last executing test programs: 4m2.799606574s ago: executing program 1 (id=797): r0 = memfd_create(&(0x7f0000002140)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x05FY\x1c\x04\x0f\x00\x00\x00\x00\x00\x00z[\xc4\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xee9\xdd\x87\xf1\xc5\xa81\xd4\xfb\x8a8t\xd0\v\xe6\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\x8fu\x0fjuX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06D\x83\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xe6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\xf8?=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\t\x00\x00\x00\x00\x00\x00\x00\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x02\xeb6\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x1f\x17\x11$\x88g\xb4\xad\xe5\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc0_\xfe7\xd0=5&_\x86m\x8d\x12\x96\xc8\x91\x1dD\x02\x13\xf6r\xa4L\xd3\x93\x8d\x05\x85P\x93\xa9\xc0\xda\x9b\xb9\xafZ\xd7W\xcb\xd7\x1fZq\x86%\x9a\rcb\x96\xfeI\t\x9c\a\xcc+\x9d\n\x18k9\x16y\xf0\xf1\xad\xb4\xdeOR-\x89\xc6%\x06\x05zB\xcc\xe1\xa1\x11P\xd2u\'o\xee\xc3|\xb4\xe3\xc8]\x11\x7f\x17\x8dS\xb4\xd1\x1a\fjF\xab\xcf\"y\f\x85\xb0s\xc8\xec\xa6Y\xe22\x9c_}\aq\xec\xc4\x124\x9e`\xf5\xd1~\xd6x\xa9\x95\v\xac\xea\x0f^\xa3\xc3:\xd6fC\xfc\xf0\xb6\x8c\xf7cF\x9a\x97\x83GMJ\xf2A\x0e\xecrg\xf6\xc039\xb8\b\x85\x9fu\x84Am\xc67\xae\xee\xce-E@4\n\xab9rB\xed\xf7\x86\'\xb3\x04\f\xb5\xc3\x82\xd9WO\xe2\x92\xf9\xb5\x93\xe67\xb1\xc8x\xa3\xf6fs\x88\x81\x80\x1ck\"\xe4\xc3A\xee\xec\x8ea+\xcbFEm\"\xf1\x19/\x1f\x8e\xe2C\xb3\v(\x16\xc8bI\n\x95|\xb8.\x05\x80\xbeu=4\x95\xb9\xa1\x06\x16\xd8.\xd5\xa0\xc5\x7f\x97\xed05\x18\x0f\xf4\f\xcf\x1f\x8b\xa1\xb1<\xe7G\xc6\xb1%\xef\x94\x9e\x1f\x1d\xb4 b\xe8p\xd7c\xb0i\xa0\x19k\xe3\xce\x93\xd9\x03\x95L4\"1\x80\x05\xe3\x03\xfb\x81\xcc\xe6Du\x06\xe6wX0\x16\xc5_=\xe7&\x8eU\xdf\xb0OZ\x02\x19Y\x13\x16:\a\x89PI\x98\xd9\xffxh6\x13\x1co1_F\x02\x9d\xc9\xe4E\xb7\x1a\xa2&H\xef\x06\x89v\x85\xfek*\x91W\x01\x00\x00\x00\x00\x00\x00\x00\x0fX\x139o\x83\xbe\xdb\xa55D\xcbt\xb4y%\xe6j\xeb\xe7H\xe1\xe2\x9c\x7f5a\xb1&\x88\x9c\x98\\{\x8d\xbb\x92\xfa\x96j\xf4T\xd2d-\xf8dIz\x1f\x0eZ\xb5\x120A\xb8\x0f\ne\x19^\xccz\x11\xca\f\xda\x89\x8fuS(G&\xe2\xd0ky\xe7n\xc7\xfcz\x84U\xc1\xf0\xe0\xc5\xbf\xb1\xfa\xd4\xe5)\xad\xcbp\xce\x8b\xddq\xb8E\xe6+\xd2\xea\f\x16\xe1\xc2\xdaN\xce\b\xe21X\xee\x80n\x10\xfd\x03_L=@\xddR\xb5\xa5\"\xcb\xdf\xc5\xd8\n,Go\xa6u\xe0\v\x86\x9da\xda\x11\xd5>\xfea\xa1|\xe5\x7f\xab\x94\xec\x87\x11:$\xf2\x9a\x99', 0x0) write$binfmt_misc(r0, &(0x7f0000000180)="e502", 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 4m1.957939258s ago: executing program 1 (id=799): r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@dev={0xfe, 0x80, '\x00', 0x40}, @remote, @remote, 0x3, 0x2, 0x0, 0x400, 0xb7, 0xc20022}) 4m1.368185548s ago: executing program 1 (id=802): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x3, 0x2ffffffff}, 0xc) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) flock(0xffffffffffffffff, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000100)=0x1800, 0x4) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r1}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 3m58.388257514s ago: executing program 1 (id=804): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0/../file0\x00', 0x0, 0x2125099, 0x0) mount$cgroup2(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000000), 0x81, 0x0) 3m57.606702015s ago: executing program 1 (id=805): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x8, 0x0, 0x0, 0xf, 0x0, 0x10005}]}, {0x0, [0x30, 0x0, 0x0, 0xcf, 0x0, 0x0, 0x0]}}, 0x0, 0x2d, 0x0, 0x6}, 0x28) 3m54.675028129s ago: executing program 1 (id=809): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) linkat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x400) 3m54.658821279s ago: executing program 32 (id=809): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) linkat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x400) 10.98789904s ago: executing program 0 (id=1027): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="fbe6bd8dfcdda5a210b8cfefbd66f459c7261b927d25d3cf74d2f7c97735eba47f606a290d184925922333211d168ab0f6e1081fdbd921ed4db0e67c9d5ab1452445a1e0da5ac68b13f4afe2712eeaad35ef06", 0x53}], 0x1, 0x0, 0x3298}, 0x0) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r3, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r4}, 0x10) close(0x3) 9.746000264s ago: executing program 0 (id=1028): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="e5f1fddfe175759743a2d6055bef6ad67f4806ff6ac3a93555c1b5b84294df29b09e92680ca8bd3dc842c3147716237f0ad0c3ab59f41083aeb894e76f3c7fc753f2fca40d24553fdd9396171c35ecfd0932f37aa306040bd37f78526b319e572be0ae8b40f01b3835c385e789683bed9c65ccd19545b738fb470ef7c7247c631882fe3cee1ad627ad729a685446e0c1b6ca16a98bececc6ed604084f0de672a6143", 0xa2}, {&(0x7f0000001840)="fa4930e2f7feb52241e739006ef78c0aeb4dd989f1bf69e01e4eb4bb743569e49e3db4ab502ed6980a5794e38f83ba0c77252adc9d177719cb1f7991ee501ad1ff9d69f88d4bb7a70b76402fd5b363", 0x4f}], 0x2}, 0x20000044) 8.715308408s ago: executing program 0 (id=1029): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r3, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) 4.378355733s ago: executing program 2 (id=1033): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="e5f1fddfe175759743a2d6055bef6ad67f4806ff6ac3a93555c1b5b84294df29b09e92680ca8bd3dc842c3147716237f0ad0c3ab59f41083aeb894e76f3c7fc753f2fca40d24553fdd9396171c35ecfd0932f37aa306040bd37f78526b319e572be0ae8b40f01b3835c385e789683bed9c65ccd19545b738fb470ef7c7247c631882fe3cee1ad627ad729a685446e0c1b6ca16a98bececc6ed604084f0de672a6143", 0xa2}, {&(0x7f0000001840)="fa4930e2f7feb52241e739006ef78c0aeb4dd989f1bf69e01e4eb4bb743569e49e3db4ab502ed6980a5794e38f83ba0c77252adc9d177719cb1f7991ee501ad1ff9d69f88d4bb7a70b76402fd5b363", 0x4f}, {0x0}], 0x3}, 0x20000044) 3.628218302s ago: executing program 2 (id=1034): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f00000001c0)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0xfffffffd, @loopback, 0x6324}, 0x1c) sendto$inet6(r2, 0x0, 0x2, 0x0, 0x0, 0x0) 3.107519979s ago: executing program 0 (id=1035): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4c001}, 0x4004110) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101804bc9555e1affd5020000000900010001797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000000009000300737975320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x480d5}, 0x0) 2.680172461s ago: executing program 2 (id=1036): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000021c0), 0x181000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x0, 0x100c40, 0x5, 0x6, 0x2, 0x40, 0x3, 0x0, 0x1, 0x5}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0xc0a85320, &(0x7f0000000340)={{0x80}, 'port0\x00', 0x24, 0x1b1878, 0x4, 0x2, 0x3e4, 0x0, 0x4, 0x0, 0x4, 0x3}) close(r2) 2.089749581s ago: executing program 0 (id=1037): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400000bb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000005c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r2}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000010900010073797a310000000048000000030a0101000000000000000001000000090003001e007a3200000000080007006e6174000900010073797a310000000014000480080002407c40280f080001400000000028000000000a05000000000000000000010000080900010073797a3100000000080002400000000114"], 0xb8}, 0x1, 0x0, 0x0, 0x20004000}, 0x20040000) 1.805967806s ago: executing program 2 (id=1038): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b005000000000000290000003600000000b2"], 0x5b0}, 0x20008001) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000600)="e5f1fddfe175759743a2d6055bef6ad67f4806ff6ac3a93555c1b5b84294df29b09e92680ca8bd3dc842c3147716237f0ad0c3ab59f41083aeb894e76f3c7fc753f2fca40d24553fdd9396171c35ecfd0932f37aa306040bd37f78526b319e572be0ae8b40f01b3835c385e789683bed9c65ccd19545b738fb470ef7c7247c631882fe3cee1ad627ad729a685446e0c1b6ca16a98bececc6ed604084f0de672a6143", 0xa2}, {&(0x7f0000001840)="fa4930e2f7feb52241e739006ef78c0aeb4dd989f1bf69e01e4eb4bb743569e49e3db4ab502ed6980a5794e38f83ba0c77252adc9d177719cb1f7991ee501ad1ff9d69f88d4bb7a70b76402fd5b363", 0x4f}, {0x0}], 0x3}, 0x20000044) 1.423091956s ago: executing program 0 (id=1039): bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) 1.081363404s ago: executing program 2 (id=1040): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="12000000040100000800000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1, 0xffffffffffffffff}, &(0x7f0000001d80), &(0x7f0000001d40)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r2, &(0x7f0000000340), 0x0}, 0x20) 0s ago: executing program 2 (id=1041): preadv(0xffffffffffffffff, 0x0, 0x0, 0x145, 0x80000000) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0x200000000}, 0x18) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$selinux_access(r3, &(0x7f0000001a80)=ANY=[@ANYBLOB='system_u:object_r:updpwd_exec_t system_u:sys'], 0x56) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x22020400) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_OPENAT2={0x1c, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000040)={0x12280, 0xa8, 0x4}, 0x0, 0x18, 0x0, 0x23456}) socket(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x4fd, 0x2000, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x8, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) kernel console output (not intermixed with test programs): d=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.030137][ T30] audit: type=1326 audit(645.360:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.034947][ T30] audit: type=1326 audit(645.370:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.040820][ T30] audit: type=1326 audit(645.370:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.052618][ T30] audit: type=1326 audit(645.370:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=160 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.057039][ T30] audit: type=1326 audit(645.380:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4559 comm="syz.1.465" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.573035][ T30] audit: type=1326 audit(645.890:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4563 comm="syz.1.466" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 646.637604][ T30] audit: type=1326 audit(645.970:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4563 comm="syz.1.466" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 649.592999][ T4579] netlink: 4 bytes leftover after parsing attributes in process `syz.1.470'. [ 649.716792][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.717860][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.719036][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.719340][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.720036][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.720274][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.720923][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.721908][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.722601][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.722848][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.723490][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.723731][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.724351][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.724582][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.725222][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.725490][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.726119][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.726353][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.726995][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.727227][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.729526][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.729664][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.730280][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.730434][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.731060][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.731939][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.732499][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.732607][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.733120][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.733231][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.733893][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.734009][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.734510][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.734626][