last executing test programs: 3m38.366649518s ago: executing program 0 (id=961): setitimer(0x0, 0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) mkdir(&(0x7f0000000140)='./control\x00', 0x5) close(r0) inotify_init1(0x800) fcntl$setstatus(r0, 0x4, 0x2c00) r1 = gettid() fcntl$setown(r0, 0x8, r1) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x8, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000000040)={[0xffffffffffff7ff8]}, 0x0, 0x0, 0x8) inotify_add_watch(r0, &(0x7f0000000180)='./control\x00', 0xa4000d60) rmdir(&(0x7f0000000100)='./control\x00') unshare(0x2040480) 3m37.428525316s ago: executing program 0 (id=964): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000280)=0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e20, @dev}, 0x10) close(r2) 3m36.97121407s ago: executing program 0 (id=966): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4000}, 0x0, 0x0) 3m36.424028488s ago: executing program 0 (id=969): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r0, &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000080)={0x2, 0xf8, 0x40000, {r0}}, 0x20) 3m35.888685586s ago: executing program 0 (id=972): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = semget(0x1, 0x4, 0x3c4) semop(r3, &(0x7f0000000040)=[{0x2, 0xbbdd, 0x1000}], 0x1) 3m35.056457598s ago: executing program 0 (id=974): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x6f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x182, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) 3m35.02854276s ago: executing program 32 (id=974): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00'}, 0x6f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x182, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) 17.268111551s ago: executing program 1 (id=1352): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) vmsplice(r2, &(0x7f0000000340)=[{&(0x7f0000001cc0)="b70cdbd771", 0x5}, {&(0x7f0000000740)="7247ea54", 0x4}], 0x2, 0xa) fcntl$setpipe(r2, 0x407, 0x6) 16.760510116s ago: executing program 1 (id=1354): signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x800) prctl$PR_SET_SECUREBITS(0x1c, 0x2c) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2, {0x3}}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r0) 15.249445014s ago: executing program 1 (id=1358): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r1 = syz_io_uring_setup(0x497, &(0x7f0000000080)={0x0, 0x79ab, 0x8, 0x8000, 0x40024c}, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r0, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r1, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) 14.611031577s ago: executing program 1 (id=1360): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x17, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8b, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x500}, {0x85, 0x0, 0x0, 0x86}}, {}, [@printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000200)='syzkaller\x00', 0xe, 0x1001, &(0x7f0000001cc0)=""/4097, 0x41100, 0x2f}, 0x94) 14.377528239s ago: executing program 1 (id=1361): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) kexec_load(0x4, 0xa, 0x0, 0x0) 14.076073875s ago: executing program 1 (id=1362): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x800) process_madvise(r0, &(0x7f00000004c0)=[{&(0x7f0000000180)="8dcdf2e31ebd5600a7414f34d2af91162a43c709933ea675c4cc9741faa68b86ed109613e7a6f312d901be86cd83a4f6f102bf8df672af59d516f82c1a51125cdc0f756b3060734f8b22ea5b98b333da47a6a6d2263b0535354ed7842501dd79bd2f6fc18a5f3d96690c5f510053015ba59649ed31152514d4256eacf99709bab6cd9a8d", 0x84}, {&(0x7f0000000240)="64d018dc0407fcaf27662d2734ef6927832677a558404a7108b228e60b2f8bfea006e3e4d68976f5e592d5f376a98479df041a5e88d41404f2d7ed523d0c71e8dc553500dc0c1eee20e642ca99248468ab6d8bacbd0b392b076c9b849df291d1f60c905ea030df40039f5f121c9ee6ebd4cb90ea712919d0c665461600e1c4fb28fd3659f11b67245f5a6e368b89", 0x8e}, {&(0x7f0000000040)="1c64221071202db6e9ec3d557e", 0xd}, {&(0x7f0000000300)="6a6e4692188e584f1e0b293dec117a1c6edf8e9e2a93f84d291ee5b22502ef8da90023b3a8769889ac50a19c8d5231dcd43118e7537e28be11b305ecf331e99e435bb727c3ff209bb79e56ec7fabed1d6eb5", 0x52}, {&(0x7f0000000440)="4a54437223d3fc51b79a35daa6a3fd9c3746d47c55e14b755b1790d3e9daeec86dde5362f44582fb152b886c544f1c35124eeb8e5d9394d190591cb012daffc9d3d7310b3bcf3a35d9b9a5aa165581b9643372", 0x53}, {0x0}], 0x6, 0x9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x8808) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = getpid() r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x14886, 0x0) fcntl$notify(r2, 0x402, 0x29) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r3, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(r3, 0x1) recvfrom(r3, &(0x7f0000000000)=""/116, 0xffffffdd, 0x734, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x8) r4 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1803000000000020000000000001000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b5020000000000008500000086000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000000700000085000000b70000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1003, &(0x7f0000001e40)=""/4099, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000100)) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) mincore(&(0x7f0000ff5000/0x4000)=nil, 0x4000, 0x0) bpf$BPF_PROG_DETACH(0x1c, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) 1.93871969s ago: executing program 2 (id=1392): bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fdinfo/3\x00') read$eventfd(r0, &(0x7f0000000340), 0x8) 1.669674755s ago: executing program 2 (id=1393): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) vmsplice(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="e3", 0x1}], 0x1, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 1.417852768s ago: executing program 2 (id=1394): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000003e000701fcfffffff6dbdf25017c0000080003"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 995.127749ms ago: executing program 2 (id=1395): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02142000110000000040000000000000030005000000000002000000ffffffff0000000000000000080012000000010000000000000000000600000000000027b20e97a6a9ecae000000ee00000000000000000000000000fc020000000000000000000000000000030006000000000002000000e00000010000000000000000010018"], 0x88}}, 0x0) 348.427273ms ago: executing program 2 (id=1396): r0 = socket$kcm(0xa, 0x1, 0x106) sendmsg$sock(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2004c040) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x400000, 0x4}, 0x80, 0x0}, 0x20040010) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x1}, 0x50) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4002}, 0x0, 0x0) 0s ago: executing program 2 (id=1397): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x38}, 0x94) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bea100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x9}, 0x10, 0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a603f00000000000500000014000500200100000000000000000100000000001c00090008000000", @ANYRES32=r1], 0x4c}}, 0x0) kernel console output (not intermixed with test programs): 1] audit: type=1326 audit(900.927:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5984 comm="syz.0.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 388.013182][ T31] audit: type=1326 audit(900.947:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5984 comm="syz.0.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 388.239655][ T31] audit: type=1326 audit(901.167:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5987 comm="syz.0.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 388.254681][ T31] audit: type=1326 audit(901.187:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5987 comm="syz.0.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 390.394284][ T6001] netlink: 'syz.0.658': attribute type 13 has an invalid length. [ 393.114264][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 393.114675][ T31] audit: type=1400 audit(906.037:426): avc: denied { sys_module } for pid=6009 comm="syz.0.660" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 393.531840][ T31] audit: type=1400 audit(906.467:427): avc: denied { create } for pid=6014 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 393.624845][ T31] audit: type=1400 audit(906.537:428): avc: denied { write } for pid=6014 comm="syz.0.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 393.879760][ T31] audit: type=1400 audit(906.797:429): avc: denied { allowed } for pid=6016 comm="syz.0.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 394.354114][ T31] audit: type=1400 audit(907.287:430): avc: denied { create } for pid=6018 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 395.282423][ T31] audit: type=1400 audit(908.217:431): avc: denied { bind } for pid=6018 comm="syz.0.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 395.678179][ T31] audit: type=1400 audit(908.597:432): avc: denied { setopt } for pid=6024 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 395.685099][ T31] audit: type=1400 audit(908.597:433): avc: denied { write } for pid=6024 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 395.728051][ T6025] IPv4: Oversized IP packet from 127.202.26.0 [ 396.044666][ T31] audit: type=1400 audit(908.977:434): avc: denied { read } for pid=6026 comm="syz.0.665" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 396.047331][ T31] audit: type=1400 audit(908.977:435): avc: denied { open } for pid=6026 comm="syz.0.665" path="net:[4026532726]" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 399.552077][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 399.552267][ T31] audit: type=1400 audit(912.487:442): avc: denied { create } for pid=6045 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 399.555619][ T31] audit: type=1400 audit(912.487:443): avc: denied { connect } for pid=6045 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 400.215343][ T31] audit: type=1326 audit(913.147:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.218543][ T31] audit: type=1326 audit(913.147:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.221181][ T31] audit: type=1326 audit(913.157:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.223150][ T31] audit: type=1326 audit(913.157:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.223807][ T31] audit: type=1326 audit(913.157:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.225868][ T31] audit: type=1326 audit(913.157:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.232976][ T31] audit: type=1326 audit(913.167:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 400.233922][ T31] audit: type=1326 audit(913.167:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6049 comm="syz.0.674" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 402.026018][ T6057] netlink: 'syz.0.677': attribute type 13 has an invalid length. [ 405.095129][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 405.095536][ T31] audit: type=1400 audit(918.027:458): avc: denied { create } for pid=6065 comm="syz.0.681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 405.106213][ T31] audit: type=1400 audit(918.037:459): avc: denied { setopt } for pid=6065 comm="syz.0.681" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 405.961834][ T31] audit: type=1400 audit(918.897:460): avc: denied { append } for pid=6069 comm="syz.0.683" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 405.978381][ T6070] random: crng reseeded on system resumption [ 407.604199][ T31] audit: type=1400 audit(920.537:461): avc: denied { create } for pid=6077 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 407.607856][ T31] audit: type=1400 audit(920.537:462): avc: denied { write } for pid=6077 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 408.682702][ T43] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 408.815993][ T43] usb 1-1: device descriptor read/64, error -71 [ 409.049737][ T43] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 409.209387][ T43] usb 1-1: device descriptor read/64, error -71 [ 409.321191][ T43] usb usb1-port1: attempt power cycle [ 409.693637][ T43] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 409.717174][ T43] usb 1-1: device descriptor read/8, error -71 [ 409.949640][ T43] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 409.998401][ T43] usb 1-1: device descriptor read/8, error -71 [ 410.100430][ T43] usb usb1-port1: unable to enumerate USB device [ 410.660578][ T31] audit: type=1400 audit(923.587:463): avc: denied { create } for pid=6094 comm="syz.1.