last executing test programs: 10m10.089673428s ago: executing program 1 (id=364): semop(0x0, &(0x7f0000000180)=[{0x3, 0x8001, 0x1000}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 10m9.368780966s ago: executing program 1 (id=365): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, 0x0, 0x0}, 0x20) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) timer_delete(0x0) 10m8.944585708s ago: executing program 1 (id=366): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x2c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1b, &(0x7f0000001800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000000000008500000017000000180100002020690000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000700)={r3, r5, 0x25, 0x0, @val=@perf_event}, 0x18) syz_emit_ethernet(0xfdef, &(0x7f0000000100)=ANY=[], 0x0) 10m7.925871551s ago: executing program 1 (id=367): r0 = syz_open_dev$evdev(&(0x7f0000000780), 0x3ff, 0x2) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0xea60}, 0x11, 0x3, 0x7}], 0x18) 10m7.624561037s ago: executing program 1 (id=368): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x48801}, 0x0) 10m6.998159979s ago: executing program 1 (id=370): sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) 9m21.866564498s ago: executing program 32 (id=370): sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000280)='%-010d \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x26, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) 14.567835438s ago: executing program 2 (id=1111): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$inet6(0x10, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r4}, 0x10) sendto$inet6(r1, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 14.14670795s ago: executing program 2 (id=1113): socket$unix(0x1, 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000002c0)="18d4112958da36ef44d0bd9c02ff1c66438666558e37e1bbba37c9e74f10000a1821b285f2dde129446d488c043f138f3d53028a40c29b49c696cd28bd3248b6be4f573224e0b1491b2fb117641003a6bf6ebf9453ea1b868b6b924f6508055255b4f9c76ff47e4f6878f01b537245332526bd6242c81a9acf11a5a6790de8689d259579befaec580dbe71843a9650d5a72ecca356c238dacb7e529891aab2ce92468283e3132a28111d7e947ccaf4863edfec19c0fc8faff4030848031e16eb8e608d2f0e348cd14e89e3becb", 0xcd, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'pim6reg1\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000200)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r3}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r8}, 0x18) acct(&(0x7f00000001c0)='./file0\x00') r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b0001006d616373656300000400038008000500", @ANYRES32=r1], 0x3c}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) 3.950769666s ago: executing program 0 (id=1127): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x20008850) sendmsg$nl_route_sched(r3, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002700)=@newtfilter={0x30, 0x2c, 0xd27, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x7}, {}, {0x7}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) 2.725920029s ago: executing program 0 (id=1128): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x4d3f, &(0x7f0000000240)={0x0, 0xca6a, 0x40, 0x1, 0x6}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f00000002c0), 0x0) 1.800873047s ago: executing program 0 (id=1129): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240), 0x48100, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0x7d) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000200)=0x6) 1.573496629s ago: executing program 2 (id=1130): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) socket$packet(0x11, 0x3, 0x300) r1 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @loopback={0x0, 0xac14140c}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8bcd", 0xffe3}], 0x1, 0x0, 0x0, 0x900}, 0x60) 947.939561ms ago: executing program 2 (id=1131): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x100}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r3}}, 0x20) 706.470223ms ago: executing program 2 (id=1132): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r2, 0x0, 0x44, 0x0, &(0x7f0000000080)="f6f4e9a10000502468da5eb1c6b2feff8833c0000000000000c548dc7914cb11ad63bf3707164aac031971c4be105eb953f86fbc6b204e076aa7a493e796123bbbd8e3b7e62d8fd097cf21d6d431a069ebc0aefd5fce80cc99fb38c771fa46e2c32a95fe99", 0x0, 0x86, 0x0, 0xffffffffffffff80, 0x0, &(0x7f0000000000)="daf9e846ab156efc71b59652333536dbfd26a6d0546366e36eb77dd0aaa2dbe567d168904cf0d5bce1771889c98ffc0abf", 0x0}, 0x15) 578.26953ms ago: executing program 0 (id=1133): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x10, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x900}, {0x85, 0x0, 0x0, 0x86}}, {}, [@jmp={0x5, 0x0, 0x4, 0x9, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x69}}}, &(0x7f0000000680)='GPL\x00', 0xa, 0x1009, &(0x7f0000001cc0)=""/4105, 0x41000}, 0x94) 313.033494ms ago: executing program 2 (id=1134): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1b, 0x12, r1, 0x0) r2 = socket(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x4000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c}}, 0x804) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2011) 279.001286ms ago: executing program 0 (id=1135): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x5}, 0x2004c000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4040095}, 0x8010) sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) 0s ago: executing program 0 (id=1136): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r1, 0x0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f0000000000)) kernel console output (not intermixed with test programs): =root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.197007][ T30] audit: type=1326 audit(621.610:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.201645][ T30] audit: type=1326 audit(621.610:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.224379][ T30] audit: type=1326 audit(621.640:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.239411][ T30] audit: type=1326 audit(621.660:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.253923][ T30] audit: type=1326 audit(621.670:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.282688][ T30] audit: type=1326 audit(621.700:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.317936][ T30] audit: type=1326 audit(621.730:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 622.339591][ T30] audit: type=1326 audit(621.760:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3898 comm="syz.1.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffffb3d59270 code=0x7ffc0000 [ 624.034570][ T3908] Zero length message leads to an empty skb [ 642.211052][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 642.213178][ T30] audit: type=1400 audit(641.630:204): avc: denied { ioctl } for pid=3924 comm="syz.0.161" path="socket:[5588]" dev="sockfs" ino=5588 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 674.909892][ T30] audit: type=1326 audit(674.330:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3964 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 674.937445][ T30] audit: type=1326 audit(674.360:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3964 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=79 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 674.939325][ T30] audit: type=1326 audit(674.360:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3964 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 674.970306][ T30] audit: type=1326 audit(674.390:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3964 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=146 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 675.004361][ T30] audit: type=1326 audit(674.410:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3964 comm="syz.0.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 686.275775][ T3974] input: syz0 as /devices/virtual/input/input2 [ 687.661970][ T3974] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 690.403159][ T3978] process 'syz.1.178' launched '/dev/fd/3' with NULL argv: empty string added [ 690.448889][ T30] audit: type=1400 audit(689.830:210): avc: denied { execute_no_trans } for pid=3977 comm="syz.1.178" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1050 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 695.116885][ T3982] netlink: 32 bytes leftover after parsing attributes in process `syz.1.179'. [ 723.173964][ T3995] binder: 3994:3995 unknown command 0 [ 723.177530][ T3995] binder: 3994:3995 ioctl c0306201 20000080 returned -22 [ 723.222148][ T3995] binder: 3994:3995 tried to acquire reference to desc 0, got 1 instead [ 723.233845][ T30] audit: type=1400 audit(722.650:211): avc: denied { transfer } for pid=3994 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 723.254171][ T3450] binder: undelivered TRANSACTION_COMPLETE [ 723.340243][ T3450] binder: undelivered transaction 10, process died. [ 723.821426][ T30] audit: type=1400 audit(723.240:212): avc: denied { load_policy } for pid=3996 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 723.896220][ T3997] SELinux: ebitmap: truncated map [ 723.970839][ T3997] SELinux: failed to load policy [ 724.250713][ T30] audit: type=1400 audit(723.670:213): avc: denied { bind } for pid=3998 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 724.263497][ T30] audit: type=1400 audit(723.670:214): avc: denied { listen } for pid=3998 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 724.269623][ T30] audit: type=1400 audit(723.690:215): avc: denied { connect } for pid=3998 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 724.981113][ T4003] binder: 4002:4003 unknown command 0 [ 724.983809][ T4003] binder: 4002:4003 ioctl c0306201 20000080 returned -22 [ 725.006676][ T4003] binder: 4002:4003 tried to acquire reference to desc 0, got 1 instead [ 725.012451][ T4003] binder: 4002:4003 got transaction with invalid data ptr [ 725.015954][ T4003] binder: 4002:4003 transaction async to 4002:0 failed 16/29201/-14, code 0 size 0-24 line 3439 [ 725.027273][ T1906] binder: undelivered TRANSACTION_ERROR: 29201 [ 725.279080][ T30] audit: type=1400 audit(724.700:216): avc: denied { write } for pid=4004 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 737.347790][ T4012] binder: 4011:4012 BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 761.033457][ T30] audit: type=1400 audit(760.450:217): avc: denied { getopt } for pid=4030 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 774.770255][ T30] audit: type=1400 audit(774.190:218): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 774.979648][ T30] audit: type=1326 audit(774.400:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 775.000977][ T30] audit: type=1326 audit(774.400:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=10 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 775.003795][ T30] audit: type=1326 audit(774.420:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.1.204" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 786.437523][ T4067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 786.440528][ T4067] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 786.851922][ T4071] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 786.871339][ T4071] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 786.932644][ T4071] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 786.952064][ T4071] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 790.619792][ T30] audit: type=1400 audit(790.040:222): avc: denied { wake_alarm } for pid=4078 comm="syz.0.217" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 814.236980][ T4097] binder: 4096:4097 BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 814.238358][ T4097] binder: 4096:4097 DecRefs 0 refcount change on invalid ref 1 ret -22 [ 818.439665][ T30] audit: type=1326 audit(817.860:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4113 comm="syz.0.231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 818.446404][ T30] audit: type=1326 audit(817.860:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4113 comm="syz.0.231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 818.482003][ T30] audit: type=1326 audit(817.900:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4113 comm="syz.0.231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 818.494070][ T30] audit: type=1326 