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.735187][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.735327][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.735909][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.736022][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.736519][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.736634][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.737141][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.737252][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.737795][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.737946][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.738446][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.738557][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.739062][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.739199][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.739739][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.739859][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.740372][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.740482][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.740997][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.742100][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.742660][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.742785][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.743278][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.743390][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.744037][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.744154][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.744643][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.744779][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.745328][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.745481][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.746021][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.746139][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.746682][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.746804][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.747373][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.747486][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.748163][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.748288][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.748831][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.748946][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.749554][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.749679][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.750194][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.750309][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.750837][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.750946][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.752365][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.752491][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.753298][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.753448][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.754031][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.754144][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.754642][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.754764][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.755257][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.755368][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.755893][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.756044][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.756584][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.756753][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.757270][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.757446][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.758016][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.758134][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.758624][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.758740][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.759237][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.759351][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.759863][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.759979][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.760504][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.760646][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.762338][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.762496][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.763050][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.763190][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.763697][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.763813][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.764310][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.764423][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.764957][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.765068][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.765589][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.765782][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.766282][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.766393][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.766890][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.767003][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.767485][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.767598][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.768100][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.768211][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.768724][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.768857][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.769374][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.769568][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.770381][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.770542][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.771947][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.772083][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.772629][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.772754][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.773239][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.773352][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.773919][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.774040][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.774532][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.774643][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.775141][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.775250][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.775739][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.775848][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 649.776350][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 649.776457][ C0] vcan0: j1939_xtp_rx_dat: no rx connection found [ 652.615487][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 652.616752][ T30] audit: type=1400 audit(651.950:380): avc: denied { read write } for pid=4591 comm="syz.0.479" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 652.643470][ T30] audit: type=1400 audit(651.960:381): avc: denied { open } for pid=4591 comm="syz.0.479" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 653.489088][ T30] audit: type=1400 audit(652.810:382): avc: denied { create } for pid=4594 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 653.623874][ T30] audit: type=1400 audit(652.940:383): avc: denied { read write } for pid=4594 comm="syz.1.480" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 653.658719][ T30] audit: type=1400 audit(652.990:384): avc: denied { open } for pid=4594 comm="syz.1.480" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 653.982100][ T30] audit: type=1400 audit(653.280:385): avc: denied { ioctl } for pid=4594 comm="syz.1.480" path="/dev/virtual_nci" dev="devtmpfs" ino=672 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 654.243833][ T30] audit: type=1326 audit(653.570:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4603 comm="syz.0.482" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 654.306242][ T30] audit: type=1326 audit(653.600:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4603 comm="syz.0.482" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 654.307154][ T30] audit: type=1326 audit(653.640:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4603 comm="syz.0.482" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 654.394534][ T30] audit: type=1326 audit(653.720:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4603 comm="syz.0.482" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 656.750216][ T4615] netlink: 8 bytes leftover after parsing attributes in process `syz.0.485'. [ 656.775652][ T4615] netlink: 8 bytes leftover after parsing attributes in process `syz.0.485'. [ 658.416450][ T4621] Failed to initialize the IGMP autojoin socket (err -2) [ 660.147088][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 660.148942][ T30] audit: type=1326 audit(659.480:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.1.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 660.187594][ T30] audit: type=1326 audit(659.520:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.1.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=6 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 660.202728][ T30] audit: type=1326 audit(659.520:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.1.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 661.107185][ T30] audit: type=1400 audit(660.440:403): avc: denied { create } for pid=4634 comm="syz.0.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 667.167269][ T4662] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 669.283177][ T30] audit: type=1400 audit(668.600:404): avc: denied { create } for pid=4666 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 669.506059][ T30] audit: type=1400 audit(668.810:405): avc: denied { sys_admin } for pid=4666 comm="syz.1.507" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 669.707126][ T4668] Failed to initialize the IGMP autojoin socket (err -2) [ 670.905892][ T30] audit: type=1326 audit(670.240:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.923559][ T30] audit: type=1326 audit(670.250:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.928429][ T30] audit: type=1326 audit(670.260:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.930388][ T30] audit: type=1326 audit(670.260:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.955810][ T30] audit: type=1326 audit(670.280:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.966415][ T30] audit: type=1326 audit(670.300:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 670.980620][ T30] audit: type=1326 audit(670.310:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 671.012283][ T30] audit: type=1326 audit(670.330:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 671.258598][ T4677] atomic_op 00000000ce593e4b conn xmit_atomic 0000000000000000 [ 673.585818][ T4686] syzkaller0: entered promiscuous mode [ 673.586543][ T4686] syzkaller0: entered allmulticast mode [ 674.336302][ T30] kauditd_printk_skb: 448 callbacks suppressed [ 674.337247][ T30] audit: type=1326 audit(673.670:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb3553b8c code=0x7ffc0000 [ 674.337923][ T30] audit: type=1326 audit(673.670:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb4395818 code=0x7ffc0000 [ 674.369126][ T30] audit: type=1326 audit(673.690:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb3553b8c code=0x7ffc0000 [ 674.370330][ T30] audit: type=1326 audit(673.690:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb4395818 code=0x7ffc0000 [ 674.370726][ T30] audit: type=1326 audit(673.700:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb3553b8c code=0x7ffc0000 [ 674.371118][ T30] audit: type=1326 audit(673.700:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb4395818 code=0x7ffc0000 [ 674.394729][ T30] audit: type=1326 audit(673.700:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=265 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 674.409937][ T30] audit: type=1326 audit(673.730:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb3553b8c code=0x7ffc0000 [ 674.410735][ T30] audit: type=1326 audit(673.730:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffffb4395818 