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 410.663971][ T31] audit: type=1400 audit(923.597:464): avc: denied { read } for pid=6094 comm="syz.1.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 414.485114][ T31] audit: type=1400 audit(927.417:465): avc: denied { name_bind } for pid=6101 comm="syz.1.693" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 420.244155][ T31] audit: type=1326 audit(933.177:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.253452][ T31] audit: type=1326 audit(933.187:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.253657][ T31] audit: type=1326 audit(933.187:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.268216][ T31] audit: type=1326 audit(933.197:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=278 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.270218][ T31] audit: type=1326 audit(933.207:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.282996][ T31] audit: type=1326 audit(933.217:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.283352][ T31] audit: type=1326 audit(933.217:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.285443][ T31] audit: type=1326 audit(933.217:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=459 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 420.285731][ T31] audit: type=1326 audit(933.217:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6124 comm="syz.1.700" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 422.303871][ T6131] netlink: 'syz.1.703': attribute type 4 has an invalid length. [ 422.379580][ T31] audit: type=1400 audit(935.277:475): avc: denied { bind } for pid=6130 comm="syz.1.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 422.645185][ T6131] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.864804][ T6131] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 423.011914][ T6131] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 423.193428][ T6131] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 423.473319][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.523241][ T6002] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.623395][ T6002] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.706629][ T12] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.063555][ T6165] netlink: 28 bytes leftover after parsing attributes in process `syz.1.711'. [ 424.063918][ T6165] netlink: 28 bytes leftover after parsing attributes in process `syz.1.711'. [ 427.754041][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 427.755494][ T31] audit: type=1400 audit(940.687:489): avc: denied { name_bind } for pid=6210 comm="syz.1.717" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 427.759827][ T31] audit: type=1400 audit(940.697:490): avc: denied { node_bind } for pid=6210 comm="syz.1.717" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 433.385982][ T6236] SELinux: policydb version -428576896 does not match my version range 15-35 [ 433.386768][ T6236] SELinux: failed to load policy [ 433.424008][ T31] audit: type=1400 audit(946.317:491): avc: denied { load_policy } for pid=6235 comm="syz.1.724" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 434.004949][ T31] audit: type=1400 audit(946.937:492): avc: denied { execmem } for pid=6239 comm="syz.1.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 435.625241][ T31] audit: type=1400 audit(948.547:493): avc: denied { create } for pid=6248 comm="syz.1.730" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 435.672839][ T31] audit: type=1400 audit(948.607:494): avc: denied { map } for pid=6248 comm="syz.1.730" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9091 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 435.676250][ T31] audit: type=1400 audit(948.607:495): avc: denied { read write } for pid=6248 comm="syz.1.730" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9091 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 437.962767][ T31] audit: type=1326 audit(950.887:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6258 comm="syz.1.734" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 437.979834][ T31] audit: type=1326 audit(950.887:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6258 comm="syz.1.734" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 437.982678][ T31] audit: type=1326 audit(950.907:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6258 comm="syz.1.734" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.006828][ T31] audit: type=1326 audit(950.907:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6258 comm="syz.1.734" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.034817][ T31] audit: type=1326 audit(950.907:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6258 comm="syz.1.734" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.582254][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 438.582425][ T31] audit: type=1326 audit(951.517:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6260 comm="syz.1.735" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.582687][ T31] audit: type=1326 audit(951.517:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6260 comm="syz.1.735" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.585995][ T31] audit: type=1326 audit(951.517:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6260 comm="syz.1.735" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.586104][ T31] audit: type=1326 audit(951.517:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6260 comm="syz.1.735" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 438.586150][ T31] audit: type=1326 audit(951.517:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6260 comm="syz.1.735" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 439.365719][ T6263] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.627678][ T6263] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.730462][ T6263] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 439.926988][ T6263] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 440.320373][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.462200][ T12] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.541782][ T12] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.542326][ T12] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.612260][ T31] audit: type=1326 audit(954.527:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 441.614592][ T31] audit: type=1326 audit(954.547:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 441.618462][ T31] audit: type=1326 audit(954.547:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 441.620852][ T31] audit: type=1326 audit(954.557:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 441.625111][ T31] audit: type=1326 audit(954.557:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6286 comm="syz.1.738" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 447.752878][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 447.753219][ T31] audit: type=1400 audit(960.687:564): avc: denied { create } for pid=6308 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 447.790602][ T31] audit: type=1400 audit(960.727:565): avc: denied { bind } for pid=6308 comm="syz.1.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 448.176851][ T31] audit: type=1400 audit(961.107:566): avc: denied { mounton } for pid=6312 comm="syz.1.748" path="/350/file0" dev="tmpfs" ino=1816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 448.177297][ T31] audit: type=1400 audit(961.107:567): avc: denied { mount } for pid=6312 comm="syz.1.748" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 448.206272][ T31] audit: type=1400 audit(961.137:568): avc: denied { unmount } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 449.558407][ T31] audit: type=1326 audit(962.477:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.1.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 449.559136][ T31] audit: type=1326 audit(962.477:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.1.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 449.566743][ T31] audit: type=1326 audit(962.497:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.1.751" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 449.566927][ T31] audit: type=1326 audit(962.497:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.1.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 449.566998][ T31] audit: type=1326 audit(962.497:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6319 comm="syz.1.751" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.550809][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 453.553016][ T31] audit: type=1326 audit(966.477:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm="syz.0.758" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.554882][ T31] audit: type=1326 audit(966.487:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm="syz.0.758" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.569680][ T31] audit: type=1326 audit(966.487:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm="syz.0.758" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.575308][ T31] audit: type=1326 audit(966.487:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm="syz.0.758" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.578420][ T31] audit: type=1326 audit(966.487:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.587713][ T31] audit: type=1326 audit(966.497:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.596675][ T31] audit: type=1326 audit(966.497:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.598143][ T31] audit: type=1326 audit(966.507:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.600856][ T31] audit: type=1326 audit(966.507:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 453.602597][ T31] audit: type=1326 audit(966.507:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6340 comm=ACED exe="/syz-executor" sig=0 arch=40000028 syscall=83 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 454.132161][ T6346] netlink: 80 bytes leftover after parsing attributes in process `syz.1.760'. [ 455.957366][ T6367] Driver unsupported XDP return value 0 on prog (id 113) dev N/A, expect packet loss! [ 456.844353][ T6373] netlink: 4 bytes leftover after parsing attributes in process `syz.1.765'. [ 456.907270][ T6373] netlink: 12 bytes leftover after parsing attributes in process `syz.1.765'. [ 459.310001][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 459.310318][ T31] audit: type=1400 audit(972.217:658): avc: denied { ioctl } for pid=6387 comm="syz.1.775" path="socket:[9457]" dev="sockfs" ino=9457 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 460.257142][ T31] audit: type=1400 audit(973.187:659): avc: denied { read write } for pid=3123 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 460.264941][ T31] audit: type=1400 audit(973.197:660): avc: denied { open } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 460.266293][ T31] audit: type=1400 audit(973.197:661): avc: denied { ioctl } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 460.368501][ T31] audit: type=1400 audit(973.287:662): avc: denied { read } for pid=6396 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 460.391993][ T31] audit: type=1400 audit(973.327:663): avc: denied { write } for pid=6396 comm="syz.1.777" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 460.392785][ T31] audit: type=1400 audit(973.327:664): avc: denied { open } for pid=6396 comm="syz.1.777" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 460.406604][ T31] audit: type=1400 audit(973.337:665): avc: denied { ioctl } for pid=6396 comm="syz.1.777" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 463.308219][ T31] audit: type=1400 audit(976.217:666): avc: denied { map_create } for pid=6400 comm="syz.1.