last executing test programs: 19.541356661s ago: executing program 1 (id=2574): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000d00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = syz_pidfd_open(0x0, 0x0) setns(r5, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x14860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, &(0x7f0000000280)=[0x0], 0x1}, 0x58) 17.1722721s ago: executing program 0 (id=2578): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) syz_clone(0x41200100, 0x0, 0x0, 0x0, 0x0, 0x0) 14.912827994s ago: executing program 0 (id=2579): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 14.47215586s ago: executing program 0 (id=2580): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2c, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f8482e0000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 13.994070248s ago: executing program 0 (id=2581): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000500000002"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x3c, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet(r2, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmmsg$inet(r2, &(0x7f0000000600)=[{{0x0, 0x4102, &(0x7f0000000140)=[{&(0x7f0000000080)="a9", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)='9', 0x1}], 0x1}}], 0x2, 0x4008440) 13.751304337s ago: executing program 0 (id=2582): set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) r0 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) flistxattr(r0, 0x0, 0xdeff) 13.480351777s ago: executing program 0 (id=2583): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, &(0x7f0000000040)) 1.394518678s ago: executing program 1 (id=2585): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0xfd}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) 981.283133ms ago: executing program 1 (id=2586): ioctl$HIDIOCGUSAGES(0xffffffffffffffff, 0xd01c4813, &(0x7f0000000240)={{0x3, 0x100, 0x5, 0xb7a4, 0x1, 0xffff}, 0x341, [0xc, 0x40, 0xcd6, 0x4, 0x6, 0x0, 0x3, 0x7, 0x9, 0x7a18fde9, 0x9, 0xf12, 0x4, 0x3, 0x378, 0x350bae1a, 0x4, 0x0, 0x1, 0xffff06bd, 0x0, 0xd4f, 0x7, 0xf2, 0x10, 0x5, 0x8, 0x10001, 0x401, 0x80000000, 0x2401, 0x3ca5, 0x1, 0x0, 0xff, 0x4, 0x4, 0x3, 0x0, 0x0, 0x54, 0x80000000, 0x7fff, 0x7, 0x3, 0xa, 0x0, 0x10000, 0x401, 0x8, 0xffff, 0x91ba, 0x7, 0x9, 0x1, 0xb6, 0x20, 0xcb, 0x5, 0x7f, 0x5, 0x311, 0x66d1, 0xfffffffd, 0xa7d6, 0xb6eb, 0xc74, 0x77, 0x1, 0xff, 0x5cb5, 0xfffffffe, 0x3fd, 0xedf4, 0x4, 0x1000, 0x6, 0xfffffffe, 0x8001, 0xc1, 0x1, 0x5, 0x1, 0x32, 0x98, 0x7f, 0x0, 0x401, 0x2, 0x2, 0x4680, 0x7, 0xe665, 0x3c6e, 0x3, 0x40, 0x80, 0x4b, 0x8000, 0x2, 0xb, 0x6, 0x4fa4, 0x80000002, 0x1, 0xb, 0x0, 0xfffffffa, 0x3, 0x9, 0xfd, 0xfe, 0x4, 0x40, 0x9, 0x1b, 0x1ff, 0x7ff, 0x2, 0x80000000, 0xffff, 0x9, 0x0, 0x6, 0x2, 0x4, 0x3, 0xa0, 0xf, 0x1ff, 0x9, 0x7, 0x6, 0x400, 0x8, 0xff2, 0x6, 0x0, 0x6, 0x0, 0x9, 0x1, 0xf1a, 0x664, 0x4, 0x9, 0x9, 0x2, 0x4, 0xfffffffd, 0x10, 0x0, 0x9, 0x10000, 0x1, 0x9, 0xf7a, 0xc6, 0x1, 0x4, 0x6, 0xffffffff, 0x6, 0x10001, 0x3042c26b, 0x68, 0x7, 0x1, 0x5, 0x3, 0x9a3f, 0x400000, 0x0, 0x80000067, 0xffff0000, 0x7, 0x10000000, 0x10001, 0x7, 0x3, 0x12, 0x10a, 0x2, 0x40, 0x1c, 0x80, 0xb5f8, 0x8bc, 0x3, 0x101, 0x5, 0x63, 0x4, 0x4, 0x10, 0x1000, 0x288c, 0x1ffe, 0x73ee, 0x1, 0x5, 0x9, 0x7fffffff, 0x73, 0x7, 0x8, 0x6, 0x400, 0x40, 0x0, 0x0, 0x0, 0x546c, 0x981, 0x5aa, 0x7fff, 0x7, 0x4, 0x8, 0x6688, 0x45e3, 0x5, 0x7, 0x1, 0x5, 0x3, 0x0, 0x1, 0x2, 0x2, 0x4, 0xce, 0xf, 0x0, 0x1, 0x667, 0x3, 0x0, 0x9, 0x9, 0x37d, 0x10001, 0xc, 0x1, 0x1, 0x2, 0x6, 0x4, 0x6, 0x1, 0x9, 0x6, 0xfffffffa, 0x2, 0x0, 0x9, 0x5, 0x2, 0x7, 0x3, 0xffffff1b, 0x9, 0x2, 0xd, 0x34ea, 0x10000, 0x0, 0x80000001, 0x8, 0x8000, 0x3a, 0x10, 0x8, 0x9, 0x5, 0x1, 0x6, 0x10001, 0x0, 0x4, 0x10000, 0x4, 0xffff, 0xe, 0x89, 0x2, 0x7, 0x1, 0x73, 0x3, 0x9, 0x4, 0x1, 0x9, 0x0, 0x8, 0x0, 0x2, 0x80000004, 0x29, 0x9, 0x0, 0x80000004, 0x4, 0x0, 0x1, 0x4, 0x5, 0x4, 0x10001, 0xf, 0x9, 0x100, 0x4, 0x59b, 0x7, 0x8, 0x9, 0x3, 0x2, 0x4, 0xbf, 0x0, 0x8, 0x40, 0xd3, 0x7, 0x1, 0x89aa, 0x8, 0x7, 0xf0ce, 0x8000004, 0x1, 0x0, 0x2, 0xc6, 0x1000, 0x5, 0x937, 0xa, 0x6, 0x3, 0xffffffff, 0x8, 0x9, 0x5, 0xffffffff, 0xbe, 0x1, 0x7, 0x0, 0xffffffff, 0x0, 0x3d6, 0x0, 0xc, 0x6, 0x7, 0xfffffeff, 0x100, 0x2, 0x7fff, 0x101, 0x7, 0x6, 0x706, 0x2, 0x49, 0xe, 0xfffffff7, 0xfffff772, 0x8, 0x80000000, 0x6, 0x1, 0xa9c, 0x9, 0x9, 0x1, 0x2, 0x5, 0x1000, 0x5, 0x1ff, 0x8000, 0x3, 0x3, 0x10001, 0xffff0000, 0xf, 0x1, 0xffffa5ba, 0xffffa9b4, 0xb, 0x4, 0x8000005, 0x3, 0x4b5f, 0x6, 0xa, 0xffffffff, 0x1, 0x80000000, 0xb, 0x0, 0xc8f, 0x1, 0x7, 0x8, 0x0, 0x10000, 0x57dc, 0x818a, 0x10, 0x8, 0x10, 0xfffffffc, 0xfffff001, 0xa, 0x5, 0x5, 0x4, 0xfff, 0x9, 0x10, 0xfffffffd, 0x4, 0xc2, 0x7f, 0x5, 0x2, 0x80000000, 0xd, 0x3, 0x1, 0x0, 0x5, 0xb8, 0x101, 0x401, 0x2, 0x7, 0xc, 0x6623258, 0xf2, 0x741, 0xae6, 0x9, 0xffffa0ae, 0x9, 0x6, 0x2, 0x8, 0x9, 0x1, 0x81, 0x9a, 0x9, 0xb, 0x800, 0x4, 0x3ff, 0x5, 0x7, 0x7, 0x8, 0xfe, 0x7f, 0x9, 0x4, 0x2, 0x20000000, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0x8000001, 0x0, 0xfff, 0x101, 0x4, 0x0, 0x96c6, 0xc, 0x5, 0xfff, 0x100, 0xffff, 0x1, 0x401, 0xf0, 0x0, 0xfffff53d, 0x9, 0x2, 0x6, 0x0, 0x6, 0x4b15, 0x10000, 0x1, 0x9, 0x1, 0xd, 0x9, 0x4, 0x9, 0x1, 0x6, 0x0, 0x3, 0x10001, 0x1, 0x7, 0x1, 0x5, 0x8, 0xffffc487, 0x200, 0x10001, 0x37c, 0x7, 0x6, 0x6, 0x8, 0xfffffe00, 0x7fd3, 0x1, 0x0, 0x10, 0x0, 0x3, 0x7, 0x80000000, 0xb46d, 0x3, 0x1000, 0x1eb4bce6, 0x10, 0x8, 0x1, 0x5, 0x1, 0x5, 0x9, 0x1000, 0x7, 0x62f2f805, 0x9, 0x3, 0xffffffff, 0x0, 0x7f, 0x6, 0x8, 0x40, 0x2, 0x2, 0xa, 0x5, 0x6, 0x80000000, 0x2, 0x8, 0x7, 0x7, 0x1, 0x5, 0x9, 0x6709, 0x80000001, 0x0, 0x80, 0x8, 0x6, 0x0, 0xa958, 0xff, 0x5, 0x2, 0x2, 0x4, 0x10000, 0x80000001, 0x5, 0x1c00, 0x9, 0x0, 0xb7, 0x3, 0xff, 0x9, 0xffff, 0x80, 0xfea5, 0x7fff, 0x7, 0x7, 0x7, 0x7485, 0x9, 0x8, 0x0, 0x5, 0xf, 0x5, 0xe, 0x6, 0x1000, 0x3, 0x7, 0x382d, 0x459, 0xcad, 0x9, 0x0, 0x2, 0x9, 0x5, 0xffff8000, 0xe0, 0xfffffff7, 0x85, 0xffffffff, 0x2, 0x7, 0xa05a, 0x0, 0x0, 0x101, 0x35, 0x8, 0x1, 0x1, 0x30, 0xffffff7e, 0x1, 0x2, 0x9, 0x3, 0x7, 0x8, 0x6, 0x4000, 0x1, 0x4, 0x15294b70, 0x3, 0x3, 0x2, 0x43, 0x3, 0x9, 0x5, 0x80000000, 0x9, 0x0, 0x5, 0x81, 0x1, 0x2, 0x3fd, 0x1df, 0x6, 0x6, 0xfffffffa, 0x1a, 0x9, 0x2, 0x9, 0xffffffff, 0x9, 0x8, 0x2c1, 0x9e95, 0x2, 0xfffffedd, 0x30c8, 0x2, 0x38a0, 0x7b, 0x0, 0x8, 0x9, 0x6, 0x19, 0x9, 0x8, 0x5, 0x8, 0x1ff, 0x7fff, 0x3, 0x8000002, 0x8, 0x2b, 0x200006, 0x4, 0x1, 0x2, 0xfb4, 0xbf9, 0x7, 0x405, 0x6, 0x4, 0x8001, 0x9, 0x8, 0x3, 0x6ae574d2, 0x6, 0xfffffe00, 0x1000, 0x5, 0x92, 0x3, 0x7fffffff, 0xd7, 0x8001, 0x905, 0x3, 0x6, 0xfffffb31, 0xb, 0x4, 0x7, 0x8, 0x1, 0x6, 0x1, 0xff, 0x100, 0x8, 0x3, 0x6, 0x80000000, 0x0, 0x100a, 0x7fffffff, 0x7fff, 0x2, 0xfffffff8, 0x2, 0x9af, 0x10001, 0x8, 0x4, 0x8, 0x6, 0x7742348d, 0x5, 0x5, 0x1f, 0x40, 0x0, 0x6, 0x8, 0x7, 0x7, 0x8, 0x17f, 0x6, 0x2, 0x5, 0x6, 0x1, 0xb, 0xe, 0x5, 0x1, 0xfe7, 0xfffffffc, 0x8, 0x7ff, 0x3e9, 0x0, 0x3, 0x2000, 0xd, 0x3, 0x4, 0x3, 0x81, 0x8, 0x14, 0x8, 0x9, 0x6, 0xffff, 0xf28c, 0x7, 0x6, 0x4, 0x7fffffff, 0xffff, 0x7fffffff, 0xc9, 0x2, 0x0, 0x924, 0x6, 0x100, 0x1, 0x5, 0xffff351b, 0x0, 0xfffffffb, 0x7, 0x9, 0x2, 0x5, 0x4, 0x1, 0x4, 0xff, 0xee, 0x2, 0x4, 0x8, 0x9f, 0x7, 0x3, 0x9, 0xc9, 0x10001, 0x1, 0x1, 0xfffffff7, 0x0, 0x5, 0x5, 0x6, 0x400, 0x51, 0x7, 0xefb, 0xb8, 0x8, 0x5, 0xfffffff7, 0x7, 0x7, 0x5, 0x2, 0x0, 0x6, 0xea, 0x0, 0xfff, 0x809, 0x6, 0x0, 0x6, 0xffff, 0xfffffffa, 0x3, 0x0, 0x1, 0x6, 0x7, 0x5, 0x7, 0x2ec, 0x9, 0x6, 0x3ff, 0x6, 0xfff, 0x0, 0xa7b, 0x62cc, 0xfffffff7, 0x7, 0x40, 0xa, 0x8, 0x3, 0xe, 0x1, 0x1, 0xc, 0x40, 0x3, 0x4, 0x5, 0x5, 0x7ff, 0x5, 0x8, 0x5, 0x3, 0x9, 0x2, 0x80000001, 0x54, 0x400, 0x1, 0x8, 0xa, 0xb, 0xc0, 0x3, 0x72, 0x80, 0x1000, 0x7, 0x800, 0x6, 0xd19, 0x3, 0x93c, 0x6, 0x0, 0x0, 0xe, 0x5, 0x3, 0xfffffffa, 0xa01, 0xf3, 0x65, 0x8, 0xe, 0x3, 0x3ff, 0x5, 0x2, 0x6, 0xfffffff8, 0x5, 0xfffffff9, 0x9, 0x5, 0x62, 0x8, 0x1, 0xfffffffb, 0x1af88, 0x2, 0x9, 0x7, 0x0, 0x7, 0x8, 0x10000, 0x40, 0x8, 0x7, 0x2b, 0x6, 0x10, 0x5, 0x200, 0x7fff, 0x6, 0x3, 0x8, 0x10, 0x4, 0x6, 0x633, 0xf05, 0x0, 0x101, 0x200, 0x7, 0x7ff, 0x0, 0x1, 0x1, 0x10000, 0x9, 0x40, 0x9, 0x0, 0x7f, 0x7, 0x6, 0x11, 0x3, 0x80000001, 0x0, 0x8, 0x8, 0x7, 0xdd, 0x8, 0x89, 0x0, 0x100, 0x1, 0x9, 0xe75, 0x400, 0x1, 0x8, 0x200, 0xe9ab, 0xfffffff8, 0x8000, 0x7, 0x2, 0x2, 0x43, 0x3ff, 0x8, 0x7, 0x9, 0x1, 0x6, 0x7, 0xa, 0xf, 0xf39d, 0x71, 0xfff, 0x5, 0x8]}) r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2250) 673.570795ms ago: executing program 1 (id=2587): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000200"/15], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth1_to_bond\x00', 0x0}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r0, r2, 0x25, 0x4}, 0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r3, r4, 0x4, r0}, 0x10) 354.594797ms ago: executing program 1 (id=2588): syz_usb_connect$hid(0x2, 0x0, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000700)=@newsa={0x10c, 0x1a, 0x7, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, '\x00', 0x1b}, @in=@multicast2, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xee00}, {@in6=@mcast1, 0x0, 0x2b}, @in6=@private0, {0x300, 0x3, 0x2, 0xfeffff7f00000000}, {0x0, 0x200000, 0x7, 0xfffffffffffffffd}, {0x40000, 0x0, 0xae8}, 0x0, 0x0, 0xa, 0x2, 0x0, 0x70}, [@coaddr={0x14, 0xe, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, @XFRMA_IF_ID={0x8, 0x1f, 0x3}]}, 0x10c}}, 0x0) 0s ago: executing program 1 (id=2589): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41101, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x21, 0x0, 0x0, 0x100000, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000, 0x0, 0x200000000000000}, 0x50) kernel console output (not intermixed with test programs): rdma_socket permissive=1 [ 653.134921][ T30] audit: type=1400 audit(652.650:224): avc: denied { read } for pid=4810 comm="syz.0.481" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.142296][ T30] audit: type=1400 audit(652.660:225): avc: denied { open } for pid=4810 comm="syz.0.481" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.152976][ T30] audit: type=1400 audit(652.670:226): avc: denied { ioctl } for pid=4810 comm="syz.0.481" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.409635][ T30] audit: type=1400 audit(652.930:227): avc: denied { accept } for pid=4814 comm="syz.0.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 654.374777][ T30] audit: type=1400 audit(653.890:228): avc: denied { create } for pid=4826 comm="syz.0.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 654.402171][ T30] audit: type=1400 audit(653.920:229): avc: denied { write } for pid=4826 comm="syz.0.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 654.885106][ T30] audit: type=1400 audit(654.400:230): avc: denied { write } for pid=4830 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 656.598608][ T30] audit: type=1400 audit(656.110:231): avc: denied { create } for pid=4850 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 656.613514][ T30] audit: type=1400 audit(656.130:232): avc: denied { ioctl } for pid=4850 comm="syz.1.501" path="socket:[8837]" dev="sockfs" ino=8837 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 657.335655][ T30] audit: type=1400 audit(656.850:233): avc: denied { read } for pid=4862 comm="syz.0.511" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 657.339219][ T30] audit: type=1400 audit(656.860:234): avc: denied { open } for pid=4862 comm="syz.0.511" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 657.452269][ T30] audit: type=1400 audit(656.970:235): avc: denied { ioctl } for pid=4862 comm="syz.0.511" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 658.126605][ T30] audit: type=1400 audit(657.640:236): avc: denied { write } for pid=4871 comm="syz.0.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 659.891214][ T30] audit: type=1400 audit(659.410:237): avc: denied { ioctl } for pid=4896 comm="syz.0.523" path="socket:[8884]" dev="sockfs" ino=8884 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 660.257464][ T30] audit: type=1400 audit(659.770:238): avc: denied { listen } for pid=4899 comm="syz.0.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 668.377025][ T30] audit: type=1400 audit(667.890:239): avc: denied { setcheckreqprot } for pid=4959 comm="syz.0.552" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 670.243253][ T30] audit: type=1400 audit(669.760:240): avc: denied { connect } for pid=4982 comm="syz.1.563" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 670.263546][ T30] audit: type=1400 audit(669.780:241): avc: denied { write } for pid=4982 comm="syz.1.563" path="socket:[8982]" dev="sockfs" ino=8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 671.158514][ T30] audit: type=1400 audit(670.670:242): avc: denied { write } for pid=4993 comm="syz.1.568" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8125 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 682.487187][ T30] audit: type=1400 audit(681.990:243): avc: denied { mount } for pid=5046 comm="syz.0.590" name="/" dev="autofs" ino=9246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 682.582719][ T30] audit: type=1400 audit(682.100:244): avc: denied { unmount } for pid=3477 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 686.271071][ T30] audit: type=1400 audit(685.790:245): avc: denied { setopt } for pid=5060 comm="syz.1.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 698.691873][ T30] audit: type=1400 audit(698.210:246): avc: denied { ioctl } for pid=5080 comm="syz.1.604" path="socket:[9080]" dev="sockfs" ino=9080 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 699.710222][ T30] audit: type=1400 audit(699.230:247): avc: denied { create } for pid=5084 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 700.124868][ T30] audit: type=1400 audit(699.640:248): avc: denied { bind } for pid=5087 comm="syz.0.