131952][ T787] syz2: Port: 1 Link DOWN [ 714.033066][ T30] audit: type=1326 audit(713.400:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 714.052715][ T30] audit: type=1326 audit(713.400:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 714.076768][ T30] audit: type=1326 audit(713.440:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 714.132938][ T30] audit: type=1326 audit(713.500:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 714.155944][ T30] audit: type=1326 audit(713.520:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=1 ip=0x132320 code=0x7ffc0000 [ 714.157169][ T30] audit: type=1400 audit(713.520:803): avc: denied { read open } for pid=4521 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=818 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 714.173632][ T30] audit: type=1326 audit(713.530:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 714.174830][ T30] audit: type=1400 audit(713.520:804): avc: denied { getattr } for pid=4521 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=818 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 714.175387][ T30] audit: type=1326 audit(713.530:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 714.215088][ T30] audit: type=1326 audit(713.580:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4517 comm="syz.2.373" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 721.581129][ T4542] Driver unsupported XDP return value 0 on prog (id 12) dev N/A, expect packet loss! [ 721.805489][ T30] kauditd_printk_skb: 82 callbacks suppressed [ 721.809328][ T30] audit: type=1326 audit(721.170:890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 721.822950][ T30] audit: type=1326 audit(721.190:891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 721.855869][ T30] audit: type=1326 audit(721.220:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 721.872912][ T30] audit: type=1326 audit(721.240:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=459 compat=1 ip=0x132320 code=0x7ffc0000 [ 721.903870][ T30] audit: type=1326 audit(721.270:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 721.910827][ T30] audit: type=1326 audit(721.270:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 743.755421][ T4601] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 743.755539][ T30] audit: type=1400 audit(743.110:896): avc: denied { mac_admin } for pid=4600 comm="syz.2.389" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 743.812539][ T30] audit: type=1400 audit(743.170:897): avc: denied { relabelto } for pid=4600 comm="syz.2.389" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 743.842704][ T30] audit: type=1400 audit(743.210:898): avc: denied { associate } for pid=4600 comm="syz.2.389" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 743.979728][ T30] audit: type=1400 audit(743.340:899): avc: denied { unmount } for pid=4197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 745.195258][ T30] audit: type=1400 audit(744.560:900): avc: denied { block_suspend } for pid=4603 comm="syz.2.390" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 746.320089][ T30] audit: type=1401 audit(745.680:901): op=setxattr invalid_context="" [ 749.291021][ T30] audit: type=1326 audit(748.660:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 749.310182][ T30] audit: type=1326 audit(748.680:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 749.313746][ T30] audit: type=1326 audit(748.680:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 749.319803][ T30] audit: type=1326 audit(748.690:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 749.325481][ T30] audit: type=1326 audit(748.690:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 749.350571][ T30] audit: type=1326 audit(748.710:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 749.353162][ T30] audit: type=1326 audit(748.720:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 749.357186][ T30] audit: type=1326 audit(748.720:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 749.376391][ T30] audit: type=1326 audit(748.740:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 749.384508][ T30] audit: type=1326 audit(748.750:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.0.398" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 752.425524][ T4649] smc: net device ip6gretap0 applied user defined pnetid SYZ2 [ 752.454312][ T4649] smc: net device ip6gretap0 erased user defined pnetid SYZ2 [ 753.162944][ T4655] netlink: 19 bytes leftover after parsing attributes in process `syz.2.407'. [ 765.965381][ T4679] SELinux: policydb version 0 does not match my version range 15-35 [ 765.969665][ T4679] SELinux: failed to load policy [ 767.289544][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 767.291968][ T30] audit: type=1400 audit(766.650:941): avc: denied { module_load } for pid=4682 comm="syz.0.412" path="/sys/kernel/warn_count" dev="sysfs" ino=25961 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 767.947009][ T30] audit: type=1400 audit(767.310:942): avc: denied { append } for pid=4685 comm="syz.2.413" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 767.954631][ T4686] random: crng reseeded on system resumption [ 767.958962][ T30] audit: type=1400 audit(767.320:943): avc: denied { open } for pid=4685 comm="syz.2.413" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 768.158827][ T30] audit: type=1326 audit(767.520:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 768.165457][ T30] audit: type=1326 audit(767.530:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 768.176780][ T30] audit: type=1326 audit(767.540:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 768.183775][ T30] audit: type=1326 audit(767.550:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 