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 463.308633][ T31] audit: type=1400 audit(976.217:667): avc: denied { bpf } for pid=6400 comm="syz.1.778" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 466.279155][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 466.288304][ T31] audit: type=1326 audit(979.207:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.300072][ T31] audit: type=1326 audit(979.207:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.304887][ T31] audit: type=1326 audit(979.237:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.319555][ T31] audit: type=1326 audit(979.237:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.323461][ T31] audit: type=1326 audit(979.247:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.329950][ T31] audit: type=1326 audit(979.247:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.335312][ T31] audit: type=1326 audit(979.257:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=57 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.337390][ T31] audit: type=1326 audit(979.257:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6417 comm="syz.1.782" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 466.905730][ T31] audit: type=1400 audit(979.837:681): avc: denied { create } for pid=6423 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 466.932164][ T31] audit: type=1400 audit(979.867:682): avc: denied { setopt } for pid=6423 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 468.364245][ T6432] mmap: syz.1.787 (6432) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 471.494869][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 471.495770][ T31] audit: type=1400 audit(984.407:690): avc: denied { create } for pid=6455 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 471.515660][ T31] audit: type=1326 audit(984.447:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.540646][ T31] audit: type=1326 audit(984.457:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.542928][ T31] audit: type=1326 audit(984.477:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.544487][ T31] audit: type=1326 audit(984.477:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.546176][ T31] audit: type=1326 audit(984.477:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.548128][ T31] audit: type=1326 audit(984.477:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.566912][ T31] audit: type=1326 audit(984.497:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.569130][ T31] audit: type=1326 audit(984.497:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 471.572679][ T31] audit: type=1326 audit(984.507:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.794" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.369605][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 481.371923][ T31] audit: type=1326 audit(994.297:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.378304][ T31] audit: type=1326 audit(994.307:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.380804][ T31] audit: type=1326 audit(994.307:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.382594][ T31] audit: type=1326 audit(994.307:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.447835][ T31] audit: type=1326 audit(994.377:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 481.481568][ T31] audit: type=1400 audit(994.377:721): avc: denied { mount } for pid=6497 comm="syz.1.807" name="/" dev="ramfs" ino=10501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 481.483346][ T31] audit: type=1326 audit(994.417:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6497 comm="syz.1.807" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 482.460702][ T31] audit: type=1400 audit(995.397:723): avc: denied { mounton } for pid=6502 comm="syz.1.809" path="/400/file0" dev="tmpfs" ino=2070 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 482.464897][ T31] audit: type=1400 audit(995.397:724): avc: denied { mount } for pid=6502 comm="syz.1.809" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 482.510834][ T31] audit: type=1400 audit(995.437:725): avc: denied { mounton } for pid=6502 comm="syz.1.809" path="/400/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 482.514455][ T6504] ======================================================= [ 482.514455][ T6504] WARNING: The mand mount option has been deprecated and [ 482.514455][ T6504] and is ignored by this kernel. Remove the mand [ 482.514455][ T6504] option from the mount to silence this warning. [ 482.514455][ T6504] ======================================================= [ 483.360705][ T6506] netlink: 'syz.1.810': attribute type 6 has an invalid length. [ 487.530151][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 487.530515][ T31] audit: type=1400 audit(1000.427:731): avc: denied { create } for pid=6526 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 487.530778][ T31] audit: type=1400 audit(1000.437:732): avc: denied { setopt } for pid=6526 comm="syz.1.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 488.480782][ T31] audit: type=1400 audit(1001.417:733): avc: denied { write } for pid=6537 comm="syz.0.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 489.956104][ T31] audit: type=1400 audit(1002.887:734): avc: denied { create } for pid=6550 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 489.963913][ T31] audit: type=1400 audit(1002.897:735): avc: denied { create } for pid=6550 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 489.968151][ T31] audit: type=1400 audit(1002.897:736): avc: denied { write } for pid=6550 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 489.978813][ T31] audit: type=1400 audit(1002.907:737): avc: denied { nlmsg_write } for pid=6550 comm="syz.0.826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 491.427300][ T31] audit: type=1326 audit(1004.357:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 491.427664][ T31] audit: type=1326 audit(1004.357:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 491.531038][ T31] audit: type=1326 audit(1004.427:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 492.026033][ T6566] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.291193][ T6566] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.465815][ T6566] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.661906][ T6566] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.792745][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 492.793022][ T31] audit: type=1400 audit(1005.717:749): avc: denied { ioctl } for pid=6565 comm="syz.0.831" path="socket:[9678]" dev="sockfs" ino=9678 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 492.854256][ T12] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 492.892291][ T6002] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 492.927790][ T6002] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 492.942695][ T6002] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 493.088020][ T31] audit: type=1400 audit(1006.017:750): avc: denied { sys_module } for pid=6565 comm="syz.0.831" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 493.744106][ T6591] binfmt_misc: register: failed to install interpreter file ./file0 [ 495.396617][ T31] audit: type=1326 audit(1008.327:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.409522][ T31] audit: type=1326 audit(1008.327:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.411607][ T31] audit: type=1326 audit(1008.327:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.422151][ T31] audit: type=1326 audit(1008.347:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.425383][ T31] audit: type=1326 audit(1008.347:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.445950][ T31] audit: type=1326 audit(1008.377:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.501259][ T31] audit: type=1326 audit(1008.427:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 495.510743][ T31] audit: type=1326 audit(1008.427:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6611 comm="syz.0.840" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 496.924526][ T6632] netlink: 4 bytes leftover after parsing attributes in process `syz.0.844'. [ 498.787874][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 498.788267][ T31] audit: type=1400 audit(1011.717:772): avc: denied { watch watch_reads } for pid=6651 comm="syz.1.851" path="/425" dev="tmpfs" ino=2194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 498.955817][ T31] audit: type=1326 audit(1011.887:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 498.985419][ T31] audit: type=1326 audit(1011.917:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.852" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 498.986015][ T31] audit: type=1326 audit(1011.917:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.0.852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 499.541878][ T31] audit: type=1400 audit(1012.477:776): avc: denied { create } for pid=6651 comm="syz.1.851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 499.558237][ T31] audit: type=1400 audit(1012.487:777): avc: denied { sys_admin } for pid=6651 comm="syz.1.851" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 500.270169][ T31] audit: type=1400 audit(1013.167:778): avc: denied { setopt } for pid=6691 comm="syz.1.857" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 500.330168][ T31] audit: type=1400 audit(1013.257:779): avc: denied { read } for pid=6691 comm="syz.1.857" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 500.601430][ T6698] netlink: 40 bytes leftover after parsing attributes in process `syz.1.859'. [ 502.271433][ T6715] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 502.652206][ T31] audit: type=1400 audit(1015.587:780): avc: denied { name_bind } for pid=6718 comm="syz.0.867" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 503.560115][ T6731] bond1: entered promiscuous mode [ 503.560648][ T6731] bond1: entered allmulticast mode [ 503.563933][ T6731] 8021q: adding VLAN 0 to HW filter on device bond1 [ 503.580306][ T6731] bond1 (unregistering): Released all slaves [ 504.183199][ T6801] netlink: 'syz.1.874': attribute type 1 has an invalid length. [ 504.364426][ T6801] 8021q: adding VLAN 0 to HW filter on device bond1 [ 504.373733][ T6801] netlink: 4 bytes leftover after parsing attributes in process `syz.1.874'. [ 504.440858][ T6801] bond1 (unregistering): Released all slaves [ 507.937491][ T31] audit: type=1400 audit(1020.867:781): avc: denied { read write } for pid=3123 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.940493][ T31] audit: type=1400 audit(1020.877:782): avc: denied { open } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.941492][ T31] audit: type=1400 audit(1020.877:783): avc: denied { ioctl } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 508.034961][ T31] audit: type=1400 audit(1020.967:784): avc: denied { read } for pid=6895 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 508.139426][ T31] audit: type=1400 audit(1021.057:785): avc: denied { map_create } for pid=6895 comm="syz.1.