code=0x7ffc0000 [ 674.418561][ T30] audit: type=1326 audit(673.730:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4673 comm="syz.0.511" exe="/syz-executor" sig=0 arch=c00000b7 syscall=265 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 690.003802][ T30] kauditd_printk_skb: 58 callbacks suppressed [ 690.005243][ T30] audit: type=1400 audit(689.310:930): avc: denied { audit_write } for pid=4743 comm="syz.0.541" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 690.032907][ T30] audit: type=1107 audit(689.360:931): pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 690.796263][ T4748] netlink: 'syz.0.543': attribute type 1 has an invalid length. [ 691.344578][ T4754] netlink: 4 bytes leftover after parsing attributes in process `syz.0.543'. [ 691.510231][ T4748] 8021q: adding VLAN 0 to HW filter on device bond3 [ 692.188526][ T30] audit: type=1400 audit(691.510:932): avc: denied { load_policy } for pid=4756 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 692.200577][ T4757] SELinux: policydb version 460 does not match my version range 15-35 [ 692.207842][ T4757] SELinux: failed to load policy [ 692.249333][ T4754] bond3 (unregistering): Released all slaves [ 694.246873][ T4766] netlink: 28 bytes leftover after parsing attributes in process `syz.1.548'. [ 694.248323][ T4766] netem: change failed [ 695.628600][ T4770] Failed to initialize the IGMP autojoin socket (err -2) [ 698.050258][ T30] audit: type=1400 audit(697.380:933): avc: denied { search } for pid=4772 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.077155][ T30] audit: type=1400 audit(697.380:934): avc: denied { search } for pid=4772 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=579 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.095331][ T30] audit: type=1400 audit(697.380:935): avc: denied { search } for pid=4772 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=749 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.105161][ T30] audit: type=1400 audit(697.430:936): avc: denied { search } for pid=4772 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.207416][ T30] audit: type=1400 audit(697.540:937): avc: denied { read open } for pid=4778 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.218955][ T30] audit: type=1400 audit(697.550:938): avc: denied { getattr } for pid=4778 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.562752][ T30] audit: type=1400 audit(697.880:939): avc: denied { add_name } for pid=4772 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 698.563767][ T30] audit: type=1400 audit(697.890:940): avc: denied { create } for pid=4772 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 698.564594][ T30] audit: type=1400 audit(697.890:941): avc: denied { write open } for pid=4772 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 698.650141][ T30] audit: type=1400 audit(697.920:942): avc: denied { append } for pid=4772 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 703.260569][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 703.261992][ T30] audit: type=1400 audit(702.590:954): avc: denied { map_create } for pid=4788 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 704.514299][ T30] audit: type=1400 audit(703.850:955): avc: denied { prog_load } for pid=4790 comm="syz.0.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 704.537115][ T30] audit: type=1400 audit(703.870:956): avc: denied { bpf } for pid=4790 comm="syz.0.558" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 704.541916][ T30] audit: type=1400 audit(703.870:957): avc: denied { perfmon } for pid=4790 comm="syz.0.558" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 705.275329][ T30] audit: type=1400 audit(704.610:958): avc: denied { map_read map_write } for pid=4792 comm="syz.0.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 705.303232][ T30] audit: type=1400 audit(704.630:959): avc: denied { kexec_image_load } for pid=4792 comm="syz.0.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 705.760138][ T30] audit: type=1326 audit(705.090:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4794 comm="syz.0.560" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 705.820525][ T30] audit: type=1326 audit(705.150:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4794 comm="syz.0.560" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 705.899520][ T30] audit: type=1326 audit(705.200:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4794 comm="syz.0.560" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 705.902674][ T30] audit: type=1326 audit(705.230:963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4794 comm="syz.0.560" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 708.697837][ T3467] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 709.097374][ T3467] usb 1-1: config 0 has an invalid interface number: 76 but max is 0 [ 709.098270][ T3467] usb 1-1: config 0 has no interface number 0 [ 709.099341][ T3467] usb 1-1: config 0 interface 76 has no altsetting 0 [ 709.285951][ T3467] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=62.9a [ 709.286486][ T3467] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 709.287002][ T3467] usb 1-1: Product: syz [ 709.287104][ T3467] usb 1-1: Manufacturer: syz [ 709.287197][ T3467] usb 1-1: SerialNumber: syz [ 709.480901][ T3467] usb 1-1: config 0 descriptor?? [ 709.688107][ T3467] cp210x 1-1:0.76: cp210x converter detected [ 709.922312][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 709.923306][ T30] audit: type=1400 audit(709.240:976): avc: denied { getopt } for pid=4800 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 710.097281][ T3467] cp210x 1-1:0.76: failed to get vendor val 0x370b size 1: -71 [ 710.098204][ T3467] cp210x 1-1:0.76: querying part number failed [ 710.289066][ T3467] usb 1-1: cp210x converter now attached to ttyUSB0 [ 710.454944][ T3467] usb 1-1: USB disconnect, device number 2 [ 710.744149][ T3467] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 710.766528][ T3467] cp210x 1-1:0.76: device disconnected [ 710.934897][ T4806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.565'. [ 711.027301][ T4806] netlink: 12 bytes leftover after parsing attributes in process `syz.1.565'. [ 711.030793][ T30] audit: type=1400 audit(710.360:977): avc: denied { module_request } for pid=4803 comm="syz.1.565" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 711.309994][ T4808] sch_tbf: burst 19869 is lower than device lo mtu (65550) ! [ 712.086082][ T4811] netlink: 3 bytes leftover after parsing attributes in process `syz.0.566'. [ 713.344346][ T30] audit: type=1400 audit(712.670:978): avc: denied { prog_run } for pid=4817 comm="syz.0.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 713.450067][ T30] audit: type=1400 audit(712.780:979): avc: denied { create } for pid=4818 comm="syz.1.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 713.482311][ T30] audit: type=1400 audit(712.810:980): avc: denied { write } for pid=4818 comm="syz.1.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 713.496624][ T30] audit: type=1400 audit(712.810:981): avc: denied { read } for pid=4818 comm="syz.1.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 713.537374][ T30] audit: type=1400 audit(712.870:982): avc: denied { ioctl } for pid=4818 comm="syz.1.570" path="socket:[8493]" dev="sockfs" ino=8493 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 714.065929][ T30] audit: type=1400 audit(713.400:983): avc: denied { create } for pid=4821 comm="syz.0.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 714.704127][ T30] audit: type=1400 audit(714.030:984): avc: denied { execmem } for pid=4825 comm="syz.0.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 715.644796][ T30] audit: type=1400 audit(714.970:985): avc: denied { load_policy } for pid=4829 comm="syz.1.575" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 715.677306][ T4830] SELinux: failed to load policy [ 720.564875][ T4842] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 721.588222][ T30] audit: type=1400 audit(720.920:986): avc: denied { execute } for pid=4843 comm="syz.1.581" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=9242 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 721.667047][ T30] audit: type=1400 audit(720.960:987): avc: denied { create } for pid=4843 comm="syz.1.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 721.688143][ T30] audit: type=1400 audit(721.020:988): avc: denied { bind } for pid=4843 comm="syz.1.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 721.720116][ T30] audit: type=1400 audit(721.050:989): avc: denied { write } for pid=4843 comm="syz.1.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 723.434066][ T30] audit: type=1400 audit(722.760:990): avc: denied { setopt } for pid=4846 comm="syz.1.582" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 723.488967][ T30] audit: type=1400 audit(722.810:991): avc: denied { write } for pid=4846 comm="syz.1.582" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 723.532811][ T30] audit: type=1400 audit(722.860:992): avc: denied { read } for pid=4846 comm="syz.1.582" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 724.907592][ T30] audit: type=1400 audit(724.240:993): avc: denied { block_suspend } for pid=4850 comm="syz.1.584" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 725.043820][ T30] audit: type=1400 audit(724.370:994): avc: denied { sys_module } for pid=4850 comm="syz.1.584" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 725.069701][ T30] audit: type=1400 audit(724.400:995): avc: denied { module_load } for pid=4850 comm="syz.1.584" path="/sys/power/wakeup_count" dev="sysfs" ino=873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 729.072571][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 729.073124][ T30] audit: type=1400 audit(728.400:1002): avc: denied { read } for pid=4871 comm="syz.1.593" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 729.084465][ T30] audit: type=1400 audit(728.400:1003): avc: denied { open } for pid=4871 comm="syz.1.593" path="net:[4026532690]" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 729.799841][ T4880] netlink: 'syz.0.597': attribute type 39 has an invalid length. [ 738.553536][ T30] audit: type=1400 audit(737.880:1004): avc: denied { create } for pid=4904 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 738.585890][ T30] audit: type=1400 audit(737.910:1005): avc: denied { setopt } for pid=4904 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 740.512918][ T30] audit: type=1400 audit(739.820:1006): avc: denied { bind } for pid=4914 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 740.542813][ T30] audit: type=1400 audit(739.840:1007): avc: denied { setopt } for pid=4914 comm="syz.0.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 740.918960][ T30] audit: type=1400 audit(740.250:1008): avc: denied { ioctl } for pid=4916 comm="syz.0.612" path="socket:[9316]" dev="sockfs" ino=9316 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 740.970129][ T30] audit: type=1400 audit(740.250:1009): avc: denied { bind } for pid=4916 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 741.079000][ T4917] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 741.080812][ T30] audit: type=1400 audit(740.410:1010): avc: denied { write } for pid=4916 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 742.238854][ T30] audit: type=1326 audit(741.570:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4918 comm="syz.1.613" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 742.244109][ T30] audit: type=1326 audit(741.570:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4918 comm="syz.1.613" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 742.247152][ T30] audit: type=1326 audit(741.580:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4918 comm="syz.1.613" exe="/syz-executor" sig=0 arch=c00000b7 syscall=223 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 743.479398][ T4930] binfmt_misc: register: failed to install interpreter file ./file0 [ 744.964233][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 744.967722][ T30] audit: type=1326 audit(744.230:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.0.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 744.970727][ T30] audit: type=1326 audit(744.250:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.0.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 744.983742][ T30] audit: type=1326 audit(744.260:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.0.