768.191965][ T30] audit: type=1326 audit(767.560:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 768.203213][ T30] audit: type=1326 audit(767.560:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 768.204275][ T30] audit: type=1326 audit(767.570:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4687 comm="syz.0.414" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 769.753609][ T4694] dvmrp8: entered allmulticast mode [ 781.211614][ T4721] netlink: 136 bytes leftover after parsing attributes in process `syz.2.428'. [ 781.214536][ T4721] A link change request failed with some changes committed already. Interface erspan0 may have been left with an inconsistent configuration, please check. [ 783.228609][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 783.229504][ T30] audit: type=1326 audit(782.590:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 783.251964][ T30] audit: type=1326 audit(782.610:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 783.252903][ T30] audit: type=1326 audit(782.620:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 783.279147][ T30] audit: type=1326 audit(782.640:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 783.279859][ T30] audit: type=1326 audit(782.640:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 783.280297][ T30] audit: type=1326 audit(782.640:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=1 ip=0x132320 code=0x7ffc0000 [ 783.289840][ T30] audit: type=1326 audit(782.660:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 783.296020][ T30] audit: type=1326 audit(782.660:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 783.816581][ T30] audit: type=1326 audit(783.180:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 783.828552][ T30] audit: type=1326 audit(783.190:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 789.373467][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 789.373917][ T30] audit: type=1326 audit(788.740:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=1 ip=0x13246c code=0x7ffc0000 [ 789.393047][ T30] audit: type=1326 audit(788.760:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 789.411431][ T30] audit: type=1326 audit(788.760:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 789.415045][ T30] audit: type=1326 audit(788.780:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 789.416738][ T30] audit: type=1326 audit(788.770:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=1 ip=0x10ae60 code=0x7ffc0000 [ 789.444793][ T30] audit: type=1326 audit(788.800:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=1 ip=0x1337dc code=0x7ffc0000 [ 789.461625][ T30] audit: type=1326 audit(788.830:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=1 ip=0x10aed4 code=0x7ffc0000 [ 789.467275][ T30] audit: type=1326 audit(788.830:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 789.472323][ T30] audit: type=1326 audit(788.830:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=1 ip=0x10a42c code=0x7ffc0000 [ 789.475926][ T30] audit: type=1326 audit(788.840:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4728 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 795.605023][ T30] kauditd_printk_skb: 64 callbacks suppressed [ 795.619047][ T30] audit: type=1401 audit(794.970:1052): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 798.884033][ T4766] capability: warning: `syz.2.449' uses 32-bit capabilities (legacy support in use) [ 800.332675][ T30] audit: type=1400 audit(799.700:1053): avc: denied { watch } for pid=4773 comm="syz.0.453" path="/266" dev="tmpfs" ino=1358 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 800.844312][ T30] audit: type=1326 audit(800.210:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 800.852176][ T30] audit: type=1326 audit(800.210:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 800.858778][ T30] audit: type=1326 audit(800.220:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 800.869189][ T30] audit: type=1326 audit(800.220:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x12ffa8 code=0x7ffc0000 [ 801.041888][ T30] audit: type=1326 audit(800.410:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 801.045461][ T30] audit: type=1326 audit(800.410:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 801.073476][ T30] audit: type=1326 audit(800.440:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4775 comm="syz.0.454" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 803.233379][ T30] audit: type=1400 audit(802.540:1061): avc: denied { relabelfrom } for pid=4783 comm="syz.2.457" name="NETLINK" dev="sockfs" ino=8184 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 803.285585][ T30] audit: type=1400 audit(802.640:1062): avc: denied { relabelto } for pid=4783 comm="syz.2.457" name="NETLINK" dev="sockfs" ino=8184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 806.674064][ T30] audit: type=1400 audit(806.020:1063): avc: denied { create } for pid=4796 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 806.755891][ T30] audit: type=1400 audit(806.120:1064): avc: denied { setopt } for pid=4796 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 806.800920][ T30] audit: type=1400 audit(806.170:1065): avc: denied { ioctl } for pid=4796 comm="syz.0.463" path="socket:[9375]" dev="sockfs" ino=9375 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 806.825651][ T30] audit: type=1400 audit(806.190:1066): avc: denied { connect } for pid=4796 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 809.373848][ T30] audit: type=1400 audit(808.740:1067): avc: denied { unlink } for pid=3322 comm="syz-executor" name="file1" dev="tmpfs" ino=1416 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 810.014515][ T40] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 810.019091][ T40] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 810.023676][ T40] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 810.029182][ T40] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 810.032579][ T40] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 810.034965][ T40] hid-generic 0003:0004:0000.0001: item fetching failed at offset 8/18 [ 810.044202][ T40] hid-generic 0003:0004:0000.0001: probe with driver hid-generic failed with error -22 [ 810.843382][ T30] audit: type=1326 audit(810.210:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.2.471" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 810.847228][ T30] audit: type=1326 audit(810.210:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.2.