last executing test programs: 5.395486182s ago: executing program 1 (id=499): pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000000)=ANY=[@ANYBLOB="08000000109eb2fa3400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e64000000001400028005000e"], 0x44}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB="4800000010001fff752b056800080000faff81", @ANYRES32=0x0, @ANYBLOB="67a9fd"], 0x3}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 4.107384099s ago: executing program 0 (id=503): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) unshare(0x28000600) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.649142083s ago: executing program 0 (id=504): r0 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x1000000, 0x0, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r0, 0x10, &(0x7f0000000400)={0x93, 0x0, &(0x7f0000000240)=[{0x0}], &(0x7f0000000280), 0x1}, 0x20) 2.496054657s ago: executing program 1 (id=505): r0 = socket(0x28, 0x1, 0x0) connect$packet(r0, &(0x7f0000000100)={0x28, 0x7, 0x0, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 2.113636208s ago: executing program 1 (id=506): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) pwrite64(r2, &(0x7f0000000080)='3', 0x1, 0x0) 2.028989221s ago: executing program 0 (id=507): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000044850000000e0000003f0000000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kfree\x00', r2}, 0x18) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0}) 1.628886352s ago: executing program 0 (id=508): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = inotify_init1(0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa000032a) close_range(r1, 0xffffffffffffffff, 0x0) 1.537521765s ago: executing program 1 (id=509): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000900)='fsi_master_acf_copro_command\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="3c02000019000100000000000000000000000000000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00800000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084010500e0000002000000000023450000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb000000003c00000000000000fe80000000000000000000000000000000000000000000000000000000000000000000007f000001000000000000000000000000000000006c00000000000000ac1414aa0000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000aa000000003300000000000000fe8000000000000000000000000000bb0000000000000600000000000000000000000000fe880000000000000000000000000001000000002b"], 0x23c}}, 0x0) 927.009723ms ago: executing program 1 (id=510): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0, 0x0, 0x40}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = epoll_create(0xd) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000400)={0x10000000}) close(r1) 864.910035ms ago: executing program 0 (id=511): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) fchmodat(0xffffffffffffffff, 0x0, 0x3) 107.582807ms ago: executing program 0 (id=512): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18) sendmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="b875a1431a05b9319c", 0x9}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000180)="f1", 0x1}], 0x1}}], 0x1, 0x0) 0s ago: executing program 1 (id=513): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) kernel console output (not intermixed with test programs): [ 65.946616][ T31] audit: type=1400 audit(65.740:68): avc: denied { read write } for pid=3083 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.947422][ T31] audit: type=1400 audit(65.740:69): avc: denied { open } for pid=3083 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:21656' (ED25519) to the list of known hosts. [ 81.545320][ T31] audit: type=1400 audit(81.330:70): avc: denied { name_bind } for pid=3087 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 82.499018][ T31] audit: type=1400 audit(82.280:71): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 82.512865][ T31] audit: type=1400 audit(82.290:72): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 86.877122][ T31] audit: type=1400 audit(86.670:73): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 86.923930][ T31] audit: type=1400 audit(86.700:74): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 87.011331][ T3089] cgroup: Unknown subsys name 'net' [ 87.019179][ T31] audit: type=1400 audit(86.800:75): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 87.653175][ T3089] cgroup: Unknown subsys name 'cpuset' [ 87.698725][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 87.700588][ T3089] cgroup: Unknown subsys name 'rlimit' [ 89.426742][ T31] audit: type=1400 audit(89.220:76): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 89.441245][ T31] audit: type=1400 audit(89.230:77): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 89.442025][ T31] audit: type=1400 audit(89.230:78): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 89.847802][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 89.878182][ T31] audit: type=1400 audit(89.650:79): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 89.892929][ T31] audit: type=1400 audit(89.650:80): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 89.928332][ T31] audit: type=1400 audit(89.720:81): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 89.941002][ T31] audit: type=1400 audit(89.730:82): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 97.938668][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 100.500910][ T31] audit: type=1400 audit(100.290:83): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 100.593400][ T31] audit: type=1400 audit(100.390:84): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.596590][ T31] audit: type=1400 audit(100.390:85): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 100.599013][ T31] audit: type=1400 audit(100.390:86): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 100.626059][ T31] audit: type=1400 audit(100.420:87): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 100.736853][ T31] audit: type=1400 audit(100.530:88): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 101.656740][ T31] audit: type=1400 audit(101.450:89): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 103.247256][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.262617][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.573005][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.585526][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.649191][ T3094] hsr_slave_0: entered promiscuous mode [ 104.659264][ T3094] hsr_slave_1: entered promiscuous mode [ 104.796578][ T3095] hsr_slave_0: entered promiscuous mode [ 104.801293][ T3095] hsr_slave_1: entered promiscuous mode [ 104.803017][ T3095] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 104.803474][ T3095] Cannot create hsr debugfs directory [ 105.271352][ T31] audit: type=1400 audit(105.060:90): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 105.275868][ T31] audit: type=1400 audit(105.070:91): avc: denied { write } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 105.277011][ T31] audit: type=1400 audit(105.070:92): avc: denied { read } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 105.294543][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.316659][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 105.344532][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 105.378827][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 105.395103][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 105.406267][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 105.457519][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 105.483266][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 106.414391][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.475468][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 109.755809][ T3095] veth0_vlan: entered promiscuous mode [ 109.779470][ T3095] veth1_vlan: entered promiscuous mode [ 109.851741][ T3095] veth0_macvtap: entered promiscuous mode [ 109.886647][ T3095] veth1_macvtap: entered promiscuous mode [ 109.958446][ T3095] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.959210][ T3095] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.959587][ T3095] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 109.959937][ T3095] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.165823][ T3094] veth0_vlan: entered promiscuous mode [ 110.219424][ T3094] veth1_vlan: entered promiscuous mode [ 110.232185][ T31] audit: type=1400 audit(110.020:93): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 110.242773][ T31] audit: type=1400 audit(110.030:94): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 110.267625][ T31] audit: type=1400 audit(110.060:95): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 110.276481][ T31] audit: type=1400 audit(110.070:96): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 110.285038][ T31] audit: type=1400 audit(110.070:97): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.I0uJgI/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 110.301035][ T31] audit: type=1400 audit(110.090:98): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 110.321436][ T31] audit: type=1400 audit(110.110:99): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 110.322668][ T31] audit: type=1400 audit(110.110:100): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 110.327017][ T31] audit: type=1400 audit(110.120:101): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 110.328011][ T31] audit: type=1400 audit(110.120:102): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 110.396227][ T3094] veth0_macvtap: entered promiscuous mode [ 110.411864][ T3094] veth1_macvtap: entered promiscuous mode [ 110.438083][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 110.498995][ T3094] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.503423][ T3094] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.503736][ T3094] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.504072][ T3094] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.652381][ T3773] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 112.584859][ T3788] netlink: 596 bytes leftover after parsing attributes in process `syz.1.6'. [ 115.243530][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 115.243644][ T31] audit: type=1400 audit(115.040:161): avc: denied { create } for pid=3800 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 115.542719][ T31] audit: type=1326 audit(115.340:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3794 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 115.543993][ T31] audit: type=1326 audit(115.340:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3794 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.951223][ T31] audit: type=1326 audit(116.730:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.952526][ T31] audit: type=1326 audit(116.740:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.953230][ T31] audit: type=1326 audit(116.740:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.1.14" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.953828][ T31] audit: type=1326 audit(116.740:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.954414][ T31] audit: type=1326 audit(116.740:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.961417][ T31] audit: type=1326 audit(116.740:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 116.964096][ T31] audit: type=1326 audit(116.760:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 119.102625][ T3851] SELinux: syz.1.17 (3851) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 131.198101][ T31] kauditd_printk_skb: 88 callbacks suppressed [ 131.198221][ T31] audit: type=1400 audit(130.990:259): avc: denied { create } for pid=3897 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.210705][ T31] audit: type=1400 audit(130.990:260): avc: denied { write } for pid=3897 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 133.572090][ T31] audit: type=1400 audit(133.340:261): avc: denied { name_bind } for pid=3907 comm="syz.1.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 133.609627][ T31] audit: type=1400 audit(133.400:262): avc: denied { node_bind } for pid=3907 comm="syz.1.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 133.796878][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 134.425395][ T31] audit: type=1400 audit(134.210:263): avc: denied { setopt } for pid=3909 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.426290][ T31] audit: type=1400 audit(134.210:264): avc: denied { bind } for pid=3909 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.426910][ T31] audit: type=1400 audit(134.210:265): avc: denied { name_bind } for pid=3909 comm="syz.1.32" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 134.427641][ T31] audit: type=1400 audit(134.210:266): avc: denied { node_bind } for pid=3909 comm="syz.1.32" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 134.428294][ T31] audit: type=1400 audit(134.210:267): avc: denied { write } for pid=3909 comm="syz.1.32" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.428963][ T31] audit: type=1400 audit(134.210:268): avc: denied { connect } for pid=3909 comm="syz.1.32" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 135.643695][ T3914] netlink: 4 bytes leftover after parsing attributes in process `syz.1.34'. [ 136.209812][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 136.209932][ T31] audit: type=1326 audit(136.000:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.215455][ T31] audit: type=1326 audit(136.010:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.237202][ T31] audit: type=1326 audit(136.020:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=187 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.282848][ T31] audit: type=1326 audit(136.070:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 136.283638][ T31] audit: type=1326 audit(136.070:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.1.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 139.477730][ T3920] syz.1.37 uses obsolete (PF_INET,SOCK_PACKET) [ 139.484171][ T31] audit: type=1400 audit(139.270:287): avc: denied { create } for pid=3919 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 139.486560][ T31] audit: type=1400 audit(139.280:288): avc: denied { ioctl } for pid=3919 comm="syz.1.37" path="socket:[2502]" dev="sockfs" ino=2502 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 140.401783][ T31] audit: type=1400 audit(140.190:289): avc: denied { create } for pid=3930 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 140.413215][ T3931] pim6reg1: entered promiscuous mode [ 140.413852][ T3931] pim6reg1: entered allmulticast mode [ 141.454930][ T3945] netlink: 'syz.1.44': attribute type 10 has an invalid length. [ 142.675423][ T31] audit: type=1400 audit(142.470:290): avc: denied { create } for pid=3975 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 143.537988][ T31] audit: type=1400 audit(143.330:291): avc: denied { block_suspend } for pid=3984 comm="+}[@" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 143.986908][ T31] audit: type=1326 audit(143.780:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 143.993698][ T31] audit: type=1326 audit(143.790:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 144.042860][ T31] audit: type=1326 audit(143.790:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x133450 code=0x7ffc0000 [ 144.043697][ T31] audit: type=1326 audit(143.830:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 144.044329][ T31] audit: type=1326 audit(143.840:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 144.470502][ T31] audit: type=1400 audit(144.260:297): avc: denied { shutdown } for pid=4012 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 144.478110][ T31] audit: type=1400 audit(144.270:298): avc: denied { getopt } for pid=4012 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 145.937581][ T31] audit: type=1326 audit(145.730:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 146.913259][ T4052] Illegal XDP return value 681111936 on prog (id 41) dev syz_tun, expect packet loss! [ 148.304172][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 148.304321][ T31] audit: type=1400 audit(148.100:324): avc: denied { write } for pid=4073 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 149.755775][ T4090] SELinux: syz.0.78 (4090) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 150.141977][ T31] audit: type=1400 audit(149.940:325): avc: denied { append } for pid=4091 comm="syz.0.79" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 150.142253][ T4092] random: crng reseeded on system resumption [ 150.455428][ T31] audit: type=1326 audit(150.240:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.456478][ T31] audit: type=1326 audit(150.250:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.457932][ T31] audit: type=1326 audit(150.250:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.458819][ T31] audit: type=1326 audit(150.250:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.459534][ T31] audit: type=1326 audit(150.250:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.481124][ T31] audit: type=1326 audit(150.260:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.482064][ T31] audit: type=1326 audit(150.260:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 150.482818][ T31] audit: type=1326 audit(150.260:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4094 comm="syz.0.