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 508.142057][ T31] audit: type=1400 audit(1021.057:786): avc: denied { map_read map_write } for pid=6895 comm="syz.1.885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 508.396946][ T31] audit: type=1400 audit(1021.327:787): avc: denied { create } for pid=6900 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 508.405420][ T31] audit: type=1400 audit(1021.337:788): avc: denied { connect } for pid=6900 comm="syz.1.887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 508.410119][ T31] audit: type=1400 audit(1021.337:789): avc: denied { perfmon } for pid=6898 comm="syz.0.886" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 508.418087][ T31] audit: type=1400 audit(1021.347:790): avc: denied { ioctl } for pid=6900 comm="syz.1.887" path="socket:[9992]" dev="sockfs" ino=9992 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 508.775835][ T6905] netlink: 4 bytes leftover after parsing attributes in process `syz.1.889'. [ 515.316773][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 515.322292][ T31] audit: type=1400 audit(1028.247:812): avc: denied { ioctl } for pid=6945 comm="syz.0.903" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 516.456846][ T31] audit: type=1400 audit(1029.377:813): avc: denied { create } for pid=6954 comm="syz.0.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 516.461956][ T31] audit: type=1400 audit(1029.397:814): avc: denied { module_request } for pid=6954 comm="syz.0.904" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 517.587513][ T31] audit: type=1400 audit(1030.517:815): avc: denied { name_bind } for pid=6954 comm="syz.0.904" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 517.595105][ T31] audit: type=1400 audit(1030.517:816): avc: denied { node_bind } for pid=6954 comm="syz.0.904" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 524.474323][ T6969] syzkaller0: refused to change device tx_queue_len [ 525.416940][ T31] audit: type=1400 audit(1038.317:817): avc: denied { create } for pid=6981 comm="syz.1.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 525.417424][ T31] audit: type=1400 audit(1038.317:818): avc: denied { setopt } for pid=6981 comm="syz.1.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 525.572467][ T31] audit: type=1400 audit(1038.507:819): avc: denied { connect } for pid=6981 comm="syz.1.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 527.114037][ T31] audit: type=1326 audit(1040.017:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.1.913" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 527.120896][ T31] audit: type=1326 audit(1040.017:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.1.913" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 527.125502][ T31] audit: type=1326 audit(1040.017:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.1.913" exe="/syz-executor" sig=0 arch=40000028 syscall=300 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 527.147016][ T31] audit: type=1326 audit(1040.017:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7009 comm="syz.1.913" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 527.872005][ T31] audit: type=1400 audit(1040.807:824): avc: denied { read } for pid=7013 comm="syz.1.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 532.853647][ T31] audit: type=1400 audit(1045.787:825): avc: denied { connect } for pid=7027 comm="syz.1.920" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 532.980816][ T31] audit: type=1400 audit(1045.907:826): avc: denied { write } for pid=7027 comm="syz.1.920" path="socket:[10122]" dev="sockfs" ino=10122 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 534.447288][ T7038] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 534.623822][ T31] audit: type=1326 audit(1047.547:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.634114][ T31] audit: type=1326 audit(1047.567:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.649773][ T31] audit: type=1326 audit(1047.577:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.655260][ T31] audit: type=1326 audit(1047.587:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.657801][ T31] audit: type=1326 audit(1047.587:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.708231][ T31] audit: type=1326 audit(1047.607:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.720090][ T31] audit: type=1326 audit(1047.607:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 534.722020][ T31] audit: type=1326 audit(1047.607:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7039 comm="syz.1.926" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 542.015845][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 542.016210][ T31] audit: type=1400 audit(1054.937:852): avc: denied { create } for pid=7059 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 542.032714][ T7060] netlink: 268 bytes leftover after parsing attributes in process `syz.1.932'. [ 542.033322][ T31] audit: type=1400 audit(1054.967:853): avc: denied { write } for pid=7059 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 542.033757][ T31] audit: type=1400 audit(1054.967:854): avc: denied { nlmsg_write } for pid=7059 comm="syz.1.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 543.241403][ T7064] netlink: 14 bytes leftover after parsing attributes in process `syz.1.934'. [ 547.464351][ T31] audit: type=1326 audit(1060.387:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7070 comm="syz.1.936" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 547.467641][ T31] audit: type=1326 audit(1060.387:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7070 comm="syz.1.936" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 547.470309][ T31] audit: type=1326 audit(1060.397:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7070 comm="syz.1.936" exe="/syz-executor" sig=0 arch=40000028 syscall=174 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 547.471873][ T31] audit: type=1326 audit(1060.397:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7070 comm="syz.1.936" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 547.474127][ T31] audit: type=1326 audit(1060.397:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7070 comm="syz.1.936" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 549.228451][ T31] audit: type=1400 audit(1062.157:860): avc: denied { create } for pid=7077 comm="syz.1.939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 549.366129][ T31] audit: type=1400 audit(1062.267:861): avc: denied { bind } for pid=7077 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 549.366503][ T31] audit: type=1400 audit(1062.267:862): avc: denied { write } for pid=7077 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 550.943033][ T31] audit: type=1326 audit(1063.867:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.1.943" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 550.946117][ T31] audit: type=1326 audit(1063.867:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.1.943" exe="/syz-executor" sig=0 arch=40000028 syscall=357 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 552.405929][ T7099] x_tables: ip6_tables: policy.0 match: invalid size 312 (kernel) != (user) 0 [ 555.134203][ T7122] netlink: 'syz.0.956': attribute type 4 has an invalid length. [ 555.146728][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 555.146975][ T31] audit: type=1400 audit(1068.077:869): avc: denied { write } for pid=7118 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 555.147221][ T31] audit: type=1400 audit(1068.077:870): avc: denied { open } for pid=7118 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 555.202921][ T7122] netlink: 'syz.0.956': attribute type 4 has an invalid length. [ 555.207628][ T31] audit: type=1400 audit(1068.137:871): avc: denied { search } for pid=7118 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.221553][ T31] audit: type=1400 audit(1068.157:872): avc: denied { search } for pid=7118 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.221921][ T31] audit: type=1400 audit(1068.157:873): avc: denied { search } for pid=7118 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.222838][ T31] audit: type=1400 audit(1068.157:874): avc: denied { search } for pid=7118 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.374305][ T31] audit: type=1400 audit(1068.307:875): avc: denied { read open } for pid=7125 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.384620][ T31] audit: type=1400 audit(1068.317:876): avc: denied { getattr } for pid=7125 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 555.564197][ T31] audit: type=1326 audit(1068.477:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7126 comm="syz.1.