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 810.880059][ T30] audit: type=1326 audit(810.230:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.2.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 810.881229][ T30] audit: type=1326 audit(810.240:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.2.471" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 810.881654][ T30] audit: type=1326 audit(810.240:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.2.471" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=1 ip=0x132320 code=0x7ffc0000 [ 811.096277][ T4817] netlink: 'syz.0.473': attribute type 3 has an invalid length. [ 823.432447][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 823.458995][ T30] audit: type=1326 audit(822.800:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 823.460045][ T30] audit: type=1326 audit(822.800:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 823.460391][ T30] audit: type=1326 audit(822.810:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 823.495818][ T30] audit: type=1326 audit(822.860:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 823.513749][ T30] audit: type=1326 audit(822.880:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 823.563653][ T30] audit: type=1326 audit(822.920:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 823.604549][ T30] audit: type=1326 audit(822.970:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 823.651718][ T30] audit: type=1326 audit(823.000:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 823.669123][ T30] audit: type=1326 audit(823.030:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 823.693197][ T30] audit: type=1326 audit(823.060:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4859 comm="syz.0.493" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 823.741020][ T4862] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4862 comm=syz.2.494 [ 824.615180][ T4864] netlink: 8 bytes leftover after parsing attributes in process `syz.2.495'. [ 827.303003][ T4875] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 828.671973][ T4880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=4880 comm=syz.2.501 [ 830.065767][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 830.075124][ T30] audit: type=1326 audit(829.430:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.2.503" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 830.085863][ T30] audit: type=1326 audit(829.450:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.2.503" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 830.102589][ T30] audit: type=1326 audit(829.470:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.0.504" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 830.110014][ T30] audit: type=1326 audit(829.470:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.0.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 830.116395][ T30] audit: type=1326 audit(829.460:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.2.503" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 830.124843][ T30] audit: type=1326 audit(829.490:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.0.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 830.136720][ T30] audit: type=1326 audit(829.500:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.0.504" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 830.142658][ T30] audit: type=1326 audit(829.500:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.2.503" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 830.145981][ T30] audit: type=1326 audit(829.500:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.0.504" exe="/syz-executor" sig=0 arch=40000028 syscall=330 compat=1 ip=0x132320 code=0x7ffc0000 [ 830.146850][ T30] audit: type=1326 audit(829.500:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.2.503" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 835.215082][ T4918] netlink: 'syz.2.513': attribute type 21 has an invalid length. [ 835.227154][ T4918] netlink: 'syz.2.513': attribute type 1 has an invalid length. [ 835.233527][ T4918] netlink: 144 bytes leftover after parsing attributes in process `syz.2.513'. [ 846.042958][ T30] kauditd_printk_skb: 213 callbacks suppressed [ 846.043805][ T30] audit: type=1400 audit(845.410:1323): avc: denied { create } for pid=4940 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 846.061503][ T30] audit: type=1400 audit(845.430:1324): avc: denied { connect } for pid=4940 comm="syz.2.523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 847.864176][ T30] audit: type=1400 audit(847.230:1325): avc: denied { bind } for pid=4949 comm="syz.2.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 847.876820][ T30] audit: type=1400 audit(847.240:1326): avc: denied { setopt } for pid=4949 comm="syz.2.