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 156.298610][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 156.298731][ T31] audit: type=1400 audit(156.090:357): avc: denied { write } for pid=4121 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 156.540687][ T31] audit: type=1400 audit(156.330:358): avc: denied { create } for pid=4124 comm="syz.0.90" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 156.543319][ T31] audit: type=1400 audit(156.330:359): avc: denied { create } for pid=4124 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 157.633914][ T4135] netlink: 4 bytes leftover after parsing attributes in process `syz.0.93'. [ 161.982290][ T31] audit: type=1400 audit(161.780:360): avc: denied { map } for pid=4160 comm="syz.0.100" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 161.983514][ T31] audit: type=1400 audit(161.780:361): avc: denied { read write } for pid=4160 comm="syz.0.100" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 162.793817][ T31] audit: type=1400 audit(162.590:362): avc: denied { create } for pid=4163 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 162.834555][ T31] audit: type=1400 audit(162.630:363): avc: denied { execute } for pid=4163 comm="syz.0.101" path="/51/cpuset.memory_pressure_enabled" dev="tmpfs" ino=276 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 163.590665][ T31] audit: type=1400 audit(163.380:364): avc: denied { setopt } for pid=4169 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 164.136718][ T31] audit: type=1400 audit(163.920:365): avc: denied { write } for pid=4171 comm="syz.0.104" name="raw6" dev="proc" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 164.409462][ T31] audit: type=1400 audit(164.200:366): avc: denied { mount } for pid=4174 comm="syz.0.105" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 164.459418][ T31] audit: type=1400 audit(164.250:367): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 167.708929][ T31] audit: type=1400 audit(167.500:368): avc: denied { create } for pid=4205 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 167.894978][ T31] audit: type=1400 audit(167.690:369): avc: denied { checkpoint_restore } for pid=4205 comm="syz.0.108" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 168.226483][ T31] audit: type=1326 audit(168.020:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.242676][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.242964][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.243657][ T4209] syz.0.109[4209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.245384][ T31] audit: type=1326 audit(168.040:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.246364][ T31] audit: type=1326 audit(168.040:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.246906][ T31] audit: type=1326 audit(168.040:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.267388][ T31] audit: type=1326 audit(168.060:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.268609][ T31] audit: type=1326 audit(168.060:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.269352][ T31] audit: type=1326 audit(168.060:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=77 compat=0 ip=0x133450 code=0x7ffc0000 [ 168.290767][ T31] audit: type=1326 audit(168.060:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4208 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 169.605813][ T4224] SELinux: policydb table sizes (0,0) do not match mine (6,6) [ 169.607133][ T4224] SELinux: failed to load policy [ 173.682177][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 173.682283][ T31] audit: type=1326 audit(173.440:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.683362][ T31] audit: type=1326 audit(173.440:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.684114][ T31] audit: type=1326 audit(173.440:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.684775][ T31] audit: type=1326 audit(173.460:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.685356][ T31] audit: type=1326 audit(173.460:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.685958][ T31] audit: type=1326 audit(173.460:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=399 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.728109][ T31] audit: type=1326 audit(173.520:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 173.743275][ T31] audit: type=1326 audit(173.540:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4263 comm=2B7D5B70B3 exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 176.784538][ T31] audit: type=1326 audit(176.580:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4276 comm="syz.1.125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 176.787927][ T31] audit: type=1326 audit(176.580:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4276 comm="syz.1.125" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x133450 code=0x7ffc0000 [ 177.830661][ T4290] IPv6: NLM_F_CREATE should be specified when creating new route [ 178.732645][ T4318] Zero length message leads to an empty skb [ 179.939615][ T4352] netlink: 8 bytes leftover after parsing attributes in process `syz.0.138'. [ 180.414646][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.431301][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.432439][ T4357] syz.0.140[4357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.453396][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 180.453518][ T31] audit: type=1400 audit(180.250:392): avc: denied { bind } for pid=4355 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 180.472924][ T31] audit: type=1400 audit(180.260:393): avc: denied { write } for pid=4355 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 181.357934][ T31] audit: type=1400 audit(181.150:394): avc: denied { ioctl } for pid=4385 comm="syz.1.144" path="socket:[3000]" dev="sockfs" ino=3000 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 181.364447][ T31] audit: type=1400 audit(181.160:395): avc: denied { bind } for pid=4385 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 182.233548][ T31] audit: type=1326 audit(182.030:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 182.263837][ T31] audit: type=1326 audit(182.040:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 182.265130][ T31] audit: type=1326 audit(182.040:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=348 compat=0 ip=0x133450 code=0x7ffc0000 [ 182.266318][ T31] audit: type=1326 audit(182.040:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 182.267417][ T31] audit: type=1326 audit(182.040:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 182.268094][ T31] audit: type=1326 audit(182.040:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4396 comm="syz.1.148" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x133450 code=0x7ffc0000 [ 185.471671][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 185.471781][ T31] audit: type=1326 audit(185.270:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 185.473479][ T31] audit: type=1326 audit(185.270:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 185.474364][ T31] audit: type=1326 audit(185.270:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 185.475150][ T31] audit: type=1326 audit(185.270:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 185.485233][ T31] audit: type=1326 audit(185.270:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 185.486608][ T31] audit: type=1326 audit(185.270:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 185.501669][ T31] audit: type=1326 