last executing test programs: 17.319414626s ago: executing program 1 (id=361): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x400000000}, 0x18) r2 = socket(0x10, 0x3, 0x0) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x30, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 17.169032944s ago: executing program 1 (id=362): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) 17.07674548s ago: executing program 1 (id=364): socket$unix(0x1, 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='fdinfo/3\x00') pread64(r0, &(0x7f0000000140)=""/116, 0x74, 0x4) 16.968311236s ago: executing program 1 (id=366): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf6548723c4611f33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r0, 0x0, 0x4}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x8, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) 16.778811866s ago: executing program 1 (id=367): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a44, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f00000000c0), 0x9) sendfile(r2, r1, 0x0, 0x10000) bpf$PROG_LOAD(0x5, 0x0, 0x0) 11.780278161s ago: executing program 0 (id=379): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000ac0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="5953fdfffffffddbdf256b"], 0x5c}}, 0x0) 10.885539422s ago: executing program 0 (id=380): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x7f, 0x7ffc0002}]}) fchmodat(0xffffffffffffffff, 0x0, 0x1a) socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xffffffff]}, 0x0, 0x8) 10.760726349s ago: executing program 0 (id=381): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup, 0xffffffffffffffff, 0x16, 0x4, 0xffffffffffffffff, @void, @value}, 0x20) 10.434440527s ago: executing program 0 (id=382): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r1) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)={0x2c, r2, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x4886) 10.010533061s ago: executing program 0 (id=383): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) setfsgid(0x0) 9.689383369s ago: executing program 0 (id=384): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x800000000000, 0x0, 0x0, 0x751, 0x7, 0x200000000080], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000200000000000000000000000000000000000000000000000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000"]}, 0xe0) 0s ago: executing program 1 (id=385): r0 = syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0x20000000, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000000)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x0, r3, 0x0, &(0x7f0000002080)={0x0, 0xfffffffffffffcc6, 0x0}}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) io_uring_enter(r0, 0x5b43, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 40.946253][ T31] audit: type=1400 audit(40.880:58): avc: denied { read write } for pid=3096 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.947624][ T31] audit: type=1400 audit(40.880:59): avc: denied { open } for pid=3096 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:33298' (ED25519) to the list of known hosts. [ 50.319211][ T31] audit: type=1400 audit(50.250:60): avc: denied { name_bind } for pid=3099 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 51.414827][ T31] audit: type=1400 audit(51.340:61): avc: denied { execute } for pid=3100 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 51.431530][ T31] audit: type=1400 audit(51.360:62): avc: denied { execute_no_trans } for pid=3100 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 53.947024][ T31] audit: type=1400 audit(53.880:63): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 53.954687][ T31] audit: type=1400 audit(53.880:64): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 53.960237][ T3100] cgroup: Unknown subsys name 'net' [ 53.965182][ T31] audit: type=1400 audit(53.900:65): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 54.152299][ T3100] cgroup: Unknown subsys name 'cpuset' [ 54.156944][ T3100] cgroup: Unknown subsys name 'hugetlb' [ 54.157875][ T3100] cgroup: Unknown subsys name 'rlimit' [ 54.413603][ T31] audit: type=1400 audit(54.340:66): avc: denied { setattr } for pid=3100 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.418793][ T31] audit: type=1400 audit(54.350:67): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 54.422370][ T31] audit: type=1400 audit(54.350:68): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 54.577826][ T3102] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 54.582615][ T31] audit: type=1400 audit(54.510:69): avc: denied { relabelto } for pid=3102 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 60.113700][ T3100] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.529930][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 61.530186][ T31] audit: type=1400 audit(61.460:73): avc: denied { execmem } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 61.570758][ T31] audit: type=1400 audit(61.500:74): avc: denied { read } for pid=3105 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.577367][ T31] audit: type=1400 audit(61.510:75): avc: denied { open } for pid=3106 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 61.580953][ T31] audit: type=1400 audit(61.510:76): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 61.595905][ T31] audit: type=1400 audit(61.530:77): avc: denied { module_request } for pid=3106 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 61.639866][ T31] audit: type=1400 audit(61.570:78): avc: denied { sys_module } for pid=3106 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 61.986598][ T31] audit: type=1400 audit(61.920:79): avc: denied { ioctl } for pid=3106 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 62.603299][ T3106] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.607977][ T3106] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.100796][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.113992][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.222297][ T3106] hsr_slave_0: entered promiscuous mode [ 63.225563][ T3106] hsr_slave_1: entered promiscuous mode [ 63.447298][ T31] audit: type=1400 audit(63.370:80): avc: denied { create } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.449382][ T31] audit: type=1400 audit(63.380:81): avc: denied { write } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.451004][ T31] audit: type=1400 audit(63.380:82): avc: denied { read } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 63.456073][ T3106] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 63.462933][ T3106] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 63.467704][ T3106] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 63.471987][ T3106] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 63.802143][ T3105] hsr_slave_0: entered promiscuous mode [ 63.803241][ T3105] hsr_slave_1: entered promiscuous mode [ 63.806214][ T3105] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.806508][ T3105] Cannot create hsr debugfs directory [ 63.876563][ T3106] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.003994][ T3105] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.009943][ T3105] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.016726][ T3105] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.020980][ T3105] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.396405][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.241714][ T3106] veth0_vlan: entered promiscuous mode [ 65.254867][ T3106] veth1_vlan: entered promiscuous mode [ 65.290479][ T3106] veth0_macvtap: entered promiscuous mode [ 65.297117][ T3106] veth1_macvtap: entered promiscuous mode [ 65.328843][ T3106] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.329703][ T3106] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.331213][ T3106] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.332258][ T3106] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.497027][ T3106] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 66.078718][ T3785] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5'. [ 66.080877][ T3785] netlink: 16 bytes leftover after parsing attributes in process `syz.1.5'. [ 66.518402][ T3105] veth0_vlan: entered promiscuous mode [ 66.542182][ T3105] veth1_vlan: entered promiscuous mode [ 66.699366][ T3105] veth0_macvtap: entered promiscuous mode [ 66.719411][ T3105] veth1_macvtap: entered promiscuous mode [ 66.946124][ T3105] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.946601][ T3105] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.946698][ T3105] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.946779][ T3105] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.629235][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 67.629529][ T31] audit: type=1400 audit(67.560:114): avc: denied { create } for pid=3806 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 67.738204][ T31] audit: type=1400 audit(67.670:115): avc: denied { write } for pid=3806 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 68.049653][ T31] audit: type=1326 audit(67.980:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.050121][ T31] audit: type=1326 audit(67.980:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.051664][ T31] audit: type=1326 audit(67.980:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.134913][ T31] audit: type=1326 audit(68.060:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.136053][ T31] audit: type=1326 audit(68.070:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.140040][ T31] audit: type=1326 audit(68.070:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.141478][ T31] audit: type=1326 audit(68.070:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3811 comm="syz.1.12" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 68.143138][ T31] audit: type=1400 audit(68.070:123): avc: denied { create } for pid=3813 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 69.772291][ T3834] netlink: 20 bytes leftover after parsing attributes in process `syz.1.20'. [ 73.045281][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 73.045599][ T31] audit: type=1400 audit(72.980:132): avc: denied { ioctl } for pid=3855 comm="syz.0.27" path="socket:[3235]" dev="sockfs" ino=3235 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.872926][ T31] audit: type=1400 audit(73.800:133): avc: denied { mount } for pid=3866 comm="syz.0.30" name="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 73.882844][ T31] audit: type=1400 audit(73.810:134): avc: denied { search } for pid=3866 comm="syz.0.30" name="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 73.906281][ T31] audit: type=1400 audit(73.830:135): avc: denied { mounton } for pid=3866 comm="syz.0.30" path="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 73.906588][ T31] audit: type=1400 audit(73.840:136): avc: denied { mount } for pid=3866 comm="syz.0.30" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 74.039054][ T31] audit: type=1400 audit(73.960:137): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 74.039311][ T31] audit: type=1400 audit(73.970:138): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 74.068062][ T31] audit: type=1400 audit(73.970:139): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 74.317294][ T3874] netlink: 48 bytes leftover after parsing attributes in process `syz.1.31'. [ 74.317835][ T3874] netlink: 48 bytes leftover after parsing attributes in process `syz.1.31'. [ 75.186756][ T3887] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 75.206693][ T31] audit: type=1400 audit(75.120:140): avc: denied { setopt } for pid=3885 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 75.763809][ T31] audit: type=1400 audit(75.690:141): avc: denied { create } for pid=3892 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 78.614864][ T3899] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 78.621094][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 78.621482][ T31] audit: type=1400 audit(78.550:143): avc: denied { ioctl } for pid=3898 comm="syz.0.41" path="socket:[2268]" dev="sockfs" ino=2268 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 79.121820][ T3902] Zero length message leads to an empty skb [ 79.139699][ T31] audit: type=1400 audit(79.070:144): avc: denied { allowed } for pid=3898 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 79.150476][ T31] audit: type=1400 audit(79.080:145): avc: denied { create } for pid=3898 comm="syz.0.41" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 79.152231][ T31] audit: type=1400 audit(79.080:146): avc: denied { map } for pid=3898 comm="syz.0.