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 847.899732][ T4950] netlink: 'syz.2.526': attribute type 10 has an invalid length. [ 847.982904][ T4950] netlink: 'syz.2.526': attribute type 10 has an invalid length. [ 857.555423][ T30] audit: type=1400 audit(856.920:1327): avc: denied { read } for pid=4971 comm="syz.0.535" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 857.566675][ T30] audit: type=1400 audit(856.930:1328): avc: denied { open } for pid=4971 comm="syz.0.535" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 857.574482][ T30] audit: type=1400 audit(856.940:1329): avc: denied { ioctl } for pid=4971 comm="syz.0.535" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 858.589153][ T30] audit: type=1400 audit(857.920:1330): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 858.593469][ T30] audit: type=1400 audit(857.940:1331): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 858.594601][ T30] audit: type=1400 audit(857.940:1332): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1577 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 858.763795][ T30] audit: type=1400 audit(858.130:1333): avc: denied { write } for pid=4973 comm="syz.2.536" name="raw" dev="proc" ino=4026532938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 863.376010][ T30] audit: type=1400 audit(862.740:1334): avc: denied { watch_reads } for pid=4985 comm="syz.2.541" path="/110" dev="tmpfs" ino=576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 866.058169][ T30] audit: type=1326 audit(865.420:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 866.068525][ T30] audit: type=1326 audit(865.430:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 866.072935][ T30] audit: type=1326 audit(865.430:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 866.076528][ T30] audit: type=1326 audit(865.430:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 866.085450][ T30] audit: type=1326 audit(865.450:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 866.089284][ T30] audit: type=1326 audit(865.450:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 866.091674][ T30] audit: type=1326 audit(865.450:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 866.094832][ T30] audit: type=1326 audit(865.450:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 866.106676][ T30] audit: type=1326 audit(865.470:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.2.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.355577][ T30] kauditd_printk_skb: 101 callbacks suppressed [ 870.359324][ T30] audit: type=1326 audit(869.720:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.382183][ T30] audit: type=1326 audit(869.750:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 870.387007][ T30] audit: type=1326 audit(869.750:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.396501][ T30] audit: type=1326 audit(869.760:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=1 ip=0x132320 code=0x7ffc0000 [ 870.417163][ T30] audit: type=1326 audit(869.770:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=1 ip=0x132358 code=0x7ffc0000 [ 870.430537][ T30] audit: type=1326 audit(869.790:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=1 ip=0x132358 code=0x7ffc0000 [ 870.440061][ T30] audit: type=1326 audit(869.800:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.451858][ T30] audit: type=1326 audit(869.810:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 870.456803][ T30] audit: type=1326 audit(869.820:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.477280][ T30] audit: type=1326 audit(869.840:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5006 comm="syz.0.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 870.907068][ T5008] syzkaller0: entered promiscuous mode [ 870.915731][ T5008] syzkaller0: entered allmulticast mode [ 878.166977][ T30] kauditd_printk_skb: 104 callbacks suppressed [ 878.170244][ T30] audit: type=1326 audit(877.530:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 878.174213][ T30] audit: type=1326 audit(877.540:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 878.181512][ T30] audit: type=1326 audit(877.550:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 878.185747][ T30] audit: type=1326 audit(877.550:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 878.195599][ T30] audit: type=1326 audit(877.560:1563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 878.200581][ T30] audit: type=1326 audit(877.570:1564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 878.206920][ T30] audit: type=1326 audit(877.570:1565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 878.222305][ T30] audit: type=1326 audit(877.590:1566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 878.271714][ T30] audit: type=1326 audit(877.640:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 878.313189][ T30] audit: type=1326 audit(877.680:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.2.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 880.303531][ T5034] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 880.304668][ T5034] SELinux: failed to load policy [ 902.256023][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 902.258322][ T30] audit: type=1400 audit(901.620:1614): avc: denied { mount } for pid=5067 comm="syz.0.574" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 902.422620][ T30] audit: type=1400 audit(901.790:1615): avc: denied { execute } for pid=5071 comm="syz.2.575" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=10897 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 902.935994][ T5074] netlink: 8 bytes leftover after parsing attributes in process `syz.0.576'. [ 903.246252][ T5076] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 906.345902][ T30] audit: type=1400 audit(905.700:1616): avc: denied { read } for pid=5081 