audit(185.270:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=340 compat=0 ip=0x133450 code=0x7ffc0000 [ 185.511353][ T31] audit: type=1326 audit(185.280:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 185.531276][ T31] audit: type=1326 audit(185.280:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 185.554694][ T31] audit: type=1326 audit(185.280:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4425 comm="syz.1.156" exe="/syz-executor" sig=0 arch=40000028 syscall=340 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.736877][ T31] kauditd_printk_skb: 167 callbacks suppressed [ 190.736993][ T31] audit: type=1326 audit(190.530:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.752786][ T31] audit: type=1326 audit(190.550:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.754127][ T31] audit: type=1326 audit(190.550:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.767111][ T31] audit: type=1326 audit(190.550:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.768539][ T31] audit: type=1400 audit(190.550:624): avc: denied { mount } for pid=4452 comm="syz.1.165" name="/" dev="ramfs" ino=3498 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 190.769451][ T31] audit: type=1326 audit(190.550:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.792984][ T31] audit: type=1326 audit(190.560:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=432 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.813048][ T31] audit: type=1326 audit(190.560:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.813986][ T31] audit: type=1326 audit(190.560:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x133450 code=0x7ffc0000 [ 190.814901][ T31] audit: type=1326 audit(190.580:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4452 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 191.122511][ T4457] netlink: 12 bytes leftover after parsing attributes in process `syz.1.166'. [ 193.511950][ T4494] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.619275][ T4494] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.795367][ T4494] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.852797][ T4494] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.972070][ T4494] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.998362][ T4494] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.028228][ T4494] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.041566][ T4494] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.969273][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 195.969550][ T31] audit: type=1326 audit(195.760:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 195.978066][ T31] audit: type=1326 audit(195.760:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.004147][ T31] audit: type=1326 audit(195.780:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.009603][ T31] audit: type=1326 audit(195.800:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.016906][ T31] audit: type=1326 audit(195.800:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4535 comm="syz.0.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.365169][ T31] audit: type=1326 audit(196.160:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4542 comm="syz.0.187" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 196.458058][ T31] audit: type=1326 audit(196.250:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.459253][ T31] audit: type=1326 audit(196.250:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.463674][ T31] audit: type=1326 audit(196.250:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x133450 code=0x7ffc0000 [ 196.464502][ T31] audit: type=1326 audit(196.250:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4543 comm="syz.1.188" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 207.066491][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 207.066592][ T31] audit: type=1400 audit(206.860:694): avc: denied { write } for pid=4678 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 207.342904][ T4684] process 'syz.1.215' launched '/dev/fd/3' with NULL argv: empty string added [ 207.346258][ T31] audit: type=1400 audit(207.140:695): avc: denied { execute_no_trans } for pid=4682 comm="syz.1.215" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 208.233689][ T4694] vlan0: entered allmulticast mode [ 208.234322][ T4694] bridge_slave_0: entered allmulticast mode [ 208.296254][ T4694] bridge_slave_0: left allmulticast mode [ 210.550755][ T31] audit: type=1400 audit(210.340:696): avc: denied { create } for pid=4728 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 211.726304][ T31] audit: type=1400 audit(211.520:697): avc: denied { ioctl } for pid=4760 comm="syz.0.234" path="socket:[4360]" dev="sockfs" ino=4360 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 211.840566][ T31] audit: type=1326 audit(211.630:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 211.841729][ T31] audit: type=1326 audit(211.640:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 211.850543][ T31] audit: type=1326 audit(211.640:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 211.851662][ T31] audit: type=1326 audit(211.640:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 211.854026][ T31] audit: type=1326 audit(211.640:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 211.859508][ T31] audit: type=1326 audit(211.640:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.1.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 212.047938][ T4773] capability: warning: `syz.1.237' uses deprecated v2 capabilities in a way that may be insecure [ 217.175110][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 217.175201][ T31] audit: type=1326 audit(216.970:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.176600][ T31] audit: type=1326 audit(216.970:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.211529][ T31] audit: type=1326 audit(217.010:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.212797][ T31] audit: type=1326 audit(217.010:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.213398][ T31] audit: type=1326 audit(217.010:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.216468][ T31] audit: type=1326 audit(217.010:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.232762][ T31] audit: type=1326 audit(217.010:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.233597][ T31] audit: type=1326 audit(217.030:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.235178][ T31] audit: type=1326 audit(217.030:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.236332][ T31] audit: type=1326 audit(217.030:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4803 comm="syz.0.246" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.496946][ T31] kauditd_printk_skb: 536 callbacks suppressed [ 223.497065][ T31] audit: type=1400 audit(223.290:1259): avc: denied { write } for pid=4836 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 223.497213][ T4837] netlink: 16 bytes leftover after parsing attributes in process `syz.0.256'. [ 223.570496][ T31] audit: type=1400 audit(223.360:1260): avc: denied { setopt } for pid=4836 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 228.483790][ T31] audit: type=1326 audit(228.280:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.485169][ T31] audit: type=1326 audit(228.280:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.486087][ T31] audit: type=1326 audit(228.280:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.487194][ T31] audit: type=1326 audit(228.280:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.492211][ T31] audit: type=1326 audit(228.280:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4857 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 229.456090][ T31] audit: type=1400 audit(229.250:1266): avc: denied { name_bind } for pid=4863 comm="syz.0.266" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 230.362484][ T31] audit: type=1326 audit(230.150:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.363715][ T31] audit: type=1326 audit(230.150:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.368932][ T31] audit: type=1326 audit(230.150:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.381655][ T31] audit: type=1326 audit(230.150:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.385031][ T31] audit: type=1326 