last executing test programs: 6m18.834341827s ago: executing program 1 (id=358): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, 0x0, 0x310) 6m18.314517983s ago: executing program 1 (id=359): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0xf) ioctl$TIOCVHANGUP(r0, 0x5437, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000180)={0x0, 0x0, 0x9, 0xfffffffc, 0xffffffff, 0x6}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 6m17.489461878s ago: executing program 1 (id=360): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000300)={0xa, 0x2, 0xfffffffc, @empty, 0x80000001}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000680)="d942cf39", 0x4, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r3 = dup(r2) sendto$packet(r3, &(0x7f0000000400)='(', 0x1, 0x24004090, 0x0, 0x0) connect$unix(r3, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e22}, 0x6e) 6m15.845790628s ago: executing program 1 (id=362): r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) ioctl$SNAPSHOT_UNFREEZE(r0, 0x3302) 6m15.51030754s ago: executing program 1 (id=364): bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)={0x49de, 0x0, 0xfffc, 0xbfff, 0x19, "ec28a144f13d7607"}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x2001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x8, 0xffffffff9673e35d]}}) 6m14.788673693s ago: executing program 1 (id=365): openat(0xffffffffffffff9c, 0x0, 0x2, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) syz_open_dev$usbfs(0x0, 0x74, 0x101301) 5m29.433638318s ago: executing program 32 (id=365): openat(0xffffffffffffff9c, 0x0, 0x2, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) syz_open_dev$usbfs(0x0, 0x74, 0x101301) 48.971240782s ago: executing program 0 (id=645): openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4800}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01}, 0x78}}, 0x0) 46.199603686s ago: executing program 0 (id=647): bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x2000000000000242, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x18) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) 43.371222677s ago: executing program 0 (id=649): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0x3e, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0x80045505, 0x0) 42.459346643s ago: executing program 0 (id=650): r0 = socket(0x2b, 0x80801, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8000000, 0x7fffffe, 0x2d0, 0x0, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x200, 0xffffffff, 0xffffffff, 0x200, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x3, 0x0}, @mcast1, [0x0, 0x0, 0x0, 0xffffff], [0x0, 0x0, 0x4c62d6309aaa1bde, 0xff000000], 'ip6tnl0\x00', 'nicvf0\x00', {}, {0xff}, 0x3a}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x4, '\x00', 'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', {0x1}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x330) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001540)={0x0}, 0x1, 0x0, 0x0, 0xe75001b60ea60cd8}, 0x6000c054) 5.907522956s ago: executing program 2 (id=671): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 5.468169652s ago: executing program 2 (id=672): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000800014004000000", 0x58}], 0x1) 4.749606893s ago: executing program 2 (id=673): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = socket(0x23, 0x2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 3.887947773s ago: executing program 0 (id=674): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x1a, r1, 0x1, 0x8, 0x6, @broadcast}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000480)='kfree\x00', r3, 0x0, 0x4}, 0x18) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 3.348111362s ago: executing program 2 (id=675): r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000080), 0x10) sendmmsg(r1, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x1a}], 0x1}}], 0x1, 0x24008094) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 2.200413929s ago: executing program 2 (id=676): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1008}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4f, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000840)="ff", 0x1, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000340)=@chain={'key_or_keyring:', r2}) 1.24614163s ago: executing program 2 (id=677): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a1f000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c00048048000180080001"], 0x122}}, 0x4008090) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) acct(&(0x7f0000000100)='./file1\x00') futex_waitv(0x0, 0x0, 0x0, 0x0, 0x1) 0s ago: executing program 0 (id=678): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB="500000000906010200000000000000e1020000000900020073797a31000000000500010007000000280007800c00018008000140ffffffff0c00148008000140ac1414bb0c000280080001"], 0x50}, 0x1, 0x0, 0x0, 0xd24f4d5778621d46}, 0x4) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:32025' (ED25519) to the list of known hosts. [ 274.432446][ T30] audit: type=1400 audit(273.820:46): avc: denied { name_bind } for pid=3316 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 275.138048][ T30] audit: type=1400 audit(274.530:47): avc: denied { execute } for pid=3317 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 275.152689][ T30] audit: type=1400 audit(274.540:48): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 282.656420][ T30] audit: type=1400 audit(282.050:49): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 282.747379][ T30] audit: type=1400 audit(282.140:50): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 282.804264][ T3317] cgroup: Unknown subsys name 'net' [ 282.862574][ T30] audit: type=1400 audit(282.250:51): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 283.334414][ T3317] cgroup: Unknown subsys name 'cpuset' [ 283.405899][ T3317] cgroup: Unknown subsys name 'rlimit' [ 283.717466][ T30] audit: type=1400 audit(283.110:52): avc: denied { setattr } for pid=3317 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 283.726064][ T30] audit: type=1400 audit(283.120:53): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 283.733394][ T30] audit: type=1400 audit(283.120:54): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 284.511129][ T3320] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 284.516769][ T30] audit: type=1400 audit(283.910:55): avc: denied { relabelto } for pid=3320 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 284.522209][ T30] audit: type=1400 audit(283.910:56): avc: denied { write } for pid=3320 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 284.645597][ T30] audit: type=1400 audit(284.040:57): avc: denied { read } for pid=3317 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 284.652680][ T30] audit: type=1400 audit(284.040:58): avc: denied { open } for pid=3317 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 284.698120][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 305.430624][ T30] audit: type=1400 audit(304.820:59): avc: denied { execmem } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 305.503995][ T30] audit: type=1400 audit(304.890:60): avc: denied { read } for pid=3323 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 305.508299][ T30] audit: type=1400 audit(304.900:61): avc: denied { open } for pid=3323 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 305.521112][ T30] audit: type=1400 audit(304.910:62): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 305.619936][ T30] audit: type=1400 audit(305.010:63): avc: denied { module_request } for pid=3323 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 305.861114][ T30] audit: type=1400 audit(305.250:64): avc: denied { sys_module } for pid=3324 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 314.865620][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.035368][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.416425][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.475814][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.093820][ T3324] hsr_slave_0: entered promiscuous mode [ 319.124307][ T3324] hsr_slave_1: entered promiscuous mode [ 320.070567][ T3323] hsr_slave_0: entered promiscuous mode [ 320.084809][ T3323] hsr_slave_1: entered promiscuous mode [ 320.093912][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 320.096019][ T3323] Cannot create hsr debugfs directory [ 322.923784][ T30] audit: type=1400 audit(322.310:65): avc: denied { create } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.929966][ T30] audit: type=1400 audit(322.320:66): avc: denied { write } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.952956][ T30] audit: type=1400 audit(322.330:67): avc: denied { read } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 322.995967][ T3324] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 323.095315][ T3324] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 323.245152][ T3324] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 323.369986][ T3324] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 323.913624][ T3323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 323.976614][ T3323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 324.020113][ T3323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 324.070904][ T3323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 328.239344][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 328.806079][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.695355][ T3324] veth0_vlan: entered promiscuous mode [ 342.897281][ T3324] veth1_vlan: entered promiscuous mode [ 343.539225][ T3324] veth0_macvtap: entered promiscuous mode [ 343.707020][ T3324] veth1_macvtap: entered promiscuous mode [ 344.024058][ T3323] veth0_vlan: entered promiscuous mode [ 344.325036][ T3323] veth1_vlan: entered promiscuous mode [ 344.489412][ T1116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.496844][ T1116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.508858][ T1116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.513054][ T1116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.709405][ T30] audit: type=1400 audit(345.100:68): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.EqtGDP/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 345.759354][ T30] audit: type=1400 audit(345.150:69): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 345.800949][ T30] audit: type=1400 audit(345.190:70): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.EqtGDP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 345.831132][ T30] audit: type=1400 audit(345.220:71): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 345.888565][ T30] audit: type=1400 audit(345.280:72): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.EqtGDP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 346.028148][ T30] audit: type=1400 audit(345.420:73): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.EqtGDP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 346.178209][ T30] audit: type=1400 audit(345.570:74): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 346.226817][ T30] audit: type=1400 audit(345.620:75): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 346.254175][ T30] audit: type=1400 audit(345.640:76): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="gadgetfs" ino=3664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 346.349164][ T30] audit: type=1400 audit(345.730:77): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 346.387914][ T3323] veth0_macvtap: entered promiscuous mode [ 346.529365][ T3323] veth1_macvtap: entered promiscuous mode [ 346.875107][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 347.289345][ T26] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.293490][ T26] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.293835][ T26] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.294132][ T26] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.993506][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 350.996601][ T30] audit: type=1400 audit(350.380:83): avc: denied { map_create } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 351.054029][ T30] audit: type=1400 audit(350.430:84): avc: denied { bpf } for pid=3471 comm="syz.1.