audit(817.910:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.0.231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffff96f852c8 code=0x7ffc0000 [ 819.923650][ T30] audit: type=1326 audit(819.340:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4125 comm="syz.0.237" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 819.926445][ T30] audit: type=1326 audit(819.340:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4125 comm="syz.0.237" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 819.970471][ T30] audit: type=1326 audit(819.390:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4125 comm="syz.0.237" exe="/syz-executor" sig=0 arch=c00000b7 syscall=281 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 819.979964][ T30] audit: type=1326 audit(819.400:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4125 comm="syz.0.237" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 819.998883][ T30] audit: type=1326 audit(819.420:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.0.231" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 820.009043][ T30] audit: type=1326 audit(819.430:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4125 comm="syz.0.237" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 820.411839][ T4130] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 820.462074][ T4130] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 820.557416][ T4130] SELinux: syz.1.238 (4130) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 820.653234][ T4132] ip6gre1: entered allmulticast mode [ 826.270341][ T4145] fuse: Unknown parameter 'use00000000000000000000' [ 830.068909][ T4158] binder: BINDER_SET_CONTEXT_MGR already set [ 830.091627][ T4158] binder: 4155:4158 ioctl 4018620d 20000040 returned -16 [ 830.167586][ T4158] binder: 4155:4158 got transaction to invalid handle, 1 [ 830.168834][ T4158] binder: 4158:4155 cannot find target node [ 830.169311][ T4158] binder: 4155:4158 transaction async to 0:0 failed 19/29201/-22, code 0 size 88-24 line 3152 [ 830.182285][ T3450] binder: undelivered TRANSACTION_ERROR: 29201 [ 842.283718][ T4185] SELinux: syz.0.260 (4185) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 855.272213][ T30] audit: type=1326 audit(854.690:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 855.296924][ T30] audit: type=1326 audit(854.700:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=276 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 855.326016][ T30] audit: type=1326 audit(854.730:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 868.481336][ T30] audit: type=1400 audit(867.900:236): avc: denied { read write } for pid=4221 comm="syz.0.272" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 868.487280][ T30] audit: type=1400 audit(867.900:237): avc: denied { open } for pid=4221 comm="syz.0.272" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 869.133110][ T9] hid-generic 0003:0000:0000.0003: unknown main item tag 0x0 [ 869.256054][ T9] hid-generic 0003:0000:0000.0003: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 869.981566][ T30] audit: type=1400 audit(869.390:238): avc: denied { view } for pid=4229 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 870.166045][ T30] audit: type=1400 audit(869.580:239): avc: denied { audit_write } for pid=4231 comm="syz.0.276" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 870.706105][ T30] audit: type=1326 audit(870.120:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 870.722178][ T30] audit: type=1326 audit(870.140:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 870.759055][ T30] audit: type=1326 audit(870.170:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 870.851386][ T30] audit: type=1326 audit(870.250:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 870.852711][ T30] audit: type=1326 audit(870.270:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 870.976554][ T30] audit: type=1326 audit(870.380:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4234 comm="syz.1.277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5aba8 code=0x7ffc0000 [ 871.669234][ T4232] fido_id[4232]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 872.734286][ T4243] syzkaller0: entered promiscuous mode [ 872.744515][ T4243] syzkaller0: entered allmulticast mode [ 895.417674][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 895.427388][ T30] audit: type=1400 audit(894.840:253): avc: denied { bind } for pid=4266 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 895.428615][ T30] audit: type=1400 audit(894.840:254): avc: denied { name_bind } for pid=4266 comm="syz.1.291" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 895.429140][ T30] audit: type=1400 audit(894.840:255): avc: denied { node_bind } for pid=4266 comm="syz.1.291" saddr=fe88::2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 919.163691][ T30] audit: type=1400 audit(918.580:256): avc: denied { create } for pid=4281 comm="syz.0.296" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 919.182480][ T30] audit: type=1400 audit(918.600:257): avc: denied { connect } for pid=4281 comm="syz.0.296" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=tcp_socket permissive=1 [ 919.184518][ T30] audit: type=1400 audit(918.600:258): avc: denied { name_connect } for pid=4281 comm="syz.0.296" dest=20002 scontext=system_u:object_r:hugetlbfs_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 929.769607][ T4294] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 929.844498][ T4294] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 937.636776][ T4197] usb 1-1: new full-speed USB device number 11 using dummy_hcd [ 938.150133][ T4197] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 938.154262][ T4197] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 938.158303][ T4197] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 938.234360][ T4197] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 938.237480][ T4197] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 938.240101][ T4197] usb 1-1: Product: syz [ 938.245824][ T4197] usb 1-1: Manufacturer: syz [ 938.247307][ T4197] usb 1-1: SerialNumber: syz [ 939.365734][ T4311] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 939.414040][ T4197] usb 1-1: USB disconnect, device number 11 [ 939.480117][ T4311] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 941.914426][ T4326] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 941.964258][ T4326] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 960.156208][ T30] audit: type=1400 audit(959.550:259): avc: denied { setcheckreqprot } for pid=4348 comm="syz.0.320" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 965.315904][ T4356] binfmt_misc: register: failed to install interpreter file ./file0 [ 968.263244][ T30] audit: type=1400 audit(967.680:260): avc: denied { create } for pid=4360 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 978.881197][ T30] audit: type=1400 audit(978.230:261): avc: denied { create } for pid=4371 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 978.882451][ T30] audit: type=1400 audit(978.240:262): avc: denied { bind } for pid=4371 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 978.891967][ T30] audit: type=1400 audit(978.250:263): avc: denied { setopt } for pid=4371 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 978.892761][ T30] audit: type=1400 audit(978.260:264): avc: denied { write } for pid=4371 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 987.786314][ T1906] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 987.987101][ T1906] usb 1-1: Using ep0 maxpacket: 16 [ 988.057733][ T1906] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 988.059121][ T1906] usb 1-1: config 0 interface 0 altsetting 16 has 0 endpoint descriptors, different from the interface descriptor's value: 28 [ 988.065439][ T1906] usb 1-1: config 0 interface 0 has no altsetting 0 [ 988.070999][ T1906] usb 1-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 988.074174][ T1906] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 988.216922][ T1906] usb 1-1: config 0 descriptor?? [ 988.743535][ T1906] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 989.006464][ T4385] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 989.022155][ T4385] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1002.786413][ T1906] usb 1-1: USB disconnect, device number 12 [ 1012.172165][ T30] audit: type=1400 audit(1011.590:265): avc: denied { block_suspend } for pid=4409 comm="syz.1.339" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1031.366267][ T30] audit: type=1400 audit(1030.640:266): avc: denied { create } for pid=4419 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1031.662180][ T30] audit: type=1400 audit(1030.680:267): avc: denied { bind } for pid=4419 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1031.876463][ T30] audit: type=1400 audit(1030.710:268): avc: denied { write } for pid=4419 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1033.221570][ T4429] syz.0.343 uses obsolete (PF_INET,SOCK_PACKET) [ 1035.516524][ T30] audit: type=1400 audit(1034.930:269): avc: denied { write } for pid=4432 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1035.579575][ T30] audit: type=1400 audit(1034.960:270): avc: denied { read } for pid=4432 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1047.629904][ T4443] netlink: 'syz.0.348': attribute type 29 has an invalid length. [ 1047.658154][ T4443] netlink: 'syz.0.348': attribute type 29 has an invalid length. [ 1052.861389][ T4458] netlink: 'syz.0.352': attribute type 13 has an invalid length. [ 1052.918380][ T4459] netlink: 36 bytes leftover after parsing attributes in process `syz.1.353'. [ 1052.969574][ T4458] 0ªX¹¦D: left allmulticast mode [ 1053.014230][ T4458] 0ªX¹¦D: refused to change device tx_queue_len [ 1053.093378][ T4458] A link change request failed with some changes committed already. Interface 30ªX¹¦D may have been left with an inconsistent configuration, please check. [ 1054.040436][ T30] audit: type=1326 audit(1053.460:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1054.044516][ T30] audit: type=1326 audit(1053.460:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1054.075695][ T30] audit: type=1326 audit(1053.490:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=430 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1054.102506][ T30] audit: type=1326 audit(1053.510:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1054.133738][ T30] audit: type=1326 audit(1053.550:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=431 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1054.177684][ T30] audit: type=1326 audit(1053.570:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4464 comm="syz.0.354" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1057.884127][ T30] audit: type=1400 audit(1057.300:277): avc: denied { ioctl } for pid=4477 comm="syz.1.359" path="socket:[7481]" dev="sockfs" ino=7481 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1057.891015][ T4483] syzkaller0: entered promiscuous mode [ 1057.906666][ T4483] syzkaller0: entered allmulticast mode [ 1059.090618][ T30] audit: type=1326 audit(1058.510:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.110728][ T30] audit: type=1326 audit(1058.510:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.111913][ T30] audit: type=1326 audit(1058.530:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.112564][ T30] audit: type=1326 audit(1058.530:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.113176][ T30] audit: type=1326 audit(1058.530:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.147825][ T30] audit: type=1326 audit(1058.560:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.156475][ T30] audit: type=1326 audit(1058.570:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.193647][ T30] audit: type=1326 audit(1058.600:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.229086][ T30] audit: type=1326 audit(1058.650:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1059.317686][ T30] audit: type=1326 audit(1058.660:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.0.363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1077.367318][ T4530] netlink: 112 bytes leftover after parsing attributes in process `syz.0.378'. [ 1080.211659][ T4539] SELinux: ebitmap: truncated map [ 1080.396501][ T4539] SELinux: failed to load policy [ 1083.708599][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 