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=138 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 744.989527][ T30] audit: type=1326 audit(744.260:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.0.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 744.998694][ T30] audit: type=1326 audit(744.270:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.0.621" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 746.804057][ T30] audit: type=1400 audit(746.140:1032): avc: denied { write } for pid=4940 comm="syz.0.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 751.062584][ T30] audit: type=1400 audit(750.360:1033): avc: denied { create } for pid=4946 comm="syz.0.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 754.773564][ T4954] netlink: 14 bytes leftover after parsing attributes in process `syz.0.628'. [ 755.746994][ T30] audit: type=1326 audit(755.080:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.747593][ T30] audit: type=1326 audit(755.080:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.760970][ T30] audit: type=1326 audit(755.090:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.849213][ T30] audit: type=1326 audit(755.180:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.879046][ T30] audit: type=1326 audit(755.210:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.897218][ T30] audit: type=1326 audit(755.230:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.952606][ T30] audit: type=1326 audit(755.280:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.975302][ T30] audit: type=1326 audit(755.300:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 755.986991][ T30] audit: type=1326 audit(755.320:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4955 comm="syz.1.629" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 757.204236][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 757.205659][ T30] audit: type=1326 audit(756.530:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.265023][ T30] audit: type=1326 audit(756.580:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.284288][ T30] audit: type=1326 audit(756.610:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.285230][ T30] audit: type=1326 audit(756.620:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.303038][ T30] audit: type=1326 audit(756.620:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.303881][ T30] audit: type=1326 audit(756.630:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.315938][ T30] audit: type=1326 audit(756.650:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.322841][ T30] audit: type=1326 audit(756.650:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.323509][ T30] audit: type=1326 audit(756.650:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 757.343177][ T30] audit: type=1326 audit(756.660:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.0.631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=187 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 762.800253][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 762.810582][ T30] audit: type=1400 audit(762.130:1066): avc: denied { read } for pid=4989 comm="syz.0.642" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 762.815426][ T30] audit: type=1400 audit(762.140:1067): avc: denied { open } for pid=4989 comm="syz.0.642" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 762.878986][ T30] audit: type=1400 audit(762.200:1068): avc: denied { ioctl } for pid=4989 comm="syz.0.642" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4581 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 766.434429][ T5006] netlink: 12 bytes leftover after parsing attributes in process `syz.1.648'. [ 767.516896][ T5012] netlink: 256 bytes leftover after parsing attributes in process `syz.0.650'. [ 768.109427][ T5015] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 768.916667][ T5015] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.437494][ T5015] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 769.952822][ T5015] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 770.810722][ T168] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.197593][ T2136] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.518614][ T2136] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 771.667032][ T168] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 776.056875][ T30] audit: type=1400 audit(775.390:1069): avc: denied { bind } for pid=5041 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 780.226498][ T5052] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 780.759019][ T5052] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 781.089385][ T5052] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 781.359258][ T5052] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 782.385780][ T168] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.695411][ T168] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.939851][ T168] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 783.428300][ T2150] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 784.775408][ T30] audit: type=1400 audit(784.110:1070): avc: denied { create } for pid=5060 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 784.808609][ T30] audit: type=1400 audit(784.140:1071): avc: denied { getopt } for pid=5060 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 785.384794][ T5066] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 785.855841][ T5066] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 786.319331][ T5066] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 786.460316][ T30] audit: type=1400 audit(785.790:1072): avc: denied { read write } for pid=5073 comm="syz.0.680" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 786.466030][ T30] audit: type=1400 audit(785.800:1073): avc: denied { open } for pid=5073 comm="syz.0.680" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 786.600873][ T5066] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 786.714624][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.715644][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.715925][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.716170][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.716435][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.716712][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.716964][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.717203][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.717491][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.717771][ T4950] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 786.854586][ T4950] hid-generic 0000:0000:0000.0001: hidraw0: HID v8.00 Device [syz0] on syz1 [ 787.269745][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.430918][ T12] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.638475][ T168] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 787.913571][ T2150] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 788.463363][ T30] audit: type=1400 audit(787.790:1074): avc: denied { create } for pid=5077 comm="syz.1.681" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 788.603689][ T30] audit: type=1400 audit(787.930:1075): avc: denied { unlink } for pid=3323 comm="syz-executor" name="file0" dev="tmpfs" ino=1684 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 788.648899][ T5075] fido_id[5075]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 790.064116][ T30] audit: type=1400 audit(789.360:1076): avc: denied { ioctl } for pid=5085 comm="syz.0.685" path="socket:[9772]" dev="sockfs" ino=9772 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 790.528300][ T30] audit: type=1326 audit(789.860:1077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5087 comm="syz.1.686" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 790.568748][ T30] audit: type=1326 audit(789.900:1078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5087 comm="syz.1.686" exe="/syz-executor" sig=0 arch=c00000b7 syscall=228 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 790.584790][ T30] audit: type=1326 audit(789.900:1079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5087 comm="syz.1.686" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 792.027722][ T5097] netlink: 96 bytes leftover after parsing attributes in process `syz.0.691'. [ 800.159426][ T5134] bond0: (slave bond_slave_0): Releasing backup interface [ 800.330751][ T5134] bond0: (slave bond_slave_1): Releasing backup interface [ 800.936740][ T5140] netlink: 4 bytes leftover after parsing attributes in process `syz.0.710'. [ 802.985453][ T5151] Failed to initialize the IGMP autojoin socket (err -2) [ 803.242502][ T30] audit: type=1326 audit(802.570:1080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.243435][ T30] audit: type=1326 audit(802.570:1081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=167 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.256367][ T30] audit: type=1326 audit(802.590:1082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.257369][ T30] audit: type=1326 audit(802.590:1083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffb355a5d4 code=0x7ffc0000 [ 803.270744][ T30] audit: type=1400 audit(802.600:1084): avc: denied { write } for pid=5150 comm="syz.0.715" name="config" dev="proc" ino=4026532687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 803.289063][ T30] audit: type=1326 audit(802.620:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffb355a5d4 code=0x7ffc0000 [ 803.317353][ T30] audit: type=1326 audit(802.650:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.333163][ T30] audit: type=1326 audit(802.660:1087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.337226][ T30] audit: type=1326 audit(802.670:1088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 803.340051][ T30] audit: type=1326 audit(802.670:1089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5150 comm="syz.0.715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 805.266163][ T5158] Failed to initialize the IGMP autojoin socket (err -2) [ 811.214282][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 811.215316][ T30] audit: type=1326 audit(810.540:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.236160][ T30] audit: type=1326 audit(810.570:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.256803][ T30] audit: type=1326 audit(810.570:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.273073][ T30] audit: type=1326 audit(810.600:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.295541][ T30] audit: type=1326 audit(810.620:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.310532][ T30] audit: type=1326 audit(810.640:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.323142][ T30] audit: type=1326 audit(810.650:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.339453][ T30] audit: type=1326 audit(810.670:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.353041][ T30] audit: type=1326 audit(810.680:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 811.360809][ T30] audit: type=1326 audit(810.690:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5181 comm="syz.1.729" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 817.613827][ T5203] netlink: 264 bytes leftover after parsing attributes in process `syz.0.736'. [ 817.617995][ T5203] netlink: 56 bytes leftover after parsing attributes in process `syz.0.736'. [ 821.375656][ T5208] IPv6: sit1: Disabled Multicast RS [ 821.407806][ T5208] sit1: entered allmulticast mode [ 827.705828][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 827.722183][ T30] audit: type=1326 audit(827.040:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.723152][ T30] audit: type=1326 audit(827.050:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.723937][ T30] audit: type=1326 audit(827.050:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.724423][ T30] audit: type=1326 audit(827.060:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.742640][ T30] audit: type=1326 audit(827.060:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.743522][ T30] audit: type=1326 audit(827.070:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.744008][ T30] audit: type=1326 audit(827.070:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.746797][ T30] audit: type=1326 audit(827.080:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.747450][ T30] audit: type=1326 audit(827.080:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.764383][ T30] audit: type=1326 audit(827.100:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5218 comm="syz.1.745" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 827.871814][ T5219] netlink: 4 bytes