audit(230.150:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.400719][ T31] audit: type=1326 audit(230.150:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.406765][ T31] audit: type=1326 audit(230.160:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4865 comm="syz.0.267" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 241.970747][ T4873] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 241.971588][ T4873] syz.0.269: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 241.973519][ T4873] CPU: 0 UID: 0 PID: 4873 Comm: syz.0.269 Not tainted 6.12.0-syzkaller #0 [ 241.974012][ T4873] Hardware name: ARM-Versatile Express [ 241.974444][ T4873] Call trace: [ 241.974825][ T4873] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 241.975332][ T4873] r7:ff800000 r6:8205a4a4 r5:60000013 r4:820413b8 [ 241.975639][ T4873] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 241.975945][ T4873] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 241.976349][ T4873] r5:84976000 r4:00000000 [ 241.976515][ T4873] [<819d6104>] (dump_stack) from [<804c63fc>] (warn_alloc+0xd8/0x178) [ 241.976781][ T4873] [<804c6324>] (warn_alloc) from [<804b8620>] (__vmalloc_node_range_noprof+0xcc/0x55c) [ 241.977143][ T4873] r3:20000000 r2:8205a4a4 [ 241.977320][ T4873] r6:00000dc0 r5:00000001 r4:20000000 [ 241.977537][ T4873] [<804b8554>] (__vmalloc_node_range_noprof) from [<8047390c>] (__kvmalloc_node_noprof+0xc0/0x110) [ 241.977936][ T4873] r10:dfae1cf0 r9:852d7400 r8:81654614 r7:ffffffff r6:00000dc0 r5:20000000 [ 241.978233][ T4873] r4:00000000 [ 241.978382][ T4873] [<8047384c>] (__kvmalloc_node_noprof) from [<81654614>] (xt_alloc_entry_offsets+0x24/0x30) [ 241.978783][ T4873] r8:b5403587 r7:00000000 r6:20000360 r5:852d7440 r4:08000000 [ 241.979048][ T4873] [<816545f0>] (xt_alloc_entry_offsets) from [<81710724>] (translate_table+0x70/0x78c) [ 241.979411][ T4873] [<817106b4>] (translate_table) from [<817118d0>] (do_replace+0xe8/0x5b8) [ 241.979772][ T4873] r10:00000126 r9:852d7440 r8:b5403587 r7:00000238 r6:20000360 r5:852d7400 [ 241.980376][ T4873] r4:848e8000 [ 241.980583][ T4873] [<817117e8>] (do_replace) from [<81711ed4>] (do_ipt_set_ctl+0x134/0x2a0) [ 241.981018][ T4873] r10:00000126 r9:814991a8 r8:00000298 r7:852a8448 r6:dfae1d98 r5:84076c80 [ 241.981253][ T4873] r4:00000040 [ 241.981373][ T4873] [<81711da0>] (do_ipt_set_ctl) from [<815e0de4>] (nf_setsockopt+0x60/0x7c) [ 241.981887][ T4873] r10:00000126 r9:814991a8 r8:00000298 r7:852a8448 r6:84076c80 r5:81711da0 [ 241.982201][ T4873] r4:827e6534 [ 241.982385][ T4873] [<815e0d88>] (nf_setsockopt) from [<8167ab1c>] (ip_setsockopt+0x88/0x98) [ 241.982744][ T4873] r6:84076c80 r5:00000298 r4:00000040 [ 241.983042][ T4873] [<8167aa98>] (ip_setsockopt) from [<8168aef8>] (tcp_setsockopt+0x3c/0x58) [ 241.983376][ T4873] r6:00000000 r5:852a8000 r4:8167aa94 [ 241.983570][ T4873] [<8168aec0>] (tcp_setsockopt) from [<814991e0>] (sock_common_setsockopt+0x38/0x40) [ 241.983858][ T4873] r4:8168aebc [ 241.983985][ T4873] [<814991ac>] (sock_common_setsockopt) from [<818bda00>] (smc_setsockopt+0xac/0x3cc) [ 241.984380][ T4873] r4:00000040 [ 241.984546][ T4873] [<818bd958>] (smc_setsockopt) from [<81494afc>] (do_sock_setsockopt+0xb0/0x17c) [ 241.984901][ T4873] r9:84976000 r8:00000000 r7:8418b180 r6:84c52a00 r5:00000000 r4:818bd954 [ 241.985175][ T4873] [<81494a4c>] (do_sock_setsockopt) from [<81497e98>] (__sys_setsockopt+0x7c/0xb4) [ 241.985535][ T4873] r6:8418b181 r5:00000040 r4:00000000 [ 241.985732][ T4873] [<81497e1c>] (__sys_setsockopt) from [<81497eec>] (sys_setsockopt+0x1c/0x24) [ 241.986090][ T4873] r8:8020029c r7:00000126 r6:002862f8 r5:00000000 r4:00000298 [ 241.986359][ T4873] [<81497ed0>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 241.986831][ T4873] Exception stack(0xdfae1fa8 to 0xdfae1ff0) [ 241.987226][ T4873] 1fa0: 00000298 00000000 00000005 00000000 00000040 20000300 [ 241.987599][ T4873] 1fc0: 00000298 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b650bc [ 241.987883][ T4873] 1fe0: 76b64ec0 76b64eb0 00018af0 00133450 [ 241.990475][ T4873] Mem-Info: [ 241.991186][ T4873] active_anon:3957 inactive_anon:0 isolated_anon:0 [ 241.991186][ T4873] active_file:256 inactive_file:34311 isolated_file:0 [ 241.991186][ T4873] unevictable:768 dirty:7 writeback:0 [ 241.991186][ T4873] slab_reclaimable:944 slab_unreclaimable:5678 [ 241.991186][ T4873] mapped:4588 shmem:3688 pagetables:200 [ 241.991186][ T4873] sec_pagetables:0 bounce:0 [ 241.991186][ T4873] kernel_misc_reclaimable:0 [ 241.991186][ T4873] free:442020 free_pcp:869 free_cma:4032 [ 241.992641][ T4873] Node 0 active_anon:15828kB inactive_anon:0kB active_file:1024kB inactive_file:137244kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:18352kB dirty:28kB writeback:0kB shmem:14752kB writeback_tmp:0kB kernel_stack:2736kB pagetables:800kB sec_pagetables:0kB all_unreclaimable? no [ 241.993906][ T4873] Normal free:1392120kB boost:0kB min:4776kB low:6200kB high:7624kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:776kB unevictable:0kB writepending:28kB present:1556480kB managed:1430008kB mlocked:0kB bounce:0kB free_pcp:3476kB local_pcp:2084kB free_cma:0kB [ 241.994799][ T4873] lowmem_reserve[]: 0 4224 0 [ 241.995214][ T4873] Normal: 172*4kB (U) 65*8kB (U) 2*16kB (UE) 21*32kB (UME) 12*64kB (UM) 3*128kB (UME) 6*256kB (UME) 8*512kB (UM) 5*1024kB (ME) 5*2048kB (UME) 334*4096kB (UM) = 1392120kB [ 241.996558][ T4873] 38255 total pagecache pages [ 241.996768][ T4873] 0 pages in swap cache [ 241.996951][ T4873] Free swap = 124996kB [ 241.997137][ T4873] Total swap = 124996kB [ 241.997377][ T4873] 524288 pages RAM [ 241.997549][ T4873] 135168 pages HighMem/MovableOnly [ 241.997742][ T4873] 31618 pages reserved [ 241.997925][ T4873] 4096 pages cma reserved [ 242.002209][ T31] audit: type=1400 audit(241.790:1274): avc: denied { getopt } for pid=4872 comm="syz.0.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 242.733467][ T31] audit: type=1400 audit(242.530:1275): avc: denied { create } for pid=4876 comm="syz.0.271" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 242.820596][ T31] audit: type=1400 audit(242.600:1276): avc: denied { unlink } for pid=3094 comm="syz-executor" name="file0" dev="tmpfs" ino=825 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 252.076599][ T31] audit: type=1326 audit(251.860:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.103229][ T31] audit: type=1326 audit(251.870:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.114832][ T31] audit: type=1326 audit(251.910:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.116078][ T31] audit: type=1326 audit(251.910:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.116831][ T31] audit: type=1326 audit(251.910:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.141056][ T31] audit: type=1326 audit(251.930:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.146219][ T31] audit: type=1326 audit(251.930:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.152099][ T31] audit: type=1326 audit(251.930:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.156454][ T31] audit: type=1326 audit(251.950:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 252.158108][ T31] audit: type=1326 audit(251.950:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4889 comm="syz.1.