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 700.173763][ T30] audit: type=1400 audit(699.690:249): avc: denied { connect } for pid=5087 comm="syz.0.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 700.205719][ T5088] vcan0: tx drop: invalid sa for name 0xffffffffffffffff [ 700.669131][ T5091] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 702.747953][ T30] audit: type=1400 audit(702.260:250): avc: denied { bind } for pid=5101 comm="syz.1.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 702.780298][ T30] audit: type=1400 audit(702.300:251): avc: denied { read } for pid=5101 comm="syz.1.612" path="socket:[9102]" dev="sockfs" ino=9102 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 704.530115][ T5106] syz.1.614 uses obsolete (PF_INET,SOCK_PACKET) [ 706.421047][ T30] audit: type=1400 audit(705.930:252): avc: denied { mount } for pid=5109 comm="syz.1.616" name="/" dev="ramfs" ino=9318 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 706.868650][ T30] audit: type=1400 audit(706.390:253): avc: denied { read } for pid=5111 comm="syz.1.617" path="socket:[9323]" dev="sockfs" ino=9323 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 709.530566][ T30] audit: type=1400 audit(709.050:254): avc: denied { map } for pid=5123 comm="syz.0.622" path="socket:[9361]" dev="sockfs" ino=9361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 713.162695][ T30] audit: type=1400 audit(712.680:255): avc: denied { read } for pid=5141 comm="syz.0.631" path="socket:[9155]" dev="sockfs" ino=9155 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 713.832245][ T30] audit: type=1400 audit(713.350:256): avc: denied { write } for pid=5145 comm="syz.0.633" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 713.861771][ T30] audit: type=1400 audit(713.380:257): avc: denied { ioctl } for pid=5145 comm="syz.0.633" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 714.894193][ T30] audit: type=1400 audit(714.410:258): avc: denied { read } for pid=5148 comm="syz.0.634" dev="nsfs" ino=4026532618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 714.929924][ T30] audit: type=1400 audit(714.410:259): avc: denied { open } for pid=5148 comm="syz.0.634" path="net:[4026532618]" dev="nsfs" ino=4026532618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 715.958095][ T5157] netlink: 8 bytes leftover after parsing attributes in process `syz.0.636'. [ 717.125603][ T30] audit: type=1400 audit(716.640:260): avc: denied { bind } for pid=5164 comm="syz.1.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 721.035397][ T30] audit: type=1400 audit(720.550:261): avc: denied { bind } for pid=5188 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 721.049421][ T30] audit: type=1400 audit(720.560:262): avc: denied { listen } for pid=5188 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 721.059496][ T30] audit: type=1400 audit(720.580:263): avc: denied { connect } for pid=5188 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 721.104436][ T30] audit: type=1400 audit(720.620:264): avc: denied { accept } for pid=5188 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 725.288695][ C1] vkms_vblank_simulate: vblank timer overrun [ 725.315608][ C1] vkms_vblank_simulate: vblank timer overrun [ 734.939010][ T30] audit: type=1400 audit(734.450:265): avc: denied { name_bind } for pid=5218 comm="syz.1.657" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 737.524886][ T5233] netlink: 'syz.0.661': attribute type 4 has an invalid length. [ 737.648368][ T5233] netlink: 'syz.0.661': attribute type 4 has an invalid length. [ 743.808135][ T4393] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 744.010262][ T4393] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 744.011354][ T4393] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 744.011724][ T4393] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 744.011847][ T4393] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 744.065475][ T4393] usb 1-1: config 0 descriptor?? [ 744.787849][ T4393] hid-generic 0003:256C:006D.0001: ignoring exceeding usage max [ 744.868562][ T4393] hid-generic 0003:256C:006D.0001: hidraw0: USB HID v0.00 Device [HID 256c:006d] on usb-dummy_hcd.0-1/input0 [ 748.652823][ T30] audit: type=1400 audit(748.170:266): avc: denied { sqpoll } for pid=5258 comm="syz.1.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 750.298769][ T5263] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 751.271826][ T30] audit: type=1400 audit(750.790:267): avc: denied { accept } for pid=5264 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 757.573764][ T30] audit: type=1326 audit(757.090:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.626781][ T30] audit: type=1326 audit(757.130:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.649855][ T30] audit: type=1326 audit(757.170:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.665473][ T30] audit: type=1326 audit(757.180:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.692396][ T30] audit: type=1326 audit(757.210:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.715027][ T30] audit: type=1326 audit(757.230:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.742196][ T30] audit: type=1326 audit(757.260:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.785059][ T30] audit: type=1326 audit(757.290:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.805495][ T30] audit: type=1326 audit(757.300:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 757.827767][ T30] audit: type=1326 audit(757.340:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 758.729035][ T52] usb 1-1: USB disconnect, device number 5 [ 762.608201][ T30] kauditd_printk_skb: 328 callbacks suppressed [ 762.619543][ T30] audit: type=1326 audit(762.120:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.620564][ T30] audit: type=1326 audit(762.130:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.692852][ T30] audit: type=1326 audit(762.210:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.728580][ T30] audit: type=1326 audit(762.240:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9fd5b3a8 code=0x7ffc0000 [ 762.754335][ T30] audit: type=1326 audit(762.270:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.801679][ T30] audit: type=1326 audit(762.320:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.835473][ T30] audit: type=1326 audit(762.350:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.898658][ T30] audit: type=1326 audit(762.410:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.913582][ T30] audit: type=1326 audit(762.420:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 762.978223][ T30] audit: type=1326 audit(762.490:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.1.681" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffa0c7e818 code=0x7ffc0000 [ 770.245106][ T30] kauditd_printk_skb: 97 callbacks suppressed [ 770.246302][ T30] audit: type=1400 audit(769.730:713): avc: denied { nlmsg_read } for pid=5368 comm="syz.1.712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 778.980292][ T30] audit: type=1400 audit(778.500:714): avc: denied { execute } for pid=5437 comm="syz.1.744" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=10551 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 781.353794][ T30] audit: type=1400 audit(780.860:715): avc: denied { append } for pid=5462 comm="syz.0.754" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 781.356803][ T30] audit: type=1400 audit(780.870:716): avc: denied { ioctl } for pid=5462 comm="syz.0.754" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 785.644375][ T30] audit: type=1400 audit(785.160:717): avc: denied { bind } for pid=5497 comm="syz.1.772" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 785.655556][ T30] audit: type=1400 audit(785.170:718): avc: denied { name_bind } for pid=5497 comm="syz.1.772" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 785.701271][ T30] audit: type=1400 audit(785.200:719): avc: denied { node_bind } for pid=5497 comm="syz.1.772" saddr=ff01::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 789.545265][ T5540] block nbd0: NBD_DISCONNECT [ 790.194867][ T30] audit: type=1400 audit(789.710:720): avc: denied { write } for pid=5545 comm="syz.0.795" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 790.199476][ T5547] random: crng reseeded on system resumption [ 795.437380][ T30] audit: type=1400 audit(794.950:721): avc: denied { append } for pid=5619 comm="syz.0.832" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 799.179152][ T30] audit: type=1400 audit(798.700:722): avc: denied { append } for pid=5666 comm="syz.0.856" name="loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 799.769125][ T30] audit: type=1400 audit(799.270:723): avc: denied { setopt } for pid=5674 comm="syz.1.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 802.860758][ T30] audit: type=1400 audit(802.380:724): avc: denied { ioctl } for pid=5706 comm="syz.0.875" path="socket:[11315]" dev="sockfs" ino=11315 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 806.271609][ T5747] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 809.230159][ T30] audit: type=1400 audit(808.750:725): avc: denied { getopt } for pid=5779 comm="syz.0.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 816.294162][ T5844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5844 comm=syz.0.940 [ 817.784243][ T30] audit: type=1400 audit(817.300:726): avc: denied { setopt } for pid=5857 comm="syz.0.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 822.198623][ T30] audit: type=1400 audit(821.710:727): avc: denied { ioctl } for pid=5896 comm="syz.0.967" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 823.531954][ T30] audit: type=1400 audit(823.050:728): avc: denied { execute } for pid=5910 comm="syz.0.973" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=11619 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 831.160837][ T5954] vxcan1: tx drop: invalid sa for name 0xfffffffffffffffd [ 831.524851][ T30] audit: type=1400 audit(831.040:729): avc: denied { getopt } for pid=5955 comm="syz.0.990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 835.124563][ T30] audit: type=1400 audit(834.640:730): avc: denied { create } for pid=5969 comm="syz.0.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 835.160237][ T30] audit: type=1400 audit(834.670:731): avc: denied { write } for pid=5969 comm="syz.0.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 837.689171][ T5970] infiniband syz1: set active [ 837.695263][ T5970] infiniband syz1: added syz_tun [ 837.726635][ T5970] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 837.748652][ T5970] infiniband syz1: Couldn't open port 1 [ 837.879709][ T5970] RDS/IB: syz1: added [ 837.883317][ T5970] smc: adding ib device syz1 with port count 1 [ 837.885736][ T5970] smc: ib device syz1 port 1 has pnetid [ 838.190584][ T30] audit: type=1400 audit(837.700:732): avc: denied { write } for pid=5987 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 838.191494][ T30] audit: type=1400 audit(837.710:733): avc: denied { nlmsg_write } for pid=5987 comm="syz.1.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 842.294705][ T5996] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 843.320700][ T30] audit: type=1400 audit(842.840:734): avc: denied { create } for pid=5999 comm="syz.1.1009" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 843.504067][ T30] audit: type=1400 audit(843.020:735): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file0" dev="tmpfs" ino=3030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 846.931653][ T6036] pimreg: entered allmulticast mode [ 848.601568][ T6051] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 851.705306][ T6070] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1038'. [ 852.016662][ T30] audit: type=1400 audit(851.530:736): avc: denied { read } for pid=6069 comm="syz.1.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 853.241704][ T6081] rdma_rxe: rxe_newlink: failed to add syz_tun [ 858.060891][ T6110] pimreg: entered allmulticast mode [ 867.032206][ T30] audit: type=1400 audit(866.550:737): avc: denied { connect } for pid=6152 comm="syz.0.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 893.118543][ T30] audit: type=1400 audit(892.630:738): avc: denied { checkpoint_restore } for pid=6217 comm="syz.0.1097" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 901.042956][ T6276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6276 comm=syz.1.1125 [ 905.847516][ T30] audit: type=1400 audit(905.360:739): avc: denied { bind } for pid=6306 comm="syz.1.