leftover after parsing attributes in process `syz.1.745'. [ 832.796614][ T5236] ip6gre1: entered allmulticast mode [ 832.828205][ T2173] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 833.416750][ T5239] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.650235][ T5239] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.880755][ T5239] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.199665][ T5239] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.862633][ T2173] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 834.967738][ T168] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.078240][ T168] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.209044][ T2173] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.835051][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 835.838421][ T30] audit: type=1326 audit(835.160:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 835.903296][ T30] audit: type=1326 audit(835.230:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=164 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 835.932746][ T30] audit: type=1326 audit(835.250:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 835.953624][ T30] audit: type=1326 audit(835.280:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.0.756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 837.212814][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 839.998097][ T5251] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 840.634973][ T5251] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.230857][ T5251] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.010989][ T5251] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 844.089504][ T5204] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 844.443449][ T3579] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 844.935860][ T3579] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 845.243821][ T2150] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 845.933628][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 850.622972][ T30] audit: type=1400 audit(849.950:1179): avc: denied { connect } for pid=5258 comm="syz.1.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 854.453307][ T30] audit: type=1400 audit(853.780:1180): avc: denied { create } for pid=5267 comm="syz.0.767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 854.510935][ T30] audit: type=1400 audit(853.840:1181): avc: denied { getopt } for pid=5267 comm="syz.0.767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 857.086610][ T30] audit: type=1326 audit(856.420:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.094932][ T30] audit: type=1326 audit(856.430:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.124896][ T30] audit: type=1326 audit(856.450:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.143999][ T30] audit: type=1326 audit(856.470:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.166703][ T30] audit: type=1326 audit(856.500:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=34 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.189772][ T30] audit: type=1326 audit(856.520:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.204981][ T30] audit: type=1326 audit(856.540:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.242359][ T30] audit: type=1326 audit(856.560:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.246866][ T30] audit: type=1326 audit(856.570:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 857.269396][ T30] audit: type=1326 audit(856.600:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5277 comm="syz.1.771" exe="/syz-executor" sig=0 arch=c00000b7 syscall=8 compat=0 ip=0xffff9295c0a8 code=0x7ffc0000 [ 862.854267][ T5291] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 863.090081][ T5291] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 863.212925][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 863.338620][ T5291] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 863.667219][ T5291] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 864.595743][ T168] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.737280][ T168] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 864.960458][ T2136] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 865.183879][ T168] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 867.068230][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 867.070457][ T30] audit: type=1400 audit(866.400:1193): avc: denied { ioctl } for pid=5296 comm="syz.1.779" path="socket:[11350]" dev="sockfs" ino=11350 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 868.555464][ T5302] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 868.766438][ T5302] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 868.949457][ T5302] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.289276][ T5302] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 870.155629][ T2136] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 870.314216][ T5204] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 870.442321][ T5204] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 870.565862][ T168] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 872.499112][ T5309] netlink: 'syz.1.784': attribute type 1 has an invalid length. [ 876.215135][ T5326] netlink: 'syz.0.793': attribute type 10 has an invalid length. [ 876.223144][ T5326] vxcan0: left promiscuous mode [ 877.715484][ T30] audit: type=1400 audit(877.050:1194): avc: denied { execute } for pid=5334 comm="syz.1.797" dev="tmpfs" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 877.730839][ T30] audit: type=1400 audit(877.060:1195): avc: denied { execute_no_trans } for pid=5334 comm="syz.1.797" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 877.970510][ T30] audit: type=1400 audit(877.300:1196): avc: denied { name_bind } for pid=5335 comm="syz.0.798" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 877.977541][ T30] audit: type=1400 audit(877.300:1197): avc: denied { node_bind } for pid=5335 comm="syz.0.798" saddr=::ffff:172.20.20.187 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 879.357632][ T5346] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 879.646529][ T5346] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 879.939829][ T5346] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 880.285996][ T5346] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 881.193697][ T5204] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 881.417672][ T5204] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 881.517179][ T2136] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 881.626318][ T5204] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 882.254221][ T30] audit: type=1400 audit(881.580:1198): avc: denied { mounton } for pid=5349 comm="syz.1.804" path="/407/file0" dev="tmpfs" ino=2062 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 882.415069][ T30] audit: type=1400 audit(881.730:1199): avc: denied { mount } for pid=5349 comm="syz.1.804" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 882.534982][ T30] audit: type=1400 audit(881.860:1200): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 882.536199][ T30] audit: type=1400 audit(881.870:1201): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 883.936794][ T5356] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 884.160549][ T5356] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 884.442806][ T5356] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 884.575456][ T5356] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.148542][ T168] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.518911][ T3579] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 885.527518][ T30] audit: type=1400 audit(884.860:1202): avc: denied { execute } for pid=5357 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 885.538415][ T30] audit: type=1400 audit(884.870:1203): avc: denied { execute_no_trans } for pid=5357 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 885.558206][ T168] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 885.952238][ T30] audit: type=1400 audit(885.280:1204): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 886.000701][ T168] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.088920][ T3579] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 886.343830][ T168] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 886.425301][ T5204] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 886.690997][ T5204] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 889.287810][ T30] audit: type=1400 audit(888.620:1205): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 892.974846][ T168] bond0 (unregistering): Released all slaves [ 893.590936][ T30] audit: type=1400 audit(892.900:1206): avc: denied { read } for pid=3167 comm="dhcpcd" name="n18" dev="tmpfs" ino=2906 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 893.596285][ T30] audit: type=1400 audit(892.920:1207): avc: denied { open } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=2906 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 895.172765][ T5358] Failed to initialize the IGMP autojoin socket (err -2) [ 897.228044][ T30] audit: type=1400 audit(896.530:1208): avc: denied { read open } for pid=5399 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 897.244589][ T30] audit: type=1400 audit(896.550:1209): avc: denied { getattr } for pid=5399 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 897.902092][ T30] audit: type=1400 audit(897.220:1210): avc: denied { add_name } for pid=5396 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 897.903146][ T30] audit: type=1400 audit(897.230:1211): avc: denied { create } for pid=5396 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 897.903504][ T30] audit: type=1400 audit(897.230:1212): avc: denied { write } for pid=5396 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=2925 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 897.918975][ T30] audit: type=1400 audit(897.250:1213): avc: denied { append } for pid=5396 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=2925 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 898.424605][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 899.864834][ T5409] Failed to initialize the IGMP autojoin socket (err -2) [ 901.334025][ T30] audit: type=1400 audit(900.650:1214): avc: denied { read write } for pid=5414 comm="syz.0.823" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 901.335090][ T30] audit: type=1400 audit(900.650:1215): avc: denied { open } for pid=5414 comm="syz.0.823" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 902.274147][ T168] hsr_slave_0: left promiscuous mode [ 902.315655][ T168] hsr_slave_1: left promiscuous mode [ 902.630311][ T168] veth1_macvtap: left promiscuous mode [ 902.647737][ T168] veth0_macvtap: left allmulticast mode [ 902.648754][ T168] veth0_macvtap: left promiscuous mode [ 902.673943][ T168] veth1_vlan: left promiscuous mode [ 902.675596][ T168] veth0_vlan: left promiscuous mode [ 913.114183][ T2163] smc: removing ib device syz! [ 917.847752][ T30] audit: type=1400 audit(917.180:1216): avc: denied { prog_load } for pid=5434 comm="syz.0.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 917.849355][ T30] audit: type=1400 audit(917.180:1217): avc: denied { bpf } for pid=5434 comm="syz.0.828" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 917.862991][ T30] audit: type=1400 audit(917.180:1218): avc: denied { perfmon } for pid=5434 comm="syz.0.828" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 917.873243][ T30] audit: type=1400 audit(917.210:1219): avc: denied { map_create } for pid=5434 comm="syz.0.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 917.877507][ T30] audit: type=1400 audit(917.210:1220): avc: denied { map_read map_write } for pid=5434 comm="syz.0.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 917.962412][ T30] audit: type=1326 audit(917.290:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.0.828" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 917.967777][ T30] audit: type=1326 audit(917.300:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.0.828" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 917.990495][ T30] audit: type=1326 audit(917.320:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.0.828" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 918.007571][ T30] audit: type=1326 audit(917.340:1224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.0.828" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 918.017995][ T30] audit: type=1326 audit(917.340:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.0.828" exe="/syz-executor" sig=0 arch=c00000b7 syscall=281 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 923.077573][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 923.094512][ T30] audit: type=1400 audit(922.400:1267): avc: denied { create } for pid=5457 comm="syz.0.