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 555.566514][ T31] audit: type=1326 audit(1068.477:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7126 comm="syz.1.959" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 555.990874][ T7134] syz.0.961 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 558.922139][ T12] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 558.967905][ T12] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 559.100038][ T12] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 559.167714][ T12] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 560.390470][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 560.457554][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 560.465425][ T12] bond0 (unregistering): Released all slaves [ 560.503394][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 560.503708][ T31] audit: type=1326 audit(1073.427:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7184 comm="syz.1.977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 560.503956][ T31] audit: type=1326 audit(1073.427:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7184 comm="syz.1.977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 560.517075][ T31] audit: type=1326 audit(1073.447:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7184 comm="syz.1.977" exe="/syz-executor" sig=0 arch=40000028 syscall=279 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 560.519880][ T31] audit: type=1326 audit(1073.447:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7184 comm="syz.1.977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 560.521359][ T31] audit: type=1326 audit(1073.447:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7184 comm="syz.1.977" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 560.660068][ T12] hsr_slave_0: left promiscuous mode [ 560.682796][ T12] hsr_slave_1: left promiscuous mode [ 560.710666][ T12] veth1_vlan: left promiscuous mode [ 560.711044][ T12] veth0_vlan: left promiscuous mode [ 560.903787][ T31] audit: type=1400 audit(1073.817:905): avc: denied { create } for pid=7187 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 561.379329][ T31] audit: type=1400 audit(1074.307:906): avc: denied { create } for pid=7187 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 561.423536][ T31] audit: type=1400 audit(1074.357:907): avc: denied { write } for pid=7187 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 561.484637][ T31] audit: type=1400 audit(1074.407:908): avc: denied { setopt } for pid=7187 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 561.486698][ T31] audit: type=1400 audit(1074.417:909): avc: denied { write } for pid=7187 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 561.692790][ T7188] netlink: 28 bytes leftover after parsing attributes in process `syz.1.979'. [ 568.555210][ T7171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 568.586492][ T7171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 568.825504][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 568.825896][ T31] audit: type=1400 audit(1081.747:911): avc: denied { create } for pid=7377 comm="syz.1.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 572.583866][ T7171] hsr_slave_0: entered promiscuous mode [ 572.590520][ T7171] hsr_slave_1: entered promiscuous mode [ 572.659480][ T31] audit: type=1400 audit(1085.587:912): avc: denied { create } for pid=7461 comm="syz.1.990" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 572.913677][ T31] audit: type=1400 audit(1085.847:913): avc: denied { unlink } for pid=3123 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=2676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 574.079997][ T7171] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 574.087970][ T7171] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 574.186907][ T7171] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 574.221260][ T7171] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 575.135805][ T31] audit: type=1326 audit(1088.067:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.142309][ T31] audit: type=1326 audit(1088.077:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.142616][ T31] audit: type=1326 audit(1088.077:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.142858][ T31] audit: type=1326 audit(1088.077:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.167477][ T31] audit: type=1326 audit(1088.077:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.167640][ T31] audit: type=1326 audit(1088.097:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.171308][ T31] audit: type=1326 audit(1088.107:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.182668][ T31] audit: type=1326 audit(1088.107:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.186277][ T31] audit: type=1326 audit(1088.117:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.187702][ T31] audit: type=1326 audit(1088.117:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7560 comm="syz.1.995" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 575.962309][ T7567] netlink: 4 bytes leftover after parsing attributes in process `syz.1.997'. [ 576.035957][ T7567] netlink: 4 bytes leftover after parsing attributes in process `syz.1.997'. [ 576.413526][ T7171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 577.343915][ T7576] SELinux: failed to load policy [ 580.689343][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 580.690169][ T31] audit: type=1326 audit(1093.617:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7602 comm="syz.1.1004" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 580.697188][ T31] audit: type=1326 audit(1093.627:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7602 comm="syz.1.1004" exe="/syz-executor" sig=0 arch=40000028 syscall=312 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 580.700204][ T31] audit: type=1326 audit(1093.637:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7602 comm="syz.1.1004" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 580.700946][ T31] audit: type=1326 audit(1093.637:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7602 comm="syz.1.1004" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 581.191253][ T7605] netlink: 72 bytes leftover after parsing attributes in process `syz.1.1005'. [ 582.283323][ T7617] can0: slcan on ptm0. [ 582.420408][ T7615] can0 (unregistered): slcan off ptm0. [ 583.142593][ T31] audit: type=1400 audit(1096.077:935): avc: denied { create } for pid=7629 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 583.150709][ T31] audit: type=1400 audit(1096.087:936): avc: denied { bind } for pid=7629 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 583.702958][ T12] bond0: (slave bond_slave_0): interface is now down [ 583.703640][ T12] bond0: (slave bond_slave_1): interface is now down [ 583.705963][ T12] bond0: now running without any active interface! [ 583.745937][ T7633] netlink: 'syz.1.1011': attribute type 10 has an invalid length. [ 583.775575][ T7633] syz_tun: entered promiscuous mode [ 584.659817][ T31] audit: type=1400 audit(1097.587:937): avc: denied { nlmsg_write } for pid=7643 comm="syz.1.1015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 585.902026][ T31] audit: type=1400 audit(1098.837:938): avc: denied { create } for pid=7654 comm="syz.1.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 585.906380][ T31] audit: type=1400 audit(1098.837:939): avc: denied { write } for pid=7654 comm="syz.1.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 587.087612][ T7171] veth0_vlan: entered promiscuous mode [ 587.118201][ T7171] veth1_vlan: entered promiscuous mode [ 587.508241][ T7171] veth0_macvtap: entered promiscuous mode [ 587.573616][ T7171] veth1_macvtap: entered promiscuous mode [ 587.913150][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.916572][ T12] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.916886][ T12] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.919531][ T12] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.376640][ T31] audit: type=1400 audit(1101.307:940): avc: denied { mounton } for pid=7171 comm="syz-executor" path="/syzkaller.soXxoX/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 588.396563][ T31] audit: type=1400 audit(1101.317:941): avc: denied { mount } for pid=7171 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 588.401499][ T31] audit: type=1400 audit(1101.337:942): avc: denied { mount } for pid=7171 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 588.407183][ T31] audit: type=1400 audit(1101.337:943): avc: denied { mounton } for pid=7171 comm="syz-executor" path="/syzkaller.soXxoX/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 588.410896][ T31] audit: type=1400 audit(1101.337:944): avc: denied { mounton } for pid=7171 comm="syz-executor" path="/syzkaller.soXxoX/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12476 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 588.450251][ T31] audit: type=1400 audit(1101.377:945): avc: denied { unmount } for pid=7171 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 588.466289][ T31] audit: type=1400 audit(1101.397:946): avc: denied { mounton } for pid=7171 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 588.466607][ T31] audit: type=1400 audit(1101.397:947): avc: denied { mount } for pid=7171 comm="syz-executor" name="/" dev="gadgetfs" ino=901 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 591.666058][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 591.666356][ T31] audit: type=1400 audit(1104.597:951): avc: denied { create } for pid=7678 comm="syz.2.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 591.669859][ T31] audit: type=1400 audit(1104.597:952): avc: denied { setopt } for pid=7678 comm="syz.2.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 592.345188][ T31] audit: type=1326 audit(1105.267:953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.345546][ T31] audit: type=1326 audit(1105.267:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.364683][ T31] audit: type=1326 audit(1105.287:955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.365101][ T31] audit: type=1326 audit(1105.287:956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.365329][ T31] audit: type=1326 audit(1105.287:957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.384780][ T31] audit: type=1326 audit(1105.317:958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.388585][ T31] audit: type=1326 audit(1105.317:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.390011][ T31] audit: type=1326 audit(1105.317:960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7692 comm="syz.1.1028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 592.919659][ T7699] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1031'. [ 593.808099][ T7710] netlink: 36 bytes leftover after parsing attributes in process `+}[@'. [ 593.944958][ T7712] netlink: 48 bytes leftover after parsing attributes in process `syz.2.1037'. [ 595.751905][ T7734] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1044'. [ 595.753441][ T7734] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1044'. [ 596.497663][ T7740] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1047'. [ 596.520777][ T7740] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1047'. [ 596.522355][ T7740] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1047'. [ 596.673305][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 596.673609][ T31] audit: type=1400 audit(1109.607:975): avc: denied { create } for pid=7741 comm="syz.2.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 596.691447][ T31] audit: type=1400 audit(1109.607:976): avc: denied { write } for pid=7741 comm="syz.2.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 598.037697][ T31] audit: type=1326 audit(1110.967:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7748 comm="syz.1.1049" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 598.051294][ T31] audit: type=1326 audit(1110.977:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7748 comm="syz.1.1049" exe="/syz-executor" sig=0 arch=40000028 syscall=63 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 598.054044][ T31] audit: type=1326 audit(1110.977:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7748 comm="syz.1.1049" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 598.056783][ T31] audit: type=1326 audit(1110.977:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7748 comm="syz.1.1049" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 602.099825][ T31] audit: type=1400 audit(1115.017:981): avc: denied { block_suspend } for pid=7788 comm="syz.2.1063" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 603.158135][ T7800] SELinux: failed to load policy [ 605.744453][ T31] audit: type=1400 audit(1118.677:982): avc: denied { read write } for pid=3123 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.745403][ T31] audit: type=1400 audit(1118.677:983): avc: denied { open } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.746398][ T31] audit: type=1400 audit(1118.677:984): avc: denied { ioctl } for pid=3123 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.837703][ T31] audit: type=1400 audit(1118.757:985): avc: denied { read } for pid=7809 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 605.875918][ T31] audit: type=1400 audit(1118.807:986): avc: denied { map_create } for pid=7809 comm="syz.1.