comm="syz.0.580" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 906.371955][ T30] audit: type=1400 audit(905.740:1617): avc: denied { open } for pid=5081 comm="syz.0.580" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 906.410503][ T30] audit: type=1400 audit(905.770:1618): avc: denied { ioctl } for pid=5081 comm="syz.0.580" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 908.359601][ T30] audit: type=1326 audit(907.730:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 908.365387][ T30] audit: type=1326 audit(907.730:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 908.378564][ T30] audit: type=1326 audit(907.730:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 908.380292][ T30] audit: type=1326 audit(907.730:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 908.380556][ T30] audit: type=1326 audit(907.740:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 908.380737][ T30] audit: type=1326 audit(907.740:1624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=1 ip=0x132320 code=0x7ffc0000 [ 908.380914][ T30] audit: type=1326 audit(907.740:1626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 908.395161][ T30] audit: type=1326 audit(907.760:1627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 908.402458][ T30] audit: type=1326 audit(907.740:1625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 908.411521][ T30] audit: type=1326 audit(907.780:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5085 comm="syz.0.582" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 909.496068][ T5091] netlink: 12 bytes leftover after parsing attributes in process `syz.0.584'. [ 911.164258][ T5097] netlink: 36 bytes leftover after parsing attributes in process `syz.0.586'. [ 911.974948][ T5099] netlink: 4 bytes leftover after parsing attributes in process `syz.0.587'. [ 913.831793][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 913.833051][ T30] audit: type=1326 audit(913.190:1658): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 913.879480][ T30] audit: type=1326 audit(913.190:1659): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 913.899938][ T30] audit: type=1326 audit(913.260:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 913.951037][ T30] audit: type=1326 audit(913.310:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 913.952223][ T30] audit: type=1326 audit(913.290:1661): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 913.955369][ T30] audit: type=1326 audit(913.310:1663): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=264 compat=1 ip=0x132320 code=0x7ffc0000 [ 913.955770][ T30] audit: type=1326 audit(913.310:1664): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 913.978819][ T30] audit: type=1326 audit(913.340:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 914.032246][ T30] audit: type=1326 audit(913.390:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 914.033275][ T30] audit: type=1326 audit(913.390:1667): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5104 comm="syz.2.590" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 916.211233][ T5118] SELinux: failed to load policy [ 920.035999][ T30] kauditd_printk_skb: 66 callbacks suppressed [ 920.041690][ T30] audit: type=1326 audit(919.400:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 920.059404][ T30] audit: type=1326 audit(919.410:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 920.069700][ T30] audit: type=1326 audit(919.430:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 920.079971][ T30] audit: type=1326 audit(919.430:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 920.094436][ T30] audit: type=1326 audit(919.430:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 920.107185][ T30] audit: type=1326 audit(919.470:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 920.118909][ T30] audit: type=1326 audit(919.470:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 920.129392][ T30] audit: type=1326 audit(919.490:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 920.133019][ T30] audit: type=1326 audit(919.500:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 920.140360][ T30] audit: type=1326 audit(919.500:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5123 comm="syz.0.597" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 923.644007][ T5143] netlink: 380 bytes leftover after parsing attributes in process `syz.2.605'. [ 925.932864][ T30] kauditd_printk_skb: 76 callbacks suppressed [ 925.938980][ T30] audit: type=1400 audit(925.300:1820): avc: denied { sys_module } for pid=5148 comm="syz.0.607" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 927.089593][ T30] audit: type=1326 audit(926.450:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 927.093944][ T30] audit: type=1326 audit(926.460:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 927.100153][ T30] audit: type=1326 audit(926.460:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 927.108654][ T30] audit: type=1326 audit(926.470:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 927.113820][ T30] audit: type=1326 audit(926.480:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132320 code=0x7ffc0000 [ 927.120731][ T30] audit: type=1326 audit(926.490:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 927.124665][ T30] audit: type=1326 audit(926.490:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 927.131189][ T30] audit: type=1326 audit(926.500:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 927.135685][ T30] audit: type=1326 audit(926.500:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5153 comm="syz.0.608" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 937.964440][ T5186] netlink: 'syz.0.623': attribute type 10 has an invalid length. [ 950.711168][ T30] kauditd_printk_skb: 56 callbacks suppressed [ 950.716279][ T30] audit: type=1400 audit(950.070:1886): avc: denied { watch watch_reads } for pid=5202 comm="syz.0.628" path="/360" dev="tmpfs" ino=1838 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 957.579048][ T30] audit: type=1400 audit(956.930:1887): avc: denied { name_bind } for pid=5213 comm="syz.2.631" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 957.579980][ T30] audit: type=1400 audit(956.940:1888): avc: denied { node_bind } for pid=5213 comm="syz.2.631" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 959.016368][ T30] audit: type=1400 audit(958.380:1889): avc: denied { unmount } for pid=4197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 959.449727][ T30] audit: type=1400 audit(958.820:1890): avc: denied { create } for pid=5221 comm="syz.0.