1083.714553][ T30] audit: type=1326 audit(1083.120:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.720574][ T30] audit: type=1326 audit(1083.140:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.739141][ T30] audit: type=1326 audit(1083.160:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.748113][ T30] audit: type=1326 audit(1083.160:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.766409][ T30] audit: type=1326 audit(1083.160:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.770617][ T30] audit: type=1326 audit(1083.160:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=97 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.774091][ T30] audit: type=1326 audit(1083.180:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.783760][ T30] audit: type=1326 audit(1083.180:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.822959][ T30] audit: type=1326 audit(1083.240:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1083.836862][ T30] audit: type=1326 audit(1083.250:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4549 comm="syz.0.387" exe="/syz-executor" sig=0 arch=c00000b7 syscall=268 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1099.156234][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1099.157333][ T30] audit: type=1400 audit(1098.570:333): avc: denied { mount } for pid=4570 comm="syz.0.396" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1099.187805][ T30] audit: type=1400 audit(1098.610:334): avc: denied { mounton } for pid=4570 comm="syz.0.396" path="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 1099.447801][ T30] audit: type=1400 audit(1098.840:335): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1099.479509][ T30] audit: type=1400 audit(1098.900:336): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1101.214693][ T4580] netlink: 12 bytes leftover after parsing attributes in process `syz.0.399'. [ 1103.374448][ T30] audit: type=1400 audit(1102.790:337): avc: denied { mount } for pid=4590 comm="syz.0.403" name="/" dev="configfs" ino=1121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1103.613419][ T30] audit: type=1326 audit(1103.030:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4592 comm="syz.0.404" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1103.626700][ T30] audit: type=1326 audit(1103.040:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4592 comm="syz.0.404" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1103.633614][ T30] audit: type=1326 audit(1103.050:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4592 comm="syz.0.404" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1103.652698][ T30] audit: type=1326 audit(1103.070:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4592 comm="syz.0.404" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1103.663829][ T30] audit: type=1326 audit(1103.080:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4592 comm="syz.0.404" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1110.181736][ T4611] netlink: 4 bytes leftover after parsing attributes in process `syz.0.409'. [ 1112.209062][ T4620] rdma_op 00000000ecb268a0 conn xmit_rdma 0000000000000000 [ 1112.588025][ T4622] netlink: 'syz.0.413': attribute type 13 has an invalid length. [ 1117.267724][ T4632] netlink: 'syz.0.415': attribute type 10 has an invalid length. [ 1117.289070][ T4632] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 1119.927603][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1119.928957][ T30] audit: type=1400 audit(1119.340:346): avc: denied { create } for pid=4642 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1121.068922][ T4600] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1121.104064][ T4600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1121.691576][ T30] audit: type=1400 audit(1121.110:347): avc: denied { create } for pid=4653 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1121.722387][ T30] audit: type=1400 audit(1121.140:348): avc: denied { setopt } for pid=4653 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1122.064212][ T156] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1122.300877][ T156] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1122.661748][ T156] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1123.007187][ T156] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1123.311154][ T30] audit: type=1326 audit(1122.730:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.425" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1123.323475][ T30] audit: type=1326 audit(1122.730:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.425" exe="/syz-executor" sig=0 arch=c00000b7 syscall=114 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1123.336301][ T30] audit: type=1326 audit(1122.750:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.425" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1128.265623][ T156] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1128.361773][ T156] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1128.440190][ T156] bond0 (unregistering): Released all slaves [ 1129.038328][ T156] hsr_slave_0: left promiscuous mode [ 1129.138068][ T156] hsr_slave_1: left promiscuous mode [ 1129.414108][ T30] audit: type=1326 audit(1128.830:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.469947][ T30] audit: type=1326 audit(1128.830:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.474601][ T30] audit: type=1326 audit(1128.890:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.501081][ T30] audit: type=1326 audit(1128.920:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.559640][ T30] audit: type=1326 audit(1128.980:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.597366][ T30] audit: type=1326 audit(1129.000:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.608601][ T30] audit: type=1326 audit(1129.030:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.611989][ T30] audit: type=1326 audit(1129.030:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.667075][ T30] audit: type=1326 audit(1129.050:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=223 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.680486][ T30] audit: type=1326 audit(1129.070:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4678 comm="syz.0.427" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1129.873498][ T156] veth1_macvtap: left promiscuous mode [ 1129.880790][ T156] veth0_macvtap: left promiscuous mode [ 1129.888031][ T156] veth1_vlan: left promiscuous mode [ 1129.892079][ T156] veth0_vlan: left promiscuous mode [ 1140.969824][ T4600] hsr_slave_0: entered promiscuous mode [ 1141.029734][ T4600] hsr_slave_1: entered promiscuous mode [ 1141.177849][ T4600] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1141.181090][ T4600] Cannot create hsr debugfs directory [ 1141.457430][ T4690] SELinux: policydb table sizes (149,0) do not match mine (8,7) [ 1141.459040][ T4690] SELinux: failed to load policy [ 1144.714270][ T4600] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1144.849681][ T4600] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1144.930272][ T4600] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1145.027752][ T4600] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1152.522296][ T4600] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1166.833468][ T30] audit: type=1400 audit(1166.250:362): avc: denied { nlmsg_read } for pid=4781 comm="syz.0.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1166.839115][ T4782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4782 comm=syz.0.437 [ 1167.007507][ T4600] veth0_vlan: entered promiscuous mode [ 1167.131488][ T4600] veth1_vlan: entered promiscuous mode [ 1167.496680][ T4600] veth0_macvtap: entered promiscuous mode [ 1167.551483][ T4600] veth1_macvtap: entered promiscuous mode [ 1168.055389][ T30] audit: type=1400 audit(1167.470:363): avc: denied { read write } for pid=4788 comm="syz.0.440" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1168.058153][ T4600] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1168.065471][ T30] audit: type=1400 audit(1167.480:364): avc: denied { open } for pid=4788 comm="syz.0.440" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1168.069285][ T4600] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1168.073124][ T4600] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1168.074286][ T4600] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1168.675912][ T30] audit: type=1400 audit(1168.090:365): avc: denied { mounton } for pid=4600 comm="syz-executor" path="/syzkaller.MJRYWM/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1168.859242][ T30] audit: type=1400 audit(1168.260:366): avc: denied { mounton } for pid=4600 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1169.748076][ T30] audit: type=1400 audit(1169.160:367): avc: denied { connect } for pid=4796 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1170.701994][ T4802] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1171.243222][ T4802] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1171.656103][ T4802] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1172.020965][ T4802] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1172.982101][ T4802] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1173.367996][ T4802] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1173.503554][ T4802] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1173.774377][ T4802] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1174.528063][ T4828] netlink: 'syz.2.451': attribute type 39 has an invalid length. [ 1177.783194][ T30] audit: type=1400 audit(1177.190:368): avc: denied { ioctl } for pid=4831 comm="+}[@" path="socket:[8249]" dev="sockfs" ino=8249 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1177.787448][ T30] audit: type=1400 audit(1177.200:369): avc: denied { bind } for pid=4831 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1178.759183][ T30] audit: type=1400 audit(1178.180:370): avc: denied { bind } for pid=4833 comm="syz.2.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1181.899758][ T4842] netlink: 4 bytes leftover after parsing attributes in process `syz.0.450'. [ 1186.639185][ T4855] netlink: 'syz.2.456': attribute type 1 has an invalid length. [ 1186.640769][ T4855] netlink: 224 bytes leftover after parsing attributes in process `syz.2.456'. [ 1191.617240][ T30] audit: type=1400 audit(1190.730:371): avc: denied { read } for pid=4857 comm="syz.2.457" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1191.688218][ T30] audit: type=1400 audit(1190.730:372): avc: denied { open } for pid=4857 comm="syz.2.457" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1191.688885][ T30] audit: type=1400 audit(1191.010:373): avc: denied { ioctl } for pid=4857 comm="syz.2.457" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1210.068743][ T30] audit: type=1326 audit(1209.480:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.088273][ T30] audit: type=1326 audit(1209.500:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.092091][ T30] audit: type=1326 audit(1209.510:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.093096][ T30] audit: type=1326 audit(1209.510:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.123182][ T30] audit: type=1326 audit(1209.510:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.124034][ T30] audit: type=1326 audit(1209.530:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.139561][ T30] audit: type=1326 audit(1209.530:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.140294][ T30] audit: type=1326 audit(1209.530:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.140757][ T30] audit: type=1326 audit(1209.530:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=448 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1210.141015][ T30] audit: type=1326 audit(1209.530:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4882 comm="syz.2.463" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1212.150615][ T4897] binfmt_misc: register: failed to install interpreter file ./file0 [ 1212.739116][ T4901] netlink: 92 bytes leftover after parsing attributes in process `syz.0.471'. [ 1218.364195][ T4929] netlink: 136 bytes leftover after parsing attributes in process `syz.2.478'. [ 1222.270664][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 1222.271445][ T30] audit: type=1400 audit(1221.690:412): avc: denied { create } for pid=4938 comm="syz.2.