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 79.158350][ T31] audit: type=1400 audit(79.090:147): avc: denied { read write } for pid=3898 comm="syz.0.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 81.824977][ T31] audit: type=1326 audit(81.760:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 81.825314][ T31] audit: type=1326 audit(81.760:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 81.843884][ T31] audit: type=1326 audit(81.770:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 81.862452][ T31] audit: type=1326 audit(81.790:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 81.873814][ T31] audit: type=1326 audit(81.800:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 83.890445][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 83.904506][ T31] audit: type=1400 audit(83.810:200): avc: denied { mount } for pid=3944 comm="syz.0.53" name="/" dev="ramfs" ino=3343 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 83.930339][ T31] audit: type=1326 audit(83.860:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3944 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 83.937702][ T31] audit: type=1326 audit(83.870:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3944 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=432 compat=0 ip=0x131f30 code=0x7ffc0000 [ 83.941305][ T31] audit: type=1326 audit(83.870:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3944 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 83.944764][ T31] audit: type=1326 audit(83.870:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3944 comm="syz.0.53" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 85.120606][ T31] audit: type=1400 audit(85.050:205): avc: denied { getopt } for pid=3959 comm="syz.0.56" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 85.473371][ T3964] capability: warning: `syz.0.57' uses 32-bit capabilities (legacy support in use) [ 86.815293][ C1] hrtimer: interrupt took 19867120 ns [ 86.920838][ T31] audit: type=1400 audit(86.850:206): avc: denied { ioctl } for pid=3965 comm="syz.0.58" path="socket:[2324]" dev="sockfs" ino=2324 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.926102][ T3966] netlink: 4 bytes leftover after parsing attributes in process `syz.0.58'. [ 89.934751][ T31] audit: type=1400 audit(89.860:207): avc: denied { create } for pid=3975 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.038610][ T31] audit: type=1400 audit(89.970:208): avc: denied { getopt } for pid=3975 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.040480][ T31] audit: type=1400 audit(89.970:209): avc: denied { connect } for pid=3975 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.045563][ T31] audit: type=1400 audit(89.970:210): avc: denied { name_connect } for pid=3975 comm="syz.0.62" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 92.327875][ T31] audit: type=1400 audit(92.260:211): avc: denied { create } for pid=3988 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.331241][ T31] audit: type=1400 audit(92.260:212): avc: denied { setopt } for pid=3988 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.338802][ T31] audit: type=1400 audit(92.270:213): avc: denied { connect } for pid=3988 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 93.457196][ T31] audit: type=1400 audit(93.390:214): avc: denied { name_bind } for pid=3992 comm="syz.0.69" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 93.464709][ T31] audit: type=1400 audit(93.390:215): avc: denied { node_bind } for pid=3992 comm="syz.0.69" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 94.024723][ T31] audit: type=1400 audit(93.950:216): avc: denied { setopt } for pid=3996 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 95.522126][ T4031] Illegal XDP return value 4294967294 on prog (id 58) dev N/A, expect packet loss! [ 96.422738][ T4042] smc: net device bond0 applied user defined pnetid SYZ2 [ 96.433015][ T4042] smc: net device bond0 erased user defined pnetid SYZ2 [ 96.610472][ T4049] netem: change failed [ 97.076159][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 97.076570][ T31] audit: type=1400 audit(96.960:219): avc: denied { shutdown } for pid=4054 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 97.843690][ T31] audit: type=1400 audit(97.770:220): avc: denied { bind } for pid=4069 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.886844][ T31] audit: type=1400 audit(97.820:221): avc: denied { name_bind } for pid=4069 comm="syz.0.97" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 97.887021][ T31] audit: type=1400 audit(97.820:222): avc: denied { node_bind } for pid=4069 comm="syz.0.97" saddr=127.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 97.941803][ T31] audit: type=1400 audit(97.870:223): avc: denied { read } for pid=4069 comm="syz.0.97" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.947365][ T31] audit: type=1326 audit(97.880:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4071 comm="syz.1.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 97.947593][ T31] audit: type=1326 audit(97.880:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4071 comm="syz.1.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 97.956303][ T31] audit: type=1326 audit(97.890:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4071 comm="syz.1.98" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 97.958544][ T31] audit: type=1326 audit(97.890:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4071 comm="syz.1.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 97.984578][ T31] audit: type=1326 audit(97.910:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4071 comm="syz.1.