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 960.061590][ T30] audit: type=1400 audit(959.420:1891): avc: denied { write } for pid=5221 comm="syz.0.635" name="netstat" dev="proc" ino=4026532736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 960.344941][ T105] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 960.776251][ T105] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.242808][ T105] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.559902][ T105] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.618490][ T30] audit: type=1400 audit(960.980:1892): avc: denied { execute } for pid=5228 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 961.642494][ T30] audit: type=1400 audit(961.010:1893): avc: denied { execute_no_trans } for pid=5228 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 962.369027][ T30] audit: type=1400 audit(961.730:1894): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 963.429540][ T30] audit: type=1400 audit(962.780:1895): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 966.695687][ T105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 966.814618][ T105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 966.933747][ T105] bond0 (unregistering): Released all slaves [ 967.361825][ T30] audit: type=1400 audit(966.730:1896): avc: denied { search } for pid=3167 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 967.376646][ T30] audit: type=1400 audit(966.740:1897): avc: denied { search } for pid=3167 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 967.388454][ T30] audit: type=1400 audit(966.750:1898): avc: denied { search } for pid=3167 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 967.400624][ T30] audit: type=1400 audit(966.750:1899): avc: denied { read } for pid=3167 comm="dhcpcd" name="n22" dev="tmpfs" ino=2292 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 967.406228][ T30] audit: type=1400 audit(966.770:1900): avc: denied { open } for pid=3167 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=2292 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 967.442118][ T30] audit: type=1400 audit(966.800:1901): avc: denied { getattr } for pid=3167 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=2292 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 967.470128][ T105] hsr_slave_0: left promiscuous mode [ 967.505951][ T105] hsr_slave_1: left promiscuous mode [ 967.851293][ T105] veth1_macvtap: left promiscuous mode [ 967.859032][ T105] veth0_macvtap: left promiscuous mode [ 967.861775][ T105] veth1_vlan: left promiscuous mode [ 967.870333][ T105] veth0_vlan: left promiscuous mode [ 974.580273][ T5246] netlink: 4 bytes leftover after parsing attributes in process `syz.0.640'. [ 980.764667][ T30] audit: type=1400 audit(980.120:1902): avc: denied { search } for pid=5256 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 980.765867][ T30] audit: type=1400 audit(980.120:1903): avc: denied { search } for pid=5256 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=660 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 980.766899][ T30] audit: type=1400 audit(980.120:1904): avc: denied { search } for pid=5256 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=817 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 980.767272][ T30] audit: type=1400 audit(980.120:1905): avc: denied { search } for pid=5256 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=818 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 980.862332][ T30] audit: type=1400 audit(980.220:1906): avc: denied { recv } for pid=3317 comm="syz-executor" saddr=127.0.0.1 src=45252 daddr=127.0.0.1 dest=30004 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 980.863282][ T30] audit: type=1400 audit(980.220:1907): avc: denied { recv } for pid=3317 comm="syz-executor" saddr=127.0.0.1 src=30004 daddr=127.0.0.1 dest=45252 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 980.909105][ T30] audit: type=1400 audit(980.270:1908): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 980.915611][ T30] audit: type=1400 audit(980.280:1909): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 980.922820][ T30] audit: type=1400 audit(980.290:1910): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1577 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 981.046925][ T30] audit: type=1400 audit(980.410:1911): avc: denied { read open } for pid=5259 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=818 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 988.535667][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 988.561804][ T30] audit: type=1400 audit(987.900:1922): avc: denied { sys_module } for pid=5230 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 991.206069][ T5230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 991.300832][ T5230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 995.307246][ T30] audit: type=1400 audit(994.660:1923): avc: denied { prog_load } for pid=5299 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 995.337197][ T30] audit: type=1400 audit(994.700:1924): avc: denied { bpf } for pid=5299 comm="syz.0.645" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 995.345551][ T30] audit: type=1400 audit(994.710:1925): avc: denied { perfmon } for pid=5299 comm="syz.0.645" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 995.484416][ T30] audit: type=1400 audit(994.850:1926): avc: denied { mounton } for pid=5299 comm="syz.0.645" path="/370/file0" dev="tmpfs" ino=1895 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 995.519605][ T30] audit: type=1400 audit(994.880:1927): avc: denied { unmount } for pid=5299 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 996.589110][ T30] audit: type=1400 audit(995.950:1928): avc: denied { map_create } for pid=5305 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 996.596261][ T30] audit: type=1400 audit(995.960:1929): avc: denied { map_read map_write } for pid=5305 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 996.713277][ T30] audit: type=1400 audit(996.080:1930): avc: denied { prog_run } for pid=5305 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 997.362765][ T5230] hsr_slave_0: entered promiscuous mode [ 997.384915][ T5230] hsr_slave_1: entered promiscuous mode [ 999.931163][ T30] audit: type=1326 audit(999.290:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.647" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 999.996029][ T30] audit: type=1326 audit(999.360:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5314 comm="syz.0.647" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1001.851091][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 1001.853510][ T30] audit: type=1400 audit(1001.220:1948): avc: denied { create } for pid=5230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1001.862645][ T30] audit: type=1400 audit(1001.230:1949): avc: denied { write } for pid=5230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1001.866330][ T30] audit: type=1400 audit(1001.230:1950): avc: denied { read } for pid=5230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1001.881539][ T5230] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1002.113606][ T5230] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1002.195213][ T5230] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1002.221855][ T5230] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1008.921384][ T5230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1013.635571][ T30] audit: type=1400 audit(1013.000:1951): avc: denied { read } for pid=5358 comm="syz.0.649" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1013.683769][ T30] audit: type=1400 audit(1013.020:1952): avc: denied { open } for pid=5358 comm="syz.0.649" path="net:[4026532707]" dev="nsfs" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1013.684524][ T30] audit: type=1400 audit(1013.030:1953): avc: denied { create } for pid=5358 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1013.733955][ T30] audit: type=1400 audit(1013.100:1954): avc: denied { getopt } for pid=5358 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1014.854715][ T30] audit: type=1400 audit(1014.220:1955): avc: denied { create } for pid=5364 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1014.920444][ T30] audit: type=1400 audit(1014.280:1956): avc: denied { write } for pid=5364 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1015.812644][ T30] audit: type=1400 audit(1015.170:1957): avc: denied { create } for pid=5369 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1015.882461][ T30] audit: type=1400 audit(1015.250:1958): avc: denied { setopt } for pid=5369 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1016.163472][ T30] audit: type=1400 audit(1015.530:1959): avc: denied { nlmsg_write } for pid=5369 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1016.168299][ T5371] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5371 comm=syz.0.651 [ 1016.172845][ T30] audit: type=1400 audit(1015.540:1960): avc: denied { audit_write } for pid=5369 comm="syz.0.651" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1026.183405][ T5230] veth0_vlan: entered promiscuous mode [ 1026.484101][ T5230] veth1_vlan: entered promiscuous mode [ 1027.232733][ T5230] veth0_macvtap: entered promiscuous mode [ 1027.421476][ T5230] veth1_macvtap: entered promiscuous mode [ 1028.421042][ T99] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1028.423683][ T99] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1028.444001][ T99] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1028.444950][ T99] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.477159][ T30] audit: type=1400 audit(1028.840:1961): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/syzkaller.mpCmee/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1029.495068][ T30] audit: type=1400 audit(1028.860:1962): avc: denied { mount } for pid=5230 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1029.579679][ T30] audit: type=1400 audit(1028.940:1963): avc: denied { mount } for pid=5230 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1029.829291][ T30] audit: type=1400 audit(1029.190:1964): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/syzkaller.mpCmee/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1029.866117][ T30] audit: type=1400 audit(1029.230:1965): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/syzkaller.mpCmee/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=11673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1029.950555][ T30] audit: type=1400 audit(1029.310:1966): avc: denied { unmount } for