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 925.079729][ T30] audit: type=1400 audit(924.600:740): avc: denied { accept } for pid=6467 comm="syz.0.1215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 928.652974][ T30] audit: type=1400 audit(928.170:741): avc: denied { write } for pid=6505 comm="syz.0.1233" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 928.655200][ T30] audit: type=1400 audit(928.170:742): avc: denied { read } for pid=6505 comm="syz.0.1233" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 932.472359][ T30] audit: type=1400 audit(931.990:743): avc: denied { nlmsg_tty_audit } for pid=6514 comm="syz.1.1237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 946.994569][ T30] audit: type=1400 audit(946.500:744): avc: denied { mount } for pid=6602 comm="syz.1.1277" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 947.019793][ T30] audit: type=1400 audit(946.540:745): avc: denied { search } for pid=6602 comm="syz.1.1277" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 947.047533][ T30] audit: type=1400 audit(946.560:746): avc: denied { search } for pid=6602 comm="syz.1.1277" name="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 947.053556][ T30] audit: type=1400 audit(946.570:747): avc: denied { read open } for pid=6602 comm="syz.1.1277" path="/" dev="configfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 947.077612][ T5252] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 947.078347][ T30] audit: type=1400 audit(946.590:748): avc: denied { ioctl } for pid=6602 comm="syz.1.1277" path="/" dev="configfs" ino=52 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 947.419909][ T5252] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 947.422578][ T5252] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1024, setting to 64 [ 947.601233][ T5252] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 947.601591][ T5252] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 947.601816][ T5252] usb 1-1: Product: syz [ 947.601938][ T5252] usb 1-1: Manufacturer: syz [ 947.602038][ T5252] usb 1-1: SerialNumber: syz [ 947.679460][ T6601] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 948.792011][ T5252] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 948.798348][ T5252] cdc_ncm 1-1:1.0: dwNtbInMaxSize=1 is too small. Using 2048 [ 948.802051][ T5252] cdc_ncm 1-1:1.0: setting rx_max = 2048 [ 949.002836][ T5252] cdc_ncm 1-1:1.0: setting tx_max = 16384 [ 949.273518][ T5252] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 949.440787][ T5252] usb 1-1: USB disconnect, device number 6 [ 949.623453][ T5252] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 952.637412][ T30] audit: type=1400 audit(952.150:749): avc: denied { mount } for pid=6622 comm="syz.0.1283" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 953.600970][ T6630] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 953.754795][ T30] audit: type=1400 audit(953.270:750): avc: denied { read } for pid=6631 comm="syz.1.1287" laddr=::ffff:0.0.0.0 lport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 967.981524][ T30] audit: type=1400 audit(967.490:751): avc: denied { bind } for pid=6710 comm="syz.1.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 969.531885][ T6721] fuse: root generation should be zero [ 974.011689][ T30] audit: type=1400 audit(973.530:752): avc: denied { create } for pid=6729 comm="syz.1.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 980.358492][ T30] audit: type=1400 audit(979.880:753): avc: denied { bind } for pid=6750 comm="syz.1.1337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 980.383033][ T6751] RDS: rds_bind could not find a transport for ::ffff:172.30.0.2, load rds_tcp or rds_rdma? [ 981.030207][ T30] audit: type=1400 audit(980.510:754): avc: denied { create } for pid=6758 comm="syz.1.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 990.209718][ T6797] FAULT_INJECTION: forcing a failure. [ 990.209718][ T6797] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 990.211326][ T6797] CPU: 0 UID: 0 PID: 6797 Comm: syz.0.1354 Not tainted syzkaller #0 PREEMPT [ 990.211545][ T6797] Hardware name: linux,dummy-virt (DT) [ 990.212022][ T6797] Call trace: [ 990.212443][ T6797] show_stack+0x18/0x24 (C) [ 990.213684][ T6797] dump_stack_lvl+0xdc/0xf4 [ 990.213841][ T6797] dump_stack+0x1c/0x28 [ 990.213936][ T6797] should_fail_ex+0x5a0/0x6ac [ 990.214036][ T6797] should_fail+0x14/0x20 [ 990.214118][ T6797] should_fail_usercopy+0x1c/0x28 [ 990.214200][ T6797] _inline_copy_from_user+0x38/0x130 [ 990.214304][ T6797] copy_msghdr_from_user+0xa0/0x130 [ 990.214385][ T6797] ___sys_sendmsg+0xfc/0x19c [ 990.214467][ T6797] __sys_sendmsg+0x114/0x19c [ 990.214548][ T6797] __arm64_sys_sendmsg+0x70/0xa0 [ 990.214630][ T6797] invoke_syscall+0x6c/0x258 [ 990.214713][ T6797] el0_svc_common.constprop.0+0xac/0x230 [ 990.214792][ T6797] do_el0_svc+0x40/0x58 [ 990.214870][ T6797] el0_svc+0x50/0x1a0 [ 990.214965][ T6797] el0t_64_sync_handler+0xa0/0xe4 [ 990.215054][ T6797] el0t_64_sync+0x198/0x19c [ 990.855464][ T6801] FAULT_INJECTION: forcing a failure. [ 990.855464][ T6801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 990.859050][ T6801] CPU: 1 UID: 0 PID: 6801 Comm: syz.0.1356 Not tainted syzkaller #0 PREEMPT [ 990.859143][ T6801] Hardware name: linux,dummy-virt (DT) [ 990.859175][ T6801] Call trace: [ 990.859199][ T6801] show_stack+0x18/0x24 (C) [ 990.859286][ T6801] dump_stack_lvl+0xdc/0xf4 [ 990.859334][ T6801] dump_stack+0x1c/0x28 [ 990.859373][ T6801] should_fail_ex+0x5a0/0x6ac [ 990.859418][ T6801] should_fail+0x14/0x20 [ 990.859458][ T6801] should_fail_usercopy+0x1c/0x28 [ 990.859499][ T6801] copy_from_sockptr_offset.constprop.0+0x12c/0x264 [ 990.859546][ T6801] do_ipv6_setsockopt+0x310/0x2c88 [ 990.859587][ T6801] ipv6_setsockopt+0x8c/0x114 [ 990.859628][ T6801] rawv6_setsockopt+0xa4/0x388 [ 990.859672][ T6801] sock_common_setsockopt+0x70/0xe0 [ 990.859719][ T6801] do_sock_setsockopt+0x17c/0x354 [ 990.859765][ T6801] __sys_setsockopt+0xcc/0x164 [ 990.859805][ T6801] __arm64_sys_setsockopt+0xa4/0x100 [ 990.859846][ T6801] invoke_syscall+0x6c/0x258 [ 990.859888][ T6801] el0_svc_common.constprop.0+0xac/0x230 [ 990.859929][ T6801] do_el0_svc+0x40/0x58 [ 990.859978][ T6801] el0_svc+0x50/0x1a0 [ 990.860024][ T6801] el0t_64_sync_handler+0xa0/0xe4 [ 990.860067][ T6801] el0t_64_sync+0x198/0x19c [ 991.397335][ T966] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 991.584057][ T966] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 991.584977][ T966] usb 1-1: config 1 has no interface number 0 [ 991.585696][ T966] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 991.587937][ T966] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 991.588097][ T966] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 991.650897][ T966] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 991.651663][ T966] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 991.657980][ T966] usb 1-1: Product: syz [ 991.658458][ T966] usb 1-1: Manufacturer: syz [ 991.658665][ T966] usb 1-1: SerialNumber: syz [ 991.805369][ T6803] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 992.175225][ T6803] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 992.321884][ T30] audit: type=1400 audit(991.840:755): avc: denied { create } for pid=6806 comm="syz.1.1358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 992.358857][ T30] audit: type=1400 audit(991.880:756): avc: denied { ioctl } for pid=6806 comm="syz.1.1358" path="socket:[14479]" dev="sockfs" ino=14479 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 992.634830][ T966] sierra_net 1-1:1.7 wwan0: register 'sierra_net' at usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem, 00:00:00:00:01:07 [ 992.762356][ T30] audit: type=1400 audit(992.280:757): avc: denied { write } for pid=6806 comm="syz.1.1358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 992.858760][ T966] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 992.859545][ T966] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 992.868856][ T966] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 992.870229][ T966] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 993.081714][ T966] usb 1-1: USB disconnect, device number 7 [ 993.138149][ T966] sierra_net 1-1:1.7 wwan0: unregister 'sierra_net' usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem [ 993.364865][ T966] sierra_net 1-1:1.7 wwan0 (unregistered): usb_control_msg failed, status -19 [ 994.537749][ T6817] FAULT_INJECTION: forcing a failure. [ 994.537749][ T6817] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.538503][ T6817] CPU: 1 UID: 0 PID: 6817 Comm: syz.0.1359 Not tainted syzkaller #0 PREEMPT [ 994.538628][ T6817] Hardware name: linux,dummy-virt (DT) [ 994.538693][ T6817] Call trace: [ 994.538750][ T6817] show_stack+0x18/0x24 (C) [ 994.538903][ T6817] dump_stack_lvl+0xdc/0xf4 [ 994.539014][ T6817] dump_stack+0x1c/0x28 [ 994.539143][ T6817] should_fail_ex+0x5a0/0x6ac [ 994.539266][ T6817] should_fail+0x14/0x20 [ 994.539360][ T6817] should_fail_usercopy+0x1c/0x28 [ 994.539452][ T6817] simple_read_from_buffer+0x84/0x214 [ 994.539551][ T6817] proc_fail_nth_read+0x160/0x21c [ 994.539653][ T6817] vfs_read+0x18c/0xa28 [ 994.539748][ T6817] ksys_read+0xec/0x1d8 [ 994.539843][ T6817] __arm64_sys_read+0x6c/0x9c [ 994.540049][ T6817] invoke_syscall+0x6c/0x258 [ 994.540195][ T6817] el0_svc_common.constprop.0+0xac/0x230 [ 994.540310][ T6817] do_el0_svc+0x40/0x58 [ 994.540402][ T6817] el0_svc+0x50/0x1a0 [ 994.540502][ T6817] el0t_64_sync_handler+0xa0/0xe4 [ 994.540683][ T6817] el0t_64_sync+0x198/0x19c [ 995.730029][ T6827] FAULT_INJECTION: forcing a failure. [ 995.730029][ T6827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 995.730623][ T6827] CPU: 1 UID: 0 PID: 6827 Comm: syz.0.1363 Not tainted syzkaller #0 PREEMPT [ 995.730694][ T6827] Hardware name: linux,dummy-virt (DT) [ 995.730725][ T6827] Call trace: [ 995.730770][ T6827] show_stack+0x18/0x24 (C) [ 995.730850][ T6827] dump_stack_lvl+0xdc/0xf4 [ 995.730900][ T6827] dump_stack+0x1c/0x28 [ 995.730939][ T6827] should_fail_ex+0x5a0/0x6ac [ 995.730991][ T6827] should_fail+0x14/0x20 [ 995.731031][ T6827] should_fail_usercopy+0x1c/0x28 [ 995.731072][ T6827] _inline_copy_from_user+0x38/0x130 [ 995.731196][ T6827] copy_msghdr_from_user+0xa0/0x130 [ 995.731356][ T6827] ___sys_sendmsg+0xfc/0x19c [ 995.731478][ T6827] __sys_sendmsg+0x114/0x19c [ 995.731673][ T6827] __arm64_sys_sendmsg+0x70/0xa0 [ 995.731854][ T6827] invoke_syscall+0x6c/0x258 [ 995.732046][ T6827] el0_svc_common.constprop.0+0xac/0x230 [ 995.732228][ T6827] do_el0_svc+0x40/0x58 [ 995.732388][ T6827] el0_svc+0x50/0x1a0 [ 995.732587][ T6827] el0t_64_sync_handler+0xa0/0xe4 [ 995.732695][ T6827] el0t_64_sync+0x198/0x19c [ 996.527289][ T30] audit: type=1400 audit(996.040:758): avc: denied { append } for pid=6837 comm="syz.0.1368" name="vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1001.798926][ T30] audit: type=1400 audit(1001.310:759): avc: denied { setattr } for pid=6875 comm="syz.0.1379" name="cuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1007.227512][ T52] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 1007.454604][ T52] usb 1-1: config 1 interface 0 altsetting 127 bulk endpoint 0x81 has invalid maxpacket 64 [ 1007.461172][ T52] usb 1-1: config 1 interface 0 altsetting 127 bulk endpoint 0x2 has invalid maxpacket 32 [ 1007.463110][ T52] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1007.520751][ T52] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.40 [ 1007.523102][ T52] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1007.527741][ T52] usb 1-1: Product: syz [ 1007.529491][ T52] usb 1-1: Manufacturer: syz [ 1007.530919][ T52] usb 1-1: SerialNumber: syz [ 1007.609173][ T6904] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1007.621440][ T6904] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1008.759868][ T52] rtl8150 1-1:1.0: couldn't reset the device [ 1008.763571][ T52] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 1008.862025][ T52] usb 1-1: USB disconnect, device number 8 [ 1010.688238][ T4393] usb 1-1: new full-speed USB device number 9 using dummy_hcd [ 1011.002701][ T4393] usb 1-1: not running at top speed; connect to a high speed hub [ 1011.021442][ T4393] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 1011.021850][ T4393] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1011.210477][ T4393] usb 1-1: New USB device found, idVendor=1b1c, idProduct=1b27, bcdDevice= 0.40 [ 1011.210835][ T4393] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1011.211079][ T4393] usb 1-1: Product: syz [ 1011.211210][ T4393] usb 1-1: Manufacturer: syz [ 1011.211322][ T4393] usb 1-1: SerialNumber: syz [ 1011.297943][ T6930] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1011.817400][ T4393] usbhid 1-1:1.0: can't add hid device: -71 [ 1011.818932][ T4393] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 1011.962931][ T4393] usb 1-1: USB disconnect, device number 9 [ 1017.054811][ T6958] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6958 comm=syz.1.1407 [ 1017.074903][ T6957] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6957 comm=syz.1.1407 [ 1018.097092][ T30] audit: type=1400 audit(1017.600:760): avc: denied { mounton } for pid=6963 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1020.159909][ T52] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 1020.439658][ T52] usb 1-1: device descriptor read/64, error -71 [ 1020.727768][ T52] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 1020.988289][ T52] usb 1-1: device descriptor read/64, error -71 [ 1021.113903][ T52] usb usb1-port1: attempt power cycle [ 1021.583948][ T52] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 1021.721230][ T52] usb 1-1: device descriptor read/8, error -71 [ 1022.008421][ T52] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 1022.111621][ T52] usb 1-1: device descriptor read/8, error -71 [ 1022.238463][ T52] usb usb1-port1: unable to enumerate USB device [ 1022.483459][ T30] audit: type=1400 audit(1022.000:761): avc: denied { read } for pid=3166 comm="dhcpcd" name="n24" dev="tmpfs" ino=1512 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1022.498741][ T30] audit: type=1400 audit(1022.010:762): avc: denied { open } for pid=3166 comm="dhcpcd" path="/run/udev/data/n24" dev="tmpfs" ino=1512 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1022.517686][ T30] audit: type=1400 audit(1022.020:763): avc: denied { getattr } for pid=3166 comm="dhcpcd" path="/run/udev/data/n24" dev="tmpfs" ino=1512 