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 258.632567][ T4903] smc: net device lo applied user defined pnetid SYZ0 [ 258.639299][ T4903] smc: net device lo erased user defined pnetid SYZ0 [ 262.231540][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 262.231680][ T31] audit: type=1400 audit(262.020:1294): avc: denied { connect } for pid=4912 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.624922][ T31] audit: type=1326 audit(263.350:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.626033][ T31] audit: type=1326 audit(263.420:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.634792][ T31] audit: type=1326 audit(263.430:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.672824][ T31] audit: type=1326 audit(263.450:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.690669][ T31] audit: type=1326 audit(263.480:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.753336][ T31] audit: type=1326 audit(263.530:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.790471][ T31] audit: type=1326 audit(263.580:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.796228][ T31] audit: type=1326 audit(263.580:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.805262][ T31] audit: type=1326 audit(263.590:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 274.671269][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 274.671385][ T31] audit: type=1400 audit(274.470:1313): avc: denied { setopt } for pid=4935 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.156336][ T4940] Process accounting resumed [ 278.088946][ T31] audit: type=1400 audit(277.880:1314): avc: denied { bind } for pid=4943 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 280.661785][ T4955] vlan3: entered promiscuous mode [ 280.662285][ T4955] vlan3: entered allmulticast mode [ 281.912842][ T31] audit: type=1400 audit(281.710:1315): avc: denied { create } for pid=4952 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 283.915045][ T31] audit: type=1400 audit(283.710:1316): avc: denied { create } for pid=4965 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 283.917902][ T31] audit: type=1400 audit(283.710:1317): avc: denied { write } for pid=4965 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 284.390380][ T31] audit: type=1326 audit(284.180:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 284.430763][ T31] audit: type=1326 audit(284.210:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x133450 code=0x7ffc0000 [ 284.442819][ T31] audit: type=1326 audit(284.240:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 284.444114][ T31] audit: type=1326 audit(284.240:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4968 comm="syz.0.307" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 287.466205][ T31] audit: type=1400 audit(287.230:1322): avc: denied { connect } for pid=4989 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 289.391615][ T31] audit: type=1400 audit(289.190:1323): avc: denied { getopt } for pid=5007 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 290.116885][ T5013] netlink: 4 bytes leftover after parsing attributes in process `syz.0.321'. [ 290.943145][ T31] audit: type=1400 audit(290.720:1324): avc: denied { validate_trans } for pid=5017 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 291.411141][ T31] audit: type=1400 audit(291.200:1325): avc: denied { relabelfrom } for pid=5019 comm="syz.0.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 291.412487][ T31] audit: type=1400 audit(291.200:1326): avc: denied { relabelto } for pid=5019 comm="syz.0.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 293.271096][ T5038] vlan3: entered promiscuous mode [ 293.271662][ T5038] syz_tun: entered promiscuous mode [ 293.272429][ T5038] vlan3: entered allmulticast mode [ 293.272646][ T5038] syz_tun: entered allmulticast mode [ 293.291892][ T5038] syz_tun: left allmulticast mode [ 293.292403][ T5038] syz_tun: left promiscuous mode [ 293.609892][ T31] audit: type=1400 audit(293.400:1327): avc: denied { create } for pid=5037 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 293.614615][ T31] audit: type=1400 audit(293.410:1328): avc: denied { setopt } for pid=5037 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 296.546573][ T31] audit: type=1326 audit(296.340:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.547597][ T31] audit: type=1326 audit(296.340:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.554923][ T31] audit: type=1326 audit(296.340:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.557758][ T31] audit: type=1326 audit(296.350:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 296.562140][ T31] audit: type=1326 audit(296.360:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5078 comm="syz.0.344" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 297.666560][ T31] audit: type=1326 audit(297.460:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 297.667656][ T31] audit: type=1326 audit(297.460:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 297.668244][ T31] audit: type=1326 audit(297.460:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.349" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x133450 code=0x7ffc0000 [ 298.611399][ T5101] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 298.612080][ T5101] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 298.612916][ T5101] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 301.436956][ T5105] netlink: 28 bytes leftover after parsing attributes in process `syz.0.354'. [ 302.383676][ T5112] netlink: 'syz.0.355': attribute type 4 has an invalid length. [ 302.451341][ T5112] netlink: 28 bytes leftover after parsing attributes in process `syz.0.355'. [ 304.285079][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 304.285146][ T31] audit: type=1400 audit(304.080:1352): avc: denied { bind } for pid=5096 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 305.766498][ T31] audit: type=1326 audit(305.560:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.768575][ T31] audit: type=1326 audit(305.560:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.784051][ T31] audit: type=1326 audit(305.580:1355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.789692][ T31] audit: type=1326 audit(305.580:1356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.805937][ T31] audit: type=1326 audit(305.600:1357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.827487][ T31] audit: type=1326 audit(305.620:1358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.828498][ T31] audit: type=1326 audit(305.620:1359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.829247][ T31] audit: type=1326 audit(305.620:1360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 305.832549][ T31] audit: type=1326 audit(305.620:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5121 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x133450 code=0x7ffc0000 [ 321.203038][ T5134] ªªªªªª: renamed from syzkaller0 [ 322.404793][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.405020][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.415013][ T5151] syz.1.367[5151] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.324926][ T5161] pim6reg1: entered promiscuous mode [ 323.326016][ T5161] pim6reg1: entered allmulticast mode [ 323.675969][ T5167] tmpfs: Unsupported parameter 'mpol' [ 327.351990][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 327.352104][ T31] audit: type=1400 audit(327.140:1364): avc: denied { mount } for pid=5182 comm="syz.0.379" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 328.912510][ T5187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.381'. [ 328.937382][ T5187] netlink: 4 bytes leftover after parsing attributes in process `syz.0.381'. [ 331.663554][ T31] audit: type=1400 audit(331.460:1365): avc: denied { create } for pid=5196 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 331.682607][ T31] audit: type=1400 audit(331.480:1366): avc: denied { connect } for pid=5196 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 337.510416][ T31] audit: type=1326 audit(337.280:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.573566][ T31] audit: type=1326 audit(337.370:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.577892][ T31] audit: type=1326 audit(337.370:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.605251][ T31] audit: type=1326 audit(337.370:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.607560][ T31] audit: type=1326 audit(337.370:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.608855][ T31] audit: type=1326 audit(337.370:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.616044][ T31] audit: type=1326 audit(337.370:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.617811][ T31] audit: type=1326 audit(337.370:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.639367][ T31] audit: type=1326 audit(337.380:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 337.646430][ T31] audit: type=1326 audit(337.400:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.0.393" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 341.461959][ T5228] block device autoloading is deprecated and will be removed. [ 341.470008][ T5228] syz.0.397: attempt to access beyond end of device [ 341.470008][ T5228] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 343.534989][ T4814] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 