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1222.376168][ T30] audit: type=1400 audit(1221.740:413): avc: denied { sys_admin } for pid=4938 comm="syz.2.483" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1223.109996][ T4943] netlink: 3 bytes leftover after parsing attributes in process `syz.0.485'. [ 1224.613741][ T30] audit: type=1400 audit(1224.030:414): avc: denied { bind } for pid=4949 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1225.870378][ T4955] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 1228.388892][ T4970] netlink: 'syz.2.497': attribute type 13 has an invalid length. [ 1228.449376][ T30] audit: type=1400 audit(1227.870:415): avc: denied { write } for pid=4971 comm="syz.0.498" path="socket:[8481]" dev="sockfs" ino=8481 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1228.456998][ T30] audit: type=1400 audit(1227.870:416): avc: denied { accept } for pid=4971 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1228.459851][ T30] audit: type=1400 audit(1227.880:417): avc: denied { read } for pid=4971 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1230.121322][ T4977] netlink: 'wg1': attribute type 10 has an invalid length. [ 1233.523967][ T30] audit: type=1400 audit(1232.940:418): avc: denied { read } for pid=4984 comm="syz.0.504" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1233.551952][ T30] audit: type=1400 audit(1232.960:419): avc: denied { open } for pid=4984 comm="syz.0.504" path="net:[4026532626]" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1246.505892][ T5014] netlink: 16 bytes leftover after parsing attributes in process `syz.2.513'. [ 1247.835572][ T30] audit: type=1326 audit(1247.250:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5020 comm="syz.2.516" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x0 [ 1247.991300][ T30] audit: type=1400 audit(1247.410:421): avc: denied { create } for pid=5022 comm="syz.0.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1249.104421][ T30] audit: type=1400 audit(1248.520:422): avc: denied { create } for pid=5029 comm="syz.2.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1249.106192][ T30] audit: type=1400 audit(1248.520:423): avc: denied { write } for pid=5029 comm="syz.2.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1249.422193][ T5033] netlink: 20 bytes leftover after parsing attributes in process `syz.2.522'. [ 1249.427879][ T5033] netlink: 20 bytes leftover after parsing attributes in process `syz.2.522'. [ 1249.430035][ T5033] netlink: 20 bytes leftover after parsing attributes in process `syz.2.522'. [ 1249.431436][ T5033] netlink: 4 bytes leftover after parsing attributes in process `syz.2.522'. [ 1249.903258][ T5037] SELinux: security policydb version 18 (MLS) not backwards compatible [ 1249.910976][ T5037] SELinux: failed to load policy [ 1250.846049][ T30] audit: type=1400 audit(1250.260:424): avc: denied { mount } for pid=5044 comm="syz.0.527" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1251.758513][ T30] audit: type=1400 audit(1251.180:425): avc: denied { watch watch_reads } for pid=5052 comm="syz.0.531" path="/329" dev="tmpfs" ino=1682 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1252.455788][ T30] audit: type=1400 audit(1251.870:426): avc: denied { create } for pid=5057 comm="syz.2.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1252.538374][ T30] audit: type=1400 audit(1251.960:427): avc: denied { setopt } for pid=5057 comm="syz.2.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1252.696204][ T5059] mmap: syz.0.532 (5059) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1253.269533][ T5061] netlink: 4 bytes leftover after parsing attributes in process `syz.2.534'. [ 1253.997261][ T30] audit: type=1400 audit(1253.410:428): avc: denied { write } for pid=5066 comm="syz.0.537" name="tcp" dev="proc" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1254.322826][ T30] audit: type=1400 audit(1253.740:429): avc: denied { write } for pid=5068 comm="syz.2.538" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1255.310348][ T30] audit: type=1400 audit(1254.720:430): avc: denied { validate_trans } for pid=5077 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1257.873443][ T5093] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 1259.008731][ T5100] loop9: detected capacity change from 0 to 7 [ 1259.033625][ T5100] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.042674][ T5100] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.047436][ T5100] loop9: unable to read partition table [ 1259.051795][ T5100] loop_reread_partitions: partition scan of loop9 (þ被xüŸÑø éÚ¬§½dG¤´à–ƒÝ¡¯ â·û [ 1259.051795][ T5100] ) failed (rc=-5) [ 1259.220971][ T4996] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.271082][ T4996] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.273953][ T4996] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.346957][ T4996] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.359300][ T4996] Buffer I/O error on dev loop9, logical block 0, async page read [ 1259.523265][ T30] audit: type=1326 audit(1258.940:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.553" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1259.537599][ T30] audit: type=1326 audit(1258.950:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.553" exe="/syz-executor" sig=0 arch=c00000b7 syscall=17 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1259.566540][ T30] audit: type=1326 audit(1258.980:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.0.553" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1262.329870][ T30] audit: type=1400 audit(1261.750:434): avc: denied { mounton } for pid=5111 comm="syz.2.556" path="/proc/124/task" dev="proc" ino=9486 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1264.457978][ T30] audit: type=1400 audit(1263.880:435): avc: denied { create } for pid=5126 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1268.039831][ T30] audit: type=1400 audit(1267.450:436): avc: denied { mount } for pid=5138 comm="syz.2.568" name="/" dev="ramfs" ino=8787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1270.327437][ T5151] netlink: 4 bytes leftover after parsing attributes in process `syz.2.574'. [ 1270.390274][ T5151] netlink: 12 bytes leftover after parsing attributes in process `syz.2.574'. [ 1279.786839][ T5171] wireguard0: entered promiscuous mode [ 1279.787940][ T5171] wireguard0: entered allmulticast mode [ 1292.651868][ T30] audit: type=1326 audit(1292.070:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.661805][ T30] audit: type=1326 audit(1292.080:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.675756][ T30] audit: type=1326 audit(1292.090:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.680325][ T30] audit: type=1326 audit(1292.100:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.688577][ T30] audit: type=1326 audit(1292.110:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.700493][ T30] audit: type=1326 audit(1292.120:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.712943][ T30] audit: type=1326 audit(1292.130:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.720169][ T30] audit: type=1326 audit(1292.140:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.729015][ T30] audit: type=1326 audit(1292.150:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1292.735823][ T30] audit: type=1326 audit(1292.150:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5202 comm="syz.0.595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1294.203381][ T5212] IPv6: Can't replace route, no match found [ 1297.891598][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1297.901003][ T30] audit: type=1400 audit(1297.310:455): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1298.151331][ T30] audit: type=1400 audit(1297.550:456): avc: denied { create } for pid=5216 comm="syz.2.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1298.304382][ T30] audit: type=1326 audit(1297.720:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.312065][ T30] audit: type=1326 audit(1297.730:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.337256][ T30] audit: type=1326 audit(1297.750:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.359093][ T30] audit: type=1326 audit(1297.780:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.383737][ T30] audit: type=1326 audit(1297.790:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.400127][ T30] audit: type=1326 audit(1297.820:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.403576][ T30] audit: type=1326 audit(1297.820:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1298.411073][ T30] audit: type=1326 audit(1297.820:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5224 comm="syz.0.604" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1301.333270][ T5242] syzkaller0: entered promiscuous mode [ 1301.348504][ T5242] syzkaller0: entered allmulticast mode [ 1304.330114][ T5247] netlink: 8 bytes leftover after parsing attributes in process `syz.0.614'. [ 1321.511437][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1321.515665][ T30] audit: type=1400 audit(1320.930:473): avc: denied { read } for pid=5269 comm="syz.0.624" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1323.190192][ T30] audit: type=1400 audit(1322.610:474): avc: denied { name_bind } for pid=5279 comm="syz.0.629" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1330.878005][ T30] audit: type=1326 audit(1330.280:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.2.637" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1330.882489][ T30] audit: type=1326 audit(1330.290:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.2.637" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1330.889942][ T30] audit: type=1326 audit(1330.290:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.2.637" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1330.894053][ T30] audit: type=1326 audit(1330.290:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.2.637" exe="/syz-executor" sig=0 arch=c00000b7 syscall=150 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1330.902783][ T30] audit: type=1326 audit(1330.310:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5295 comm="syz.2.637" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1331.229170][ T30] audit: type=1326 audit(1330.650:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5297 comm="syz.2.638" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1331.248313][ T30] audit: type=1326 audit(1330.650:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5297 comm="syz.2.638" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1331.267102][ T30] audit: type=1326 audit(1330.670:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5297 comm="syz.2.638" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1331.268339][ T30] audit: type=1326 audit(1330.680:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5297 comm="syz.2.638" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1331.282837][ T30] audit: type=1326 audit(1330.690:484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5297 comm="syz.2.638" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1340.460545][ T5345] syzkaller1: entered promiscuous mode [ 1340.461112][ T5345] syzkaller1: entered allmulticast mode [ 1354.069470][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1354.078715][ T30] audit: type=1326 audit(1353.490:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.096295][ T30] audit: type=1326 audit(1353.510:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.103858][ T30] audit: type=1326 audit(1353.520:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.122542][ T30] audit: type=1326 audit(1353.540:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.130423][ T30] audit: type=1326 audit(1353.550:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.150639][ T30] audit: type=1326 audit(1353.570:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.163343][ T30] audit: type=1326 audit(1353.580:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.168997][ T30] audit: type=1326 audit(1353.590:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=164 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1354.170426][ T30] audit: type=1326 audit(1353.590:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5384 comm="syz.2.675" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1355.074266][ T5387] serio: Serial port ptm0 [ 1359.764166][ T30] audit: type=1400 audit(1359.100:499): avc: denied { setopt } for pid=5396 comm="syz.2.