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 923.130315][ T30] audit: type=1400 audit(922.460:1268): avc: denied { read } for pid=5457 comm="syz.0.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 923.564740][ T30] audit: type=1400 audit(922.890:1269): avc: denied { read open } for pid=5459 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.588263][ T30] audit: type=1400 audit(922.910:1270): avc: denied { getattr } for pid=5459 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.896056][ T30] audit: type=1400 audit(923.220:1271): avc: denied { add_name } for pid=5456 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 923.900193][ T30] audit: type=1400 audit(923.220:1272): avc: denied { create } for pid=5456 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.909113][ T30] audit: type=1400 audit(923.220:1273): avc: denied { write } for pid=5456 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2951 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 923.946245][ T30] audit: type=1400 audit(923.280:1274): avc: denied { append } for pid=5456 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2951 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 924.219862][ T5358] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 924.508410][ T5358] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 925.682682][ T30] audit: type=1400 audit(924.980:1275): avc: denied { remove_name } for pid=5462 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2951 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 925.683716][ T30] audit: type=1400 audit(925.000:1276): avc: denied { unlink } for pid=5462 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2951 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 928.542662][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 928.546996][ T30] audit: type=1326 audit(927.860:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.556058][ T30] audit: type=1326 audit(927.890:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.573483][ T30] audit: type=1326 audit(927.890:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.587935][ T30] audit: type=1326 audit(927.910:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.600922][ T30] audit: type=1326 audit(927.930:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.616567][ T30] audit: type=1326 audit(927.950:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.647193][ T30] audit: type=1326 audit(927.980:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.681915][ T30] audit: type=1326 audit(928.010:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.682533][ T30] audit: type=1326 audit(928.010:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 928.733203][ T30] audit: type=1326 audit(928.060:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5476 comm="syz.0.838" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 929.753812][ T5482] netlink: 8 bytes leftover after parsing attributes in process `syz.0.839'. [ 931.709745][ T5491] netlink: 256 bytes leftover after parsing attributes in process `syz.0.842'. [ 932.255084][ T5494] netlink: 3 bytes leftover after parsing attributes in process `syz.0.843'. [ 933.838250][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 933.838747][ T30] audit: type=1326 audit(933.170:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.849778][ T30] audit: type=1326 audit(933.180:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.862326][ T30] audit: type=1326 audit(933.190:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.868372][ T30] audit: type=1326 audit(933.200:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.889726][ T30] audit: type=1326 audit(933.220:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.893790][ T30] audit: type=1326 audit(933.220:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.902665][ T30] audit: type=1326 audit(933.220:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.906681][ T30] audit: type=1326 audit(933.240:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=89 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 933.908429][ T30] audit: type=1326 audit(933.240:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5502 comm="syz.0.845" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 935.560203][ T5358] hsr_slave_0: entered promiscuous mode [ 935.583152][ T5358] hsr_slave_1: entered promiscuous mode [ 935.590975][ T5358] debugfs: 'hsr0' already exists in 'hsr' [ 935.595348][ T5358] Cannot create hsr debugfs directory [ 939.822660][ T30] audit: type=1400 audit(939.150:1308): avc: denied { allowed } for pid=5528 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 939.886296][ T30] audit: type=1400 audit(939.210:1309): avc: denied { create } for pid=5528 comm="syz.0.853" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 939.887363][ T30] audit: type=1400 audit(939.210:1310): avc: denied { map } for pid=5528 comm="syz.0.853" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12475 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 939.899952][ T30] audit: type=1400 audit(939.210:1311): avc: denied { read write } for pid=5528 comm="syz.0.853" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12475 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 940.584825][ T5532] netlink: 8 bytes leftover after parsing attributes in process `syz.0.854'. [ 940.587752][ T5532] netlink: 'syz.0.854': attribute type 30 has an invalid length. [ 942.148121][ T30] audit: type=1326 audit(941.480:1312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.0.855" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 942.154947][ T30] audit: type=1326 audit(941.480:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.0.855" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 942.173530][ T30] audit: type=1326 audit(941.500:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.0.855" exe="/syz-executor" sig=0 arch=c00000b7 syscall=176 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 942.185655][ T30] audit: type=1326 audit(941.500:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5535 comm="syz.0.855" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 942.809647][ T30] audit: type=1326 audit(942.140:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5537 comm="syz.0.856" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 942.820049][ T30] audit: type=1326 audit(942.150:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5537 comm="syz.0.856" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 943.898356][ T5358] netdevsim netdevsim2 netdevsim0: renamed from eth5 [ 943.994255][ T5358] netdevsim netdevsim2 netdevsim1: renamed from eth6 [ 944.155525][ T5358] netdevsim netdevsim2 netdevsim2: renamed from eth7 [ 944.300979][ T5358] netdevsim netdevsim2 netdevsim3: renamed from eth8 [ 950.910717][ T1414] aoe: packet could not be sent on bond0. consider increasing tx_queue_len [ 951.865103][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 951.866680][ T30] audit: type=1326 audit(951.200:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5579 comm="syz.0.863" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 951.942262][ T30] audit: type=1326 audit(951.230:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5579 comm="syz.0.863" exe="/syz-executor" sig=0 arch=c00000b7 syscall=41 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 951.967127][ T30] audit: type=1326 audit(951.290:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5579 comm="syz.0.863" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 951.984793][ T30] audit: type=1326 audit(951.310:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5579 comm="syz.0.863" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 955.884207][ T5594] capability: warning: `syz.0.865' uses 32-bit capabilities (legacy support in use) [ 955.895369][ T30] audit: type=1400 audit(955.220:1338): avc: denied { setopt } for pid=5592 comm="syz.0.865" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 957.430175][ T30] audit: type=1400 audit(956.760:1339): avc: denied { create } for pid=5600 comm="syz.0.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 963.463234][ T30] audit: type=1400 audit(962.780:1340): avc: denied { execute } for pid=5620 comm="syz.0.870" dev="tmpfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 963.493252][ T30] audit: type=1400 audit(962.820:1341): avc: denied { execute_no_trans } for pid=5620 comm="syz.0.870" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 968.197898][ T5639] netlink: 16 bytes leftover after parsing attributes in process `syz.0.873'. [ 969.117315][ T30] audit: type=1400 audit(968.440:1342): avc: denied { write } for pid=5641 comm="syz.0.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 969.818192][ T30] audit: type=1326 audit(969.140:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.900441][ T30] audit: type=1326 audit(969.160:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.901047][ T30] audit: type=1326 audit(969.210:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.903260][ T30] audit: type=1326 audit(969.210:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.903564][ T30] audit: type=1326 audit(969.230:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.904036][ T30] audit: type=1326 audit(969.230:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.925784][ T30] audit: type=1326 audit(969.260:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=24 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.959890][ T30] audit: type=1326 audit(969.290:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 969.983186][ T30] audit: type=1326 audit(969.300:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5645 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 971.382728][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 971.847581][ T5358] veth0_vlan: entered promiscuous mode [ 971.978026][ T5358] veth1_vlan: entered promiscuous mode [ 972.684005][ T5358] veth0_macvtap: entered promiscuous mode [ 972.770019][ T5358] veth1_macvtap: entered promiscuous mode [ 973.357621][ T5358] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 973.606054][ T168] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.608397][ T168] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.611730][ T168] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.613718][ T168] netdevsim netdevsim1 eth4: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.638937][ T168] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.689204][ T2163] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.690567][ T2163] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.690957][ T2163] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.856678][ T5358] wireguard: wg0: Could not create IPv4 socket [ 974.016184][ T5358] wireguard: wg1: Could not create IPv4 socket [ 974.079696][ T5358] wireguard: wg2: Could not create IPv4 socket [ 974.170125][ T30] audit: type=1400 audit(973.500:1352): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/syzkaller.HuLnDZ/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 974.189863][ T30] audit: type=1400 audit(973.510:1353): avc: denied { mount } for pid=5358 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 974.236652][ T30] audit: type=1400 audit(973.570:1354): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/syzkaller.HuLnDZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 974.287373][ T30] audit: type=1400 audit(973.610:1355): avc: denied { setattr } for pid=5658 comm="syz.0.877" name="vcsa1" dev="devtmpfs" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 974.308361][ T30] audit: type=1400 audit(973.630:1356): avc: denied { mount } for pid=5358 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 974.363068][ T30] audit: type=1400 audit(973.690:1357): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/syzkaller.HuLnDZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 974.375004][ T30] audit: type=1400 audit(973.710:1358): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/syzkaller.HuLnDZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12816 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 974.494604][ T30] audit: type=1400 audit(973.770:1359): avc: denied { unmount } for pid=5358 