343.856843][ T4814] usb 1-1: Using ep0 maxpacket: 16 [ 343.882630][ T4814] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 343.882993][ T4814] usb 1-1: config 0 has no interfaces? [ 343.887528][ T4814] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 343.910487][ T4814] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 343.927065][ T4814] usb 1-1: config 0 descriptor?? [ 344.284130][ T4756] usb 1-1: USB disconnect, device number 2 [ 347.286394][ T5252] IPv6: Can't replace route, no match found [ 348.191853][ T5255] syz.0.403 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 351.073426][ T5263] IPv6: Can't replace route, no match found [ 351.444768][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 351.444879][ T31] audit: type=1326 audit(351.240:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.451059][ T31] audit: type=1326 audit(351.240:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.502105][ T31] audit: type=1326 audit(351.270:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=220 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.503351][ T31] audit: type=1326 audit(351.300:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.512011][ T31] audit: type=1326 audit(351.310:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.512958][ T31] audit: type=1326 audit(351.310:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.513502][ T31] audit: type=1326 audit(351.310:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.517832][ T31] audit: type=1326 audit(351.310:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.518954][ T31] audit: type=1326 audit(351.310:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5264 comm="syz.0.408" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 351.534509][ T31] audit: type=1400 audit(351.330:1396): avc: denied { remove_name } for pid=2908 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 364.039788][ T5292] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 364.043158][ T5292] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 364.070753][ T5292] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 367.184006][ T5298] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.393329][ T5298] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.512211][ T5298] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.725839][ T5298] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 368.280469][ T5298] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 368.306936][ T5298] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 368.355016][ T5298] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 368.415283][ T5298] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 368.672045][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 368.672183][ T31] audit: type=1326 audit(368.460:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.674923][ T31] audit: type=1326 audit(368.470:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.686614][ T31] audit: type=1326 audit(368.480:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.687895][ T31] audit: type=1326 audit(368.480:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.688712][ T31] audit: type=1326 audit(368.480:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.698897][ T31] audit: type=1326 audit(368.490:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.700231][ T31] audit: type=1326 audit(368.490:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.700868][ T31] audit: type=1326 audit(368.490:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.719171][ T31] audit: type=1326 audit(368.510:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 368.722409][ T31] audit: type=1326 audit(368.510:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5324 comm="syz.1.425" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 369.279142][ T5328] netlink: 32 bytes leftover after parsing attributes in process `syz.1.426'. [ 369.292019][ T5328] netlink: 16 bytes leftover after parsing attributes in process `syz.1.426'. [ 373.859669][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 373.868225][ T31] audit: type=1326 audit(373.650:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.869111][ T31] audit: type=1326 audit(373.650:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.891352][ T31] audit: type=1326 audit(373.690:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=24 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.892986][ T31] audit: type=1326 audit(373.690:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.893851][ T31] audit: type=1326 audit(373.690:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.904193][ T31] audit: type=1326 audit(373.700:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.906141][ T31] audit: type=1326 audit(373.700:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 373.909148][ T31] audit: type=1326 audit(373.700:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5393 comm="syz.0.434" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 374.587983][ T31] audit: type=1326 audit(374.350:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5401 comm="syz.1.437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 374.589059][ T31] audit: type=1326 audit(374.370:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5401 comm="syz.1.437" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.867308][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 404.867424][ T31] audit: type=1326 audit(404.660:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.874756][ T31] audit: type=1326 audit(404.670:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.877763][ T31] audit: type=1326 audit(404.670:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.880575][ T31] audit: type=1326 audit(404.670:1556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.882628][ T31] audit: type=1326 audit(404.680:1557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.885337][ T31] audit: type=1326 audit(404.680:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.889443][ T31] audit: type=1326 audit(404.680:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.892364][ T31] audit: type=1326 audit(404.690:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.911134][ T31] audit: type=1326 audit(404.700:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 404.913923][ T31] audit: type=1326 audit(404.710:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.1.452" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 408.674670][ T5457] syzkaller0: entered promiscuous mode [ 408.675123][ T5457] syzkaller0: entered allmulticast mode [ 409.310911][ T5464] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 409.396065][ T5464] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 409.584419][ T5464] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 409.693370][ T5464] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 409.859857][ T5464] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.945356][ T5464] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 410.044529][ T5464] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 410.101240][ T5464] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 410.730658][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 410.730785][ T31] audit: type=1326 audit(410.520:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.731964][ T31] audit: type=1326 audit(410.520:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.732903][ T31] audit: type=1326 audit(410.530:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.741163][ T31] audit: type=1326 audit(410.530:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.742030][ T31] audit: type=1326 audit(410.530:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.742724][ T31] audit: type=1326 audit(410.530:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.744149][ T31] audit: type=1326 audit(410.530:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.767523][ T31] audit: type=1326 audit(410.560:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.768382][ T31] audit: type=1326 audit(410.560:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=135 compat=0 ip=0x133450 code=0x7ffc0000 [ 410.768956][ T31] audit: type=1326 audit(410.560:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5482 comm="syz.0.461" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 