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1364.889738][ T5423] netlink: 4 bytes leftover after parsing attributes in process `syz.2.692'. [ 1366.840932][ T30] audit: type=1400 audit(1366.260:500): avc: denied { write } for pid=5430 comm="syz.2.696" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1383.811158][ T30] audit: type=1400 audit(1383.220:501): avc: denied { append } for pid=5443 comm="syz.2.701" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1384.021327][ T30] audit: type=1400 audit(1383.440:502): avc: denied { write } for pid=5445 comm="syz.2.702" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1384.781523][ T5450] loop9: detected capacity change from 0 to 7 [ 1384.800693][ T5450] Buffer I/O error on dev loop9, logical block 0, async page read [ 1384.804637][ T5450] Buffer I/O error on dev loop9, logical block 0, async page read [ 1384.828101][ T5450] loop9: unable to read partition table [ 1384.857459][ T5450] loop_reread_partitions: partition scan of loop9 (þ被xüŸÑø éÚ¬§½dG¤´à–ƒÝ¡¯ â·û [ 1384.857459][ T5450] ) failed (rc=-5) [ 1387.696279][ T30] audit: type=1326 audit(1387.110:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.708987][ T30] audit: type=1326 audit(1387.130:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.724376][ T30] audit: type=1326 audit(1387.140:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.745984][ T30] audit: type=1326 audit(1387.150:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.751336][ T30] audit: type=1326 audit(1387.160:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.781064][ T30] audit: type=1326 audit(1387.200:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.810194][ T30] audit: type=1326 audit(1387.220:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1387.810964][ T30] audit: type=1326 audit(1387.230:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5456 comm="syz.2.707" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1388.160389][ T5459] netlink: 8 bytes leftover after parsing attributes in process `syz.0.708'. [ 1388.643604][ T5464] netlink: 'syz.2.711': attribute type 1 has an invalid length. [ 1388.930536][ T5465] netlink: 56 bytes leftover after parsing attributes in process `syz.0.710'. [ 1388.951109][ T5465] netlink: 24 bytes leftover after parsing attributes in process `syz.0.710'. [ 1389.411329][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1389.419079][ T30] audit: type=1400 audit(1388.830:514): avc: denied { read } for pid=5468 comm="syz.0.713" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1389.429695][ T30] audit: type=1400 audit(1388.840:515): avc: denied { open } for pid=5468 comm="syz.0.713" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1390.618295][ T30] audit: type=1326 audit(1390.030:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5474 comm="syz.2.716" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1390.623176][ T30] audit: type=1326 audit(1390.040:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5474 comm="syz.2.716" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1390.636872][ T30] audit: type=1326 audit(1390.050:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5474 comm="syz.2.716" exe="/syz-executor" sig=0 arch=c00000b7 syscall=191 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1390.639417][ T30] audit: type=1326 audit(1390.060:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5474 comm="syz.2.716" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1393.887260][ T30] audit: type=1326 audit(1393.310:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5493 comm="syz.2.723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1393.898190][ T30] audit: type=1326 audit(1393.310:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5493 comm="syz.2.723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=87 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1393.903839][ T30] audit: type=1326 audit(1393.320:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5493 comm="syz.2.723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1395.110643][ T30] audit: type=1400 audit(1394.520:523): avc: denied { setopt } for pid=5501 comm="syz.2.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1395.447643][ T5504] netlink: 8 bytes leftover after parsing attributes in process `syz.0.728'. [ 1395.451249][ T5504] netlink: 8 bytes leftover after parsing attributes in process `syz.0.728'. [ 1395.457258][ T5504] netlink: 8 bytes leftover after parsing attributes in process `syz.0.728'. [ 1395.483973][ T5504] netlink: 8 bytes leftover after parsing attributes in process `syz.0.728'. [ 1395.489332][ T5504] netlink: 8 bytes leftover after parsing attributes in process `syz.0.728'. [ 1396.007312][ T5510] x_tables: duplicate entry at hook 2 [ 1399.571450][ T5532] x_tables: duplicate underflow at hook 1 [ 1399.769981][ T30] audit: type=1400 audit(1399.190:524): avc: denied { bind } for pid=5533 comm="syz.0.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1403.728096][ T5559] netlink: 4 bytes leftover after parsing attributes in process `syz.2.748'. [ 1404.093360][ T5563] SELinux: Context Ü is not valid (left unmapped). [ 1404.661882][ T5570] netlink: 268 bytes leftover after parsing attributes in process `syz.0.754'. [ 1405.531609][ T5577] netlink: 36 bytes leftover after parsing attributes in process `syz.0.757'. [ 1406.478364][ T30] audit: type=1400 audit(1405.900:525): avc: denied { setopt } for pid=5583 comm="syz.2.761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1407.281493][ T5591] SELinux: syz.2.764 (5591) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1411.398558][ T5600] netlink: 268 bytes leftover after parsing attributes in process `syz.0.768'. [ 1421.459887][ T30] audit: type=1326 audit(1420.880:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5630 comm="syz.2.781" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1421.464228][ T30] audit: type=1326 audit(1420.880:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5630 comm="syz.2.781" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1421.495855][ T30] audit: type=1326 audit(1420.900:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5630 comm="syz.2.781" exe="/syz-executor" sig=0 arch=c00000b7 syscall=460 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1421.497175][ T30] audit: type=1326 audit(1420.910:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5630 comm="syz.2.781" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1421.516812][ T30] audit: type=1404 audit(1420.930:530): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1421.749974][ T30] audit: type=1400 audit(1421.170:531): avc: denied { read write } for pid=4600 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1421.791771][ T30] audit: type=1404 audit(1421.210:532): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1421.853620][ T30] audit: type=1400 audit(1421.270:533): avc: denied { prog_load } for pid=5629 comm="syz.0.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1421.868949][ T30] audit: type=1400 audit(1421.290:534): avc: denied { bpf } for pid=5629 comm="syz.0.780" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1421.888980][ T30] audit: type=1400 audit(1421.310:535): avc: denied { setopt } for pid=5629 comm="syz.0.780" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1430.276835][ T5654] netlink: 96 bytes leftover after parsing attributes in process `syz.0.791'. [ 1430.967157][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 1430.976482][ T30] audit: type=1400 audit(1430.380:560): avc: denied { create } for pid=5656 comm="syz.0.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1430.989670][ T30] audit: type=1400 audit(1430.410:561): avc: denied { write } for pid=5656 comm="syz.0.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1430.998019][ T5658] netlink: 32 bytes leftover after parsing attributes in process `syz.0.793'. [ 1431.177423][ T30] audit: type=1326 audit(1430.590:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.222090][ T30] audit: type=1326 audit(1430.630:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.223398][ T30] audit: type=1326 audit(1430.630:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.257084][ T30] audit: type=1326 audit(1430.630:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.265700][ T30] audit: type=1326 audit(1430.680:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.319008][ T30] audit: type=1326 audit(1430.740:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.334616][ T30] audit: type=1326 audit(1430.750:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1431.445957][ T30] audit: type=1326 audit(1430.800:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5659 comm="syz.2.794" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1434.848605][ T5677] netlink: 4 bytes leftover after parsing attributes in process `syz.0.802'. [ 1436.062810][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1436.068174][ T30] audit: type=1400 audit(1435.480:577): avc: denied { module_request } for pid=5679 comm="syz.0.804" kmod="net-pf-2-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1442.874049][ T30] audit: type=1400 audit(1442.290:578): avc: denied { create } for pid=5689 comm="syz.0.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1442.946148][ T30] audit: type=1400 audit(1442.360:579): avc: denied { write } for pid=5689 comm="syz.0.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1442.992683][ T30] audit: type=1400 audit(1442.410:580): avc: denied { read } for pid=5689 comm="syz.0.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1445.292304][ T30] audit: type=1400 audit(1444.710:581): avc: denied { create } for pid=5697 comm="syz.0.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1445.322890][ T30] audit: type=1400 audit(1444.720:582): avc: denied { connect } for pid=5697 comm="syz.0.810" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1447.430514][ T5704] capability: warning: `syz.2.813' uses deprecated v2 capabilities in a way that may be insecure [ 1448.111266][ T5700] netlink: 'syz.0.811': attribute type 13 has an invalid length. [ 1449.396852][ T30] audit: type=1400 audit(1448.810:583): avc: denied { load_policy } for pid=5710 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1449.632116][ T5711] SELinux: failed to load policy [ 1454.296191][ T30] audit: type=1400 audit(1453.700:584): avc: denied { mount } for pid=5712 comm="syz.0.817" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1460.482670][ T30] audit: type=1400 audit(1459.900:585): avc: denied { create } for pid=5722 comm="syz.2.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1460.726363][ T30] audit: type=1400 audit(1460.150:586): avc: denied { create } for pid=5724 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1460.746470][ T30] audit: type=1400 audit(1460.170:587): avc: denied { write } for pid=5724 comm="syz.2.821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1461.025431][ T5727] netlink: 320 bytes leftover after parsing attributes in process `syz.2.822'. [ 1461.316087][ T30] audit: type=1400 audit(1460.730:588): avc: denied { read } for pid=5728 comm="syz.2.823" dev="nsfs" ino=4026532923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1461.327940][ T30] audit: type=1400 audit(1460.730:589): avc: denied { open } for pid=5728 comm="syz.2.823" path="net:[4026532923]" dev="nsfs" ino=4026532923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1464.053491][ T30] audit: type=1400 audit(1463.470:590): avc: denied { create } for pid=5732 comm="syz.0.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1464.064122][ T30] audit: type=1400 audit(1463.480:591): avc: denied { ioctl } for pid=5732 comm="syz.0.825" path="socket:[11693]" dev="sockfs" ino=11693 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1464.070138][ T30] audit: type=1400 audit(1463.490:592): avc: denied { bind } for pid=5732 comm="syz.0.