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 605.877844][ T31] audit: type=1400 audit(1118.807:987): avc: denied { bpf } for pid=7809 comm="syz.1.1069" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 605.880001][ T31] audit: type=1400 audit(1118.807:988): avc: denied { map_read map_write } for pid=7809 comm="syz.1.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 605.884394][ T31] audit: type=1400 audit(1118.807:989): avc: denied { create } for pid=7809 comm="syz.1.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 605.902402][ T31] audit: type=1400 audit(1118.837:990): avc: denied { write } for pid=7809 comm="syz.1.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 608.562317][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 608.562583][ T31] audit: type=1400 audit(1121.487:995): avc: denied { create } for pid=7820 comm="syz.1.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 608.581650][ T31] audit: type=1400 audit(1121.517:996): avc: denied { write } for pid=7820 comm="syz.1.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 609.260757][ T31] audit: type=1326 audit(1122.177:997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.261170][ T31] audit: type=1326 audit(1122.187:998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.286508][ T31] audit: type=1326 audit(1122.187:999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.288607][ T31] audit: type=1326 audit(1122.217:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.291902][ T31] audit: type=1326 audit(1122.217:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.297189][ T31] audit: type=1326 audit(1122.227:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.345199][ T31] audit: type=1326 audit(1122.257:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 609.348194][ T31] audit: type=1326 audit(1122.277:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.1.1076" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.745521][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 613.746412][ T31] audit: type=1326 audit(1126.677:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7844 comm="syz.1.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.780954][ T31] audit: type=1326 audit(1126.697:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7844 comm="syz.1.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 613.782159][ T31] audit: type=1326 audit(1126.697:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7844 comm="syz.1.1084" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 614.964030][ T7851] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1087'. [ 617.467230][ T31] audit: type=1400 audit(1130.387:1033): avc: denied { create } for pid=7864 comm="syz.1.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 617.506397][ T31] audit: type=1400 audit(1130.427:1034): avc: denied { setopt } for pid=7864 comm="syz.1.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 617.555426][ T31] audit: type=1400 audit(1130.477:1035): avc: denied { create } for pid=7864 comm="syz.1.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 619.056200][ T31] audit: type=1400 audit(1131.987:1036): avc: denied { create } for pid=7871 comm="syz.1.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 621.174272][ T31] audit: type=1400 audit(1134.107:1037): avc: denied { name_bind } for pid=7882 comm="syz.1.1098" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 621.176722][ T31] audit: type=1400 audit(1134.107:1038): avc: denied { node_bind } for pid=7882 comm="syz.1.1098" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 623.874822][ T31] audit: type=1400 audit(1136.807:1039): avc: denied { ioctl } for pid=7886 comm="syz.1.1099" path="socket:[12764]" dev="sockfs" ino=12764 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 623.953273][ T31] audit: type=1400 audit(1136.887:1040): avc: denied { write } for pid=7886 comm="syz.1.1099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 624.288251][ T31] audit: type=1400 audit(1137.207:1041): avc: denied { execute } for pid=7888 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 624.375060][ T31] audit: type=1400 audit(1137.277:1042): avc: denied { execute_no_trans } for pid=7888 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 624.400314][ T31] audit: type=1400 audit(1137.317:1043): avc: denied { execmem } for pid=7888 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 624.443812][ T31] audit: type=1400 audit(1137.377:1044): avc: denied { read } for pid=7889 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 624.444180][ T31] audit: type=1400 audit(1137.377:1045): avc: denied { open } for pid=7889 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 624.460457][ T31] audit: type=1400 audit(1137.387:1046): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 624.843145][ T12] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.996658][ T12] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.135593][ T12] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 625.402124][ T12] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 626.228326][ T31] audit: type=1326 audit(1139.157:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7907 comm="syz.2.1101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 626.300347][ T31] audit: type=1326 audit(1139.217:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7907 comm="syz.2.1101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 626.301335][ T31] audit: type=1326 audit(1139.217:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7907 comm="syz.2.1101" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 626.350349][ T31] audit: type=1326 audit(1139.267:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7907 comm="syz.2.1101" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 626.716344][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 626.723423][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 626.726567][ T12] bond0 (unregistering): Released all slaves [ 626.887677][ T12] hsr_slave_0: left promiscuous mode [ 626.894179][ T12] hsr_slave_1: left promiscuous mode [ 626.900561][ T12] veth1_macvtap: left promiscuous mode [ 626.900863][ T12] veth0_macvtap: left promiscuous mode [ 626.901082][ T12] veth1_vlan: left promiscuous mode [ 626.901229][ T12] veth0_vlan: left promiscuous mode [ 629.164786][ T7927] syz_tun: entered allmulticast mode [ 629.631828][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 629.632163][ T31] audit: type=1400 audit(1142.557:1066): avc: denied { name_bind } for pid=7929 comm="syz.2.1109" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 631.500662][ T31] audit: type=1400 audit(1144.417:1067): avc: denied { write } for pid=8001 comm="syz.2.1112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 631.794129][ T31] audit: type=1400 audit(1144.717:1068): avc: denied { create } for pid=8003 comm="syz.2.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 631.796267][ T31] audit: type=1400 audit(1144.727:1069): avc: denied { sys_admin } for pid=8003 comm="syz.2.1113" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 634.787931][ T7889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 634.796182][ T7889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 636.995327][ T7889] hsr_slave_0: entered promiscuous mode [ 636.999652][ T7889] hsr_slave_1: entered promiscuous mode [ 637.003014][ T7889] debugfs: 'hsr0' already exists in 'hsr' [ 637.003879][ T7889] Cannot create hsr debugfs directory [ 637.587618][ T8257] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=8257 comm=syz.2.1116 [ 637.598363][ T31] audit: type=1400 audit(1150.527:1070): avc: denied { audit_write } for pid=8256 comm="syz.2.1116" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 637.604644][ T31] audit: type=1107 audit(1150.537:1071): pid=8256 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 637.773077][ T7889] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 637.786053][ T7889] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 637.793559][ T7889] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 637.827304][ T7889] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 640.490139][ T31] audit: type=1400 audit(1153.417:1072): avc: denied { block_suspend } for pid=8308 comm="syz.2.1123" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 641.316831][ T7889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 642.454556][ T31] audit: type=1400 audit(1155.357:1073): avc: denied { append } for pid=8321 comm="syz.2.1126" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 642.952192][ T8325] veth3: entered promiscuous mode [ 648.861632][ T7889] veth0_vlan: entered promiscuous mode [ 648.882289][ T7889] veth1_vlan: entered promiscuous mode [ 648.946644][ T7889] veth0_macvtap: entered promiscuous mode [ 648.956513][ T7889] veth1_macvtap: entered promiscuous mode [ 649.027890][ T6002] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.028257][ T6002] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.028350][ T6002] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.028495][ T6002] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.136179][ T31] audit: type=1400 audit(1162.067:1074): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/syzkaller.Mg24nR/syz-tmp" dev="vda" ino=817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 649.138121][ T31] audit: type=1400 audit(1162.067:1075): avc: denied { mount } for pid=7889 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 649.144549][ T31] audit: type=1400 audit(1162.077:1076): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/syzkaller.Mg24nR/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 649.148646][ T31] audit: type=1400 audit(1162.077:1077): avc: denied { mount } for pid=7889 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 649.154969][ T31] audit: type=1400 audit(1162.087:1078): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/syzkaller.Mg24nR/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 649.161047][ T31] audit: type=1400 audit(1162.087:1079): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/syzkaller.Mg24nR/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=14390 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 649.174380][ T31] audit: type=1400 audit(1162.107:1080): avc: denied { unmount } for pid=7889 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 649.192464][ T31] audit: type=1400 audit(1162.127:1081): avc: denied { mounton } for pid=7889 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 649.280892][ T31] audit: type=1400 audit(1162.147:1082): avc: denied { mount } for pid=7889 comm="syz-executor" name="/" dev="gadgetfs" ino=901 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 649.281315][ T31] audit: type=1400 audit(1162.157:1083): avc: denied { mount } for pid=7889 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 655.861616][ T8437] lo: entered promiscuous mode [ 655.863728][ T8437] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 659.422764][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 659.423046][ T31] audit: type=1326 audit(1172.327:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.423289][ T31] audit: type=1326 audit(1172.347:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.423484][ T31] audit: type=1326 audit(1172.347:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.423665][ T31] audit: type=1326 audit(1172.347:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.423881][ T31] audit: type=1326 audit(1172.347:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.424062][ T31] audit: type=1326 audit(1172.347:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.430973][ T31] audit: type=1326 audit(1172.357:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.431140][ T31] audit: type=1326 audit(1172.357:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.492182][ T31] audit: type=1326 audit(1172.427:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 659.495710][ T31] audit: type=1326 audit(1172.427:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8454 comm="syz.1.1155" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 664.983582][ T8472] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8472 comm=syz.1.1163 [ 664.983916][ T8472] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=8472 comm=syz.1.1163 [ 666.425097][ T8480] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1167'. [ 666.425486][ T8480] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1167'. [ 666.425680][ T8480] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1167'. [ 666.443998][ T8480] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1167'. [ 666.444545][ T8480] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1167'. [ 666.444728][ T8480] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1167'. [ 676.835460][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 676.835771][ T31] audit: type=1326 audit(1189.767:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.855716][ T31] audit: type=1326 audit(1189.787:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.857829][ T31] audit: type=1326 audit(1189.787:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.860641][ T31] audit: type=1326 audit(1189.787:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.862668][ T31] audit: type=1326 audit(1189.787:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.864505][ T31] audit: type=1326 audit(1189.787:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.868235][ T31] audit: type=1326 audit(1189.797:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.871004][ T31] audit: type=1326 audit(1189.797:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 676.900039][ T31] audit: type=1326 audit(1189.807:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8531 comm="syz.2.1180" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.476751][ T31] audit: type=1326 audit(1196.407:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.496564][ T31] audit: type=1326 audit(1196.427:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.530370][ T31] audit: type=1326 audit(1196.457:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.530819][ T31] audit: type=1326 audit(1196.467:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.535844][ T31] audit: type=1326 audit(1196.467:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.539745][ T31] audit: type=1326 audit(1196.467:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.552403][ T31] audit: type=1326 audit(1196.467:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.560981][ T31] audit: type=1326 audit(1196.487:1198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.567103][ T31] audit: type=1326 audit(1196.487:1199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 683.574552][ T31] audit: type=1326 audit(1196.487:1200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8546 comm="syz.2.1187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.331297][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 690.332383][ T31] audit: type=1326 audit(1203.267:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.337639][ T31] audit: type=1326 audit(1203.267:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.338019][ T31] audit: type=1326 audit(1203.267:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.342652][ T31] audit: type=1326 audit(1203.277:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.349744][ T31] audit: type=1326 audit(1203.277:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.351959][ T31] audit: type=1326 audit(1203.287:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.355219][ T31] audit: type=1326 audit(1203.287:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.356363][ T31] audit: type=1326 audit(1203.287:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.370670][ T31] audit: type=1326 audit(1203.287:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 690.385310][ T31] audit: type=1326 audit(1203.317:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8558 comm="syz.2.1192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 697.061136][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 697.061495][ T31] audit: type=1400 audit(1209.997:1219): avc: denied { connect } for pid=8570 comm="syz.1.1197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 697.567487][ T31] audit: type=1326 audit(1210.497:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8574 comm="syz.1.1199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 697.574409][ T31] audit: type=1326 audit(1210.507:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8574 comm="syz.1.1199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 697.646398][ T31] audit: type=1326 audit(1210.537:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8574 comm="syz.1.1199" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 697.646686][ T31] audit: type=1326 audit(1210.537:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8574 comm="syz.1.1199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 697.902965][ T31] audit: type=1400 audit(1210.837:1224): avc: denied { create } for pid=8578 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 697.906830][ T31] audit: type=1400 audit(1210.837:1225): avc: denied { getopt } for pid=8578 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 698.017301][ T31] audit: type=1326 audit(1210.947:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8582 comm="syz.1.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 698.039919][ T31] audit: type=1326 audit(1210.967:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8582 comm="syz.1.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 698.040302][ T31] audit: type=1326 audit(1210.967:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8582 comm="syz.1.1203" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 703.304795][ T8620] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=8620 comm=syz.1.1214 [ 703.305115][ T8620] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=8620 comm=syz.1.1214 [ 707.178363][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 707.178659][ T31] audit: type=1400 audit(1220.107:1275): avc: denied { create } for pid=8632 comm="syz.2.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 707.240111][ T31] audit: type=1400 audit(1220.177:1276): avc: denied { create } for pid=8632 comm="syz.2.1220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 707.254898][ T8633] pim6reg: entered allmulticast mode [ 707.261704][ T8633] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1220'. [ 707.473592][ T8640] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1221'. [ 709.261240][ T31] audit: type=1400 audit(1222.197:1277): avc: denied { write } for pid=8649 comm="syz.2.1225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 709.262940][ T31] audit: type=1400 audit(1222.197:1278): avc: denied { nlmsg_write } for pid=8649 comm="syz.2.1225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 709.651882][ T31] audit: type=1400 audit(1222.577:1279): avc: denied { setopt } for pid=8654 comm="syz.2.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 709.731637][ T31] audit: type=1400 audit(1222.667:1280): avc: denied { connect } for pid=8654 comm="syz.2.1227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 709.954879][ T8655] netlink: 200 bytes leftover after parsing attributes in process `syz.2.1227'. [ 711.774706][ T8663] netlink: 52 bytes leftover after parsing attributes in process `syz.2.1231'. [ 713.103145][ T8670] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1234'. [ 713.867047][ T31] audit: type=1326 audit(1226.797:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 713.880319][ T31] audit: type=1326 audit(1226.807:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=351 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 713.884269][ T31] audit: type=1326 audit(1226.807:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 713.894211][ T31] audit: type=1326 audit(1226.817:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 713.902666][ T31] audit: type=1326 audit(1226.817:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 714.073056][ T31] audit: type=1326 audit(1227.007:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 714.074836][ T31] audit: type=1326 audit(1227.007:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 714.113794][ T31] audit: type=1326 audit(1227.037:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 714.114218][ T31] audit: type=1326 audit(1227.037:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 714.122870][ T31] audit: type=1326 audit(1227.037:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8669 comm="syz.2.1234" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 717.369334][ T8684] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1238'. [ 718.874218][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 718.875463][ T31] audit: type=1400 audit(1231.807:1298): avc: denied { ioctl } for pid=8694 comm="syz.2.1241" path="socket:[13988]" dev="sockfs" ino=13988 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 722.401739][ T31] audit: type=1326 audit(1235.337:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.411244][ T31] audit: type=1326 audit(1235.347:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.413643][ T31] audit: type=1326 audit(1235.347:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.415848][ T31] audit: type=1326 audit(1235.347:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.417680][ T31] audit: type=1326 audit(1235.347:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.421404][ T31] audit: type=1326 audit(1235.347:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.428005][ T31] audit: type=1326 audit(1235.347:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.428353][ T31] audit: type=1326 audit(1235.347:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.428619][ T31] audit: type=1326 audit(1235.357:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8702 comm="syz.2.1243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 722.848228][ T8705] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1244'. [ 722.848572][ T8705] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1244'. [ 726.983584][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 726.984179][ T31] audit: type=1326 audit(1239.917:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8717 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 726.985365][ T31] audit: type=1326 audit(1239.917:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8717 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 726.987288][ T31] audit: type=1326 audit(1239.917:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8717 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 726.999448][ T31] audit: type=1326 audit(1239.927:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8717 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 727.001773][ T31] audit: type=1326 audit(1239.937:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8717 comm="syz.2.1250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 727.273050][ T31] audit: type=1400 audit(1240.207:1318): avc: denied { create } for pid=8719 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 727.283783][ T31] audit: type=1400 audit(1240.217:1319): avc: denied { write } for pid=8719 comm="syz.2.