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 351.082667][ T30] audit: type=1400 audit(350.470:85): avc: denied { map_read map_write } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 351.118656][ T30] audit: type=1400 audit(350.510:86): avc: denied { prog_load } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 351.123818][ T30] audit: type=1400 audit(350.510:87): avc: denied { perfmon } for pid=3471 comm="syz.1.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 351.184805][ T30] audit: type=1400 audit(350.580:88): avc: denied { create } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 351.190853][ T3473] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 351.208853][ T30] audit: type=1400 audit(350.600:89): avc: denied { write } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 352.405306][ T30] audit: type=1326 audit(351.780:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3474 comm="syz.1.3" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 352.415821][ T30] audit: type=1326 audit(351.810:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3474 comm="syz.1.3" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 352.435511][ T30] audit: type=1326 audit(351.830:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3474 comm="syz.1.3" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 356.607890][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 356.625228][ T30] audit: type=1400 audit(355.990:113): avc: denied { read } for pid=3484 comm="syz.1.7" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 356.642594][ T30] audit: type=1400 audit(356.030:114): avc: denied { open } for pid=3484 comm="syz.1.7" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 359.102265][ T30] audit: type=1400 audit(358.410:115): avc: denied { create } for pid=3489 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 359.150874][ T30] audit: type=1400 audit(358.540:116): avc: denied { ioctl } for pid=3489 comm="syz.0.10" path="socket:[3726]" dev="sockfs" ino=3726 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 367.469046][ T30] audit: type=1326 audit(366.830:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.13" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x0 [ 370.474587][ T30] audit: type=1400 audit(369.860:118): avc: denied { read write } for pid=3503 comm="syz.0.14" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 370.517600][ T30] audit: type=1400 audit(369.900:119): avc: denied { open } for pid=3503 comm="syz.0.14" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 370.890791][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.903454][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.914438][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.920177][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.923759][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.926015][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.928309][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.933270][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.935399][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.937535][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 370.997736][ T23] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.02 Device [syz0] on syz1 [ 373.782247][ T30] audit: type=1400 audit(373.170:120): avc: denied { prog_run } for pid=3511 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 373.842178][ T30] audit: type=1326 audit(373.230:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3512 comm="syz.1.17" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 373.915706][ T30] audit: type=1326 audit(373.270:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3512 comm="syz.1.17" exe="/syz-executor" sig=0 arch=c00000b7 syscall=165 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 373.919969][ T30] audit: type=1326 audit(373.310:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3512 comm="syz.1.17" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 374.510481][ T3516] SELinux: Context Ü is not valid (left unmapped). [ 375.002606][ T30] audit: type=1400 audit(374.390:124): avc: denied { bind } for pid=3517 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.056919][ T30] audit: type=1400 audit(374.430:125): avc: denied { setopt } for pid=3517 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.835413][ T30] audit: type=1400 audit(375.220:126): avc: denied { name_bind } for pid=3519 comm="syz.0.21" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 375.856002][ T30] audit: type=1400 audit(375.240:127): avc: denied { node_bind } for pid=3519 comm="syz.0.21" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 376.727806][ T3510] fido_id[3510]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 376.736184][ T30] audit: type=1400 audit(376.130:128): avc: denied { connect } for pid=3521 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 376.798447][ T30] audit: type=1400 audit(376.190:129): avc: denied { setopt } for pid=3521 comm="syz.1.22" laddr=::ffff:172.20.20.10 lport=33333 faddr=::ffff:172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 380.364672][ T30] audit: type=1400 audit(379.760:130): avc: denied { create } for pid=3530 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 380.466590][ T30] audit: type=1400 audit(379.860:131): avc: denied { unmount } for pid=3530 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 384.714179][ T30] audit: type=1400 audit(384.100:132): avc: denied { create } for pid=3551 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 386.125429][ T30] audit: type=1400 audit(385.510:133): avc: denied { create } for pid=3558 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 386.147712][ T30] audit: type=1400 audit(385.540:134): avc: denied { setopt } for pid=3558 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 386.693700][ T30] audit: type=1400 audit(386.080:135): avc: denied { sqpoll } for pid=3560 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 388.950428][ T30] audit: type=1400 audit(388.340:136): avc: denied { create } for pid=3571 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 389.410805][ T3575] netlink: 8 bytes leftover after parsing attributes in process `syz.0.46'. [ 390.096882][ T30] audit: type=1400 audit(389.490:137): avc: denied { create } for pid=3571 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 390.188454][ T30] audit: type=1400 audit(389.580:138): avc: denied { write } for pid=3571 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 391.952786][ T30] audit: type=1400 audit(391.340:139): avc: denied { kexec_image_load } for pid=3584 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 392.038928][ T3586] syz_tun: entered allmulticast mode [ 392.148398][ T3586] netlink: 4 bytes leftover after parsing attributes in process `syz.1.50'. [ 392.576912][ T3586] syz_tun (unregistering): left allmulticast mode [ 395.184133][ T30] audit: type=1326 audit(394.570:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.198919][ T30] audit: type=1326 audit(394.590:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.257553][ T30] audit: type=1326 audit(394.640:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.260720][ T30] audit: type=1326 audit(394.650:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.270765][ T30] audit: type=1326 audit(394.660:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.298024][ T30] audit: type=1326 audit(394.690:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=116 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.323193][ T30] audit: type=1326 audit(394.700:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.344125][ T30] audit: type=1326 audit(394.740:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 395.359242][ T30] audit: type=1326 audit(394.750:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3597 comm="syz.0.54" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 397.520787][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 397.526378][ T30] audit: type=1400 audit(396.910:163): avc: denied { create } for pid=3604 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 397.675823][ T30] audit: type=1400 audit(397.020:164): avc: denied { ioctl } for pid=3604 comm="syz.1.56" path="socket:[3875]" dev="sockfs" ino=3875 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 401.247938][ T30] audit: type=1400 audit(400.640:165): avc: denied { create } for pid=3616 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 401.355620][ T30] audit: type=1400 audit(400.750:166): avc: denied { setopt } for pid=3616 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 401.428862][ T30] audit: type=1400 audit(400.810:167): avc: denied { connect } for pid=3616 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 404.732144][ T3630] netlink: 'syz.1.66': attribute type 4 has an invalid length. [ 405.175673][ T3632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3632 comm=syz.1.67 [ 405.219820][ T3632] netlink: 16 bytes leftover after parsing attributes in process `syz.1.67'. [ 405.278334][ T30] audit: type=1400 audit(404.670:168): avc: denied { bind } for pid=3631 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 409.998148][ T3647] netlink: 40 bytes leftover after parsing attributes in process `syz.1.74'. [ 410.634890][ T3647] netlink: 40 bytes leftover after parsing attributes in process `syz.1.74'. [ 412.402498][ T30] audit: type=1400 audit(411.790:169): avc: denied { create } for pid=3654 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 412.435128][ T30] audit: type=1400 audit(411.810:170): avc: denied { write } for pid=3654 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 415.815662][ T3655] infiniband !yz!: set down [ 415.817046][ T3655] infiniband !yz!: added team_slave_0 [ 415.969361][ T3655] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 416.119291][ T3655] infiniband !yz!: Couldn't open port 1 [ 416.839095][ T3655] RDS/IB: !yz!: added [ 416.867171][ T3655] smc: adding ib device !yz! with port count 1 [ 416.869513][ T3655] smc: ib device !yz! port 1 has no pnetid [ 428.913334][ T30] audit: type=1400 audit(428.300:171): avc: denied { execute } for pid=3674 comm="syz.0.84" path="/35/blkio.bfq.group_wait_time" dev="tmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 430.759082][ T3679] binfmt_misc: register: failed to install interpreter file ./file2 [ 431.433608][ T30] audit: type=1400 audit(430.820:172): avc: denied { create } for pid=3680 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 431.479165][ T30] audit: type=1400 audit(430.870:173): avc: denied { setopt } for pid=3680 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 435.443150][ T3697] netlink: 28 bytes leftover after parsing attributes in process `syz.0.94'. [ 436.589601][ T30] audit: type=1400 audit(435.980:174): avc: denied { write } for pid=3702 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 436.613152][ T30] audit: type=1400 audit(435.990:175): avc: denied { nlmsg_write } for pid=3702 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 438.442112][ T30] audit: type=1400 audit(437.810:176): avc: denied { create } for pid=3709 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 441.147684][ T30] audit: type=1400 audit(440.540:177): avc: denied { create } for pid=3717 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 441.173696][ T30] audit: type=1400 audit(440.570:178): avc: denied { connect } for pid=3717 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 442.884192][ T30] audit: type=1400 audit(442.260:179): avc: denied { watch watch_reads } for pid=3721 comm="syz.1.104" path="/57" dev="tmpfs" ino=300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 443.430823][ T30] audit: type=1400 audit(442.820:180): avc: denied { ioctl } for pid=3722 comm="syz.0.105" path="socket:[4039]" dev="sockfs" ino=4039 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 445.203103][ T30] audit: type=1326 audit(444.590:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 445.242753][ T30] audit: type=1326 audit(444.590:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 445.249399][ T30] audit: type=1326 audit(444.640:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=179 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 445.278599][ T30] audit: type=1326 audit(444.670:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 445.589896][ T3737] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 448.248075][ T3749] capability: warning: `wÞ£ÿ' uses deprecated v2 capabilities in a way that may be insecure [ 449.586173][ T30] audit: type=1400 audit(448.980:185): avc: denied { bind } for pid=3753 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 449.605962][ T30] audit: type=1400 audit(449.000:186): avc: denied { setopt } for pid=3753 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 449.733587][ T3754] netlink: 64 bytes leftover after parsing attributes in process `syz.1.117'. [ 452.407807][ T3757] bond0: (slave bond_slave_0): Releasing backup interface [ 452.559378][ T3757] bond0: (slave bond_slave_1): Releasing backup interface [ 452.698945][ T3758] netlink: 'syz.1.118': attribute type 10 has an invalid length. [ 452.701939][ T3758] netlink: 40 bytes leftover after parsing attributes in process `syz.1.118'. [ 452.917609][ T3757] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 453.058445][ T3758] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 459.273236][ T30] audit: type=1400 audit(458.660:187): avc: denied { create } for pid=3770 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 462.288738][ T30] audit: type=1400 audit(461.680:188): avc: denied { setopt } for pid=3783 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 462.294871][ T30] audit: type=1400 audit(461.690:189): avc: denied { read } for pid=3783 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 463.794684][ T30] audit: type=1400 audit(463.190:190): avc: denied { write } for pid=3783 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.397893][ T3792] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.128'. [ 466.689797][ T30] audit: type=1400 audit(466.080:191): avc: denied { create } for pid=3787 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.757076][ T30] audit: type=1400 audit(466.120:192): avc: denied { write open } for pid=3787 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1154 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 466.865537][ T30] audit: type=1400 audit(466.250:193): avc: denied { append } for pid=3787 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1154 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 467.063079][ T30] audit: type=1400 audit(466.450:194): avc: denied { getattr } for pid=3787 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 468.249365][ T30] audit: type=1400 audit(467.640:195): avc: denied { read } for pid=3800 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 469.905726][ T30] audit: type=1400 audit(469.280:196): avc: denied { unlink } for pid=3805 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1154 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 471.298027][ T30] audit: type=1400 audit(470.690:197): avc: denied { create } for pid=3811 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_xfrm_socket permissive=1 [ 472.616678][ T30] audit: type=1400 audit(472.000:198): avc: denied { mount } for pid=3816 comm="syz.1.137" name="/" dev="ramfs" ino=5139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 473.808336][ T3822] dvmrp8: entered allmulticast mode [ 475.937647][ T3831] netlink: 8 bytes leftover after parsing attributes in process `syz.1.142'. [ 475.938498][ T3831] netlink: 4 bytes leftover after parsing attributes in process `syz.1.142'. [ 475.975186][ T3831] netlink: 8 bytes leftover after parsing attributes in process `syz.1.142'. [ 475.976021][ T3831] netlink: 4 bytes leftover after parsing attributes in process `syz.1.142'. [ 475.978558][ T3831] Zero length message leads to an empty skb [ 477.153595][ T30] audit: type=1400 audit(476.530:199): avc: denied { read } for pid=3835 comm="syz.0.145" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 477.168046][ T30] audit: type=1400 audit(476.560:200): avc: denied { open } for pid=3835 comm="syz.0.145" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 477.542999][ T30] audit: type=1400 audit(476.910:201): avc: denied { ioctl } for pid=3835 comm="syz.0.145" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 477.612471][ T30] audit: type=1400 audit(477.000:202): avc: denied { read } for pid=3835 comm="syz.0.145" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 477.613411][ T30] audit: type=1400 audit(477.000:203): avc: denied { open } for pid=3835 comm="syz.0.145" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 481.615928][ T3847] xt_hashlimit: max too large, truncated to 1048576 [ 482.373741][ T30] audit: type=1400 audit(481.760:204): avc: denied { mounton } for pid=3848 comm="syz.1.149" path="/87/file0" dev="tmpfs" ino=456 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 482.389683][ T30] audit: type=1400 audit(481.780:205): avc: denied { mount } for pid=3848 comm="syz.1.149" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 487.140662][ T3865] netlink: 8 bytes leftover after parsing attributes in process `syz.1.155'. [ 490.721105][ T3881] ======================================================= [ 490.721105][ T3881] WARNING: The mand mount option has been deprecated and [ 490.721105][ T3881] and is ignored by this kernel. Remove the mand [ 490.721105][ T3881] option from the mount to silence this warning. [ 490.721105][ T3881] ======================================================= [ 490.944067][ T30] audit: type=1400 audit(490.320:206): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 492.481110][ T30] audit: type=1400 audit(491.870:207): avc: denied { ioctl } for pid=3886 comm="syz.0.163" path="socket:[4919]" dev="sockfs" ino=4919 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 492.489580][ T30] audit: type=1400 audit(491.880:208): avc: denied { create } for pid=3886 comm="syz.0.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 494.232839][ T30] audit: type=1400 audit(493.620:209): avc: denied { name_bind } for pid=3897 comm="syz.0.167" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 496.212787][ T30] audit: type=1326 audit(495.600:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.246521][ T30] audit: type=1326 audit(495.640:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=11 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.272732][ T30] audit: type=1326 audit(495.660:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.276865][ T30] audit: type=1326 audit(495.660:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.295946][ T30] audit: type=1326 audit(495.690:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.307286][ T30] audit: type=1326 audit(495.700:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.315965][ T30] audit: type=1326 audit(495.710:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.326999][ T30] audit: type=1326 audit(495.720:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.334823][ T30] audit: type=1326 audit(495.730:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 496.345688][ T30] audit: type=1326 audit(495.740:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3901 comm="syz.0.169" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 501.065769][ T3922] nft_compat: unsupported protocol 0 [ 501.834357][ T3918] lo speed is unknown, defaulting to 1000 [ 501.846391][ T3918] lo speed is unknown, defaulting to 1000 [ 501.890205][ T3918] lo speed is unknown, defaulting to 1000 [ 502.065572][ T3918] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 502.254403][ T3918] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 502.336894][ T3922] netlink: 'syz.1.177': attribute type 4 has an invalid length. [ 502.407141][ T3468] lo speed is unknown, defaulting to 1000 [ 502.410517][ T3468] syz2: Port: 1 Link ACTIVE [ 502.610136][ T3918] lo speed is unknown, defaulting to 1000 [ 502.754901][ T3918] lo speed is unknown, defaulting to 1000 [ 502.968666][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 502.983674][ T30] audit: type=1400 audit(502.350:226): avc: denied { name_bind } for pid=3926 comm="syz.0.180" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 504.577257][ T30] audit: type=1326 audit(503.970:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 504.580986][ T30] audit: type=1326 audit(503.970:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 504.617949][ T30] audit: type=1326 audit(504.010:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 504.627517][ T30] audit: type=1326 audit(504.010:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=82 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 504.641118][ T30] audit: type=1326 audit(504.030:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 504.656715][ T30] audit: type=1326 audit(504.050:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 505.875682][ T30] audit: type=1326 audit(505.270:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3938 comm="syz.1.