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1025.744117][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1025.800541][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1025.844634][ T54] bond0 (unregistering): Released all slaves [ 1027.520333][ T30] audit: type=1400 audit(1027.030:764): avc: denied { create } for pid=6982 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1027.522793][ T30] audit: type=1400 audit(1027.040:765): avc: denied { write } for pid=6982 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1027.548847][ T30] audit: type=1400 audit(1027.060:766): avc: denied { append } for pid=6982 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1028.978657][ T54] hsr_slave_0: left promiscuous mode [ 1028.988761][ T54] hsr_slave_1: left promiscuous mode [ 1029.079020][ T54] pimreg (unregistering): left allmulticast mode [ 1029.106316][ T30] audit: type=1400 audit(1028.620:767): avc: denied { unlink } for pid=6985 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1038.255167][ T7014] loop2: detected capacity change from 0 to 7 [ 1038.311839][ T7014] loop2: [ 1038.720613][ T7018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1419'. [ 1042.874184][ T30] audit: type=1400 audit(1042.040:768): avc: denied { watch watch_reads } for pid=7020 comm="syz.0.1420" path="/586" dev="tmpfs" ino=3032 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1045.894345][ T6963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1045.995393][ T6963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1050.399685][ T7046] sch_tbf: burst 274 is lower than device lo mtu (11337746) ! [ 1051.032988][ T30] audit: type=1400 audit(1050.550:769): avc: denied { name_bind } for pid=7050 comm="syz.0.1423" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1053.283317][ T6963] hsr_slave_0: entered promiscuous mode [ 1053.320034][ T6963] hsr_slave_1: entered promiscuous mode [ 1053.338033][ T6963] debugfs: 'hsr0' already exists in 'hsr' [ 1053.338516][ T6963] Cannot create hsr debugfs directory [ 1063.371030][ T6963] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1063.531548][ T6963] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1063.590125][ T6963] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1063.633621][ T6963] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1068.499949][ T6963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1087.654558][ T6963] veth0_vlan: entered promiscuous mode [ 1087.733828][ T6963] veth1_vlan: entered promiscuous mode [ 1088.062251][ T6963] veth0_macvtap: entered promiscuous mode [ 1088.116367][ T6963] veth1_macvtap: entered promiscuous mode [ 1088.334493][ T30] audit: type=1400 audit(1087.850:770): avc: denied { ioctl } for pid=7192 comm="syz.0.1445" path="socket:[15163]" dev="sockfs" ino=15163 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 1088.601748][ T6859] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.622985][ T6859] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.625658][ T6859] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.633841][ T6859] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1089.310280][ T30] audit: type=1400 audit(1088.820:771): avc: denied { mounton } for pid=6963 comm="syz-executor" path="/syzkaller.mpEAxW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1089.344822][ T30] audit: type=1400 audit(1088.860:772): avc: denied { unmount } for pid=6963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1091.200301][ T6862] smc: removing ib device syz1 [ 1091.302369][ T3417] syz1: Port: 1 Link DOWN [ 1104.732539][ T7206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1104.764956][ T7206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1109.021929][ T7206] hsr_slave_0: entered promiscuous mode [ 1109.032736][ T7206] hsr_slave_1: entered promiscuous mode [ 1109.041848][ T7206] debugfs: 'hsr0' already exists in 'hsr' [ 1109.044032][ T7206] Cannot create hsr debugfs directory [ 1110.764212][ T7206] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.147863][ T7206] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1113.502253][ T7206] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1113.814201][ T7206] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1115.521447][ T7206] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1115.581877][ T7206] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1115.632936][ T7206] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1115.710598][ T7206] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1120.922911][ T7206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1130.690194][ T30] audit: type=1400 audit(1130.190:773): avc: denied { read } for pid=7319 comm="syz.1.1463" path="socket:[16644]" dev="sockfs" ino=16644 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1130.694565][ T30] audit: type=1400 audit(1130.210:774): avc: denied { write } for pid=7319 comm="syz.1.1463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1131.411861][ T7206] veth0_vlan: entered promiscuous mode [ 1131.524471][ T7206] veth1_vlan: entered promiscuous mode [ 1131.921685][ T7206] veth0_macvtap: entered promiscuous mode [ 1131.985104][ T7206] veth1_macvtap: entered promiscuous mode [ 1132.409168][ T6857] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1132.410205][ T6857] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1132.410475][ T6857] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1132.410795][ T6857] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1139.574599][ T7356] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1470'. [ 1158.844815][ T30] audit: type=1400 audit(1158.360:775): avc: denied { write } for pid=7381 comm="syz.0.1480" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1158.863763][ T7382] Injecting memory failure for pfn 0x62d4a at process virtual address 0x20001000 [ 1158.898015][ T7382] Memory failure: 0x62d4a: Sending SIGBUS to syz.0.1480:7382 due to hardware memory corruption [ 1158.910911][ T7382] Memory failure: 0x62d4a: recovery action for dirty LRU page: Recovered [ 1158.918439][ T7382] Injecting memory failure for pfn 0x48ecb at process virtual address 0x20002000 [ 1158.923470][ T7382] Memory failure: 0x48ecb: recovery action for reserved kernel page: Ignored [ 1166.461845][ T6862] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1166.561922][ T6862] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1166.687974][ T6862] bond0 (unregistering): Released all slaves [ 1167.742269][ T6862] hsr_slave_0: left promiscuous mode [ 1167.760959][ T6862] hsr_slave_1: left promiscuous mode [ 1167.961649][ T6862] veth1_macvtap: left promiscuous mode [ 1167.967993][ T6862] veth0_macvtap: left promiscuous mode [ 1167.972221][ T6862] veth1_vlan: left promiscuous mode [ 1167.974094][ T6862] veth0_vlan: left promiscuous mode [ 1169.682646][ T6862] pimreg (unregistering): left allmulticast mode [ 1185.847941][ T30] audit: type=1400 audit(1185.320:776): avc: denied { map } for pid=7412 comm="syz.1.1490" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1185.849162][ T30] audit: type=1400 audit(1185.320:777): avc: denied { execute } for pid=7412 comm="syz.1.1490" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1202.284893][ T7452] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1503'. [ 1202.472440][ T7452] xfrm1: entered promiscuous mode [ 1202.473032][ T7452] xfrm1: entered allmulticast mode [ 1225.162943][ T30] audit: type=1400 audit(1224.680:778): avc: denied { map } for pid=7485 comm="syz.1.1515" path="socket:[16870]" dev="sockfs" ino=16870 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1253.722451][ T7536] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1533'. [ 1254.482197][ T30] audit: type=1400 audit(1254.000:779): avc: denied { mounton } for pid=7539 comm="syz.0.1535" path="/proc/112/task" dev="proc" ino=16981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1254.584098][ T30] audit: type=1400 audit(1254.100:780): avc: denied { associate } for pid=7541 comm="syz.0.1535" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1276.008493][ T7571] IPv6: syztnl0: Disabled Multicast RS [ 1290.899806][ T30] audit: type=1400 audit(1290.400:781): avc: denied { watch watch_reads } for pid=7598 comm="syz.1.1553" path="pipe:[17066]" dev="pipefs" ino=17066 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1298.927764][ T30] audit: type=1400 audit(1298.440:782): avc: denied { read write } for pid=7614 comm="syz.1.1557" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1298.928317][ T30] audit: type=1400 audit(1298.440:783): avc: denied { open } for pid=7614 comm="syz.1.1557" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1301.012490][ C0] vkms_vblank_simulate: vblank timer overrun [ 1303.830045][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d1eb536c: rx timeout, send abort [ 1303.843186][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000d1eb536c: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 1304.707965][ T30] audit: type=1400 audit(1304.220:784): avc: denied { read } for pid=3121 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1304.712414][ T30] audit: type=1400 audit(1304.220:785): avc: denied { search } for pid=3121 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1304.784303][ T30] audit: type=1400 audit(1304.260:786): avc: denied { search } for pid=3121 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1304.792118][ T30] audit: type=1400 audit(1304.300:787): avc: denied { add_name } for pid=3121 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1304.809920][ T30] audit: type=1400 audit(1304.300:788): avc: denied { create } for pid=3121 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1304.874626][ T30] audit: type=1400 audit(1304.360:789): avc: denied { append open } for pid=3121 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1304.905439][ T30] audit: type=1400 audit(1304.400:790): avc: denied { getattr } for pid=3121 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1316.766624][ T30] audit: type=1400 audit(1316.280:791): avc: denied { setopt } for pid=7649 comm="syz.1.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1319.318060][ C1] vkms_vblank_simulate: vblank timer overrun [ 1359.154759][ T7765] raw_sendmsg: syz.0.1607 forgot to set AF_INET. Fix it! [ 1362.881731][ T7787] random: crng reseeded on system resumption [ 1374.718775][ T5252] usb 1-1: new low-speed USB device number 14 using dummy_hcd [ 1375.073501][ T5252] usb 1-1: config 0 has an invalid interface number: 55 but max is 0 [ 1375.074311][ T5252] usb 1-1: config 0 has no interface number 0 [ 1375.075121][ T5252] usb 1-1: config 0 interface 55 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 1375.075362][ T5252] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0xE has invalid maxpacket 32, setting to 8 [ 1375.075483][ T5252] usb 1-1: config 0 interface 55 altsetting 0 has an endpoint descriptor with address 0xAB, changing to 0x8B [ 1375.075589][ T5252] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 10 [ 1375.076810][ T5252] usb 1-1: config 0 interface 55 altsetting 0 endpoint 0x8B has invalid maxpacket 120, setting to 8 [ 1375.076945][ T5252] usb 1-1: config 0 interface 55 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 1375.077216][ T5252] usb 1-1: New USB device found, idVendor=0f11, idProduct=1080, bcdDevice=fc.6a [ 1375.077333][ T5252] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1375.203696][ T5252] usb 1-1: config 0 descriptor?? [ 1375.260514][ T7846] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1375.267699][ T7846] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1375.613558][ T5252] ldusb 1-1:0.55: LD USB Device #0 now attached to major 180 minor 0 [ 1375.811740][ T5252] usb 1-1: USB disconnect, device number 14 [ 1375.981504][ T5252] ldusb 1-1:0.55: LD USB Device #0 now disconnected [ 1376.202791][ T7854] random: crng reseeded on system resumption [ 1376.284821][ T7854] Restarting kernel threads ... [ 1376.297960][ T7854] Done restarting kernel threads. [ 1378.892192][ T30] audit: type=1400 audit(1378.400:792): avc: denied { view } for pid=7864 comm="syz.0.1645" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1382.007253][ T30] audit: type=1400 audit(1381.520:793): avc: denied { mounton } for pid=7879 comm="syz.0.1651" path="/117/file0" dev="tmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 1386.817497][ T30] audit: type=1400 audit(1386.330:794): avc: denied { connect } for pid=7904 comm="syz.1.