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 974.542841][ T30] audit: type=1400 audit(973.870:1360): avc: denied { mounton } for pid=5358 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 974.569264][ T30] audit: type=1400 audit(973.890:1361): avc: denied { mount } for pid=5358 comm="syz-executor" name="/" dev="gadgetfs" ino=3996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 977.360974][ T5676] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.049656][ T5676] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.699042][ T5676] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 979.147962][ T5676] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 980.169181][ T2163] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.477944][ T2150] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 980.737245][ T2163] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 981.152436][ T2150] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 982.172854][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 982.173710][ T30] audit: type=1326 audit(981.480:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 982.174120][ T30] audit: type=1326 audit(981.500:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 982.199679][ T30] audit: type=1326 audit(981.520:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=180 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 982.200705][ T30] audit: type=1326 audit(981.520:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 982.240712][ T30] audit: type=1326 audit(981.560:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=185 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 982.241982][ T30] audit: type=1326 audit(981.570:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.887" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 983.118247][ T30] audit: type=1400 audit(982.450:1376): avc: denied { create } for pid=5696 comm="syz.2.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 983.380697][ T5695] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.669629][ T30] audit: type=1400 audit(983.000:1377): avc: denied { ioctl } for pid=5700 comm="syz.2.892" path="socket:[12904]" dev="sockfs" ino=12904 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 984.075699][ T5695] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.262401][ T30] audit: type=1400 audit(983.580:1378): avc: denied { setopt } for pid=5700 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 984.263504][ T30] audit: type=1400 audit(983.590:1379): avc: denied { write } for pid=5700 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 984.899014][ T5695] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 985.549158][ T5695] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 986.877127][ T5204] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.118369][ T2163] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.307627][ T2163] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.618522][ T5204] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 989.563454][ T30] audit: type=1400 audit(988.890:1380): avc: denied { prog_run } for pid=5723 comm="syz.2.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 991.243176][ T5736] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 991.554874][ T30] audit: type=1326 audit(990.860:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.558933][ T30] audit: type=1326 audit(990.890:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.576352][ T30] audit: type=1326 audit(990.900:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.585125][ T30] audit: type=1326 audit(990.910:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.613358][ T30] audit: type=1326 audit(990.940:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.614432][ T30] audit: type=1326 audit(990.940:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.664290][ T30] audit: type=1326 audit(990.990:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.715759][ T30] audit: type=1326 audit(991.040:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 991.724249][ T30] audit: type=1326 audit(991.050:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5733 comm="syz.0.902" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 992.237186][ T5735] netlink: 4 bytes leftover after parsing attributes in process `syz.0.902'. [ 993.287343][ T9] hid_parser_main: 33 callbacks suppressed [ 993.293647][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.294489][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.294859][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.295162][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.295408][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.295644][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.295893][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.296207][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.296444][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.296675][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 993.383779][ T9] hid-generic 0000:0000:0000.0002: hidraw0: HID v8.00 Device [syz0] on syz1 [ 996.658364][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 996.673392][ T30] audit: type=1400 audit(995.990:1432): avc: denied { relabelfrom } for pid=5760 comm="syz.0.913" name="NETLINK" dev="sockfs" ino=13503 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 996.679851][ T30] audit: type=1400 audit(995.990:1433): avc: denied { relabelto } for pid=5760 comm="syz.0.913" name="NETLINK" dev="sockfs" ino=13503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_route_socket permissive=1 [ 997.030964][ T5749] fido_id[5749]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1006.432750][ T30] audit: type=1326 audit(1005.750:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.0.922" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1006.504981][ T30] audit: type=1326 audit(1005.790:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.0.922" exe="/syz-executor" sig=0 arch=c00000b7 syscall=83 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1006.505898][ T30] audit: type=1326 audit(1005.810:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.0.922" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1011.725545][ T5804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5804 comm=syz.0.925 [ 1012.053229][ T30] audit: type=1400 audit(1011.380:1437): avc: denied { create } for pid=5803 comm="syz.2.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1012.136553][ T30] audit: type=1400 audit(1011.470:1438): avc: denied { bind } for pid=5803 comm="syz.2.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1012.165857][ T30] audit: type=1400 audit(1011.500:1439): avc: denied { write } for pid=5803 comm="syz.2.926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1017.986725][ T5836] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1018.070317][ T30] audit: type=1400 audit(1017.400:1440): avc: denied { append } for pid=5834 comm="syz.2.938" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1018.099125][ T30] audit: type=1400 audit(1017.420:1441): avc: denied { open } for pid=5834 comm="syz.2.938" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1018.128566][ T5836] random: crng reseeded on system resumption [ 1019.402750][ T5845] Illegal XDP return value 4294967274 on prog (id 27) dev N/A, expect packet loss! [ 1023.128275][ T30] audit: type=1400 audit(1022.460:1442): avc: denied { create } for pid=5861 comm="syz.0.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1023.196844][ T30] audit: type=1400 audit(1022.530:1443): avc: denied { bind } for pid=5861 comm="syz.0.948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1024.223701][ T30] audit: type=1400 audit(1023.550:1444): avc: denied { bind } for pid=5865 comm="syz.2.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1030.853038][ T30] audit: type=1326 audit(1030.180:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.0.961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1030.908509][ T30] audit: type=1326 audit(1030.230:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.0.961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1030.930740][ T30] audit: type=1326 audit(1030.260:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.0.961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=146 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1030.989578][ T30] audit: type=1326 audit(1030.310:1448): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.0.961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1031.007730][ T30] audit: type=1326 audit(1030.340:1449): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5893 comm="syz.0.961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1041.108996][ T30] audit: type=1400 audit(1040.440:1450): avc: denied { execmem } for pid=5925 comm="syz.2.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1041.940679][ T30] audit: type=1326 audit(1041.270:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1041.992013][ T30] audit: type=1326 audit(1041.320:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.017746][ T30] audit: type=1326 audit(1041.350:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.065224][ T30] audit: type=1326 audit(1041.390:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.087151][ T30] audit: type=1326 audit(1041.410:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.122678][ T30] audit: type=1326 audit(1041.450:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.159593][ T30] audit: type=1326 audit(1041.480:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.221012][ T30] audit: type=1326 audit(1041.540:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1042.273292][ T30] audit: type=1326 audit(1041.590:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5927 comm="syz.0.976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1046.908920][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1046.909491][ T30] audit: type=1400 audit(1046.240:1469): avc: denied { wake_alarm } for pid=5940 comm="syz.0.980" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1047.470011][ T5944] netlink: 12 bytes leftover after parsing attributes in process `syz.0.981'. [ 1048.160651][ T5949] netlink: 4 bytes leftover after parsing attributes in process `syz.0.981'. [ 1048.224587][ T30] audit: type=1400 audit(1047.550:1470): avc: denied { ioctl } for pid=5947 comm="syz.2.982" path="socket:[13773]" dev="sockfs" ino=13773 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1048.693547][ T30] audit: type=1400 audit(1048.020:1471): avc: denied { write } for pid=5951 comm="syz.0.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1048.830128][ T5948] syzkaller0: entered promiscuous mode [ 1048.853700][ T5948] syzkaller0: entered allmulticast mode [ 1069.995008][ T6000] netlink: 96 bytes leftover after parsing attributes in process `syz.0.995'. [ 1070.546985][ T5999] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1072.475775][ T5999] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.009827][ T5999] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1074.876176][ T5999] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1077.860236][ T2163] netdevsim netdevsim2 eth5: set [1, 0] type 2 family 0 port 6081 - 0 [ 1078.186879][ T6021] netlink: 3 bytes leftover after parsing attributes in process `syz.0.1000'. [ 1078.432847][ T5204] netdevsim netdevsim2 eth6: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.250829][ T2163] netdevsim netdevsim2 eth7: set [1, 0] type 2 family 0 port 6081 - 0 [ 1079.737241][ T2163] netdevsim netdevsim2 eth8: set [1, 0] type 2 family 0 port 6081 - 0 [ 1082.503895][ T30] audit: type=1400 audit(1081.750:1472): avc: denied { mount } for pid=6033 comm="syz.0.1004" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1082.504546][ T30] audit: type=1400 audit(1081.790:1473): avc: denied { unmount } for pid=6033 comm="syz.0.1004" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1083.806314][ T6038] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1005'. [ 1084.747797][ T6042] netdevsim netdevsim2 eth8 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1085.548217][ T6042] netdevsim netdevsim2 eth7 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.495793][ T6042] netdevsim netdevsim2 eth6 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1087.086766][ T6042] netdevsim netdevsim2 eth5 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1088.253050][ T2163] netdevsim netdevsim2 eth5: set [1, 0] type 2 family 0 port 6081 - 0 [ 1088.886985][ T5204] netdevsim netdevsim2 eth6: set [1, 0] type 2 family 0 port 6081 - 0 [ 1089.678823][ T12] netdevsim netdevsim2 eth7: set [1, 0] type 2 family 0 port 6081 - 0 [ 1090.229148][ T168] netdevsim netdevsim2 eth8: set [1, 0] type 2 family 0 port 6081 - 0 [ 1091.804750][ T30] audit: type=1400 audit(1091.110:1474): avc: denied { write } for pid=6060 comm="syz.2.