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 505.890541][ T30] audit: type=1326 audit(505.280:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3938 comm="syz.1.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 505.900194][ T30] audit: type=1326 audit(505.290:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3938 comm="syz.1.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=261 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 514.353446][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 514.356258][ T30] audit: type=1326 audit(513.740:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 514.357115][ T30] audit: type=1326 audit(513.740:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 514.367935][ T30] audit: type=1326 audit(513.740:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=155 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 514.368634][ T30] audit: type=1326 audit(513.740:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 514.368972][ T30] audit: type=1326 audit(513.740:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=206 compat=0 ip=0xffffb3d5e8a8 code=0x7ffc0000 [ 514.993676][ T30] audit: type=1326 audit(514.370:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 515.036898][ T30] audit: type=1326 audit(514.430:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=90 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 515.045459][ T30] audit: type=1326 audit(514.440:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 515.057163][ T30] audit: type=1326 audit(514.440:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 515.176373][ T30] audit: type=1326 audit(514.500:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3968 comm="syz.0.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 518.334967][ T3989] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 519.832378][ T3969] lo speed is unknown, defaulting to 1000 [ 521.120380][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 521.144816][ T30] audit: type=1400 audit(520.510:279): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 521.166515][ T30] audit: type=1400 audit(520.540:280): avc: denied { open } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 521.195758][ T30] audit: type=1400 audit(520.580:281): avc: denied { ioctl } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 527.480743][ T30] audit: type=1326 audit(526.870:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.0.205" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 527.525265][ T30] audit: type=1326 audit(526.920:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.0.205" exe="/syz-executor" sig=0 arch=c00000b7 syscall=2 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 527.554024][ T30] audit: type=1326 audit(526.940:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.0.205" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 529.944609][ T30] audit: type=1400 audit(529.240:285): avc: denied { allowed } for pid=4004 comm="syz.0.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 529.973832][ T30] audit: type=1400 audit(529.360:286): avc: denied { create } for pid=4004 comm="syz.0.207" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 530.025736][ T30] audit: type=1400 audit(529.400:287): avc: denied { map } for pid=4004 comm="syz.0.207" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5070 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 530.032647][ T30] audit: type=1400 audit(529.420:288): avc: denied { read write } for pid=4004 comm="syz.0.207" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5070 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 531.447395][ T30] audit: type=1400 audit(530.820:289): avc: denied { name_bind } for pid=4007 comm="syz.0.209" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 531.455698][ T30] audit: type=1400 audit(530.840:290): avc: denied { node_bind } for pid=4007 comm="syz.0.209" saddr=::ffff:0.0.0.0 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 531.820089][ T30] audit: type=1400 audit(531.210:291): avc: denied { create } for pid=4011 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 533.314862][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 533.319469][ T30] audit: type=1400 audit(532.710:294): avc: denied { create } for pid=4016 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 533.339559][ T30] audit: type=1400 audit(532.730:295): avc: denied { write } for pid=4016 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 534.524024][ T30] audit: type=1400 audit(533.920:296): avc: denied { getopt } for pid=4022 comm="syz.0.213" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 536.555713][ T4018] lo speed is unknown, defaulting to 1000 [ 537.065000][ T30] audit: type=1326 audit(536.440:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.072635][ T30] audit: type=1326 audit(536.460:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.082662][ T30] audit: type=1326 audit(536.460:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.085364][ T30] audit: type=1326 audit(536.460:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.087257][ T30] audit: type=1326 audit(536.460:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.096442][ T30] audit: type=1326 audit(536.490:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 537.100220][ T30] audit: type=1326 audit(536.490:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4028 comm="syz.0.215" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 539.832559][ T30] kauditd_printk_skb: 97 callbacks suppressed [ 539.837667][ T30] audit: type=1400 audit(539.220:401): avc: denied { create } for pid=4033 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 540.022722][ T30] audit: type=1400 audit(539.390:402): avc: denied { write } for pid=4033 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 540.063711][ T30] audit: type=1400 audit(539.410:403): avc: denied { module_request } for pid=4033 comm="syz.1.217" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 541.295404][ T30] audit: type=1400 audit(540.690:404): avc: denied { read } for pid=4033 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 550.714568][ T30] audit: type=1326 audit(550.110:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.754858][ T30] audit: type=1326 audit(550.140:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.788429][ T30] audit: type=1326 audit(550.180:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.821037][ T30] audit: type=1326 audit(550.210:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.827219][ T30] audit: type=1326 audit(550.220:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.838219][ T30] audit: type=1326 audit(550.230:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.860568][ T30] audit: type=1326 audit(550.250:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.877012][ T30] audit: type=1326 audit(550.270:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=270 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 550.893607][ T30] audit: type=1326 audit(550.270:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4064 comm="syz.0.230" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 555.958992][ T4088] netlink: 'syz.1.239': attribute type 15 has an invalid length. [ 555.959809][ T4088] netlink: 4 bytes leftover after parsing attributes in process `syz.1.239'. [ 556.404529][ T4088] netlink: 'syz.1.239': attribute type 15 has an invalid length. [ 556.407777][ T4088] netlink: 4 bytes leftover after parsing attributes in process `syz.1.239'. [ 556.417902][ T1014] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 2816 - 0 [ 556.424497][ T1014] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 2816 - 0 [ 556.428330][ T1014] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 2816 - 0 [ 556.450460][ T1112] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 2816 - 0 [ 557.062636][ T30] audit: type=1326 audit(556.450:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.068683][ T30] audit: type=1326 audit(556.460:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.101039][ T30] audit: type=1326 audit(556.490:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.128347][ T30] audit: type=1326 audit(556.520:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.139386][ T30] audit: type=1326 audit(556.530:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.154278][ T30] audit: type=1326 audit(556.530:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.164500][ T30] audit: type=1326 audit(556.520:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.175112][ T30] audit: type=1326 audit(556.550:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.185386][ T30] audit: type=1326 audit(556.550:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.199838][ T30] audit: type=1326 audit(556.550:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.1.242" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 557.387193][ T4096] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.243' sets config #3 [ 562.509054][ T4108] netlink: 8 bytes leftover after parsing attributes in process `syz.0.244'. [ 570.359630][ T4121] IPv6: Can't replace route, no match found [ 571.960209][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 571.994604][ T30] audit: type=1400 audit(571.350:433): avc: denied { write } for pid=4124 comm="syz.0.254" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 572.358154][ T30] audit: type=1400 audit(571.740:434): avc: denied { create } for pid=4126 comm="wg1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 572.395245][ T30] audit: type=1400 audit(571.790:435): avc: denied { write } for pid=4126 comm="wg1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 572.734266][ T30] audit: type=1400 audit(572.120:436): avc: denied { create } for pid=4129 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 572.753228][ T30] audit: type=1400 audit(572.130:437): avc: denied { setopt } for pid=4129 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 