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1464.195938][ T30] audit: type=1400 audit(1463.610:593): avc: denied { name_bind } for pid=5734 comm="syz.2.824" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1464.200460][ T30] audit: type=1400 audit(1463.620:594): avc: denied { node_bind } for pid=5734 comm="syz.2.824" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1465.003370][ T5742] SELinux: failed to load policy [ 1467.413862][ T30] audit: type=1400 audit(1466.830:595): avc: denied { sqpoll } for pid=5746 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1467.504011][ T30] audit: type=1400 audit(1466.920:596): avc: denied { mount } for pid=5743 comm="syz.2.829" name="/" dev="ramfs" ino=10708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1468.001008][ T5750] netlink: 20 bytes leftover after parsing attributes in process `syz.0.831'. [ 1469.916149][ T30] audit: type=1400 audit(1469.330:597): avc: denied { create } for pid=5757 comm="syz.2.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1469.980763][ T30] audit: type=1400 audit(1469.400:598): avc: denied { write } for pid=5757 comm="syz.2.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1469.982659][ T5759] netlink: 268 bytes leftover after parsing attributes in process `syz.2.834'. [ 1469.986715][ T30] audit: type=1400 audit(1469.400:599): avc: denied { nlmsg_write } for pid=5757 comm="syz.2.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1470.438418][ T5762] ALSA: seq fatal error: cannot create timer (-16) [ 1470.460836][ T5762] ALSA: seq fatal error: cannot create timer (-16) [ 1470.471370][ T5762] ALSA: seq fatal error: cannot create timer (-16) [ 1470.933067][ T5767] netlink: 28 bytes leftover after parsing attributes in process `syz.2.838'. [ 1471.374562][ T30] audit: type=1400 audit(1470.790:600): avc: denied { ioctl } for pid=5768 comm="syz.2.840" path="socket:[10734]" dev="sockfs" ino=10734 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1471.563854][ T30] audit: type=1400 audit(1470.980:601): avc: denied { sys_module } for pid=5768 comm="syz.2.840" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1471.751887][ T30] audit: type=1400 audit(1471.170:602): avc: denied { prog_run } for pid=5774 comm="syz.0.841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1472.724029][ T30] audit: type=1400 audit(1472.140:603): avc: denied { create } for pid=5780 comm="syz.0.843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1472.770404][ T30] audit: type=1400 audit(1472.190:604): avc: denied { read } for pid=5780 comm="syz.0.843" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1472.779859][ T30] audit: type=1400 audit(1472.200:605): avc: denied { open } for pid=5780 comm="syz.0.843" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1472.790722][ T30] audit: type=1400 audit(1472.210:606): avc: denied { ioctl } for pid=5780 comm="syz.0.843" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1473.567836][ T30] audit: type=1400 audit(1472.990:607): avc: denied { read } for pid=5783 comm="syz.0.844" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1473.572657][ T30] audit: type=1400 audit(1472.990:608): avc: denied { open } for pid=5783 comm="syz.0.844" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1473.578483][ T30] audit: type=1400 audit(1473.000:609): avc: denied { ioctl } for pid=5783 comm="syz.0.844" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1475.721571][ T5798] IPv6: Can't replace route, no match found [ 1480.209743][ T30] audit: type=1400 audit(1479.630:610): avc: denied { write } for pid=5806 comm="syz.0.853" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1481.170156][ T5809] netlink: 8 bytes leftover after parsing attributes in process `syz.0.854'. [ 1481.173639][ T5809] netlink: 4 bytes leftover after parsing attributes in process `syz.0.854'. [ 1483.768366][ T30] audit: type=1400 audit(1483.190:611): avc: denied { write } for pid=5818 comm="syz.0.858" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1485.581841][ T5823] netlink: 40 bytes leftover after parsing attributes in process `syz.0.860'. [ 1486.663639][ T30] audit: type=1326 audit(1486.080:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.862" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1486.678832][ T30] audit: type=1326 audit(1486.090:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.862" exe="/syz-executor" sig=0 arch=c00000b7 syscall=227 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1486.711167][ T30] audit: type=1326 audit(1486.090:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5825 comm="syz.2.862" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1486.996550][ T30] audit: type=1400 audit(1486.410:615): avc: denied { create } for pid=5828 comm="syz.0.863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1487.024044][ T30] audit: type=1400 audit(1486.430:616): avc: denied { connect } for pid=5828 comm="syz.0.863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1487.207899][ T5831] netlink: 132 bytes leftover after parsing attributes in process `syz.2.864'. [ 1487.256419][ T30] audit: type=1400 audit(1486.670:617): avc: denied { write } for pid=5832 comm="syz.0.865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1487.743739][ T5837] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5837 comm=syz.2.867 [ 1488.088165][ T30] audit: type=1326 audit(1487.510:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.2.868" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1488.100380][ T30] audit: type=1326 audit(1487.510:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.2.868" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1488.112614][ T30] audit: type=1326 audit(1487.530:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.2.868" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1488.132492][ T30] audit: type=1326 audit(1487.550:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.2.868" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1492.852861][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1492.864434][ T30] audit: type=1400 audit(1492.270:627): avc: denied { append } for pid=5849 comm="syz.0.872" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1493.101966][ T30] audit: type=1326 audit(1492.520:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.117424][ T30] audit: type=1326 audit(1492.530:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.126776][ T30] audit: type=1326 audit(1492.540:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.139176][ T30] audit: type=1326 audit(1492.550:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.152477][ T30] audit: type=1326 audit(1492.570:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.189295][ T30] audit: type=1326 audit(1492.600:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.190842][ T30] audit: type=1326 audit(1492.610:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.203533][ T30] audit: type=1326 audit(1492.610:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1493.212430][ T30] audit: type=1326 audit(1492.630:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5851 comm="syz.0.873" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1494.973326][ T5864] netlink: 'syz.0.879': attribute type 13 has an invalid length. [ 1494.974457][ T5864] netlink: 'syz.0.879': attribute type 17 has an invalid length. [ 1495.670172][ T5864] netdevsim netdevsim0 netdevsim3: left promiscuous mode [ 1495.691956][ T5864] ip6gre1: left allmulticast mode [ 1497.130467][ T5873] netlink: 40 bytes leftover after parsing attributes in process `syz.0.883'. [ 1501.358503][ T5903] SELinux: syz.0.897 (5903) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1502.907647][ T5909] pim6reg1: entered promiscuous mode [ 1502.910118][ T5909] pim6reg1: entered allmulticast mode [ 1503.606619][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1503.608512][ T30] audit: type=1400 audit(1503.020:640): avc: denied { setopt } for pid=5910 comm="syz.0.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1503.613615][ T30] audit: type=1400 audit(1503.030:641): avc: denied { ioctl } for pid=5910 comm="syz.0.901" path="socket:[12111]" dev="sockfs" ino=12111 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1503.620094][ T30] audit: type=1400 audit(1503.040:642): avc: denied { write } for pid=5910 comm="syz.0.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1504.589589][ T30] audit: type=1326 audit(1504.000:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.602494][ T30] audit: type=1326 audit(1504.020:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.626133][ T30] audit: type=1326 audit(1504.020:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.661209][ T30] audit: type=1326 audit(1504.070:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.758280][ T30] audit: type=1326 audit(1504.150:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=234 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.774599][ T30] audit: type=1326 audit(1504.190:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1504.830659][ T30] audit: type=1326 audit(1504.250:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5914 comm="syz.0.903" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1506.088961][ T5919] netlink: 8 bytes leftover after parsing attributes in process `syz.0.905'. [ 1506.727290][ T5921] ip6gretap1: entered allmulticast mode [ 1508.753587][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1508.754566][ T30] audit: type=1400 audit(1508.170:653): avc: denied { bind } for pid=5927 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1508.782129][ T30] audit: type=1400 audit(1508.200:654): avc: denied { setopt } for pid=5927 comm="syz.0.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1508.811535][ T5928] netlink: 'syz.0.909': attribute type 10 has an invalid length. [ 1508.848501][ T5928] netlink: 'syz.0.909': attribute type 10 has an invalid length. [ 1510.414009][ T30] audit: type=1400 audit(1509.830:655): avc: denied { block_suspend } for pid=5931 comm="syz.0.911" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1511.113494][ T30] audit: type=1326 audit(1510.530:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.0.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1511.131863][ T30] audit: type=1326 audit(1510.550:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.0.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=175 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1511.133167][ T30] audit: type=1326 audit(1510.550:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.0.912" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96f5aba8 code=0x7ffc0000 [ 1515.817082][ T5951] netlink: 4 bytes leftover after parsing attributes in process `syz.2.919'. [ 1516.351520][ T30] audit: type=1400 audit(1515.770:659): avc: denied { setopt } for pid=5954 comm="syz.2.