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1391.557801][ T30] audit: type=1400 audit(1391.070:795): avc: denied { create } for pid=7923 comm="syz.0.1667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1393.049759][ T7930] syzkaller1: entered promiscuous mode [ 1393.074651][ T7930] syzkaller1: entered allmulticast mode [ 1393.211241][ T7930] PF_CAN: dropped non conform CAN skbuff: dev type 65534, len 72 [ 1407.795628][ T8048] fuse: Bad value for 'fd' [ 1409.103561][ T8060] fuse: Bad value for 'fd' [ 1416.444957][ T8108] random: crng reseeded on system resumption [ 1427.253432][ T8165] syz_tun: entered allmulticast mode [ 1427.453177][ T8165] dvmrp8: entered allmulticast mode [ 1427.609653][ T8163] syz_tun: left allmulticast mode [ 1428.309084][ T8170] bond0: (slave bond_slave_0): Releasing backup interface [ 1428.564765][ T8170] bond0: (slave bond_slave_1): Releasing backup interface [ 1435.484480][ T8215] fuse: Bad value for 'fd' [ 1437.321224][ T8225] fuse: Bad value for 'fd' [ 1437.969477][ T8230] misc userio: Begin command sent, but we're already running [ 1439.881783][ T8245] random: crng reseeded on system resumption [ 1440.029809][ T8246] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1440.061911][ T8246] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1440.124742][ T8246] random: crng reseeded on system resumption [ 1441.542230][ T8258] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1804'. [ 1441.924447][ T8252] syzkaller1: entered promiscuous mode [ 1441.925346][ T8252] syzkaller1: entered allmulticast mode [ 1454.035032][ T8330] binder: 8329:8330 BC_CLEAR_FREEZE_NOTIFICATION freeze notification cookie mismatch 0000000000000000 != 7a79732f7570632e [ 1454.060907][ T8330] binder: 8329:8330 ioctl c0306201 20000640 returned -22 [ 1455.194176][ T30] audit: type=1400 audit(1454.710:796): avc: denied { mount } for pid=8339 comm="syz.1.1830" name="/" dev="autofs" ino=19099 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1457.708841][ T30] audit: type=1400 audit(1457.230:797): avc: denied { unmount } for pid=6963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1458.307096][ T30] audit: type=1400 audit(1457.820:798): avc: denied { map } for pid=8357 comm="syz.0.1834" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1458.310419][ T30] audit: type=1400 audit(1457.830:799): avc: denied { execute } for pid=8357 comm="syz.0.1834" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1458.538332][ T1572] nci: nci_rx_work: unknown MT 0x1 [ 1460.800674][ T8363] misc userio: No port type given on /dev/userio [ 1460.819770][ T8363] misc userio: No port type given on /dev/userio [ 1461.901186][ T8371] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1840'. [ 1461.901613][ T8371] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1840'. [ 1461.908094][ T8371] netlink: 'syz.0.1840': attribute type 14 has an invalid length. [ 1466.910794][ T8401] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1854'. [ 1472.765040][ T8431] TCP: TCP_TX_DELAY enabled [ 1478.140575][ T8474] misc userio: Invalid payload size [ 1478.141621][ T8474] misc userio: No port type given on /dev/userio [ 1478.150550][ T8474] misc userio: No port type given on /dev/userio [ 1480.820836][ T8491] misc userio: Invalid payload size [ 1480.828044][ T8491] misc userio: No port type given on /dev/userio [ 1480.833268][ T8491] misc userio: No port type given on /dev/userio [ 1484.917395][ T8513] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1484.935236][ T8513] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1484.999401][ T8514] misc userio: Invalid payload size [ 1487.874592][ T8528] misc userio: Invalid payload size [ 1488.904897][ T8536] fuse: Unknown parameter 'grou00000000000000000000' [ 1489.451082][ T8540] misc userio: Invalid payload size [ 1490.737612][ T8552] misc userio: Invalid payload size [ 1491.514005][ T8558] syz_tun: entered allmulticast mode [ 1491.528787][ T8557] syz_tun: left allmulticast mode [ 1492.559514][ T8567] misc userio: Invalid payload size [ 1494.778615][ T30] audit: type=1400 audit(1494.290:800): avc: denied { write } for pid=8581 comm="syz.1.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1494.849596][ T8582] rdma_op 0000000010541b29 conn xmit_rdma 0000000000000000 [ 1495.779310][ T30] audit: type=1400 audit(1495.300:801): avc: denied { wake_alarm } for pid=8589 comm="syz.1.1931" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1499.884241][ T30] audit: type=1326 audit(1499.390:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8614 comm="syz.1.1942" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1499.901658][ T30] audit: type=1326 audit(1499.420:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8614 comm="syz.1.1942" exe="/syz-executor" sig=0 arch=c00000b7 syscall=134 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1499.908107][ T30] audit: type=1326 audit(1499.420:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8614 comm="syz.1.1942" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1504.499783][ T30] audit: type=1326 audit(1503.970:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.500751][ T30] audit: type=1326 audit(1503.990:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.501540][ T30] audit: type=1326 audit(1504.010:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.512362][ T30] audit: type=1326 audit(1504.030:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.542567][ T30] audit: type=1326 audit(1504.060:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.572456][ T30] audit: type=1326 audit(1504.090:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1504.595371][ T30] audit: type=1326 audit(1504.090:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8649 comm="syz.0.1955" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1505.271603][ T8658] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1959'. [ 1509.117794][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1509.119151][ T30] audit: type=1400 audit(1508.640:817): avc: denied { create } for pid=8687 comm="syz.0.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1515.192699][ T30] audit: type=1400 audit(1514.710:818): avc: denied { load_policy } for pid=8712 comm="syz.0.1979" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1515.259895][ T8713] SELinux: ebitmap: truncated map [ 1515.370440][ T8713] SELinux: failed to load policy [ 1521.419057][ T8739] netlink: 'syz.0.1989': attribute type 10 has an invalid length. [ 1521.454480][ T8739] $H: renamed from dummy0 (while UP) [ 1521.539223][ T8739] $H: entered promiscuous mode [ 1524.518224][ T8760] netlink: 'syz.1.1999': attribute type 30 has an invalid length. [ 1524.594028][ T8761] fuse: Bad value for 'fd' [ 1526.403107][ T30] audit: type=1326 audit(1525.920:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8778 comm="syz.1.2009" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1526.412410][ T30] audit: type=1326 audit(1525.930:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8778 comm="syz.1.2009" exe="/syz-executor" sig=0 arch=c00000b7 syscall=145 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1526.417052][ T30] audit: type=1326 audit(1525.930:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8778 comm="syz.1.2009" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1526.928792][ T30] audit: type=1400 audit(1526.430:822): avc: denied { create } for pid=8786 comm="syz.1.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1527.051383][ T30] audit: type=1400 audit(1526.570:823): avc: denied { read write } for pid=6963 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.061074][ T30] audit: type=1400 audit(1526.580:824): avc: denied { open } for pid=6963 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.082333][ T30] audit: type=1400 audit(1526.600:825): avc: denied { ioctl } for pid=6963 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1527.243723][ T30] audit: type=1400 audit(1526.760:826): avc: denied { prog_load } for pid=8788 comm="syz.1.2014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1527.252263][ T30] audit: type=1400 audit(1526.770:827): avc: denied { bpf } for pid=8788 comm="syz.1.2014" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1527.276570][ T30] audit: type=1400 audit(1526.780:828): avc: denied { perfmon } for pid=8788 comm="syz.1.2014" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1531.312512][ T8823] fuse: Invalid rootmode [ 1533.370720][ T8838] fuse: Invalid rootmode [ 1534.289429][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 1534.291820][ T30] audit: type=1400 audit(1533.800:859): avc: denied { execmem } for pid=8843 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1534.377337][ T30] audit: type=1400 audit(1533.890:860): avc: denied { create } for pid=8845 comm="syz.1.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1534.424498][ T30] audit: type=1400 audit(1533.940:861): avc: denied { setopt } for pid=8845 comm="syz.1.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1534.437254][ T30] audit: type=1400 audit(1533.950:862): avc: denied { write } for pid=8845 comm="syz.1.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1536.835068][ T8854] fuse: Invalid rootmode [ 1537.695534][ T30] audit: type=1400 audit(1537.180:863): avc: denied { mount } for pid=8857 comm="syz.1.2042" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1537.984928][ T30] audit: type=1400 audit(1537.500:864): avc: denied { unmount } for pid=6963 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1538.043223][ T30] audit: type=1400 audit(1537.560:865): avc: denied { read } for pid=8859 comm="syz.0.2043" dev="nsfs" ino=4026532754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1538.111962][ T30] audit: type=1400 audit(1537.590:866): avc: denied { open } for pid=8859 comm="syz.0.2043" path="net:[4026532754]" dev="nsfs" ino=4026532754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1538.801148][ T8864] fuse: Bad value for 'rootmode' [ 1539.150561][ T30] audit: type=1400 audit(1538.670:867): avc: denied { name_bind } for pid=8867 comm="syz.0.2047" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1539.946685][ T30] audit: type=1326 audit(1539.450:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1539.953569][ T30] audit: type=1326 audit(1539.470:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1539.967797][ T30] audit: type=1326 audit(1539.480:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1539.983119][ T30] audit: type=1326 audit(1539.500:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1539.997398][ T30] audit: type=1326 audit(1539.510:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1540.006596][ T30] audit: type=1326 audit(1539.510:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1540.022865][ T30] audit: type=1326 audit(1539.540:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=194 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1540.048987][ T30] audit: type=1326 audit(1539.550:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1540.068018][ T30] audit: type=1326 audit(1539.580:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8871 comm="syz.0.2048" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1540.621863][ T30] audit: type=1400 audit(1540.140:877): avc: denied { create } for pid=8875 comm="syz.0.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1545.249423][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1545.250199][ T30] audit: type=1400 audit(1544.750:884): avc: denied { write } for pid=8888 comm="syz.0.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1545.363631][ T30] audit: type=1400 audit(1544.880:885): avc: denied { search } for pid=8883 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.364456][ T30] audit: type=1400 audit(1544.880:886): avc: denied { search } for pid=8883 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=601 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.365208][ T30] audit: type=1400 audit(1544.880:887): avc: denied { search } for pid=8883 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=760 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.368030][ T30] audit: type=1400 audit(1544.880:888): avc: denied { search } for pid=8883 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=761 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.502441][ T30] audit: type=1400 audit(1545.020:889): avc: denied { read open } for pid=8891 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=761 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.522494][ T30] audit: type=1400 audit(1545.030:890): avc: denied { getattr } for pid=8891 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=761 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.814795][ T30] audit: type=1400 audit(1545.330:891): avc: denied { add_name } for pid=8883 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1545.841334][ T30] audit: type=1400 audit(1545.360:892): avc: denied { create } for pid=8883 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1545.855267][ T30] audit: type=1400 audit(1545.370:893): avc: denied { write open } for pid=8883 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1599 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1546.803854][ T8899] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2057'. [ 1547.987511][ T8901] Invalid ELF header magic: != ELF [ 1550.413677][ T8915] Illegal XDP return value 4294967283 on prog (id 54) dev N/A, expect packet loss! [ 1551.799450][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 1551.801813][ T30] audit: type=1326 audit(1551.310:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.808896][ T30] audit: type=1326 audit(1551.320:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.814274][ T30] audit: type=1326 audit(1551.330:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.821578][ T30] audit: type=1326 audit(1551.340:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.831091][ T30] audit: type=1326 audit(1551.350:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.846902][ T30] audit: type=1326 audit(1551.350:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.847377][ T30] audit: type=1326 audit(1551.360:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.847601][ T30] audit: type=1326 audit(1551.360:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=203 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1551.847778][ T30] audit: type=1400 audit(1551.360:926): avc: denied { connect } for pid=8919 comm="syz.0.2065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1551.847940][ T30] audit: type=1326 audit(1551.360:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8919 comm="syz.0.2065" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1555.660600][ T8943] IPv6: NLM_F_CREATE should be specified when creating new route [ 1556.372018][ T8948] fuse: Unknown parameter 'user_i00000000000000000000' [ 1558.923007][ T8959] fuse: Unknown parameter 'user_i00000000000000000000' [ 1559.307694][ T8963] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2083'. [ 1559.721314][ T8963] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2083'. [ 1560.378229][ T8963] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2083'. [ 1561.429370][ T8976] fuse: Unknown parameter 'user_i00000000000000000000' [ 1562.083894][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1562.084770][ T30] audit: type=1400 audit(1561.600:929): avc: denied { create } for pid=8978 comm="syz.0.