573.635818][ T30] audit: type=1400 audit(573.030:438): avc: denied { ioctl } for pid=4129 comm="syz.0.256" path="socket:[6254]" dev="sockfs" ino=6254 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 573.715220][ T30] audit: type=1400 audit(573.100:439): avc: denied { setopt } for pid=4133 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 573.735399][ T30] audit: type=1400 audit(573.130:440): avc: denied { ioctl } for pid=4133 comm="syz.1.258" path="socket:[5529]" dev="sockfs" ino=5529 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 573.795751][ T30] audit: type=1400 audit(573.160:441): avc: denied { write } for pid=4133 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 573.844203][ T4135] IPv4: Oversized IP packet from 127.202.26.0 [ 574.056612][ T30] audit: type=1400 audit(573.450:442): avc: denied { bind } for pid=4129 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 577.186844][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 577.200865][ T30] audit: type=1326 audit(576.580:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.205564][ T30] audit: type=1326 audit(576.590:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.213914][ T30] audit: type=1326 audit(576.590:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.226381][ T30] audit: type=1326 audit(576.620:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.232842][ T30] audit: type=1326 audit(576.620:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.238185][ T30] audit: type=1326 audit(576.620:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.244124][ T30] audit: type=1326 audit(576.620:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.248850][ T30] audit: type=1326 audit(576.630:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.250764][ T30] audit: type=1326 audit(576.630:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 577.254679][ T30] audit: type=1326 audit(576.630:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.265" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 578.268570][ T4153] netlink: 148 bytes leftover after parsing attributes in process `syz.1.267'. [ 582.964938][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 582.967473][ T30] audit: type=1400 audit(582.350:462): avc: denied { ioctl } for pid=4176 comm="syz.0.276" path="socket:[5596]" dev="sockfs" ino=5596 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 583.098903][ T30] audit: type=1400 audit(582.490:463): avc: denied { setopt } for pid=4176 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 583.783331][ T4183] netlink: 16 bytes leftover after parsing attributes in process `syz.0.276'. [ 583.948266][ T4179] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.863939][ T4183] gtp0: entered promiscuous mode [ 585.345926][ T4179] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.674077][ T4179] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.130280][ T4179] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.088257][ T1014] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.285465][ T1014] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.593702][ T1602] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.814449][ T1602] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.856864][ T30] audit: type=1326 audit(587.250:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 587.880795][ T30] audit: type=1326 audit(587.270:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 587.896153][ T30] audit: type=1326 audit(587.290:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=84 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 587.914121][ T30] audit: type=1326 audit(587.300:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 587.918523][ T30] audit: type=1326 audit(587.300:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 587.980209][ T30] audit: type=1326 audit(587.370:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.016551][ T30] audit: type=1326 audit(587.380:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.024074][ T30] audit: type=1326 audit(587.410:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=429 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.040747][ T30] audit: type=1326 audit(587.430:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.064865][ T30] audit: type=1326 audit(587.450:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=291 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.076705][ T30] audit: type=1326 audit(587.470:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 588.083096][ T30] audit: type=1326 audit(587.470:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.1.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa3b5c3e8 code=0x7ffc0000 [ 589.510530][ T30] audit: type=1400 audit(588.900:476): avc: denied { create } for pid=4205 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 589.525740][ T30] audit: type=1400 audit(588.920:477): avc: denied { ioctl } for pid=4205 comm="syz.0.286" path="socket:[6458]" dev="sockfs" ino=6458 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 589.933233][ T30] audit: type=1326 audit(589.310:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4207 comm="syz.0.287" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 593.190563][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 593.212794][ T30] audit: type=1400 audit(592.580:487): avc: denied { read write } for pid=4223 comm="syz.0.294" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 593.213842][ T30] audit: type=1400 audit(592.580:488): avc: denied { open } for pid=4223 comm="syz.0.294" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 593.628445][ T30] audit: type=1400 audit(593.020:489): avc: denied { create } for pid=4226 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 593.710254][ T30] audit: type=1400 audit(593.100:490): avc: denied { create } for pid=4226 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 593.755176][ T30] audit: type=1400 audit(593.140:491): avc: denied { bind } for pid=4226 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 593.766864][ T4227] RDS: rds_bind could not find a transport for ::ffff:172.20.20.170, load rds_tcp or rds_rdma? [ 593.804397][ T30] audit: type=1400 audit(593.190:492): avc: denied { write } for pid=4226 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 594.476883][ T4231] veth0: entered promiscuous mode [ 594.528388][ T4231] netlink: 4 bytes leftover after parsing attributes in process `syz.1.296'. [ 596.196630][ T30] audit: type=1400 audit(595.590:493): avc: denied { map } for pid=4235 comm="syz.0.299" path="socket:[5704]" dev="sockfs" ino=5704 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 597.285666][ T4242] netlink: 12 bytes leftover after parsing attributes in process `syz.1.302'. [ 597.865399][ T4244] netlink: 12 bytes leftover after parsing attributes in process `syz.1.302'. [ 598.309706][ T4242] netlink: 12 bytes leftover after parsing attributes in process `syz.1.302'. [ 599.085527][ T4244] netlink: 12 bytes leftover after parsing attributes in process `syz.1.302'. [ 602.348513][ T4253] Driver unsupported XDP return value 0 on prog (id 11) dev N/A, expect packet loss! [ 603.107485][ T30] audit: type=1400 audit(602.490:494): avc: denied { bind } for pid=4254 comm=D46731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 603.126033][ T30] audit: type=1400 audit(602.520:495): avc: denied { setopt } for pid=4254 comm=D46731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 611.459761][ T4277] netlink: 14593 bytes leftover after parsing attributes in process `syz.1.312'. [ 612.039551][ T4280] rdma_op 000000003a7addd3 conn xmit_rdma 0000000000000000 [ 613.284293][ T30] audit: type=1400 audit(612.670:496): avc: denied { mount } for pid=4283 comm="syz.1.316" name="/" dev="ramfs" ino=5745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 613.349956][ T30] audit: type=1400 audit(612.740:497): avc: denied { mount } for pid=4283 comm="syz.1.316" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 613.835801][ T4289] wireguard0: entered promiscuous mode [ 613.836834][ T4289] wireguard0: entered allmulticast mode [ 614.699310][ T30] audit: type=1400 audit(614.090:498): avc: denied { create } for pid=4293 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 614.777640][ T30] audit: type=1400 audit(614.170:499): avc: denied { connect } for pid=4293 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 614.796927][ T30] audit: type=1400 audit(614.190:500): avc: denied { ioctl } for pid=4293 comm="syz.1.319" path="socket:[5758]" dev="sockfs" ino=5758 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 614.865230][ T30] audit: type=1400 audit(614.250:501): avc: denied { write } for pid=4293 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 615.551171][ T4301] veth0: entered promiscuous mode [ 615.616300][ T4301] netlink: 4 bytes leftover after parsing attributes in process `syz.0.320'. [ 620.054520][ T4316] netem: incorrect gi model size [ 620.059906][ T4316] netem: change failed [ 625.188259][ T30] audit: type=1400 audit(624.580:502): avc: denied { create } for pid=4342 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 625.267971][ T30] audit: type=1400 audit(624.660:503): avc: denied { name_bind } for pid=4342 comm="syz.1.338" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 627.428614][ T4350] mmap: syz.0.341 (4350) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 631.680841][ T30] audit: type=1400 audit(631.070:504): avc: denied { relabelfrom } for pid=4361 comm="syz.0.347" name="" dev="pipefs" ino=2753 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 631.693305][ T4362] SELinux: Context system_u:object_r:modules_dep_t:s0 is not valid (left unmapped). [ 631.695980][ T30] audit: type=1400 audit(631.080:505): avc: denied { mac_admin } for pid=4361 comm="syz.0.347" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 631.709409][ T30] audit: type=1400 audit(631.090:506): avc: denied { relabelto } for pid=4361 comm="syz.0.347" name="" dev="pipefs" ino=2753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:modules_dep_t:s0" [ 634.299922][ T30] audit: type=1400 audit(633.690:507): avc: denied { setopt } for pid=4371 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 637.378492][ T30] audit: type=1400 audit(636.770:508): avc: denied { setopt } for pid=4386 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 638.459175][ T4391] capability: warning: `syz.1.359' uses 32-bit capabilities (legacy support in use) [ 640.322430][ T30] audit: type=1400 audit(639.710:509): avc: denied { name_bind } for pid=4392 comm="syz.1.360" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 640.367118][ T30] audit: type=1400 audit(639.760:510): avc: denied { mount } for pid=4393 comm="syz.0.361" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 640.387793][ T30] audit: type=1400 