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1516.793603][ T5957] netlink: 16 bytes leftover after parsing attributes in process `syz.2.923'. [ 1517.071667][ T30] audit: type=1400 audit(1516.490:660): avc: denied { execute } for pid=5958 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1517.088569][ T30] audit: type=1400 audit(1516.500:661): avc: denied { execute_no_trans } for pid=5958 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1517.508060][ T30] audit: type=1400 audit(1516.920:662): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1520.860482][ T5976] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1522.167287][ T30] audit: type=1326 audit(1521.590:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.173798][ T30] audit: type=1326 audit(1521.590:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.189157][ T30] audit: type=1326 audit(1521.610:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.201710][ T30] audit: type=1326 audit(1521.620:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.211135][ T30] audit: type=1326 audit(1521.630:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.229399][ T30] audit: type=1326 audit(1521.640:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.232393][ T30] audit: type=1326 audit(1521.650:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.243500][ T30] audit: type=1326 audit(1521.660:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.264403][ T30] audit: type=1326 audit(1521.680:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1522.273663][ T30] audit: type=1326 audit(1521.690:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5985 comm="syz.2.930" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1523.653631][ T5998] netlink: 40 bytes leftover after parsing attributes in process `syz.2.933'. [ 1525.608480][ T5961] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1525.650718][ T5961] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1525.712704][ T6009] netlink: 4 bytes leftover after parsing attributes in process `syz.2.936'. [ 1530.663023][ T6029] netlink: 16402 bytes leftover after parsing attributes in process `syz.2.941'. [ 1531.373845][ T5961] hsr_slave_0: entered promiscuous mode [ 1531.389495][ T5961] hsr_slave_1: entered promiscuous mode [ 1531.394311][ T5961] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1531.398391][ T5961] Cannot create hsr debugfs directory [ 1532.934280][ T5961] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1533.001817][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1533.003267][ T30] audit: type=1400 audit(1532.420:679): avc: denied { write } for pid=6035 comm="syz.2.944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1533.374127][ T5961] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1533.640014][ T30] audit: type=1326 audit(1533.060:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.651339][ T30] audit: type=1326 audit(1533.070:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.677587][ T30] audit: type=1326 audit(1533.080:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.679106][ T30] audit: type=1326 audit(1533.080:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.680088][ T30] audit: type=1326 audit(1533.080:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.680743][ T30] audit: type=1326 audit(1533.080:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.681455][ T30] audit: type=1326 audit(1533.100:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.697726][ T30] audit: type=1326 audit(1533.100:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.702117][ T6040] xt_TPROXY: Can be used only with -p tcp or -p udp [ 1533.712858][ T30] audit: type=1326 audit(1533.120:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6039 comm="syz.2.946" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1533.741156][ T5961] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1534.122065][ T5961] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1535.332671][ T6049] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 1539.350169][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1539.352604][ T30] audit: type=1326 audit(1538.770:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.359978][ T30] audit: type=1326 audit(1538.770:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.367871][ T30] audit: type=1400 audit(1538.770:714): avc: denied { create } for pid=6066 comm="syz.2.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1539.680316][ T1613] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1539.718430][ T30] audit: type=1326 audit(1539.140:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.722330][ T30] audit: type=1326 audit(1539.140:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.723503][ T30] audit: type=1326 audit(1539.140:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.754102][ T30] audit: type=1326 audit(1539.170:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=91 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.768318][ T1613] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1539.771236][ T30] audit: type=1326 audit(1539.190:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.782933][ T30] audit: type=1326 audit(1539.200:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=195 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.789940][ T30] audit: type=1326 audit(1539.200:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6066 comm="syz.2.958" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1539.829058][ T1613] bond0 (unregistering): Released all slaves [ 1540.383343][ T1613] hsr_slave_0: left promiscuous mode [ 1540.396902][ T1613] hsr_slave_1: left promiscuous mode [ 1540.445419][ T1613] veth1_macvtap: left promiscuous mode [ 1540.446813][ T1613] veth0_macvtap: left promiscuous mode [ 1540.449074][ T1613] veth1_vlan: left promiscuous mode [ 1540.450252][ T1613] veth0_vlan: left promiscuous mode [ 1546.599244][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1546.607476][ T30] audit: type=1326 audit(1546.020:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1546.613833][ T30] audit: type=1326 audit(1546.030:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1546.630740][ T30] audit: type=1326 audit(1546.050:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1546.647137][ T30] audit: type=1326 audit(1546.050:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1546.648279][ T30] audit: type=1326 audit(1546.050:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=218 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1546.648900][ T30] audit: type=1326 audit(1546.050:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6081 comm="syz.2.964" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1549.763030][ T6086] slcan: can't register candev [ 1550.213553][ T30] audit: type=1326 audit(1549.630:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6088 comm="syz.2.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1550.220476][ T30] audit: type=1326 audit(1549.630:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6088 comm="syz.2.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1550.229286][ T30] audit: type=1326 audit(1549.640:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6088 comm="syz.2.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1550.234209][ T30] audit: type=1326 audit(1549.640:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6088 comm="syz.2.967" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1551.841331][ T5961] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1551.948656][ T5961] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1552.071337][ T5961] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1552.129964][ T5961] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1552.574549][ T6106] netlink: 8 bytes leftover after parsing attributes in process `syz.2.971'. [ 1552.577114][ T6106] netlink: 24 bytes leftover after parsing attributes in process `syz.2.971'. [ 1556.151153][ T5961] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1557.339917][ T6124] pimreg: entered allmulticast mode [ 1557.359242][ T6124] pimreg: left allmulticast mode [ 1561.858736][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1561.859948][ T30] audit: type=1326 audit(1561.280:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.2.981" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1561.864002][ T30] audit: type=1326 audit(1561.280:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.2.981" exe="/syz-executor" sig=0 arch=c00000b7 syscall=226 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1561.868261][ T30] audit: type=1326 audit(1561.290:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6146 comm="syz.2.981" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1562.238695][ T30] audit: type=1400 audit(1561.660:742): avc: denied { create } for pid=6149 comm="syz.2.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1563.044101][ T30] audit: type=1326 audit(1562.460:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6154 comm=ACED exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1563.066422][ T30] audit: type=1326 audit(1562.480:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6154 comm=ACED exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1563.070559][ T30] audit: type=1326 audit(1562.480:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6154 comm=ACED exe="/syz-executor" sig=0 arch=c00000b7 syscall=185 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1563.080036][ T30] audit: type=1326 audit(1562.490:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6154 comm=ACED exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9435aba8 code=0x7ffc0000 [ 1568.417875][ T5961] veth0_vlan: entered promiscuous mode [ 1568.504349][ T5961] veth1_vlan: entered promiscuous mode [ 1568.857099][ T5961] veth0_macvtap: entered promiscuous mode [ 1568.940859][ T5961] veth1_macvtap: entered promiscuous mode [ 1569.263903][ T5961] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1569.268509][ T5961] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1569.269275][ T5961] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1569.269759][ T5961] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1569.673087][ T30] audit: type=1400 audit(1569.090:747): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.Avemqw/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1569.683460][ T30] audit: type=1400 audit(1569.100:748): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1569.692464][ T30] audit: type=1400 audit(1569.110:749): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.Avemqw/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1569.701483][ T30] audit: type=1400 audit(1569.120:750): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1569.721184][ T30] audit: type=1400 audit(1569.140:751): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.Avemqw/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1569.753673][ T30] audit: type=1400 audit(1569.170:752): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.Avemqw/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=13468 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1569.793847][ T30] audit: type=1400 audit(1569.210:753): avc: denied { unmount } for pid=5961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1569.816316][ T30] audit: type=1400 audit(1569.230:754): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1569.822443][ T30] audit: type=1400 audit(1569.240:755): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="gadgetfs" ino=3748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1569.842688][ T30] audit: type=1400 audit(1569.260:756): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1571.159283][ T6179] pimreg: entered allmulticast mode [ 1571.161553][ T6179] pimreg: left allmulticast mode [ 1578.515779][ T6214] netlink: 'syz.0.1001': attribute type 10 has an invalid length. [ 1578.516314][ T6214] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1001'. [ 1578.519980][ T6214] vxcan0: entered promiscuous mode [ 1578.528411][ T6214] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 1578.784706][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1578.788152][ T30] audit: type=1326 audit(1578.200:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6217 comm="syz.0.1002" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb715aba8 code=0x7ffc0000 [ 1578.794578][ T30] audit: type=1326 audit(1578.210:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6217 comm="syz.0.1002" exe="/syz-executor" sig=0 arch=c00000b7 syscall=65 compat=0 ip=0xffffb715aba8 code=0x7ffc0000 [ 1578.797337][ T30] audit: type=1326 audit(1578.210:768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6217 comm="syz.0.1002" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb715aba8 code=0x7ffc0000 [ 1579.174493][ T6224] SELinux: policydb version 0 does not match my version range 15-34 [ 1579.177525][ T6224] SELinux: failed to load policy [ 1579.903915][ T30] audit: type=1400 audit(1579.320:769): avc: denied { write } for pid=6230 comm="syz.2.1008" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1580.971665][ T30] audit: type=1400 audit(1580.390:770): avc: denied { read write } for pid=6238 comm="syz.0.1009" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1580.989007][ T30] audit: type=1400 audit(1580.390:771): avc: denied { open } for pid=6238 comm="syz.0.1009" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1588.018459][ T6275] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1020'. [ 1588.019426][ T6275] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1020'. [ 1592.846119][ T30] audit: type=1400 audit(1592.260:772): avc: denied { ioctl } for pid=6285 comm="syz.2.1025" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1592.884022][ T6286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1592.889647][ T6286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1611.932645][ T6297] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1611.933366][ T6297] netlink: 108 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1611.980774][ T6297] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1611.983739][ T6297] netlink: 108 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1611.996753][ T6297] netlink: 84 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1613.619579][ T6307] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1613.788069][ T6307] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1613.976248][ T6307] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1614.166891][ T6307] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1614.629842][ T6307] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1614.688840][ T6307] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1614.757830][ T6307] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1614.854190][ T6307] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1615.079370][ T30] audit: type=1400 audit(1614.500:773): avc: denied { mount } for pid=6317 comm="syz.2.1038" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1615.083725][ T6318] ======================================================= [ 1615.083725][ T6318] WARNING: The mand mount option has been deprecated and [ 1615.083725][ T6318] and is ignored by this kernel. Remove the mand [ 1615.083725][ T6318] option from the mount to silence this warning. [ 1615.083725][ T6318] ======================================================= [ 1615.084030][ T30] audit: type=1400 audit(1614.500:774): avc: denied { remount } for pid=6317 comm="syz.2.1038" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1615.129966][ T30] audit: type=1400 audit(1614.550:775): avc: denied { unmount } for pid=4600 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1615.624478][ T6320] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1039'. [ 1615.630891][ T6320] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1039'. [ 1621.861597][ T30] audit: type=1400 audit(1621.280:776): avc: denied { read append } for pid=6352 comm="syz.0.1049" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1621.881400][ T30] audit: type=1400 audit(1621.300:777): avc: denied { open } for pid=6352 comm="syz.0.1049" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1623.932912][ T30] audit: type=1400 audit(1623.350:778): avc: denied { setopt } for pid=6362 comm="syz.2.1053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1624.516908][ T30] audit: type=1401 audit(1623.930:779): op=setxattr invalid_context="" [ 1626.889494][ T30] audit: type=1400 audit(1626.310:780): avc: denied { connect } for pid=6383 comm="syz.0.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1628.875955][ T30] audit: type=1400 audit(1628.280:781): avc: denied { search } for pid=6390 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1628.886675][ T30] audit: type=1400 audit(1628.280:782): avc: denied { search } for pid=6390 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=618 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1628.887850][ T30] audit: type=1400 audit(1628.300:783): avc: denied { search } for pid=6390 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=778 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1628.888420][ T30] audit: type=1400 audit(1628.300:784): avc: denied { search } for pid=6390 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1629.126424][ T30] audit: type=1400 audit(1628.540:785): avc: denied { read open } for pid=6392 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1629.142352][ T30] audit: type=1400 audit(1628.560:786): avc: denied { getattr } for pid=6392 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1629.457028][ T30] audit: type=1400 audit(1628.870:787): avc: denied { add_name } for pid=6390 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1629.458276][ T30] audit: type=1400 audit(1628.870:788): avc: denied { create } for pid=6390 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1629.488836][ T30] audit: type=1400 audit(1628.890:789): avc: denied { write open } for pid=6390 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2108 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1639.348713][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1639.350615][ T30] audit: type=1326 audit(1638.770:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6413 comm="syz.0.1072" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb715aba8 code=0x0 [ 1642.832080][ T6432] ALSA: seq fatal error: cannot create timer (-19) [ 1643.276279][ T30] audit: type=1400 audit(1642.690:796): avc: denied { execute } for pid=6431 comm="syz.0.1080" path="/54/cpu.stat" dev="tmpfs" ino=289 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1647.643922][ T30] audit: type=1400 audit(1647.060:797): avc: denied { unmount } for pid=5961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1649.004195][ T6470] netlink: 32 bytes leftover after parsing attributes in process `syz.0.1095'. [ 1649.032191][ T6470] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1095'. [ 1650.888200][ T30] audit: type=1400 audit(1650.300:798): avc: denied { create } for pid=6477 comm="syz.2.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1653.016684][ T30] audit: type=1400 audit(1652.430:799): avc: denied { setopt } for pid=6496 comm="syz.0.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1654.356748][ T6509] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1111'. [ 1656.841457][ T30] audit: type=1400 audit(1656.260:800): avc: denied { create } for pid=6518 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1662.763914][ T6541] netlink: 260 bytes leftover after parsing attributes in process `syz.0.1124'. [ 1663.202007][ T30] audit: type=1400 audit(1662.620:801): avc: denied { create } for pid=6542 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1667.820872][ T30] audit: type=1400 audit(1667.240:802): avc: denied { read write } for pid=6556 comm="syz.2.1131" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1667.824547][ T30] audit: type=1400 audit(1667.240:803): avc: denied { open } for pid=6556 comm="syz.2.1131" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1668.783800][ T6565] ------------[ cut here ]------------ [ 1668.784561][ T6565] WARNING: CPU: 0 PID: 6565 at mm/page_alloc.c:4935 __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 1668.786375][ T6565] Modules linked in: [ 1668.789233][ T6565] CPU: 0 UID: 0 PID: 6565 Comm: syz.2.1134 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT [ 1668.790896][ T6565] Hardware name: linux,dummy-virt (DT) [ 1668.792455][ T6565] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1668.793207][ T6565] pc : __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 1668.793964][ T6565] lr : __alloc_pages_noprof+0x14/0x114 [ 1668.794550][ T6565] sp : ffff80008de171d0 [ 1668.795376][ T6565] x29: ffff80008de171d0 x28: 0000000000000015 x27: ffff000013381838 [ 1668.796886][ T6565] x26: 0000000000000001 x25: 0000000020000140 x24: 1ffff00011bc2f24 [ 1668.797898][ T6565] x23: ffff8000810b3c18 x22: 1ffff00011bc2e5c x21: 0000000200000000 [ 1668.799296][ T6565] x20: 0000000000000000 x19: 0000000000000015 x18: 0000000000000000 [ 1668.800283][ T6565] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000020000000 [ 1668.801577][ T6565] x14: 0000000000200000 x13: 0000000000000006 x12: ffff700011bc2eeb [ 1668.802551][ T6565] x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 [ 1668.803787][ T6565] x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 [ 1668.804911][ T6565] x5 : ffff000015341e40 x4 : 0000000000000000 x3 : 0000000000000000 [ 1668.805975][ T6565] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088b26a77 [ 1668.807402][ T6565] Call trace: [ 1668.808140][ T6565] __alloc_frozen_pages_noprof+0xb7c/0x1f1c (P) [ 1668.808974][ T6565] __alloc_pages_noprof+0x14/0x114 [ 1668.809531][ T6565] ___kmalloc_large_node+0x9c/0x1d8 [ 1668.810324][ T6565] __kmalloc_large_node_noprof+0x28/0x88 [ 1668.811160][ T6565] __kmalloc_noprof+0x360/0x4d0 [ 1668.811701][ T6565] hashtab_init+0x150/0x298 [ 1668.812345][ T6565] symtab_init+0x44/0x64 [ 1668.813082][ T6565] policydb_read+0x5a0/0x2918 [ 1668.813586][ T6565] security_load_policy+0x12c/0xd98 [ 1668.814097][ T6565] sel_write_load+0x2d8/0x148c [ 1668.814675][ T6565] vfs_write+0x1d8/0xad4 [ 1668.815294][ T6565] ksys_write+0xec/0x1d8 [ 1668.815917][ T6565] __arm64_sys_write+0x6c/0x9c [ 1668.816466][ T6565] invoke_syscall+0x6c/0x258 [ 1668.817039][ T6565] el0_svc_common.constprop.0+0xac/0x230 [ 1668.817545][ T6565] do_el0_svc+0x40/0x58 [ 1668.818026][ T6565] el0_svc+0x50/0x198 [ 1668.818556][ T6565] el0t_64_sync_handler+0x10c/0x138 [ 1668.819146][ T6565] el0t_64_sync+0x198/0x19c [ 1668.820092][ T6565] irq event stamp: 602 [ 1668.820625][ T6565] hardirqs last enabled at (601): [] kasan_quarantine_put+0x1c8/0x228 [ 1668.821426][ T6565] hardirqs last disabled at (602): [] el1_dbg+0x24/0x9c [ 1668.822128][ T6565] softirqs last enabled at (568): [] fpsimd_restore_current_state+0x44/0x6bc [ 1668.822986][ T6565] softirqs last disabled at (566): [] fpsimd_restore_current_state+0x14/0x6bc [ 1668.823882][ T6565] ---[ end trace 0000000000000000 ]--- [ 1668.884670][ T30] audit: type=1400 audit(1668.280:804): avc: denied { write } for pid=3297 comm="syz-executor" path="pipe:[3240]" dev="pipefs" ino=3240 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1668.939506][ T6565] SELinux: failed to load policy [ 1669.188313][ T30] audit: type=1400 audit(1668.610:805): avc: denied { audit_write } for pid=6568 comm="syz.0.1137" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1669.191597][ T30] audit: type=1107 audit(1668.610:806): pid=6568 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1670.511066][ T1166] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1670.892261][ T1166] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.221619][ T1166] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.531102][ T1166] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1672.326231][ T30] audit: type=1400 audit(1671.740:807): avc: denied { read } for pid=3147 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1675.608700][ T1166] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1675.711105][ T1166] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1675.803144][ T1166] bond0 (unregistering): Released all slaves [ 1676.410151][ T1166] hsr_slave_0: left promiscuous mode [ 1676.414453][ T1166] hsr_slave_1: left promiscuous mode [ 1676.482765][ T1166] veth1_macvtap: left promiscuous mode [ 1676.487174][ T1166] veth0_macvtap: left promiscuous mode [ 1676.490232][ T1166] veth1_vlan: left promiscuous mode [ 1676.492882][ T1166] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 05:31:46 Registers: info registers vcpu 0 CPU#0 PC=ffff800081ba0bec X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001dbc42f X04=0000000000000018 X05=ffff800087a64bc0 X06=ffff700010f4c978 X07=0000000000000001 X08=ffff800087a64bc0 X09=dfff800000000000 X10=ffff700010f4c978 X11=1ffff00010f4c978 X12=ffff700010f4c979 X13=0000000000008000 X14=343331312e322e7a X15=69617420746f4e20 X16=312e36206465746e X17=2d3663722d302e36 X18=0000000000000000 X19=ffff00000ede2080 X20=ffff80008d47b018 X21=ffff800087ae02e0 X22=0000000000000050 X23=dfff800000000000 X24=ffff00000edf0081 X25=0000000000000005 X26=ffff00000ede22d8 X27=ffff00000ede2080 X28=dfff800000000000 X29=ffff80008de16630 X30=ffff800081ba0e78 SP=ffff80008de16630 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdc0c6940:54b04f3baa036100 Q02=0000ffffdc0c6920:ffffff80ffffffd8 Q03=0000ffffdc0c69d0:0000ffffdc0c69d0 Q04=0000ffffdc0c69d0:0000ffff94336c88 Q05=0000ffffdc0c69a0:0000ffffdc0c69d0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdc0c6bf0:0000ffffdc0c6bf0 Q17=ffffff80ffffffd0:0000ffffdc0c6bc0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000809a2800 X00=ffff000012fc1e40 X01=0000000000000000 X02=0000000000000000 X03=0000000000000000 X04=0000000000000000 X05=0000000000040000 X06=ffff000012fc28d0 X07=3df1592f76153240 X08=ffff80008d2a90e3 X09=dfff800000000000 X10=ffff700011bbef3a X11=1ffff00011bbef3a X12=ffff700011bbef3b X13=0000000000000000 X14=ffff00006a0b83b0 X15=0000ffffc35ea418 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=0000000000000050 X20=ffff80008ddf79b0 X21=ffff000012fc1e40 X22=0000000000000001 X23=dead000000000122 X24=0000000000008373 X25=0000000000000000 X26=0000000000000e9b X27=0000000000000000 X28=dfff800000000000 X29=ffff80008ddf7ba0 X30=ffff80008099da30 SP=ffff80008ddf7b40 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc35ea430:0000ffffc35ea430 Q17=ffffff80ffffffd0:0000ffffc35ea400 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000