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 98.237910][ T4081] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 99.409687][ T4095] netlink: 12 bytes leftover after parsing attributes in process `syz.1.106'. [ 99.424912][ T4095] netlink: 16 bytes leftover after parsing attributes in process `syz.1.106'. [ 100.016948][ T4110] can0: slcan on ttyS3. [ 100.156062][ T4110] can0 (unregistered): slcan off ttyS3. [ 100.716766][ T4127] syz.1.114 uses obsolete (PF_INET,SOCK_PACKET) [ 102.457032][ T4168] netlink: 8 bytes leftover after parsing attributes in process `syz.1.123'. [ 102.465265][ T4168] netlink: 8 bytes leftover after parsing attributes in process `syz.1.123'. [ 103.775295][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 103.775558][ T31] audit: type=1400 audit(103.710:263): avc: denied { ioctl } for pid=4189 comm="syz.1.131" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 103.794592][ T31] audit: type=1400 audit(103.720:264): avc: denied { read write } for pid=3105 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 103.794929][ T31] audit: type=1400 audit(103.730:265): avc: denied { open } for pid=3105 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 103.807216][ T31] audit: type=1400 audit(103.740:266): avc: denied { ioctl } for pid=3105 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 103.923289][ T31] audit: type=1400 audit(103.850:267): avc: denied { read } for pid=4197 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 103.928422][ T4190] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 103.960222][ T31] audit: type=1400 audit(103.890:268): avc: denied { map_create } for pid=4197 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.965761][ T31] audit: type=1400 audit(103.900:269): avc: denied { bpf } for pid=4197 comm="syz.0.133" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 103.966058][ T31] audit: type=1400 audit(103.900:270): avc: denied { map_read map_write } for pid=4197 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.977966][ T31] audit: type=1400 audit(103.910:271): avc: denied { prog_load } for pid=4197 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.994542][ T31] audit: type=1400 audit(103.920:272): avc: denied { perfmon } for pid=4197 comm="syz.0.133" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.075085][ T4190] usb 2-1: device descriptor read/64, error -71 [ 104.336694][ T4190] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 104.490443][ T4190] usb 2-1: device descriptor read/64, error -71 [ 104.616963][ T4190] usb usb2-port1: attempt power cycle [ 105.014412][ T4190] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 105.074385][ T4190] usb 2-1: device descriptor read/8, error -71 [ 105.358424][ T4190] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 105.429560][ T4190] usb 2-1: device descriptor read/8, error -71 [ 105.541783][ T4190] usb usb2-port1: unable to enumerate USB device [ 112.221884][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 112.226009][ T31] audit: type=1400 audit(112.150:304): avc: denied { open } for pid=4234 comm="syz.0.146" path="/dev/input/event0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 113.094670][ T31] audit: type=1400 audit(113.010:305): avc: denied { read write } for pid=3105 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 113.095494][ T31] audit: type=1400 audit(113.030:306): avc: denied { open } for pid=3105 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 113.096697][ T31] audit: type=1400 audit(113.030:307): avc: denied { ioctl } for pid=3105 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 113.179370][ T31] audit: type=1400 audit(113.110:308): avc: denied { read } for pid=4238 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 113.240810][ T31] audit: type=1400 audit(113.170:309): avc: denied { map_create } for pid=4238 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.242039][ T31] audit: type=1400 audit(113.170:310): avc: denied { map_read map_write } for pid=4238 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.264758][ T31] audit: type=1400 audit(113.200:311): avc: denied { prog_load } for pid=4238 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.265664][ T31] audit: type=1400 audit(113.200:312): avc: denied { bpf } for pid=4238 comm="syz.0.148" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.266160][ T31] audit: type=1400 audit(113.200:313): avc: denied { perfmon } for pid=4238 comm="syz.0.148" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.602715][ T4241] netlink: 24 bytes leftover after parsing attributes in process `syz.0.149'. [ 113.860158][ T4248] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 115.022738][ T4273] IPv6: Can't replace route, no match found [ 115.256768][ T4281] netlink: 8 bytes leftover after parsing attributes in process `˜°'. [ 115.258510][ T4281] netlink: 12 bytes leftover after parsing attributes in process `˜°'. [ 115.497944][ T4281] bond1: entered promiscuous mode [ 115.527044][ T4281] bond1: entered allmulticast mode [ 115.528415][ T4281] 8021q: adding VLAN 0 to HW filter on device bond1 [ 116.354899][ T4172] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 116.509036][ T4172] usb 1-1: device descriptor read/64, error -71 [ 116.804179][ T4172] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 117.004704][ T4172] usb 1-1: device descriptor read/64, error -71 [ 117.132864][ T4172] usb usb1-port1: attempt power cycle [ 117.504693][ T4172] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 117.542527][ T4172] usb 1-1: device descriptor read/8, error -71 [ 117.804652][ T4172] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 117.846834][ T4172] usb 1-1: device descriptor read/8, error -71 [ 117.975191][ T4172] usb usb1-port1: unable to enumerate USB device [ 121.075407][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 121.076640][ T31] audit: type=1400 audit(121.010:332): avc: denied { create } for pid=4347 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.080830][ T31] audit: type=1400 audit(121.010:333): avc: denied { setopt } for pid=4347 comm="syz.1.176" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.110410][ T31] audit: type=1400 audit(121.030:334): avc: denied { connect } for pid=4347 comm="syz.1.176" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.127319][ T31] audit: type=1400 audit(121.060:335): avc: denied { write } for pid=4347 comm="syz.1.176" path="socket:[3741]" dev="sockfs" ino=3741 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.404667][ T31] audit: type=1400 audit(121.330:336): avc: denied { read } for pid=4349 comm="syz.1.177" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 121.415594][ T31] audit: type=1400 audit(121.330:337): avc: denied { open } for pid=4349 comm="syz.1.177" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 122.174441][ T31] audit: type=1400 audit(122.100:338): avc: denied { create } for pid=4353 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 122.186739][ T31] audit: type=1400 audit(122.120:339): avc: denied { setopt } for pid=4353 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 122.196350][ T31] audit: type=1400 audit(122.130:340): avc: denied { getopt } for pid=4353 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 122.197424][ T31] audit: type=1400 audit(122.130:341): avc: denied { connect } for pid=4353 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 126.105940][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 126.106476][ T31] audit: type=1400 audit(126.030:349): avc: denied { setopt } for pid=4362 comm="syz.1.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 126.362144][ T31] audit: type=1400 audit(126.290:350): avc: denied { allowed } for pid=4367 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 126.366339][ T31] audit: type=1400 audit(126.300:351): avc: denied { create } for pid=4367 comm="syz.1.185" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.408026][ T31] audit: type=1400 audit(126.330:352): avc: denied { map } for pid=4367 comm="syz.1.185" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2813 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.446265][ T31] audit: type=1400 audit(126.360:353): avc: denied { read write } for pid=4367 comm="syz.1.185" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2813 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 126.871719][ T4372] syz.0.186: attempt to access beyond end of device [ 126.871719][ T4372] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 127.524626][ T31] audit: type=1400 audit(127.450:354): avc: denied { ioctl } for pid=4377 comm="syz.0.189" path="socket:[2838]" dev="sockfs" ino=2838 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.535134][ T31] audit: type=1400 audit(127.470:355): avc: denied { bind } for pid=4377 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.542266][ T31] audit: type=1400 audit(127.470:356): avc: denied { write } for pid=4377 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.564878][ T4378] netlink: 4 bytes leftover after parsing attributes in process `syz.0.189'. [ 130.652980][ T31] audit: type=1400 audit(130.580:357): avc: denied { bind } for pid=4387 comm="syz.0.193" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.653262][ T31] audit: type=1400 audit(130.580:358): avc: denied { node_bind } for pid=4387 comm="syz.0.193" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 131.299579][ T31] audit: type=1400 audit(131.230:359): avc: denied { ioctl } for pid=4393 comm="syz.0.196" path="socket:[2863]" dev="sockfs" ino=2863 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.495268][ T4396] netlink: 20 bytes leftover after parsing attributes in process `syz.0.197'. [ 131.827338][ T31] audit: type=1400 audit(131.760:360): avc: denied { create } for pid=4397 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.829604][ T31] audit: type=1400 audit(131.760:361): avc: denied { setopt } for pid=4397 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.036903][ T4400] netlink: 28 bytes leftover after parsing attributes in process `syz.0.199'. [ 132.037196][ T4400] netlink: 28 bytes leftover after parsing attributes in process `syz.0.199'. [ 132.632677][ T4405] netlink: 'syz.0.201': attribute type 2 has an invalid length. [ 132.644953][ T4405] netlink: 'syz.0.201': attribute type 1 has an invalid length. [ 133.401413][ T4409] netlink: 8 bytes leftover after parsing attributes in process `syz.0.203'. [ 133.416559][ T4409] netlink: 28 bytes leftover after parsing attributes in process `syz.0.203'. [ 133.705542][ T4415] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 134.015165][ T31] audit: type=1400 audit(133.940:362): avc: denied { write } for pid=4416 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.015692][ T31] audit: type=1400 audit(133.940:363): avc: denied { name_connect } for pid=4416 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 134.687770][ T4448] syz.0.211 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 136.326060][ T31] audit: type=1400 audit(136.250:364): avc: denied { ioctl } for pid=4461 comm="syz.1.218" path="socket:[2924]" dev="sockfs" ino=2924 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.567656][ T31] audit: type=1400 audit(137.500:365): avc: denied { block_suspend } for pid=4469 comm="syz.0.221" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 138.355003][ T31] audit: type=1400 audit(138.240:366): avc: denied { mounton } for pid=4486 comm="syz.1.227" path="/101/file0" dev="tmpfs" ino=530 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 138.355804][ T31] audit: type=1400 audit(138.290:367): avc: denied { mount } for pid=4486 comm="syz.1.227" name="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 138.357067][ T31] audit: type=1400 audit(138.290:368): avc: denied { create } for pid=4485 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 138.365291][ T31] audit: type=1400 audit(138.290:369): avc: denied { connect } for pid=4485 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 138.371480][ T31] audit: type=1400 audit(138.300:370): avc: denied { search } for pid=4486 comm="syz.1.227" name="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 138.372412][ T31] audit: type=1400 audit(138.300:371): avc: denied { write } for pid=4486 comm="syz.1.227" name="/" dev="configfs" ino=1184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 138.386876][ T31] audit: type=1400 audit(138.320:372): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 