audit(639.780:511): avc: denied { write } for pid=4393 comm="syz.0.361" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 640.409374][ T30] audit: type=1400 audit(639.800:512): avc: denied { open } for pid=4393 comm="syz.0.361" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 640.419270][ T30] audit: type=1400 audit(639.810:513): avc: denied { ioctl } for pid=4393 comm="syz.0.361" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 640.573597][ T30] audit: type=1400 audit(639.960:514): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 655.726009][ T30] audit: type=1326 audit(655.120:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 655.729645][ T30] audit: type=1326 audit(655.120:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=36 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 655.738615][ T30] audit: type=1326 audit(655.130:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 655.753088][ T30] audit: type=1326 audit(655.140:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=264 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 655.759035][ T30] audit: type=1326 audit(655.150:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 655.766603][ T30] audit: type=1326 audit(655.160:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4418 comm="syz.0.370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 657.762863][ T30] audit: type=1400 audit(657.140:521): avc: denied { read } for pid=4421 comm="syz.0.371" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 657.763915][ T30] audit: type=1400 audit(657.140:522): avc: denied { open } for pid=4421 comm="syz.0.371" path="net:[4026532709]" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 660.747258][ T30] audit: type=1400 audit(660.140:523): avc: denied { create } for pid=4432 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 664.568762][ T30] audit: type=1400 audit(663.960:524): avc: denied { listen } for pid=4442 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 683.314317][ T30] audit: type=1400 audit(682.710:525): avc: denied { search } for pid=4466 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.317285][ T30] audit: type=1400 audit(682.710:526): avc: denied { search } for pid=4466 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.320089][ T30] audit: type=1400 audit(682.710:527): avc: denied { search } for pid=4466 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=640 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.339550][ T30] audit: type=1400 audit(682.720:528): avc: denied { search } for pid=4466 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=641 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.390726][ T30] audit: type=1400 audit(682.780:529): avc: denied { read open } for pid=4467 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=641 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.396411][ T30] audit: type=1400 audit(682.790:530): avc: denied { getattr } for pid=4467 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=641 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.488104][ T30] audit: type=1400 audit(682.880:531): avc: denied { add_name } for pid=4466 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 683.494600][ T30] audit: type=1400 audit(682.890:532): avc: denied { create } for pid=4466 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 683.500014][ T30] audit: type=1400 audit(682.890:533): avc: denied { write open } for pid=4466 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1576 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 683.519038][ T30] audit: type=1400 audit(682.910:534): avc: denied { append } for pid=4466 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1576 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 689.526418][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 689.534217][ T30] audit: type=1326 audit(688.920:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4480 comm="syz.0.391" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 689.564084][ T30] audit: type=1326 audit(688.950:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4480 comm="syz.0.391" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 689.592462][ T30] audit: type=1326 audit(688.980:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4480 comm="syz.0.391" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 689.636546][ T30] audit: type=1326 audit(689.030:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4480 comm="syz.0.391" exe="/syz-executor" sig=0 arch=c00000b7 syscall=451 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 689.637065][ T30] audit: type=1326 audit(689.030:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4480 comm="syz.0.391" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 696.587240][ T30] audit: type=1400 audit(695.780:547): avc: denied { mount } for pid=4494 comm="syz.0.395" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 698.859973][ T4472] lo speed is unknown, defaulting to 1000 [ 700.385205][ T1602] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 2816 - 0 [ 700.388381][ T1602] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 700.964897][ T1602] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 2816 - 0 [ 700.967358][ T1602] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 701.810262][ T1602] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 2816 - 0 [ 701.824061][ T1602] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 702.251019][ T1602] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 2816 - 0 [ 702.259279][ T1602] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 704.964404][ T30] audit: type=1400 audit(704.350:548): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 706.887504][ T30] audit: type=1400 audit(706.280:549): avc: denied { bind } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 706.908427][ T30] audit: type=1400 audit(706.300:550): avc: denied { listen } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 706.928416][ T30] audit: type=1400 audit(706.320:551): avc: denied { connect } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 706.964932][ T30] audit: type=1400 audit(706.360:552): avc: denied { write } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 706.984672][ T30] audit: type=1400 audit(706.380:553): avc: denied { accept } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 706.995735][ T30] audit: type=1400 audit(706.390:554): avc: denied { read } for pid=4507 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 707.439881][ T30] audit: type=1326 audit(706.830:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.0.398" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 707.449444][ T30] audit: type=1326 audit(706.840:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.0.398" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 707.465764][ T30] audit: type=1326 audit(706.840:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.0.398" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 709.346881][ T1602] dvmrp8 (unregistering): left allmulticast mode [ 709.732970][ T1602] bond0 (unregistering): Released all slaves [ 715.013105][ T1602] hsr_slave_0: left promiscuous mode [ 715.055661][ T1602] hsr_slave_1: left promiscuous mode [ 715.368781][ T1602] veth1_macvtap: left promiscuous mode [ 715.376135][ T1602] veth0_macvtap: left promiscuous mode [ 715.379221][ T1602] veth1_vlan: left promiscuous mode [ 715.385305][ T1602] veth0_vlan: left promiscuous mode [ 719.848322][ T1116] smc: removing ib device !yz! [ 723.063821][ T10] lo speed is unknown, defaulting to 1000 [ 723.065815][ T10] infiniband syz2: ib_query_port failed (-19) [ 728.873497][ T4472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 728.948870][ T4472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 734.967110][ T4472] hsr_slave_0: entered promiscuous mode [ 734.980400][ T4472] hsr_slave_1: entered promiscuous mode [ 737.070138][ T4472] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 737.119228][ T4472] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 737.165224][ T4472] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 737.266808][ T4472] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 740.185671][ T4472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 753.648558][ T4472] veth0_vlan: entered promiscuous mode [ 753.819185][ T4472] veth1_vlan: entered promiscuous mode [ 754.398230][ T4472] veth0_macvtap: entered promiscuous mode [ 754.497049][ T4472] veth1_macvtap: entered promiscuous mode [ 755.239212][ T1112] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 755.240147][ T1112] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 755.244019][ T1112] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 755.244333][ T1112] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 755.863847][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 755.877198][ T30] audit: type=1400 audit(755.250:568): avc: denied { mounton } for pid=4472 comm="syz-executor" path="/syzkaller.si4Uc1/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 755.975991][ T30] audit: type=1400 audit(755.370:569): avc: denied { mounton } for pid=4472 comm="syz-executor" path="/syzkaller.si4Uc1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 755.984649][ T30] audit: type=1400 audit(755.380:570): avc: denied { mounton } for pid=4472 comm="syz-executor" path="/syzkaller.si4Uc1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 756.021085][ T30] audit: type=1400 audit(755.410:571): avc: denied { unmount } for pid=4472 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 756.050111][ T30] audit: type=1400 audit(755.440:572): avc: denied { mounton } for pid=4472 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 756.051167][ T30] audit: type=1400 audit(755.440:573): avc: denied { mount } for pid=4472 comm="syz-executor" name="/" dev="gadgetfs" ino=3664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 756.104967][ T30] audit: type=1400 audit(755.500:574): avc: denied { mount } for pid=4472 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 756.118755][ T30] audit: type=1400 audit(755.510:575): avc: denied { mounton } for pid=4472 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 756.143353][ T30] audit: type=1400 audit(755.520:576): avc: denied { mount } for pid=4472 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 757.558840][ T30] audit: type=1400 audit(756.950:577): avc: denied { write } for pid=4642 comm="syz.0.