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1091.805740][ T30] audit: type=1400 audit(1091.120:1475): avc: denied { nlmsg_write } for pid=6060 comm="syz.2.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1095.498617][ T6073] netdevsim netdevsim2 eth8 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1096.010648][ T6073] netdevsim netdevsim2 eth7 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1096.241764][ T30] audit: type=1400 audit(1095.570:1476): avc: denied { create } for pid=6074 comm="syz.0.1017" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1096.254849][ T30] audit: type=1400 audit(1095.590:1477): avc: denied { read append } for pid=6074 comm="syz.0.1017" name="file0" dev="tmpfs" ino=2769 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1096.289837][ T30] audit: type=1400 audit(1095.590:1478): avc: denied { open } for pid=6074 comm="syz.0.1017" path="/545/file0" dev="tmpfs" ino=2769 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1096.582849][ T30] audit: type=1400 audit(1095.910:1479): avc: denied { unlink } for pid=3322 comm="syz-executor" name="file0" dev="tmpfs" ino=2769 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1096.701014][ T6073] netdevsim netdevsim2 eth6 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1097.470712][ T6073] netdevsim netdevsim2 eth5 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1098.820478][ T2150] netdevsim netdevsim2 eth5: set [1, 0] type 2 family 0 port 6081 - 0 [ 1099.419261][ T2163] netdevsim netdevsim2 eth6: set [1, 0] type 2 family 0 port 6081 - 0 [ 1100.154663][ T2163] netdevsim netdevsim2 eth7: set [1, 0] type 2 family 0 port 6081 - 0 [ 1100.805632][ T2150] netdevsim netdevsim2 eth8: set [1, 0] type 2 family 0 port 6081 - 0 [ 1101.710030][ T6093] loop9: detected capacity change from 0 to 7 [ 1101.815874][ T6093] Buffer I/O error on dev loop9, logical block 0, async page read [ 1101.828550][ T6093] Buffer I/O error on dev loop9, logical block 0, async page read [ 1101.878474][ T6093] loop9: unable to read partition table [ 1101.907008][ T6093] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 1101.907008][ T6093] ) failed (rc=-5) [ 1104.398239][ T30] audit: type=1400 audit(1103.730:1480): avc: denied { ioctl } for pid=6097 comm="syz.0.1024" path="socket:[14153]" dev="sockfs" ino=14153 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1104.614378][ T6098] bond0: (slave bond_slave_0): Releasing backup interface [ 1104.814622][ T6098] bond0: (slave bond_slave_1): Releasing backup interface [ 1107.563976][ T6106] netdevsim netdevsim2 eth8 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.222877][ T6106] netdevsim netdevsim2 eth7 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1108.405332][ T30] audit: type=1404 audit(1107.720:1481): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1108.573664][ T30] audit: type=1400 audit(1107.900:1482): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1108.585844][ T30] audit: type=1400 audit(1107.920:1483): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1108.637530][ T30] audit: type=1400 audit(1107.960:1484): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1108.654878][ T30] audit: type=1400 audit(1107.990:1485): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 1108.822712][ T30] audit: type=1404 audit(1108.150:1486): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1108.938297][ T6106] netdevsim netdevsim2 eth6 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1109.118834][ T30] audit: type=1400 audit(1108.450:1487): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1109.136513][ T30] audit: type=1400 audit(1108.450:1488): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1109.195392][ T30] audit: type=1400 audit(1108.470:1489): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1109.530190][ T6106] netdevsim netdevsim2 eth5 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1109.590423][ T30] audit: type=1400 audit(1108.920:1490): avc: denied { create } for pid=6111 comm="syz.0.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1109.613371][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1109.742914][ T30] audit: type=1400 audit(1109.050:1491): avc: denied { search } for pid=6110 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.758301][ T30] audit: type=1400 audit(1109.080:1492): avc: denied { search } for pid=6110 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1109.865611][ T30] audit: type=1400 audit(1109.170:1493): avc: denied { setopt } for pid=6111 comm="syz.0.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1109.922966][ T30] audit: type=1400 audit(1109.250:1494): avc: denied { prog_load } for pid=6111 comm="syz.0.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1109.939005][ T30] audit: type=1400 audit(1109.270:1495): avc: denied { bpf } for pid=6111 comm="syz.0.1027" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1109.960823][ T30] audit: type=1400 audit(1109.280:1496): avc: denied { perfmon } for pid=6111 comm="syz.0.1027" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1110.207062][ T30] audit: type=1400 audit(1109.530:1497): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1110.584333][ T2163] netdevsim netdevsim2 eth5: set [1, 0] type 2 family 0 port 6081 - 0 [ 1110.777090][ T2163] netdevsim netdevsim2 eth6: set [1, 0] type 2 family 0 port 6081 - 0 [ 1111.037564][ T30] audit: type=1400 audit(1110.370:1498): avc: denied { create } for pid=6115 comm="syz.0.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1111.057875][ T2163] netdevsim netdevsim2 eth7: set [1, 0] type 2 family 0 port 6081 - 0 [ 1111.109165][ T30] audit: type=1400 audit(1110.440:1499): avc: denied { write } for pid=6115 comm="syz.0.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1111.582565][ T168] netdevsim netdevsim2 eth8: set [1, 0] type 2 family 0 port 6081 - 0 [ 1112.468006][ T6121] netlink: 'syz.2.1030': attribute type 4 has an invalid length. [ 1112.924312][ T6121] netlink: 'syz.2.1030': attribute type 4 has an invalid length. [ 1115.442257][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1115.451982][ T30] audit: type=1400 audit(1114.770:1509): avc: denied { read } for pid=6126 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1117.292450][ T30] audit: type=1400 audit(1116.620:1510): avc: denied { remove_name } for pid=6129 comm="rm" name="resolv.conf.wg1.link" dev="tmpfs" ino=3455 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1117.317599][ T30] audit: type=1400 audit(1116.620:1511): avc: denied { unlink } for pid=6129 comm="rm" name="resolv.conf.wg1.link" dev="tmpfs" ino=3455 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1117.716736][ T30] audit: type=1400 audit(1117.030:1512): avc: denied { create } for pid=6134 comm="syz.0.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1117.736542][ T30] audit: type=1400 audit(1117.070:1513): avc: denied { write } for pid=6134 comm="syz.0.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1121.285132][ T30] audit: type=1400 audit(1120.620:1514): avc: denied { create } for pid=6149 comm="syz.2.1041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1121.308646][ T30] audit: type=1400 audit(1120.640:1515): avc: denied { module_request } for pid=6149 comm="syz.2.1041" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1122.036447][ T6152] sch_tbf: burst 3298 is lower than device lo mtu (11337746) ! [ 1123.019121][ T30] audit: type=1326 audit(1122.350:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.044629][ T30] audit: type=1326 audit(1122.380:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.095627][ T30] audit: type=1326 audit(1122.400:1518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.110125][ T30] audit: type=1326 audit(1122.440:1519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.165298][ T30] audit: type=1326 audit(1122.490:1520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.166177][ T30] audit: type=1326 audit(1122.490:1521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.217286][ T30] audit: type=1326 audit(1122.540:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1123.259331][ T30] audit: type=1326 audit(1122.590:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6155 comm="syz.0.1042" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb355c0a8 code=0x7ffc0000 [ 1130.526373][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 1130.530090][ T30] audit: type=1400 audit(1129.850:1544): avc: denied { write } for pid=3317 comm="syz-executor" path="pipe:[3501]" dev="pipefs" ino=3501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=-1 (errno 110: Connection timed out) [ 1132.399164][ T2163] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1132.757545][ T2163] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1133.150731][ T2163] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1133.524181][ T2163] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1134.115677][ T168] netdevsim netdevsim0 eth9: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.324949][ T5204] netdevsim netdevsim0 eth10: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.473999][ T5204] netdevsim netdevsim0 eth11: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.704727][ T5204] netdevsim netdevsim0 eth12: set [1, 0] type 2 family 0 port 6081 - 0 [ 1135.229927][ T1414] aoe: packet could not be sent on lo. consider increasing tx_queue_len [ 1137.894897][ T2163] bond0 (unregistering): Released all slaves [ 1138.353922][ T2163] bond1 (unregistering): Released all slaves [ 1138.655096][ T2163] bond2 (unregistering): Released all slaves [ 1139.045558][ T2163] hsr_slave_0: left promiscuous mode [ 1139.058577][ T2163] hsr_slave_1: left promiscuous mode [ 1139.132431][ T2163] veth1_macvtap: left promiscuous mode [ 1139.133778][ T2163] veth0_macvtap: left promiscuous mode [ 1144.614084][ T3467] infiniband syz1: ib_query_port failed (-19) VM DIAGNOSIS: 19:48:28 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b10a58 X00=ffff80008d5ad004 X01=0000000000000000 X02=1fffe00002a13b87 X03=1fffe00002a13b85 X04=1fffe00001e1d698 X05=ffff00001edb401c X06=ffff0000156f8c48 X07=0000000000000010 X08=0000000000000002 X09=ffff8000897e6000 X10=ffff0000156f8a90 X11=0000000000000002 X12=000000000000000d X13=0000000000000000 X14=1fffe00002607c65 X15=ffff00001bd2b140 X16=0000000000000000 X17=1fffe00002607b78 X18=0000000000000006 X19=ffff00001509dc00 X20=0000000000000001 X21=1fffe00002a13b88 X22=0000000000000003 X23=ffff000010e85500 X24=1fffe00002dfa400 X25=ffff00000f0eb4c4 X26=0000000000000040 X27=0000000000000000 X28=0000000000ac5d45 X29=ffff800080006160 X30=ffff800081af3a78 SP=ffff800080006160 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=3a725f6d64617379:733a746f6f723d74 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6f637420745f6d64:617379733a725f6d Q06=6d69737665647465:6e206d6973766564 Q07=202c315b20746573:203a386874652032 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd9d59bd0:0000ffffd9d59bd0 Q17=ffffff80ffffffd0:0000ffffd9d59ba0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008544400c X00=ffff800085444008 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002f853c9 X04=1fffe00002f853c9 X05=ffff80008d4e7b00 X06=ffff700011a9cf60 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011a9cf60 X11=1ffff00011a9cf60 X12=ffff700011a9cf61 X13=0000000000000000 X14=ffff00006a0b1468 X15=ffff00006a0b1054 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff800087353670 X20=ffff000017c29e40 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087353640 X25=0000000000000000 X26=0000000000000004 X27=ffff800087353670 X28=00000000000010c0 X29=ffff80008d4e7aa0 X30=ffff800080438d74 SP=ffff80008d4e7aa0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0bbc4ddf1a3eb7fc:ad533406fcedb8bf Q19=063d48af86fb6754:4f3eabdeeb26b2b6 Q20=0008002003080800:1803080800100308 Q21=ffffdf0838030008:0030030108002803 Q22=0000000000000000:0001ffffffffffff Q23=0800600300080058:0300000000000000 Q24=8777dc1ea0245d4a:3c7ea1724ddc399a Q25=2604e27ea0bf1625:41aa4604ea22b9e0 Q26=a6cdae1282bb6588:8175add7215c63df Q27=e54f3802883fdaf9:c07effcd0488499e Q28=fd9cb8c2b537a439:8344fb8ad8bda708 Q29=5897d2fef2df5c93:d8ff5f1256fd11ac Q30=39e86aef2724d16f:70ac3bc70d37f19e Q31=03421c58eca6fc98:f55587702235f054