138.948336][ T4495] IPv6: Can't replace route, no match found [ 138.989517][ T31] audit: type=1326 audit(138.910:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4494 comm="syz.1.231" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 143.480502][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 143.480807][ T31] audit: type=1400 audit(143.410:398): avc: denied { create } for pid=4539 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 143.482344][ T31] audit: type=1400 audit(143.410:399): avc: denied { ioctl } for pid=4539 comm="syz.0.247" path="socket:[3999]" dev="sockfs" ino=3999 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 144.076639][ T31] audit: type=1400 audit(144.010:400): avc: denied { load_policy } for pid=4533 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 144.079125][ T4544] SELinux: failed to load policy [ 144.264703][ T31] audit: type=1400 audit(144.190:401): avc: denied { ioctl } for pid=4533 comm="syz.1.245" path="socket:[3023]" dev="sockfs" ino=3023 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.739955][ T31] audit: type=1326 audit(147.660:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.740304][ T31] audit: type=1326 audit(147.670:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.757987][ T31] audit: type=1326 audit(147.690:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=359 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.768234][ T31] audit: type=1326 audit(147.700:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.768518][ T31] audit: type=1326 audit(147.700:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.777411][ T31] audit: type=1326 audit(147.710:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x131f30 code=0x7ffc0000 [ 148.484691][ T31] kauditd_printk_skb: 151 callbacks suppressed [ 148.485018][ T31] audit: type=1326 audit(148.410:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 148.485196][ T31] audit: type=1326 audit(148.420:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 148.489740][ T31] audit: type=1326 audit(148.420:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=342 compat=0 ip=0x131f30 code=0x7ffc0000 [ 148.514329][ T31] audit: type=1326 audit(148.430:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 148.545691][ T31] audit: type=1326 audit(148.480:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 148.548434][ T31] audit: type=1326 audit(148.480:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 148.551733][ T31] audit: type=1326 audit(148.480:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 148.553327][ T31] audit: type=1326 audit(148.480:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=342 compat=0 ip=0x131f30 code=0x7ffc0000 [ 148.566659][ T31] audit: type=1326 audit(148.500:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d2c code=0x7ffc0000 [ 148.568639][ T31] audit: type=1326 audit(148.500:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4558 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef178 code=0x7ffc0000 [ 152.882666][ T4585] netlink: 4 bytes leftover after parsing attributes in process `syz.1.260'. [ 154.116959][ T31] kauditd_printk_skb: 340 callbacks suppressed [ 154.117234][ T31] audit: type=1400 audit(154.050:909): avc: denied { execute } for pid=4608 comm="syz.1.271" dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 154.135111][ T4609] process 'syz.1.271' launched '/dev/fd/6' with NULL argv: empty string added [ 154.136419][ T31] audit: type=1400 audit(154.070:910): avc: denied { execute_no_trans } for pid=4608 comm="syz.1.271" path=2F6D656D66643A5B0BDB4FAE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 154.250555][ T31] audit: type=1400 audit(154.180:911): avc: denied { wake_alarm } for pid=4613 comm="syz.1.273" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 155.161871][ T4628] netlink: 24 bytes leftover after parsing attributes in process `syz.1.280'. [ 158.214832][ T31] audit: type=1400 audit(158.130:912): avc: denied { ioctl } for pid=4645 comm="syz.1.283" path="socket:[4154]" dev="sockfs" ino=4154 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 158.233835][ T31] audit: type=1400 audit(158.160:913): avc: denied { write } for pid=4645 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 158.318767][ T31] audit: type=1326 audit(158.250:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4647 comm="syz.1.284" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 158.332265][ T31] audit: type=1326 audit(158.260:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4647 comm="syz.1.284" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x131f30 code=0x7ffc0000 [ 158.344494][ T31] audit: type=1326 audit(158.270:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4647 comm="syz.1.284" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 158.344698][ T31] audit: type=1326 audit(158.270:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4647 comm="syz.1.284" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 158.522034][ T31] audit: type=1400 audit(158.450:918): avc: denied { name_bind } for pid=4651 comm="syz.1.286" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 159.298423][ T31] audit: type=1400 audit(159.230:919): avc: denied { validate_trans } for pid=4654 comm="syz.1.287" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 160.595084][ T4659] netlink: 72 bytes leftover after parsing attributes in process `syz.0.289'. [ 160.761192][ T31] audit: type=1400 audit(160.690:920): avc: denied { create } for pid=4661 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 160.864985][ T4663] serio: Serial port ptm0 [ 161.410257][ T31] audit: type=1400 audit(161.340:921): avc: denied { bind } for pid=4661 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 161.411398][ T4663] RDS: rds_bind could not find a transport for ::ffff:10.1.1.1, load rds_tcp or rds_rdma? [ 161.427720][ T31] audit: type=1326 audit(161.360:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.433833][ T31] audit: type=1326 audit(161.360:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.446127][ T31] audit: type=1326 audit(161.380:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.447583][ T31] audit: type=1326 audit(161.380:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.455797][ T31] audit: type=1326 audit(161.390:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.458096][ T31] audit: type=1326 audit(161.390:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.459963][ T31] audit: type=1326 audit(161.390:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4670 comm="syz.0.293" exe="/syz-executor" sig=0 arch=40000028 syscall=317 compat=0 ip=0x131f30 code=0x7ffc0000 [ 161.587805][ T4675] SELinux: Context system_u:object_r:iptables_initrc_exec_t:s0 is not valid (left unmapped). [ 161.625272][ T4677] SELinux: security policydb version 18 (MLS) not backwards compatible [ 161.625608][ T4677] SELinux: failed to load policy [ 161.683095][ T4679] netlink: 16 bytes leftover after parsing attributes in process `syz.0.297'. [ 167.341776][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 167.342202][ T31] audit: type=1400 audit(167.270:1002): avc: denied { name_bind } for pid=4753 comm="syz.1.328" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 167.342413][ T31] audit: type=1400 audit(167.270:1003): avc: denied { node_bind } for pid=4753 comm="syz.1.328" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 168.145369][ T4772] pim6reg1: entered promiscuous mode [ 168.145809][ T4772] pim6reg1: entered allmulticast mode [ 169.353729][ T31] audit: type=1326 audit(169.280:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.356037][ T31] audit: type=1326 audit(169.290:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.362780][ T31] audit: type=1400 audit(169.290:1006): avc: denied { getattr } for pid=4788 comm="syz.1.338" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 169.363400][ T31] audit: type=1326 audit(169.290:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.592126][ T31] audit: type=1326 audit(169.520:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4793 comm="syz.1.339" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.592821][ T31] audit: type=1326 audit(169.520:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4793 comm="syz.1.339" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.609174][ T31] audit: type=1326 audit(169.540:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4793 comm="syz.1.339" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=0 ip=0x131f30 code=0x7ffc0000 [ 169.609712][ T31] audit: type=1326 audit(169.540:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4793 comm="syz.1.339" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 172.576400][ T4818] netem: change failed [ 172.702415][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 172.702672][ T31] audit: type=1400 audit(172.630:1017): avc: denied { create } for pid=4819 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 173.087553][ T31] audit: type=1400 audit(173.010:1018): avc: denied { append } for pid=4827 comm="syz.1.354" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.719121][ T31] audit: type=1326 audit(173.650:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4837 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.737229][ T31] audit: type=1326 audit(173.650:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4837 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.737764][ T31] audit: type=1326 audit(173.670:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4837 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=376 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.751719][ T31] audit: type=1326 audit(173.680:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4837 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.752171][ T31] audit: type=1326 audit(173.680:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4837 comm="syz.0.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.997434][ T4842] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 174.130366][ T31] audit: type=1326 audit(174.060:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.132099][ T31] audit: type=1326 audit(174.060:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.135127][ T31] audit: type=1326 audit(174.070:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4844 comm="syz.1.362" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 178.125213][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 178.125959][ T31] audit: type=1400 audit(178.050:1037): avc: denied { mount } for pid=4878 comm="syz.0.375" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 178.906322][ T4887] ip6gre1: entered allmulticast mode [ 180.440771][ T31] audit: type=1326 audit(180.370:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.442904][ T31] audit: type=1326 audit(180.370:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=333 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.447358][ T31] audit: type=1326 audit(180.370:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.451205][ T31] audit: type=1326 audit(180.370:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.453240][ T31] audit: type=1326 audit(180.370:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.456752][ T31] audit: type=1326 audit(180.380:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.456832][ T31] audit: type=1326 audit(180.380:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.456876][ T31] audit: type=1326 audit(180.380:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x131f30 code=0x7ffc0000 [ 180.456916][ T31] audit: type=1326 audit(180.380:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4896 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 191.508047][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 191.508534][ T31] audit: type=1400 audit(191.440:1048): avc: denied { create } for pid=4913 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 191.546362][ T4914] 8<--- cut here --- [ 191.546884][ T4914] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 191.547059][ T4914] [0000000e] *pgd=85627003, *pmd=e14eb003 [ 191.548510][ T4914] Internal error: Oops: 205 [#1] SMP ARM [ 191.549364][ T4914] Modules linked in: [ 191.550876][ T4914] CPU: 0 UID: 0 PID: 4914 Comm: syz.1.385 