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1562.142592][ T30] audit: type=1400 audit(1561.650:930): avc: denied { getopt } for pid=8978 comm="syz.0.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1566.329657][ T30] audit: type=1400 audit(1565.840:931): avc: denied { setopt } for pid=8998 comm="syz.0.2098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1569.795605][ T30] audit: type=1326 audit(1569.310:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.817599][ T30] audit: type=1326 audit(1569.320:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.818347][ T30] audit: type=1326 audit(1569.330:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.827581][ T30] audit: type=1326 audit(1569.340:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.857628][ T30] audit: type=1326 audit(1569.350:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.858326][ T30] audit: type=1326 audit(1569.370:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.858953][ T30] audit: type=1326 audit(1569.370:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.876221][ T30] audit: type=1326 audit(1569.390:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.876999][ T30] audit: type=1326 audit(1569.390:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1569.888429][ T30] audit: type=1326 audit(1569.390:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9026 comm="syz.1.2110" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1570.137599][ T6859] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1570.138880][ T6859] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1570.139257][ T6859] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1570.139580][ T6859] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1573.571129][ T9054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2123'. [ 1573.580371][ T9054] netlink: 'syz.1.2123': attribute type 30 has an invalid length. [ 1573.771550][ T6857] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1573.792223][ T6857] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1573.793087][ T6857] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1573.793378][ T6857] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1574.964204][ T9060] fuse: Bad value for 'fd' [ 1575.837837][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 1575.839968][ T30] audit: type=1400 audit(1575.340:958): avc: denied { wake_alarm } for pid=9066 comm="syz.0.2130" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1575.884921][ T30] audit: type=1400 audit(1575.390:959): avc: denied { sqpoll } for pid=9066 comm="syz.0.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1577.128051][ T9073] fuse: Unknown parameter '00000000000000000003' [ 1579.674825][ T30] audit: type=1400 audit(1578.940:960): avc: denied { create } for pid=9065 comm="syz.1.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1579.688090][ T30] audit: type=1400 audit(1579.120:961): avc: denied { write } for pid=9065 comm="syz.1.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1581.547823][ T30] audit: type=1400 audit(1581.060:962): avc: denied { mount } for pid=9082 comm="syz.0.2136" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1584.189690][ T30] audit: type=1400 audit(1583.680:963): avc: denied { unmount } for pid=7206 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1588.934217][ T9106] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2144'. [ 1588.971044][ T9106] loop9: detected capacity change from 0 to 7 [ 1589.042791][ T9106] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.070221][ T9106] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.071992][ T9106] loop9: unable to read partition table [ 1589.090653][ T9106] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 1589.090653][ T9106] ) failed (rc=-5) [ 1589.450802][ T9084] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.491765][ T9084] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.513126][ T9084] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.531398][ T9084] Buffer I/O error on dev loop9, logical block 0, async page read [ 1589.584415][ T9084] Buffer I/O error on dev loop9, logical block 0, async page read [ 1595.402907][ T30] audit: type=1400 audit(1594.910:964): avc: denied { lock } for pid=9138 comm="syz.1.2159" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=21457 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1596.781587][ T30] audit: type=1400 audit(1596.300:965): avc: denied { create } for pid=9145 comm="syz.0.2162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1596.813595][ T30] audit: type=1400 audit(1596.330:966): avc: denied { setopt } for pid=9145 comm="syz.0.2162" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1597.267596][ T9146] pimreg: entered allmulticast mode [ 1597.270541][ T9146] pimreg: left allmulticast mode [ 1599.054879][ T30] audit: type=1400 audit(1598.570:967): avc: denied { read } for pid=9154 comm="syz.1.2166" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1599.075108][ T30] audit: type=1400 audit(1598.570:968): avc: denied { open } for pid=9154 comm="syz.1.2166" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1599.104793][ T30] audit: type=1400 audit(1598.600:969): avc: denied { ioctl } for pid=9154 comm="syz.1.2166" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1602.754060][ T30] audit: type=1400 audit(1602.270:970): avc: denied { ioctl } for pid=9170 comm="syz.1.2172" path="socket:[21922]" dev="sockfs" ino=21922 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1602.918824][ T9172] wireguard0: entered promiscuous mode [ 1602.927076][ T9172] wireguard0: entered allmulticast mode [ 1612.115088][ T9220] Option 'ڼeF 2͂ K*Ϫ,۟nyB6f[A [ 1612.115088][ T9220] Q׿2:[kz' to dns_resolver key: bad/missing value [ 1612.130547][ T30] audit: type=1400 audit(1611.650:971): avc: denied { create } for pid=9218 comm="syz.1.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1618.731323][ T30] audit: type=1400 audit(1618.250:972): avc: denied { block_suspend } for pid=9254 comm="syz.1.2210" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1620.685460][ T30] audit: type=1326 audit(1620.200:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9268 comm="syz.1.2216" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1620.701250][ T30] audit: type=1326 audit(1620.220:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9268 comm="syz.1.2216" exe="/syz-executor" sig=0 arch=c00000b7 syscall=227 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1620.709761][ T30] audit: type=1326 audit(1620.220:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9268 comm="syz.1.2216" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1622.711669][ T30] audit: type=1400 audit(1622.220:976): avc: denied { create } for pid=9282 comm="syz.1.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1622.752994][ T30] audit: type=1400 audit(1622.270:977): avc: denied { write } for pid=9282 comm="syz.1.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1622.763111][ T30] audit: type=1400 audit(1622.270:978): avc: denied { nlmsg_write } for pid=9282 comm="syz.1.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1624.310697][ T9298] IPv6: NLM_F_CREATE should be specified when creating new route [ 1625.820483][ T30] audit: type=1326 audit(1625.340:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1625.824030][ T30] audit: type=1326 audit(1625.340:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1625.863184][ T30] audit: type=1326 audit(1625.360:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1625.873151][ T30] audit: type=1326 audit(1625.390:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1625.920828][ T30] audit: type=1326 audit(1625.440:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1625.942961][ T30] audit: type=1326 audit(1625.460:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1626.022847][ T30] audit: type=1326 audit(1625.540:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1626.031485][ T30] audit: type=1326 audit(1625.540:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1626.047871][ T30] audit: type=1326 audit(1625.560:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1626.048888][ T30] audit: type=1326 audit(1625.560:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9308 comm="syz.1.2235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1629.200578][ T9336] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2243'. [ 1631.022017][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1631.027451][ T30] audit: type=1400 audit(1630.530:1012): avc: denied { read write } for pid=7206 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1631.048121][ T30] audit: type=1400 audit(1630.550:1013): avc: denied { open } for pid=7206 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1631.111073][ T30] audit: type=1400 audit(1630.590:1014): avc: denied { ioctl } for pid=7206 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1602 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1636.596852][ T30] audit: type=1400 audit(1636.110:1015): avc: denied { connect } for pid=9369 comm="syz.1.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1640.784401][ T30] audit: type=1400 audit(1640.300:1016): avc: denied { write } for pid=9392 comm="syz.1.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1642.971309][ T30] audit: type=1400 audit(1642.490:1017): avc: denied { create } for pid=9406 comm="syz.1.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1643.016933][ T30] audit: type=1400 audit(1642.530:1018): avc: denied { write } for pid=9406 comm="syz.1.2275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1644.617570][ T30] audit: type=1400 audit(1644.130:1019): avc: denied { ioctl } for pid=9416 comm="syz.1.2280" path="socket:[22373]" dev="sockfs" ino=22373 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1645.148744][ T30] audit: type=1400 audit(1644.660:1020): avc: denied { bind } for pid=9416 comm="syz.1.2280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1651.231306][ T9445] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2286'. [ 1651.234407][ T30] audit: type=1400 audit(1650.610:1021): avc: denied { ioctl } for pid=9431 comm="syz.0.2286" path="socket:[22410]" dev="sockfs" ino=22410 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1651.239923][ T30] audit: type=1400 audit(1650.690:1022): avc: denied { write } for pid=9431 comm="syz.0.2286" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1651.243498][ T30] audit: type=1400 audit(1650.740:1023): avc: denied { bind } for pid=9431 comm="syz.0.2286" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1653.178939][ T30] audit: type=1400 audit(1652.640:1024): avc: denied { create } for pid=9440 comm="syz.1.2289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1658.302181][ T30] audit: type=1400 audit(1657.810:1025): avc: denied { execute } for pid=9453 comm="syz.1.2290" dev="tmpfs" ino=1093 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1658.378340][ T30] audit: type=1400 audit(1657.870:1026): avc: denied { execute_no_trans } for pid=9453 comm="syz.1.2290" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1093 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1659.141301][ T30] audit: type=1400 audit(1658.660:1027): avc: denied { read write } for pid=9455 comm="syz.1.2292" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1659.151987][ T30] audit: type=1400 audit(1658.670:1028): avc: denied { open } for pid=9455 comm="syz.1.2292" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1659.691515][ T30] audit: type=1400 audit(1659.210:1029): avc: denied { create } for pid=9460 comm="syz.1.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1659.722254][ T30] audit: type=1400 audit(1659.240:1030): avc: denied { connect } for pid=9460 comm="syz.1.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1659.790944][ T30] audit: type=1400 audit(1659.310:1031): avc: denied { setopt } for pid=9460 comm="syz.1.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1659.862110][ T30] audit: type=1400 audit(1659.380:1032): avc: denied { bind } for pid=9460 comm="syz.1.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1659.883685][ T30] audit: type=1400 audit(1659.400:1033): avc: denied { write } for pid=9460 comm="syz.1.