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 763.468332][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 763.479115][ T30] audit: type=1400 audit(762.860:579): avc: denied { execute } for pid=4664 comm="syz.0.408" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=7586 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 768.256182][ T30] audit: type=1326 audit(767.640:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.2.413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 768.284732][ T30] audit: type=1326 audit(767.650:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.2.413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=226 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 768.358658][ T30] audit: type=1326 audit(767.750:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.2.413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 768.503444][ T30] audit: type=1326 audit(767.880:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4682 comm="syz.2.413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 775.875076][ T30] audit: type=1400 audit(775.250:584): avc: denied { ioctl } for pid=4700 comm="syz.2.420" path="socket:[8495]" dev="sockfs" ino=8495 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 778.749311][ T30] audit: type=1400 audit(778.140:585): avc: granted { setsecparam } for pid=4713 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 785.294890][ T30] audit: type=1400 audit(784.680:586): avc: denied { load_policy } for pid=4736 comm="syz.2.434" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 787.522870][ T4742] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.436'. [ 787.527143][ T4738] SELinux: failed to load policy [ 792.869658][ T30] audit: type=1400 audit(792.260:587): avc: denied { read } for pid=4757 comm="syz.2.442" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 792.896429][ T30] audit: type=1400 audit(792.270:588): avc: denied { open } for pid=4757 comm="syz.2.442" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 794.900163][ T30] audit: type=1326 audit(794.290:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 794.938554][ T30] audit: type=1326 audit(794.330:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 794.950771][ T30] audit: type=1326 audit(794.340:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 794.996952][ T30] audit: type=1326 audit(794.390:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 795.018667][ T30] audit: type=1326 audit(794.410:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 795.113364][ T30] audit: type=1326 audit(794.500:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 795.159820][ T30] audit: type=1326 audit(794.540:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 795.188380][ T30] audit: type=1326 audit(794.580:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4765 comm="syz.0.445" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 798.164055][ T4780] netlink: 28 bytes leftover after parsing attributes in process `syz.2.452'. [ 798.615607][ T4782] binfmt_misc: register: failed to install interpreter file ./file2 [ 800.923546][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 800.928499][ T30] audit: type=1326 audit(800.310:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 800.963925][ T30] audit: type=1326 audit(800.340:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 800.966768][ T30] audit: type=1326 audit(800.350:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 800.999136][ T30] audit: type=1326 audit(800.390:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.044091][ T30] audit: type=1326 audit(800.430:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.095918][ T30] audit: type=1326 audit(800.440:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.170016][ T30] audit: type=1326 audit(800.490:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.176216][ T30] audit: type=1326 audit(800.570:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.194842][ T30] audit: type=1326 audit(800.590:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 801.213071][ T30] audit: type=1326 audit(800.600:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4791 comm="syz.2.458" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 811.135313][ T4824] netlink: 'syz.2.471': attribute type 4 has an invalid length. [ 811.136096][ T4824] netlink: 3657 bytes leftover after parsing attributes in process `syz.2.471'. [ 811.634417][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 811.639403][ T30] audit: type=1400 audit(811.020:630): avc: denied { write } for pid=4825 comm="syz.0.470" name="fib_trie" dev="proc" ino=4026532722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 812.314987][ T30] audit: type=1400 audit(811.700:631): avc: denied { read } for pid=4827 comm="syz.2.472" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 812.334980][ T30] audit: type=1400 audit(811.730:632): avc: denied { open } for pid=4827 comm="syz.2.472" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 812.395327][ T30] audit: type=1400 audit(811.760:633): avc: denied { ioctl } for pid=4827 comm="syz.2.472" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 812.975682][ T4830] netlink: 8 bytes leftover after parsing attributes in process `syz.0.473'. [ 812.977230][ T4830] bond0: Unable to set down delay as MII monitoring is disabled [ 813.605733][ T4832] netlink: 12 bytes leftover after parsing attributes in process `syz.2.474'. [ 813.609488][ T4832] netlink: 12 bytes leftover after parsing attributes in process `syz.2.474'. [ 813.842905][ T30] audit: type=1326 audit(813.230:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 813.850872][ T30] audit: type=1326 audit(813.240:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 813.876873][ T30] audit: type=1326 audit(813.260:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 813.889757][ T30] audit: type=1326 audit(813.280:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 813.925486][ T30] audit: type=1326 audit(813.320:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 813.942026][ T30] audit: type=1326 audit(813.330:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4833 comm="syz.0.475" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 817.635988][ T4846] SELinux: failed to load policy [ 820.931046][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 820.939246][ T30] audit: type=1400 audit(820.320:672): avc: denied { write } for pid=4853 comm="syz.2.484" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 823.176376][ T30] audit: type=1400 audit(822.570:673): avc: denied { bind } for pid=4860 comm="syz.2.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 823.199270][ T4862] netlink: 4 bytes leftover after parsing attributes in process `syz.2.487'. [ 827.089961][ T30] audit: type=1400 audit(826.480:674): avc: denied { execute } for pid=4875 comm="syz.0.493" dev="tmpfs" ino=1037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 827.129731][ T4879] process 'syz.0.493' launched '/dev/fd/6' with NULL argv: empty string added [ 827.208972][ T30] audit: type=1400 audit(826.590:675): avc: denied { execute_no_trans } for pid=4875 comm="syz.0.493" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 843.207718][ T30] audit: type=1400 audit(842.600:676): avc: denied { create } for pid=4907 comm="syz.2.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 845.518533][ T30] audit: type=1400 audit(844.910:677): avc: denied { create } for pid=4911 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 849.207239][ T4921] netlink: 20 bytes leftover after parsing attributes in process `syz.2.510'. [ 850.680228][ T30] audit: type=1326 audit(850.070:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.708129][ T30] audit: type=1326 audit(850.100:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.766062][ T30] audit: type=1326 audit(850.150:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.789475][ T30] audit: type=1326 audit(850.160:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.825696][ T30] audit: type=1326 audit(850.210:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.895124][ T30] audit: type=1326 audit(850.250:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 850.900281][ T30] audit: type=1326 audit(850.290:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 851.004982][ T30] audit: type=1326 audit(850.390:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 851.054469][ T30] audit: type=1326 audit(850.440:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 851.077034][ T30] audit: type=1326 audit(850.470:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.0.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 856.127051][ T4941] netlink: 20 bytes leftover after parsing attributes in process `syz.2.520'. [ 858.510284][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 858.520623][ T30] audit: type=1400 audit(857.900:719): avc: denied { create } for pid=4944 comm="syz.2.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 863.170022][ T4947] netlink: 8 bytes leftover after parsing attributes in process `syz.2.522'. [ 877.233530][ T4955] netlink: 20 bytes leftover after parsing attributes in process `syz.2.525'. [ 890.650669][ T30] audit: type=1400 audit(890.040:720): avc: denied { read } for pid=5002 comm="syz.0.547" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 890.664938][ T30] audit: type=1400 audit(890.050:721): avc: denied { open } for pid=5002 comm="syz.0.547" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 895.155962][ T30] audit: type=1400 audit(894.550:722): avc: denied { setopt } for pid=5018 comm="syz.2.