412.213119][ T5496] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 413.533425][ T5507] netlink: 48 bytes leftover after parsing attributes in process `syz.1.472'. [ 416.254277][ T5529] SELinux: policydb table sizes (0,0) do not match mine (6,6) [ 416.255394][ T5529] SELinux: failed to load policy [ 417.985337][ T5539] dvmrp1: entered allmulticast mode [ 419.563379][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 419.563493][ T31] audit: type=1326 audit(419.360:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 419.650577][ T31] audit: type=1326 audit(419.370:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 419.652532][ T31] audit: type=1326 audit(419.440:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x133450 code=0x7ffc0000 [ 419.653427][ T31] audit: type=1326 audit(419.440:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 419.659022][ T31] audit: type=1326 audit(419.440:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5575 comm="syz.1.492" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 421.852851][ T5589] netlink: 4 bytes leftover after parsing attributes in process `syz.1.496'. [ 426.862219][ T31] audit: type=1400 audit(426.660:1624): avc: denied { ioctl } for pid=5609 comm="syz.1.505" path="socket:[6128]" dev="sockfs" ino=6128 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 427.226431][ T31] audit: type=1400 audit(427.020:1625): avc: denied { bpf } for pid=5613 comm="syz.0.507" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 427.227366][ T31] audit: type=1400 audit(427.020:1626): avc: denied { prog_run } for pid=5613 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.263865][ T31] audit: type=1400 audit(427.060:1627): avc: denied { read } for pid=2908 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 427.265158][ T31] audit: type=1400 audit(427.060:1628): avc: denied { search } for pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 427.267047][ T31] audit: type=1400 audit(427.060:1629): avc: denied { append } for pid=2908 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.268080][ T31] audit: type=1400 audit(427.060:1630): avc: denied { open } for pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.269748][ T31] audit: type=1400 audit(427.060:1631): avc: denied { getattr } for pid=2908 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.321413][ T31] audit: type=1400 audit(427.100:1632): avc: denied { recv } for pid=3089 comm="syz-executor" saddr=127.0.0.1 src=35150 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 427.349804][ T31] audit: type=1400 audit(427.140:1633): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 429.356959][ C0] ------------[ cut here ]------------ [ 429.358008][ C0] WARNING: CPU: 0 PID: 15 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 429.358734][ C0] refcount_t: underflow; use-after-free. [ 429.358985][ C0] Modules linked in: [ 429.361876][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 429.363825][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller #0 [ 429.364206][ C0] Hardware name: ARM-Versatile Express [ 429.364512][ C0] Call trace: [ 429.364974][ C0] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 429.366634][ C0] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 429.368636][ C0] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 429.371669][ C0] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 429.375603][ C0] r5:00000000 r4:82874d18 [ 429.376508][ C0] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 429.377077][ C0] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 429.377498][ C0] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 429.377774][ C0] r7:8084bbd8 [ 429.377963][ C0] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 429.378350][ C0] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 429.378749][ C0] r8:00000009 r7:8209017c r6:df855bdc r5:82e3b000 r4:00000000 [ 429.379078][ C0] [<80242940>] (warn_slowpath_fmt) from [<8084bbd8>] (refcount_warn_saturate+0x13c/0x174) [ 429.379591][ C0] r10:dddd0e88 r9:00000040 r8:8469b8d0 r7:00000000 r6:81841f64 r5:00000002 [ 429.379953][ C0] r4:85212f00 [ 429.380151][ C0] [<8084ba9c>] (refcount_warn_saturate) from [<814aa974>] (sk_skb_reason_drop+0x1d8/0x248) [ 429.380668][ C0] [<814aa79c>] (sk_skb_reason_drop) from [<81841f64>] (j1939_session_destroy+0x78/0x200) [ 429.381114][ C0] r9:00000040 r8:8469b8d0 r7:859c981c r6:847dd550 r5:847dd500 r4:85212f00 [ 429.381467][ C0] [<81841eec>] (j1939_session_destroy) from [<818430c4>] (j1939_xtp_rx_eoma+0x120/0x234) [ 429.381912][ C0] r6:852123c0 r5:847dd500 r4:847dd514 [ 429.382172][ C0] [<81842fa4>] (j1939_xtp_rx_eoma) from [<818454ec>] (j1939_tp_recv+0x4a8/0x530) [ 429.382608][ C0] r7:859c9000 r6:859c9008 r5:859c9000 r4:852123c0 [ 429.384149][ C0] [<81845044>] (j1939_tp_recv) from [<8183eed0>] (j1939_can_recv+0x1e4/0x2dc) [ 429.387808][ C0] r7:859c9000 r6:859c9008 r5:859c9810 r4:852123c0 [ 429.388394][ C0] [<8183ecec>] (j1939_can_recv) from [<81834b94>] (can_rcv_filter+0x9c/0x218) [ 429.389206][ C0] r9:00000040 r8:84b686c0 r7:98ec0000 r6:85212c00 r5:00000001 r4:8474b360 [ 429.389649][ C0] [<81834af8>] (can_rcv_filter) from [<81835610>] (can_receive+0xb4/0xf0) [ 429.390707][ C0] r9:00000040 r8:00000000 r7:84b68000 r6:8498ca80 r5:848e8000 r4:85212c00 [ 429.391118][ C0] [<8183555c>] (can_receive) from [<818356d0>] (can_rcv+0x84/0xac) [ 429.391525][ C0] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8183564c r4:85212c00 [ 429.391852][ C0] [<8183564c>] (can_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80) [ 429.392784][ C0] r5:8183564c r4:84b68000 [ 429.393980][ C0] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c) [ 429.394975][ C0] r5:dddd0f70 r4:85212c00 [ 429.396605][ C0] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c) [ 429.397388][ C0] r5:dddd0f70 r4:85212c00 [ 429.398389][ C0] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240) [ 429.401409][ C0] r10:dddd0e80 r9:dddd10c0 r8:df855e38 r7:df855e33 r6:00000040 r5:dddd0f70 [ 429.403173][ C0] r4:00000001 [ 429.403478][ C0] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440) [ 429.404037][ C0] r9:dddd10c0 r8:df855e38 r7:0000012c r6:00003276 r5:dddd0f70 r4:00000000 [ 429.404433][ C0] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464) [ 429.405015][ C0] r10:00000008 r9:82e3b000 r8:00000100 r7:04208040 r6:00000003 r5:00000004 [ 429.405383][ C0] r4:8260408c [ 429.405580][ C0] [<8024b910>] (handle_softirqs) from [<8024bdb8>] (run_ksoftirqd+0x44/0x4c) [ 429.406074][ C0] r10:00000000 r9:00000002 r8:82624b08 r7:00000001 r6:82e3b000 r5:82cb7140 [ 429.406421][ C0] r4:00000000 [ 429.406627][ C0] [<8024bd74>] (run_ksoftirqd) from [<80275edc>] (smpboot_thread_fn+0x16c/0x284) [ 429.407000][ C0] [<80275d70>] (smpboot_thread_fn) from [<80270ae0>] (kthread+0x104/0x134) [ 429.407375][ C0] r10:00000000 r9:df819de8 r8:82cb7280 r7:82cb7140 r6:80275d70 r5:82e3b000 [ 429.407702][ C0] r4:82cb7180 r3:00000000 [ 429.407918][ C0] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 429.408299][ C0] Exception stack(0xdf855fb0 to 0xdf855ff8) [ 429.408599][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 429.408933][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 429.409291][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 429.409643][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82cb7180 [ 429.411892][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:49:11 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=82e3b000 R04=8262a654 R05=00000000 R06=00000555 R07=3fffe553 R08=df8558fc R09=3fffe554 R10=00000000 R11=df855944 R12=00000001 R13=df8558e8 R14=0001d488 R15=802c4c80 PSR=40000193 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=8422cac0 R01=dfc69b8c R02=000001fc R03=00000318 R04=00000004 R05=85ebca6b R06=e6546b64 R07=183d117a R08=1b873593 R09=842557e4 R10=840243b0 R11=dfc69b4c R12=00000707 R13=dfc69b2c R14=00000077 R15=8073b080 PSR=a0000013 N-C- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=5e89015a s05=bba94669 d02=bba946695e89015a s06=00000000 s07=00000000 d03=0000000000000000 s08=f4677960 s09=5f9d0db8 d04=5f9d0db8f4677960 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=ba28896a s21=da959135 d10=da959135ba28896a s22=7229627e s23=00000000 d11=000000007229627e s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000