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1666.263636][ T9491] netdevsim netdevsim0 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1666.275319][ T9491] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.669022][ T9491] netdevsim netdevsim0 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1666.669889][ T9491] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.907721][ T9491] netdevsim netdevsim0 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1666.914269][ T9491] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1667.535174][ T9491] netdevsim netdevsim0 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1667.540806][ T9491] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.312209][ T8704] netdevsim netdevsim0 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1668.313051][ T8704] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1668.484510][ T9451] netdevsim netdevsim0 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1668.485132][ T9451] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1668.590084][ T8704] netdevsim netdevsim0 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1668.590704][ T8704] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1668.940637][ T8704] netdevsim netdevsim0 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1668.942686][ T8704] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1671.520798][ T30] audit: type=1326 audit(1671.040:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.524806][ T30] audit: type=1326 audit(1671.040:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.531878][ T30] audit: type=1326 audit(1671.040:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=275 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.535320][ T30] audit: type=1326 audit(1671.040:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.539328][ T30] audit: type=1326 audit(1671.050:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.544184][ T30] audit: type=1326 audit(1671.050:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.549647][ T30] audit: type=1326 audit(1671.060:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.558424][ T30] audit: type=1326 audit(1671.080:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.562594][ T30] audit: type=1326 audit(1671.080:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.571554][ T30] audit: type=1326 audit(1671.080:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9505 comm="syz.0.2313" exe="/syz-executor" sig=0 arch=c00000b7 syscall=34 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1671.588499][ T9511] tmpfs: Unknown parameter 'nr_ino' [ 1674.169587][ T9521] pim6reg: entered allmulticast mode [ 1674.173421][ T9521] pim6reg: left allmulticast mode [ 1679.131896][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 1679.136602][ T30] audit: type=1400 audit(1678.640:1076): avc: denied { audit_write } for pid=9541 comm="syz.1.2326" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1679.142592][ T30] audit: type=1107 audit(1678.660:1077): pid=9541 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1679.743079][ T30] audit: type=1400 audit(1679.260:1078): avc: granted { setsecparam } for pid=9546 comm="syz.1.2328" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1680.855361][ T30] audit: type=1400 audit(1680.370:1079): avc: denied { create } for pid=9535 comm="syz.0.2323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1680.945501][ T30] audit: type=1400 audit(1680.460:1080): avc: denied { sys_admin } for pid=9535 comm="syz.0.2323" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1681.024549][ T30] audit: type=1400 audit(1680.540:1081): avc: denied { checkpoint_restore } for pid=9535 comm="syz.0.2323" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1688.169166][ T9564] IPv6: Can't replace route, no match found [ 1691.425431][ T30] audit: type=1400 audit(1690.940:1082): avc: denied { lock } for pid=9575 comm="syz.1.2339" path="socket:[23218]" dev="sockfs" ino=23218 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1694.532123][ T30] audit: type=1326 audit(1694.050:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.539927][ T30] audit: type=1326 audit(1694.060:1084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.554909][ T30] audit: type=1326 audit(1694.070:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.575011][ T30] audit: type=1326 audit(1694.090:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.579280][ T30] audit: type=1326 audit(1694.100:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.585233][ T30] audit: type=1326 audit(1694.100:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.590778][ T30] audit: type=1326 audit(1694.110:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.599482][ T30] audit: type=1326 audit(1694.120:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1694.613074][ T30] audit: type=1326 audit(1694.130:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9579 comm="syz.1.2340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1713.481683][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1713.482411][ T30] audit: type=1400 audit(1713.000:1098): avc: denied { bind } for pid=9668 comm="syz.0.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1713.485188][ T30] audit: type=1400 audit(1713.000:1099): avc: denied { node_bind } for pid=9668 comm="syz.0.2376" saddr=224.0.0.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1713.503006][ T9669] syz_tun: entered allmulticast mode [ 1713.542361][ T9668] syz_tun: left allmulticast mode [ 1716.611875][ T30] audit: type=1326 audit(1716.130:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9678 comm="syz.0.2381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1716.625020][ T30] audit: type=1326 audit(1716.140:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9678 comm="syz.0.2381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1718.105050][ T9685] binfmt_misc: register: failed to install interpreter file ./file0 [ 1730.231682][ T30] audit: type=1400 audit(1729.750:1102): avc: denied { create } for pid=9719 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1730.267469][ T30] audit: type=1400 audit(1729.780:1103): avc: denied { getopt } for pid=9719 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1734.371198][ T9740] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2410'. [ 1734.809056][ T9740] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2410'. [ 1736.246555][ T30] audit: type=1326 audit(1735.760:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.249368][ T30] audit: type=1326 audit(1735.770:1105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.257674][ T30] audit: type=1326 audit(1735.770:1106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.260278][ T30] audit: type=1326 audit(1735.780:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.275252][ T30] audit: type=1326 audit(1735.790:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.282655][ T30] audit: type=1326 audit(1735.800:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.294376][ T30] audit: type=1326 audit(1735.800:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.294884][ T30] audit: type=1326 audit(1735.810:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.295288][ T30] audit: type=1326 audit(1735.810:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1736.315122][ T30] audit: type=1326 audit(1735.830:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9749 comm="syz.1.2415" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1740.365232][ T9764] syzkaller0: entered promiscuous mode [ 1740.367402][ T9764] syzkaller0: entered allmulticast mode [ 1761.344938][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1761.345503][ T30] audit: type=1400 audit(1760.860:1116): avc: denied { ioctl } for pid=9836 comm="syz.1.2449" path="socket:[24084]" dev="sockfs" ino=24084 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1761.749325][ T9839] syzkaller0: refused to change device tx_queue_len [ 1770.924733][ T30] audit: type=1326 audit(1770.440:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.935159][ T30] audit: type=1326 audit(1770.450:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=275 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.940238][ T30] audit: type=1326 audit(1770.460:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.947700][ T30] audit: type=1326 audit(1770.460:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.950689][ T30] audit: type=1326 audit(1770.470:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.958623][ T30] audit: type=1326 audit(1770.470:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.962052][ T30] audit: type=1326 audit(1770.480:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1770.965430][ T30] audit: type=1326 audit(1770.480:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1771.023940][ T30] audit: type=1326 audit(1770.530:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=34 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1771.025036][ T30] audit: type=1326 audit(1770.540:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9878 comm="syz.1.2462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1771.682004][ T9889] sch_tbf: burst 6 is lower than device ip6gre0 mtu (1448) ! [ 1772.674020][ T9895] netlink: 2 bytes leftover after parsing attributes in process `syz.0.2467'. [ 1773.638379][ T9904] IPv4: Oversized IP packet from 127.202.26.0 [ 1782.240914][ T9933] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2481'. [ 1782.241828][ T9933] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2481'. [ 1790.703731][ T9957] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2489'. [ 1794.961091][ T9987] netlink: 60 bytes leftover after parsing attributes in process `syz.0.2502'. [ 1795.767379][ T9993] netlink: 96 bytes leftover after parsing attributes in process `syz.1.2505'. [ 1796.084007][ T30] kauditd_printk_skb: 55 callbacks suppressed [ 1796.084578][ T30] audit: type=1326 audit(1795.600:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.096259][ T30] audit: type=1326 audit(1795.610:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=286 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.099273][ T30] audit: type=1326 audit(1795.620:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.104689][ T30] audit: type=1326 audit(1795.620:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.105381][ T30] audit: type=1326 audit(1795.620:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.112768][ T30] audit: type=1326 audit(1795.630:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.121166][ T30] audit: type=1326 audit(1795.640:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.137306][ T30] audit: type=1326 audit(1795.650:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.149488][ T30] audit: type=1326 audit(1795.660:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.175752][ T30] audit: type=1326 audit(1795.690:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9994 comm="syz.1.2506" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaa95b3a8 code=0x7ffc0000 [ 1796.661667][ T9998] netlink: 60 bytes leftover after parsing attributes in process `syz.1.2507'. [ 1802.742370][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1802.747704][ T30] audit: type=1400 audit(1802.260:1198): avc: denied { load_policy } for pid=10024 comm="syz.0.2516" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1802.774833][T10026] SELinux: failed to load policy [ 1805.629581][ T30] audit: type=1400 audit(1805.140:1199): avc: denied { create } for pid=10042 comm="syz.0.2522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1805.668844][ T30] audit: type=1400 audit(1805.180:1200): avc: denied { connect } for pid=10042 comm="syz.0.2522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1805.711303][ T30] audit: type=1400 audit(1805.230:1201): avc: denied { write } for pid=10042 comm="syz.0.2522" laddr=fe80::14 lport=1 faddr=fe80::30 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1807.720916][T10057] netlink: 'syz.0.2527': attribute type 4 has an invalid length. [ 1807.781660][T10057] netlink: 'syz.0.2527': attribute type 4 has an invalid length. [ 1807.885452][T10057] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2527'. [ 1812.311783][ T30] audit: type=1326 audit(1811.830:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.317487][ T30] audit: type=1326 audit(1811.830:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.348175][ T30] audit: type=1326 audit(1811.860:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.354257][ T30] audit: type=1326 audit(1811.870:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.362506][ T30] audit: type=1326 audit(1811.880:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.370686][ T30] audit: type=1326 audit(1811.890:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.407627][ T30] audit: type=1326 audit(1811.910:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.415576][ T30] audit: type=1326 audit(1811.930:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.430553][ T30] audit: type=1326 audit(1811.950:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1812.433997][ T30] audit: type=1326 audit(1811.950:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10076 comm="syz.0.2532" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1813.553359][T10080] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2533'. [ 1813.574376][T10080] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2533'. [ 1815.658898][T10095] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2537'. [ 1817.214863][T10101] syzkaller0: entered promiscuous mode [ 1817.215683][T10101] syzkaller0: entered allmulticast mode [ 1818.166591][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1818.167987][ T30] audit: type=1400 audit(1817.680:1219): avc: denied { create } for pid=10097 comm="syz.1.2538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1818.171585][ T30] audit: type=1400 audit(1817.690:1220): avc: denied { write } for pid=10097 comm="syz.1.2538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1819.961395][T10109] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2542'. [ 1825.378438][T10125] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2545'. [ 1826.260329][T10128] SELinux: policydb version 536870933 does not match my version range 15-35 [ 1826.269667][T10128] SELinux: failed to load policy [ 1842.067775][T10178] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2561'. [ 