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 896.656507][ T5024] IPv6: Can't replace route, no match found [ 902.742129][ T30] audit: type=1400 audit(902.130:723): avc: denied { read } for pid=5036 comm="syz.0.561" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 907.566564][ T30] audit: type=1400 audit(906.960:724): avc: denied { read } for pid=5051 comm="syz.0.566" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 907.580661][ T30] audit: type=1400 audit(906.970:725): avc: denied { open } for pid=5051 comm="syz.0.566" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 912.779236][ T30] audit: type=1326 audit(912.170:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5067 comm="syz.0.574" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 912.806496][ T30] audit: type=1326 audit(912.200:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5067 comm="syz.0.574" exe="/syz-executor" sig=0 arch=c00000b7 syscall=424 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 912.810589][ T30] audit: type=1326 audit(912.200:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5067 comm="syz.0.574" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 913.047581][ T30] audit: type=1400 audit(912.440:729): avc: denied { connect } for pid=5068 comm="syz.2.573" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 914.296501][ T5074] netlink: 8 bytes leftover after parsing attributes in process `syz.2.576'. [ 921.654013][ T30] audit: type=1400 audit(921.040:730): avc: denied { read write } for pid=5108 comm="syz.0.590" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.695007][ T30] audit: type=1400 audit(921.050:731): avc: denied { open } for pid=5108 comm="syz.0.590" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.710555][ T30] audit: type=1400 audit(921.100:732): avc: denied { ioctl } for pid=5108 comm="syz.0.590" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.244394][ T3468] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 922.425086][ T3468] usb 1-1: device descriptor read/64, error -71 [ 922.724011][ T3468] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 922.894276][ T3468] usb 1-1: device descriptor read/64, error -71 [ 923.007273][ T3468] usb usb1-port1: attempt power cycle [ 923.433223][ T3468] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 923.489773][ T3468] usb 1-1: device descriptor read/8, error -71 [ 923.804293][ T3468] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 923.868924][ T3468] usb 1-1: device descriptor read/8, error -71 [ 923.984076][ T3468] usb usb1-port1: unable to enumerate USB device [ 926.635188][ T30] audit: type=1326 audit(926.020:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 926.663561][ T30] audit: type=1326 audit(926.050:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 926.672449][ T30] audit: type=1326 audit(926.060:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 926.680603][ T30] audit: type=1326 audit(926.070:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 926.692219][ T30] audit: type=1326 audit(926.080:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 926.698339][ T30] audit: type=1326 audit(926.090:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5129 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 934.036607][ T30] audit: type=1326 audit(933.400:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5141 comm="syz.2.604" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x0 [ 934.799524][ T5150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5150 comm=syz.0.606 [ 934.800356][ T5150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5150 comm=syz.0.606 [ 937.657478][ T30] audit: type=1400 audit(937.050:740): avc: denied { watch } for pid=5157 comm="syz.0.610" path="/283" dev="tmpfs" ino=1443 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 938.719740][ T5165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5165 comm=syz.2.613 [ 944.975522][ T5180] netlink: 8 bytes leftover after parsing attributes in process `syz.2.620'. [ 944.980318][ T5180] netlink: 8 bytes leftover after parsing attributes in process `syz.2.620'. [ 945.045248][ T5180] netlink: 52 bytes leftover after parsing attributes in process `syz.2.620'. [ 950.655624][ T30] audit: type=1326 audit(950.040:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.706706][ T30] audit: type=1326 audit(950.100:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.812739][ T30] audit: type=1326 audit(950.200:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.836704][ T30] audit: type=1326 audit(950.230:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.860503][ T30] audit: type=1326 audit(950.250:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.870864][ T30] audit: type=1326 audit(950.260:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.892073][ T30] audit: type=1326 audit(950.280:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.894010][ T30] audit: type=1326 audit(950.290:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.924767][ T30] audit: type=1326 audit(950.320:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 950.933474][ T30] audit: type=1326 audit(950.320:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5194 comm="syz.2.625" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80d5c3e8 code=0x7ffc0000 [ 954.881129][ T5211] syz.2.631 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 956.058670][ T5215] netlink: 'syz.0.632': attribute type 12 has an invalid length. [ 961.070950][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 961.074184][ T30] audit: type=1400 audit(960.450:757): avc: denied { override_creds } for pid=5225 comm="syz.2.638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 973.429175][ T30] audit: type=1326 audit(972.820:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.476414][ T30] audit: type=1326 audit(972.850:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.496599][ T30] audit: type=1326 audit(972.870:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.514739][ T30] audit: type=1326 audit(972.910:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.540498][ T30] audit: type=1326 audit(972.930:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.560892][ T30] audit: type=1326 audit(972.950:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.606419][ T30] audit: type=1326 audit(973.000:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.609175][ T30] audit: type=1326 audit(973.000:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.609370][ T30] audit: type=1326 audit(973.000:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb3d5c3e8 code=0x7ffc0000 [ 973.623439][ T30] audit: type=1326 audit(973.010:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5247 comm="syz.0.649" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffb3d5a7d4 code=0x7ffc0000 [ 990.550591][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 990.559174][ T30] audit: type=1400 audit(989.940:777): avc: denied { nlmsg_read } for pid=5270 comm="syz.2.658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 997.529745][ T30] audit: type=1400 audit(996.920:778): avc: denied { module_load } for pid=5286 comm="syz.2.664" path="/sys/kernel/notes" dev="sysfs" ino=868 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1010.707000][ T30] audit: type=1400 audit(1010.100:779): avc: denied { read write } for pid=5303 comm="syz.2.671" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1010.727213][ T30] audit: type=1400 audit(1010.100:780): avc: denied { open } for pid=5303 comm="syz.2.671" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1012.063692][ T30] audit: type=1400 audit(1011.450:781): avc: denied { create } for pid=5307 comm="syz.2.673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1014.369129][ T30] audit: type=1400 audit(1013.760:782): avc: denied { bind } for pid=5311 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1016.115133][ T5323] netlink: 60 bytes leftover after parsing attributes in process `syz.2.677'. [ 1016.118823][ T5323] netlink: 60 bytes leftover after parsing attributes in process `syz.2.677'. [ 1016.396586][ T1014] ------------[ cut here ]------------ [ 1016.397182][ T1014] WARNING: io_uring/io_uring.c:3026 at io_ring_exit_work+0x26c/0xc60, CPU#1: kworker/u8:5/1014 [ 1016.401196][ T1014] Modules linked in: [ 1016.403062][ T1014] CPU: 1 UID: 0 PID: 1014 Comm: kworker/u8:5 Not tainted syzkaller #0 PREEMPT [ 1016.403657][ T1014] Hardware name: linux,dummy-virt (DT) [ 1016.404342][ T1014] Workqueue: iou_exit io_ring_exit_work [ 1016.405309][ T1014] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1016.406202][ T1014] pc : io_ring_exit_work+0x26c/0xc60 [ 1016.407066][ T1014] lr : io_ring_exit_work+0x250/0xc60 [ 1016.407798][ T1014] sp : ffff80008ef97940 [ 1016.408547][ T1014] x29: ffff80008ef97940 x28: 0000000000000005 x27: ffff800085974480 [ 1016.409774][ T1014] x26: 000000010001179a x25: 1fffe000043a6c00 x24: ffff800087320280 [ 1016.410823][ T1014] x23: dfff800000000000 x22: ffff000021d36040 x21: ffff000021d366d0 [ 1016.411641][ T1014] x20: 0000000000000000 x19: ffff000021d36000 x18: 0000000000000000 [ 1016.412418][ T1014] x17: ffff7fffe2d65000 x16: ffff00006a050504 x15: 0000000000001574 [ 1016.413065][ T1014] x14: 0000000000001570 x13: 0000000000000000 x12: ffff700011df2f17 [ 1016.413695][ T1014] x11: 1ffff00011df2f16 x10: ffff700011df2f16 x9 : dfff800000000000 [ 1016.414525][ T1014] x8 : ffff80008ef978b7 x7 : 0000000000000001 x6 : ffff700011df2f16 [ 1016.415170][ T1014] x5 : ffff80008ef978b0 x4 : ffff700011df2f17 x3 : ffff8000855d2fb0 [ 1016.415821][ T1014] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000010001179b [ 1016.416746][ T1014] Call trace: [ 1016.417386][ T1014] io_ring_exit_work+0x26c/0xc60 (P) [ 1016.418046][ T1014] process_one_work+0x7cc/0x18d4 [ 1016.418506][ T1014] worker_thread+0x734/0xb84 [ 1016.418877][ T1014] kthread+0x348/0x5fc [ 1016.419214][ T1014] ret_from_fork+0x10/0x20 [ 1016.419841][ T1014] irq event stamp: 1270616 [ 1016.420391][ T1014] hardirqs last enabled at (1270615): [] flush_delayed_work+0x30/0xd8 [ 1016.420996][ T1014] hardirqs last disabled at (1270616): [] el1_brk64+0x20/0x54 [ 1016.421894][ T1014] softirqs last enabled at (1270038): [] handle_softirqs+0x88c/0xdb4 [ 1016.422438][ T1014] softirqs last disabled at (1270029): [] __do_softirq+0x14/0x20 [ 1016.423349][ T1014] ---[ end trace 0000000000000000 ]--- [ 1016.515774][ T30] audit: type=1400 audit(1015.910:783): avc: denied { write } for pid=3317 comm="syz-executor" path="pipe:[2726]" dev="pipefs" ino=2726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1017.560956][ T5323] netlink: 60 bytes leftover after parsing attributes in process `syz.2.677'. [ 1017.586901][ T5323] netlink: 60 bytes leftover after parsing attributes in process `syz.2.677'. [ 1020.126688][ T26] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1020.640655][ T26] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1020.946919][ T26] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1021.142541][ T26] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1024.348457][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.424145][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.483108][ T26] bond0 (unregistering): Released all slaves [ 1024.764825][ T26] hsr_slave_0: left promiscuous mode [ 1024.777164][ T26] hsr_slave_1: left promiscuous mode [ 1024.915987][ T26] veth1_macvtap: left promiscuous mode [ 1024.919176][ T26] veth0_macvtap: left promiscuous mode [ 1024.923403][ T26] veth1_vlan: left promiscuous mode [ 1024.926038][ T26] veth0_vlan: left promiscuous mode [ 1033.050212][ T3809] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1033.229639][ T3809] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1033.450926][ T3809] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1033.754998][ T3809] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.440892][ T3809] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1037.515040][ T3809] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1037.600182][ T3809] bond0 (unregistering): Released all slaves [ 1038.022211][ T3809] hsr_slave_0: left promiscuous mode [ 1038.030174][ T3809] hsr_slave_1: left promiscuous mode [ 1038.133213][ T3809] veth1_macvtap: left promiscuous mode [ 1038.135472][ T3809] veth0_macvtap: left promiscuous mode [ 1038.140314][ T3809] veth1_vlan: left promiscuous mode [ 1038.145540][ T3809] veth0_vlan: left promiscuous mode