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 191.551901][ T4914] Hardware name: ARM-Versatile Express [ 191.552691][ T4914] PC is at io_buffer_select+0x50/0x18c [ 191.553761][ T4914] LR is at xa_load+0x68/0xa4 [ 191.554123][ T4914] pc : [<80889a10>] lr : [<81a4be34>] psr: 20000013 [ 191.554507][ T4914] sp : dfed5e18 ip : dfed5dd8 fp : dfed5e34 [ 191.555470][ T4914] r10: 837c1400 r9 : 00000000 r8 : 80000001 [ 191.556226][ T4914] r7 : dfed5e50 r6 : 00000000 r5 : 84c0d900 r4 : 85261000 [ 191.557358][ T4914] r3 : 00000001 r2 : 00000000 r1 : 855cccc0 r0 : 00000000 [ 191.558405][ T4914] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 191.559617][ T4914] Control: 30c5387d Table: 855cc480 DAC: fffffffd [ 191.560472][ T4914] Register r0 information: NULL pointer [ 191.561219][ T4914] Register r1 information: slab kmalloc-64 start 855cccc0 pointer offset 0 size 64 [ 191.562443][ T4914] Register r2 information: NULL pointer [ 191.562808][ T4914] Register r3 information: non-paged memory [ 191.563201][ T4914] Register r4 information: slab io_kiocb start 85261000 pointer offset 0 size 192 [ 191.563871][ T4914] Register r5 information: slab kmalloc-2k start 84c0d800 pointer offset 256 size 2048 [ 191.564509][ T4914] Register r6 information: NULL pointer [ 191.564851][ T4914] Register r7 information: 2-page vmalloc region starting at 0xdfed4000 allocated at kernel_clone+0xac/0x3e4 [ 191.565682][ T4914] Register r8 information: non-slab/vmalloc memory [ 191.566142][ T4914] Register r9 information: NULL pointer [ 191.566498][ T4914] Register r10 information: slab sock_inode_cache start 837c1400 pointer offset 0 size 576 [ 191.567172][ T4914] Register r11 information: 2-page vmalloc region starting at 0xdfed4000 allocated at kernel_clone+0xac/0x3e4 [ 191.568278][ T4914] Register r12 information: 2-page vmalloc region starting at 0xdfed4000 allocated at kernel_clone+0xac/0x3e4 [ 191.569279][ T4914] Process syz.1.385 (pid: 4914, stack limit = 0xdfed4000) [ 191.570126][ T4914] Stack: (0xdfed5e18 to 0xdfed6000) [ 191.570676][ T4914] 5e00: 85261000 853f5600 [ 191.571427][ T4914] 5e20: 00000000 00000040 dfed5e84 dfed5e38 80892d3c 808899cc 8057abbc 8030cb0c [ 191.571868][ T4914] 5e40: 85261000 00000001 01261000 00000000 00000000 7f4ca74a 80886a40 85261000 [ 191.572298][ T4914] 5e60: 81cf0bd4 00000000 80000001 81cf0b5c 0000000a 8567b000 dfed5ebc dfed5e88 [ 191.572771][ T4914] 5e80: 80886df4 80892b18 00000000 00000000 00000000 84c0d800 8526106c 85261000 [ 191.573190][ T4914] 5ea0: 85a00000 00000000 00000000 8567b000 dfed5f14 dfed5ec0 808877a8 80886b7c [ 191.573694][ T4914] 5ec0: 8088e164 81a4bdd8 dfed5f24 dfed5ed8 00000001 00000001 81cf0b5c 00000001 [ 191.574168][ T4914] 5ee0: 84c0d800 7f4ca74a 846edd80 00000000 84c0d800 00005b43 846edd80 00000000 [ 191.574613][ T4914] 5f00: 8567b000 00000000 dfed5fa4 dfed5f18 80888250 808875a8 ecac8b10 84c0d840 [ 191.575053][ T4914] 5f20: 00000000 00000000 81a4fbb0 81a4fa80 dfed5f54 dfed5f40 8026b438 8029ce1c [ 191.575493][ T4914] 5f40: dfed5fb0 40000000 dfed5f84 dfed5f58 802229dc 8026b3f4 00000000 8281d05c [ 191.575939][ T4914] 5f60: dfed5fb0 0014c490 ecac8b10 80222930 00000000 7f4ca74a dfed5fac 00000000 [ 191.576414][ T4914] 5f80: 00000000 002e630c 000001aa 8020029c 8567b000 000001aa 00000000 dfed5fa8 [ 191.576868][ T4914] 5fa0: 80200060 80888124 00000000 00000000 00000003 00005b43 00000000 00000000 [ 191.577310][ T4914] 5fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76bb40bc [ 191.577812][ T4914] 5fe0: 76bb3ec0 76bb3eb0 0001939c 00131f30 60000010 00000003 00000000 00000000 [ 191.578327][ T4914] Call trace: [ 191.578831][ T4914] [<808899c0>] (io_buffer_select) from [<80892d3c>] (io_recvmsg+0x230/0x420) [ 191.579659][ T4914] r7:00000040 r6:00000000 r5:853f5600 r4:85261000 [ 191.580357][ T4914] [<80892b0c>] (io_recvmsg) from [<80886df4>] (io_issue_sqe+0x284/0x658) [ 191.581572][ T4914] r10:8567b000 r9:0000000a r8:81cf0b5c r7:80000001 r6:00000000 r5:81cf0bd4 [ 191.582182][ T4914] r4:85261000 [ 191.582418][ T4914] [<80886b70>] (io_issue_sqe) from [<808877a8>] (io_submit_sqes+0x20c/0x938) [ 191.582898][ T4914] r10:8567b000 r9:00000000 r8:00000000 r7:85a00000 r6:85261000 r5:8526106c [ 191.583298][ T4914] r4:84c0d800 [ 191.583529][ T4914] [<8088759c>] (io_submit_sqes) from [<80888250>] (sys_io_uring_enter+0x138/0x780) [ 191.584106][ T4914] r10:00000000 r9:8567b000 r8:00000000 r7:846edd80 r6:00005b43 r5:84c0d800 [ 191.584529][ T4914] r4:00000000 [ 191.584765][ T4914] [<80888118>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 191.585299][ T4914] Exception stack(0xdfed5fa8 to 0xdfed5ff0) [ 191.585684][ T4914] 5fa0: 00000000 00000000 00000003 00005b43 00000000 00000000 [ 191.586139][ T4914] 5fc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76bb40bc [ 191.586585][ T4914] 5fe0: 76bb3ec0 76bb3eb0 0001939c 00131f30 [ 191.586921][ T4914] r10:000001aa r9:8567b000 r8:8020029c r7:000001aa r6:002e630c r5:00000000 [ 191.587333][ T4914] r4:00000000 [ 191.587825][ T4914] Code: e3130001 0a00002f e5910000 e1d120be (e1d030be) [ 191.591002][ T4914] ---[ end trace 0000000000000000 ]--- [ 191.645060][ T4914] Kernel panic - not syncing: Fatal exception [ 191.646807][ T4914] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:36:46 Registers: info registers vcpu 0 CPU#0 R00=82b07a90 R01=a0000193 R02=8567b000 R03=00000c55 R04=82b07a88 R05=a0000193 R06=8295b320 R07=00000001 R08=8282a2b8 R09=00000000 R10=00000482 R11=dfed59d4 R12=dfed59d8 R13=dfed59c8 R14=809e2fbc R15=81a5ba8c PSR=60000193 -ZC- A S svc32 s00=65702074 s01=73696d72 d00=73696d7265702074 s02=64617379 s03=20745f6d d01=20745f6d64617379 s04=6e6f6374 s05=74786574 d02=747865746e6f6374 s06=6f6f723d s07=79733a74 d03=79733a746f6f723d s08=6d646173 s09=733a725f d04=733a725f6d646173 s10=64617379 s11=20745f6d d05=20745f6d64617379 s12=616c6374 s13=6e3d7373 d06=6e3d7373616c6374 s14=735f6366 s15=656b636f d07=656b636f735f6366 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82257c34 R02=000da2e9 R03=80239c60 R04=8323e000 R05=00000001 R06=8323e000 R07=8280c650 R08=00000001 R09=00000000 R10=00000000 R11=df865f64 R12=df865f68 R13=df865f58 R14=80228704 R15=80239c68 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000