1842.429822][T10180] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2562'. [ 1843.060965][T10180] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2562'. [ 1844.122180][T10180] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2562'. [ 1844.432949][ T30] audit: type=1326 audit(1843.950:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.435486][ T30] audit: type=1326 audit(1843.950:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.443165][ T30] audit: type=1326 audit(1843.960:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.454682][ T30] audit: type=1326 audit(1843.970:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.467829][ T30] audit: type=1326 audit(1843.990:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.470373][ T30] audit: type=1326 audit(1843.990:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.475141][ T30] audit: type=1326 audit(1843.990:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.483458][ T30] audit: type=1326 audit(1844.000:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.491061][ T30] audit: type=1326 audit(1844.010:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.493066][ T30] audit: type=1326 audit(1844.010:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10185 comm="syz.0.2563" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1844.509550][T10186] netlink: 3 bytes leftover after parsing attributes in process `syz.0.2563'. [ 1859.034635][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1859.038650][ T30] audit: type=1326 audit(1858.550:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.057307][ T30] audit: type=1326 audit(1858.560:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.058157][ T30] audit: type=1326 audit(1858.570:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.058833][ T30] audit: type=1326 audit(1858.570:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.059283][ T30] audit: type=1326 audit(1858.570:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.059707][ T30] audit: type=1326 audit(1858.570:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.060238][ T30] audit: type=1326 audit(1858.580:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.060671][ T30] audit: type=1326 audit(1858.580:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.080118][ T30] audit: type=1326 audit(1858.580:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1859.083596][ T30] audit: type=1326 audit(1858.590:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10215 comm="syz.0.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9115b3a8 code=0x7ffc0000 [ 1862.392481][T10226] netlink: 'syz.0.2580': attribute type 10 has an invalid length. [ 1864.800770][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1864.807516][ T30] audit: type=1400 audit(1864.310:1253): avc: denied { mounton } for pid=10234 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1864.924347][ T6857] netdevsim netdevsim0 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1864.938317][ T6857] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1865.188806][ T6857] netdevsim netdevsim0 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1865.198736][ T6857] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1865.440783][ T6857] netdevsim netdevsim0 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1865.444188][ T6857] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1865.751868][ T6857] netdevsim netdevsim0 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1865.752603][ T6857] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1866.614305][ T30] audit: type=1400 audit(1866.130:1254): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1870.028940][ T6857] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1870.098590][ T6857] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1870.142925][ T6857] bond0 (unregistering): Released all slaves [ 1870.622410][ T6857] hsr_slave_0: left promiscuous mode [ 1870.641220][ T6857] hsr_slave_1: left promiscuous mode [ 1870.702599][ T6857] veth1_macvtap: left promiscuous mode [ 1870.704099][ T6857] veth0_macvtap: left promiscuous mode [ 1878.539792][ T6857] ------------[ cut here ]------------ [ 1878.540067][ T6857] WARNING: CPU: 1 PID: 6857 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0x1e8/0x330 [ 1878.542378][ T6857] Modules linked in: [ 1878.543229][ T6857] CPU: 1 UID: 0 PID: 6857 Comm: kworker/u8:3 Not tainted syzkaller #0 PREEMPT [ 1878.543717][ T6857] Hardware name: linux,dummy-virt (DT) [ 1878.544323][ T6857] Workqueue: netns cleanup_net [ 1878.545824][ T6857] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1878.546638][ T6857] pc : xfrm_state_fini+0x1e8/0x330 [ 1878.546956][ T6857] lr : xfrm_state_fini+0x4c/0x330 [ 1878.547265][ T6857] sp : ffff8000a8cd78e0 [ 1878.547564][ T6857] x29: ffff8000a8cd78e0 x28: dfff800000000000 x27: ffff8000888de900 [ 1878.548176][ T6857] x26: ffff800088a554c0 x25: ffff70001519af5a x24: ffff0000209821c0 [ 1878.548748][ T6857] x23: ffff8000888de900 x22: ffff8000a8cd7ad0 x21: ffff800088a554e0 [ 1878.549256][ T6857] x20: ffff0000209833c0 x19: ffff0000209821c0 x18: ffff80008d4f787c [ 1878.549712][ T6857] x17: ffff8000845440a0 x16: ffff800084542678 x15: ffff800084a99640 [ 1878.550074][ T6857] x14: ffff800084ab3904 x13: 0000000000000000 x12: ffff70001519aeb7 [ 1878.550425][ T6857] x11: 1ffff0001519aeb6 x10: ffff70001519aeb6 x9 : dfff800000000000 [ 1878.550895][ T6857] x8 : ffff8000a8cd75b8 x7 : ffff8000a8cd76e0 x6 : ffff8000a8cd7630 [ 1878.551479][ T6857] x5 : ffff8000a8cd7618 x4 : 1fffe000029ad791 x3 : 1fffe000029ad810 [ 1878.552059][ T6857] x2 : 0000000000000000 x1 : 1fffe00004130678 x0 : ffff000027254dd8 [ 1878.552761][ T6857] Call trace: [ 1878.553067][ T6857] xfrm_state_fini+0x1e8/0x330 (P) [ 1878.553435][ T6857] xfrm_net_exit+0x30/0x70 [ 1878.553729][ T6857] ops_undo_list+0x1f4/0x71c [ 1878.554046][ T6857] cleanup_net+0x31c/0x724 [ 1878.554386][ T6857] process_one_work+0x7cc/0x18d4 [ 1878.554738][ T6857] worker_thread+0x734/0xb84 [ 1878.555058][ T6857] kthread+0x348/0x5fc [ 1878.555370][ T6857] ret_from_fork+0x10/0x20 [ 1878.555928][ T6857] irq event stamp: 1349022 [ 1878.556301][ T6857] hardirqs last enabled at (1349021): [] _raw_spin_unlock_irq+0x30/0x8c [ 1878.557012][ T6857] hardirqs last disabled at (1349022): [] el1_brk64+0x1c/0x48 [ 1878.557481][ T6857] softirqs last enabled at (1349018): [] xfrm_state_flush+0x3bc/0x474 [ 1878.557960][ T6857] softirqs last disabled at (1349016): [] xfrm_state_flush+0x50/0x474 [ 1878.558564][ T6857] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1878.595047][ T30] audit: type=1400 audit(1878.090:1255): avc: denied { write } for pid=3316 comm="syz-executor" path="pipe:[2679]" dev="pipefs" ino=2679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1878.658938][ T6857] ------------[ cut here ]------------ [ 1878.659145][ T6857] WARNING: CPU: 1 PID: 6857 at net/xfrm/xfrm_state.c:3310 xfrm_state_fini+0x228/0x330 [ 1878.660353][ T6857] Modules linked in: [ 1878.661348][ T6857] CPU: 1 UID: 0 PID: 6857 Comm: kworker/u8:3 Tainted: G W syzkaller #0 PREEMPT [ 1878.662033][ T6857] Tainted: [W]=WARN [ 1878.662355][ T6857] Hardware name: linux,dummy-virt (DT) [ 1878.662757][ T6857] Workqueue: netns cleanup_net [ 1878.663191][ T6857] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1878.663607][ T6857] pc : xfrm_state_fini+0x228/0x330 [ 1878.663959][ T6857] lr : xfrm_state_fini+0x130/0x330 [ 1878.664387][ T6857] sp : ffff8000a8cd78e0 [ 1878.664660][ T6857] x29: ffff8000a8cd78e0 x28: dfff800000000000 x27: ffff8000888de900 [ 1878.665250][ T6857] x26: ffff800088a554c0 x25: ffff70001519af5a x24: ffff0000209821c0 [ 1878.665921][ T6857] x23: ffff8000888de900 x22: ffff0000209833d8 x21: 1fffe0000413067b [ 1878.668643][ T6857] x20: 0000000000000040 x19: ffff0000209821c0 x18: ffff80008d4f787c [ 1878.671498][ T6857] x17: ffff8000845440a0 x16: ffff800084542678 x15: ffff800084a99640 [ 1878.674375][ T6857] x14: ffff800084ab3904 x13: 0000000000000004 x12: ffff70001519aed5 [ 1878.675036][ T6857] x11: 1ffff0001519aed4 x10: ffff70001519aed4 x9 : dfff800000000000 [ 1878.675929][ T6857] x8 : ffff8000a8cd76a8 x7 : ffff8000a8cd77d0 x6 : ffff8000a8cd7720 [ 1878.676679][ T6857] x5 : ffff8000a8cd7708 x4 : 0000000000000003 x3 : 1fffe000029ad791 [ 1878.677389][ T6857] x2 : 1fffe00002dea930 x1 : ffff000027254cd8 x0 : ffff000016f54980 [ 1878.677998][ T6857] Call trace: [ 1878.678274][ T6857] xfrm_state_fini+0x228/0x330 (P) [ 1878.678655][ T6857] xfrm_net_exit+0x30/0x70 [ 1878.679015][ T6857] ops_undo_list+0x1f4/0x71c [ 1878.679390][ T6857] cleanup_net+0x31c/0x724 [ 1878.679722][ T6857] process_one_work+0x7cc/0x18d4 [ 1878.680117][ T6857] worker_thread+0x734/0xb84 [ 1878.680582][ T6857] kthread+0x348/0x5fc [ 1878.680899][ T6857] ret_from_fork+0x10/0x20 [ 1878.681259][ T6857] irq event stamp: 1349106 [ 1878.681576][ T6857] hardirqs last enabled at (1349105): [] kasan_quarantine_put+0x1c8/0x228 [ 1878.682054][ T6857] hardirqs last disabled at (1349106): [] el1_brk64+0x1c/0x48 [ 1878.682498][ T6857] softirqs last enabled at (1349092): [] handle_softirqs+0x88c/0xdb4 [ 1878.683043][ T6857] softirqs last disabled at (1349025): [] __do_softirq+0x14/0x20 [ 1878.683647][ T6857] ---[ end trace 0000000000000000 ]--- [ 1878.728253][ T6857] ------------[ cut here ]------------ [ 1878.728425][ T6857] WARNING: CPU: 1 PID: 6857 at net/xfrm/xfrm_state.c:3312 xfrm_state_fini+0x244/0x330 [ 1878.729326][ T6857] Modules linked in: [ 1878.729720][ T6857] CPU: 1 UID: 0 PID: 6857 Comm: kworker/u8:3 Tainted: G W syzkaller #0 PREEMPT [ 1878.730218][ T6857] Tainted: [W]=WARN [ 1878.730489][ T6857] Hardware name: linux,dummy-virt (DT) [ 1878.730824][ T6857] Workqueue: netns cleanup_net [ 1878.731272][ T6857] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1878.731696][ T6857] pc : xfrm_state_fini+0x244/0x330 [ 1878.732043][ T6857] lr : xfrm_state_fini+0x174/0x330 [ 1878.732428][ T6857] sp : ffff8000a8cd78e0 [ 1878.732721][ T6857] x29: ffff8000a8cd78e0 x28: dfff800000000000 x27: ffff8000888de900 [ 1878.733365][ T6857] x26: ffff800088a554c0 x25: ffff70001519af5a x24: ffff0000209821c0 [ 1878.733979][ T6857] x23: ffff8000888de900 x22: ffff0000209833d0 x21: 1fffe0000413067a [ 1878.734602][ T6857] x20: 0000000000000040 x19: ffff0000209821c0 x18: ffff80008d4f787c [ 1878.735209][ T6857] x17: ffff8000845440a0 x16: ffff00006a0ab4c4 x15: ffff800084a99640 [ 1878.736172][ T6857] x14: ffff800084ab3904 x13: 0000000000000004 x12: ffff70001519aed5 [ 1878.736930][ T6857] x11: 1ffff0001519aed4 x10: ffff70001519aed4 x9 : dfff800000000000 [ 1878.737612][ T6857] x8 : ffff8000a8cd76a8 x7 : ffff8000a8cd77d0 x6 : ffff8000a8cd7720 [ 1878.738226][ T6857] x5 : ffff8000a8cd7708 x4 : 0000000000000003 x3 : 1fffe000029ad791 [ 1878.738829][ T6857] x2 : 1fffe00002dea910 x1 : ffff000027254cc8 x0 : ffff000016f54880 [ 1878.739514][ T6857] Call trace: [ 1878.739765][ T6857] xfrm_state_fini+0x244/0x330 (P) [ 1878.740257][ T6857] xfrm_net_exit+0x30/0x70 [ 1878.740626][ T6857] ops_undo_list+0x1f4/0x71c [ 1878.740966][ T6857] cleanup_net+0x31c/0x724 [ 1878.741308][ T6857] process_one_work+0x7cc/0x18d4 [ 1878.741658][ T6857] worker_thread+0x734/0xb84 [ 1878.741981][ T6857] kthread+0x348/0x5fc [ 1878.742326][ T6857] ret_from_fork+0x10/0x20 [ 1878.742666][ T6857] irq event stamp: 1349134 [ 1878.742955][ T6857] hardirqs last enabled at (1349133): [] kasan_quarantine_put+0x1c8/0x228 [ 1878.743458][ T6857] hardirqs last disabled at (1349134): [] el1_brk64+0x1c/0x48 [ 1878.743915][ T6857] softirqs last enabled at (1349120): [] handle_softirqs+0x88c/0xdb4 [ 1878.744435][ T6857] softirqs last disabled at (1349109): [] __do_softirq+0x14/0x20 [ 1878.744902][ T6857] ---[ end trace 0000000000000000 ]--- VM DIAGNOSIS: 08:44:19 Registers: info registers vcpu 0 CPU#0 PC=ffff800085448998 X00=0000001b6ae6f71b X01=0000000000000000 X02=0000000000000000 X03=1fffe00001c67791 X04=1ffff00011a36430 X05=ffff8000800076b8 X06=ffff8000800076d0 X07=ffff8000800077b0 X08=ffff800080007658 X09=dfff800000000000 X10=ffff700010000eca X11=1ffff00010000eca X12=ffff700010000ecb X13=0000000000000001 X14=1fffe00003721acd X15=ffff0000203a0dc0 X16=0000000000000000 X17=1fffe000037219e0 X18=ffff0000203a0dd0 X19=ffff8000873636f0 X20=ffff00000e33bc80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873636c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873636f0 X28=ffff00000e33bc80 X29=ffff8000800076f0 X30=ffff80008043948c SP=ffff8000800076f0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=756e696c65736269:6c00322e6f732e76 Q01=0000000000000000:00ff000000000000 Q02=0000000000000000:000000000f000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:000000000c000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008031e2f4 X00=00000000000003c0 X01=ffff7fffe2ff1000 X02=0000000000000000 X03=1fffe000029ad791 X04=00000000923944d2 X05=0000000000048000 X06=ffff000014d6c7b0 X07=7ef6aa8626e6b5c0 X08=0000000000000000 X09=ffff8000897f7000 X10=ffff000014d6c710 X11=0000000000000000 X12=0000000000000150 X13=0000000000008000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff80008d4f787c X19=ffff8000870ba548 X20=ffff800087ad29d8 X21=0000000000000000 X22=0000000000000001 X23=0000000000000001 X24=0000000000000000 X25=ffff800081a3b618 X26=0000000000000000 X27=00000000000003c0 X28=ffff8000a8cd6e20 X29=ffff8000a8cd6e40 X30=ffff80008031e2d4 SP=ffff8000a8cd6e20 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000ffffa1ba0960:0000ffffa1ba0370 Q01=0000ffffa1b6f060:0000ffffa1b6e0c0 Q02=0000ffffa18b86e0:0000ffffa18b80d0 Q03=0000ffffa1b9fd10:0000ffffa1b6e600 Q04=0000ffffa1b6f5a0:0000ffffa1b6eb30 Q05=0000ffffa18b80d0:0000ffffa1b6fad0 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000