pid=5230 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1030.080500][ T30] audit: type=1400 audit(1029.440:1967): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1030.143458][ T30] audit: type=1400 audit(1029.510:1968): avc: denied { mount } for pid=5230 comm="syz-executor" name="/" dev="gadgetfs" ino=3502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1030.289511][ T30] audit: type=1400 audit(1029.650:1969): avc: denied { mount } for pid=5230 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1030.336970][ T30] audit: type=1400 audit(1029.700:1970): avc: denied { mounton } for pid=5230 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1030.494214][ T5230] Unable to handle kernel paging request at virtual address dfff800000000007 [ 1030.502678][ T5230] KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] [ 1030.504144][ T5230] Mem abort info: [ 1030.511392][ T5230] ESR = 0x0000000096000005 [ 1030.517232][ T5230] EC = 0x25: DABT (current EL), IL = 32 bits [ 1030.519564][ T5230] SET = 0, FnV = 0 [ 1030.529336][ T5230] EA = 0, S1PTW = 0 [ 1030.530387][ T5230] FSC = 0x05: level 1 translation fault [ 1030.531170][ T5230] Data abort info: [ 1030.531842][ T5230] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 1030.532698][ T5230] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1030.533435][ T5230] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1030.534248][ T5230] [dfff800000000007] address between user and kernel address ranges [ 1030.536521][ T5230] Internal error: Oops: 0000000096000005 [#1] SMP [ 1030.538391][ T5230] Modules linked in: [ 1030.539331][ T5230] CPU: 1 UID: 0 PID: 5230 Comm: syz-executor Not tainted syzkaller #0 PREEMPT [ 1030.539688][ T5230] Hardware name: linux,dummy-virt (DT) [ 1030.540210][ T5230] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1030.540515][ T5230] pc : simple_xattrs_free+0x48/0x184 [ 1030.541735][ T5230] lr : __kernfs_new_node+0x524/0x78c [ 1030.541916][ T5230] sp : ffff80008e437920 [ 1030.542098][ T5230] x29: ffff80008e437920 x28: ffff0000228d4188 x27: ffff800086f10d18 [ 1030.542502][ T5230] x26: ffff00000e16d068 x25: ffff800086f10000 x24: 0000000000000038 [ 1030.542785][ T5230] x23: ffff800086f10000 x22: ffff000012bf1f40 x21: 0000000000000000 [ 1030.543058][ T5230] x20: 1fffe0000451a82f x19: ffff0000228d40f0 x18: ffff80008d7e78ac [ 1030.543395][ T5230] x17: ffff800087300140 x16: ffff800087300140 x15: ffff800080b292a0 [ 1030.543757][ T5230] x14: ffff800080b29048 x13: ffff800080045c90 x12: ffff700011c86ec5 [ 1030.544036][ T5230] x11: 1ffff00011c86ec4 x10: ffff700011c86ec4 x9 : dfff800000000000 [ 1030.544467][ T5230] x8 : ffff80008e437628 x7 : ffff80008e437750 x6 : ffff80008e4376a0 [ 1030.544760][ T5230] x5 : ffff80008e437688 x4 : 0000000000000003 x3 : 1fffe0000274eab1 SYZFAIL: failed to recv rpc [ 1030.545021][ T5230] x2 : 0000000000000000 x1 : 0000000000000007 x0 : dfff800000000000 [ 1030.545875][ T5230] Call trace: [ 1030.546218][ T5230] simple_xattrs_free+0x48/0x184 (P) [ 1030.546570][ T5230] __kernfs_new_node+0x524/0x78c [ 1030.546760][ T5230] kernfs_new_node+0xe8/0x148 [ 1030.546952][ T5230] kernfs_create_dir_ns+0x34/0x118 [ 1030.547131][ T5230] cgroup_mkdir+0x2bc/0xf94 [ 1030.547408][ T5230] kernfs_iop_mkdir+0xd0/0x168 [ 1030.547611][ T5230] vfs_mkdir+0x4fc/0x7c0 [ 1030.547782][ T5230] do_mkdirat+0x30c/0x3f8 [ 1030.547933][ T5230] __arm64_sys_mkdir+0xb8/0x108 [ 1030.548269][ T5230] invoke_syscall+0x6c/0x258 [ 1030.548454][ T5230] el0_svc_common.constprop.0+0xac/0x230 [ 1030.548639][ T5230] do_el0_svc_compat+0x40/0x68 [ 1030.548796][ T5230] el0_svc_compat+0x50/0x278 [ 1030.548958][ T5230] el0t_32_sync_handler+0x88/0xac [ 1030.549118][ T5230] el0t_32_sync+0x19c/0x1a0 [ 1030.549615][ T5230] Code: f90002bf d343ff01 d2d00000 f2fbffe0 (38e06820) [ 1030.550669][ T5230] ---[ end trace 0000000000000000 ]--- [ 1030.551468][ T5230] Kernel panic - not syncing: Oops: Fatal exception [ 1030.552058][ T5230] SMP: stopping secondary CPUs [ 1030.553350][ T5230] Kernel Offset: disabled [ 1030.553547][ T5230] CPU features: 0x208000,1001a001,00008000,0400421b [ 1030.553781][ T5230] Memory Limit: none [ 1030.554521][ T5230] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:02:25 Registers: info registers vcpu 0 CPU#0 PC=ffff80008003184c X00=0000000000000000 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001c59ab1 X04=00000000e994f00c X05=0000000000048000 X06=0000000000150014 X07=fffffdffc03d7220 X08=0000000000000000 X09=ffff800089ab7000 X10=ffff00000e2ce050 X11=0000000000000000 X12=ffff700011afad23 X13=0000000000008000 X14=1fffe000043404cd X15=ffff00001a20e22f X16=0000000000000007 X17=0000000000000000 X18=ffff000021a02640 X19=ffff800080035e28 X20=ffff80008d7d69c0 X21=0000000000000000 X22=0000000000000000 X23=00000000ffffffff X24=ffff80008460de30 X25=0000000000000280 X26=fffffdffc0683a00 X27=ffff00000e82cb40 X28=0000000000000000 X29=ffff80008d7d6b80 X30=ffff800080979174 SP=ffff80008d7d6b30 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008032c144 X00=ffff0000100f0000 X01=0000000000000004 X02=0000000000000000 X03=1fffe0000201e002 X04=0000000000000000 X05=ffff8000a14b7b70 X06=ffff700014296f6e X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700014296f6e X11=1ffff00014296f6e X12=ffff700014296f6f X13=0000000000000000 X14=0000000000001570 X15=0000000000001574 X16=ffff00006a050504 X17=0000000000000000 X18=0000000000000000 X19=ffff0000100f0940 X20=ffff0000100f0000 X21=ffff8000801e8dfc X22=ffff0000100f0928 X23=0000000000000002 X24=ffff0000100f0000 X25=ffff8000a14b7d80 X26=ffff8000a14b7d80 X27=0000000000000000 X28=ffff0000100f0000 X29=ffff8000a14b7af0 X30=ffff800080035f58 SP=ffff8000a14b79d0 PSTATE=a00000c5 N-C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000