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 731.344068][ T31] audit: type=1326 audit(1244.277:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8732 comm="syz.2.1257" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 731.347274][ T31] audit: type=1326 audit(1244.277:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8732 comm="syz.2.1257" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 731.360351][ T31] audit: type=1326 audit(1244.297:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8732 comm="syz.2.1257" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 731.939639][ T8744] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 731.940079][ T8744] SELinux: failed to load policy [ 732.181754][ T8748] policy can only be matched on NF_INET_PRE_ROUTING [ 732.181928][ T8748] unable to load match [ 732.442751][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 732.442944][ T31] audit: type=1400 audit(1245.377:1364): avc: denied { bind } for pid=8754 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 732.443076][ T31] audit: type=1400 audit(1245.377:1365): avc: denied { node_bind } for pid=8754 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 732.521761][ T31] audit: type=1400 audit(1245.447:1366): avc: denied { read } for pid=8754 comm="syz.2.1266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 732.797166][ T31] audit: type=1326 audit(1245.727:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8758 comm="syz.2.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 732.812224][ T31] audit: type=1326 audit(1245.747:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8758 comm="syz.2.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=122 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 732.812583][ T31] audit: type=1326 audit(1245.747:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8758 comm="syz.2.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 732.812787][ T31] audit: type=1326 audit(1245.747:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8758 comm="syz.2.1268" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 733.917206][ T8776] syzkaller0: entered promiscuous mode [ 733.917547][ T8776] syzkaller0: entered allmulticast mode [ 735.830307][ T8785] netlink: 188 bytes leftover after parsing attributes in process `syz.2.1277'. [ 735.889403][ T8784] netlink: 188 bytes leftover after parsing attributes in process `syz.2.1277'. [ 736.410648][ T31] audit: type=1400 audit(1249.307:1371): avc: denied { map } for pid=8786 comm="syz.2.1278" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 736.412184][ T31] audit: type=1400 audit(1249.347:1372): avc: denied { read write } for pid=8786 comm="syz.2.1278" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 736.992806][ T31] audit: type=1326 audit(1249.927:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8791 comm="syz.2.1280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 737.356526][ T8795] pim6reg1: entered promiscuous mode [ 737.356990][ T8795] pim6reg1: entered allmulticast mode [ 738.113198][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 738.119774][ T31] audit: type=1400 audit(1251.047:1386): avc: denied { create } for pid=8804 comm="syz.1.1284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 738.126583][ T31] audit: type=1400 audit(1251.057:1387): avc: denied { mount } for pid=8804 comm="syz.1.1284" name="/" dev="ramfs" ino=14187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 738.159768][ T31] audit: type=1400 audit(1251.087:1388): avc: denied { bind } for pid=8804 comm="syz.1.1284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 738.162793][ T31] audit: type=1400 audit(1251.097:1389): avc: denied { listen } for pid=8804 comm="syz.1.1284" path=2F37312FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=1 [ 738.523522][ T31] audit: type=1326 audit(1251.457:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 738.527077][ T31] audit: type=1326 audit(1251.457:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 738.569589][ T31] audit: type=1326 audit(1251.487:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 738.598064][ T31] audit: type=1326 audit(1251.507:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 738.710607][ T31] audit: type=1326 audit(1251.617:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 738.718305][ T31] audit: type=1326 audit(1251.647:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8831 comm="syz.1.1288" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 740.055460][ T8848] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1295'. [ 745.894299][ T8904] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1319'. [ 750.501297][ T8921] all: renamed from lo (while UP) [ 750.917480][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 750.929909][ T31] audit: type=1326 audit(1263.847:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.934653][ T31] audit: type=1326 audit(1263.857:1496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.940163][ T31] audit: type=1326 audit(1263.857:1497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.949791][ T31] audit: type=1326 audit(1263.857:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.957480][ T31] audit: type=1326 audit(1263.857:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.961247][ T31] audit: type=1326 audit(1263.867:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=180 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.969601][ T31] audit: type=1326 audit(1263.867:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 750.971092][ T31] audit: type=1326 audit(1263.877:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8950 comm="syz.2.1335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 751.376378][ T31] audit: type=1400 audit(1264.307:1503): avc: denied { wake_alarm } for pid=8963 comm="syz.2.1338" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 751.414537][ T31] audit: type=1326 audit(1264.347:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8963 comm="syz.2.1338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 757.885805][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 757.886982][ T31] audit: type=1400 audit(1270.817:1516): avc: denied { read } for pid=9005 comm="syz.1.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 760.561163][ T31] audit: type=1400 audit(1273.497:1517): avc: denied { getopt } for pid=9023 comm="syz.2.1363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 761.985453][ T9034] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 761.987038][ T31] audit: type=1400 audit(1274.897:1518): avc: denied { mac_admin } for pid=9033 comm="syz.2.1365" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 761.991710][ T31] audit: type=1400 audit(1274.917:1519): avc: denied { relabelto } for pid=9033 comm="syz.2.1365" name="181" dev="tmpfs" ino=933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 761.994346][ T31] audit: type=1400 audit(1274.917:1520): avc: denied { associate } for pid=9033 comm="syz.2.1365" name="181" dev="tmpfs" ino=933 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 762.052569][ T31] audit: type=1400 audit(1274.987:1521): avc: denied { remove_name } for pid=7171 comm="syz-executor" name="binderfs" dev="tmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 762.081068][ T31] audit: type=1400 audit(1275.007:1522): avc: denied { rmdir } for pid=7171 comm="syz-executor" name="181" dev="tmpfs" ino=933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 762.569721][ T9037] ªªªªªª: renamed from vlan0 (while UP) [ 763.415442][ T31] audit: type=1400 audit(1276.347:1523): avc: denied { write } for pid=9040 comm="syz.2.1368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 763.903729][ T31] audit: type=1326 audit(1276.837:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.905785][ T31] audit: type=1326 audit(1276.837:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.913901][ T31] audit: type=1326 audit(1276.847:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.921738][ T31] audit: type=1326 audit(1276.857:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.922135][ T31] audit: type=1326 audit(1276.857:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.924195][ T31] audit: type=1326 audit(1276.857:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.930989][ T31] audit: type=1326 audit(1276.867:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.931359][ T31] audit: type=1326 audit(1276.867:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 763.941705][ T31] audit: type=1326 audit(1276.877:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9042 comm="syz.2.1369" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 764.340880][ T9045] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 765.304870][ T9049] veth0: entered promiscuous mode [ 765.399731][ T9048] veth0: left promiscuous mode [ 768.601415][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 768.601722][ T31] audit: type=1400 audit(1281.537:1583): avc: denied { ioctl } for pid=9083 comm="syz.2.1379" path="socket:[16422]" dev="sockfs" ino=16422 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 768.891372][ T31] audit: type=1400 audit(1281.827:1584): avc: denied { bind } for pid=9083 comm="syz.2.1379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 769.174650][ T9087] netlink: 68 bytes leftover after parsing attributes in process `syz.2.1380'. [ 769.257680][ T9089] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1381'. [ 771.990203][ T9116] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1390'. [ 774.301436][ T9130] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 774.301925][ T9130] IPv6: NLM_F_CREATE should be set when creating new route [ 774.302189][ T9130] IPv6: NLM_F_CREATE should be set when creating new route [ 774.312838][ T9130] ------------[ cut here ]------------ [ 774.316304][ T9130] WARNING: CPU: 1 PID: 9130 at drivers/net/netdevsim/fib.c:831 nsim_fib_event_nb+0x218/0x52c [ 774.320806][ T9130] Modules linked in: [ 774.321563][ T9130] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 774.322030][ T9130] CPU: 1 UID: 0 PID: 9130 Comm: syz.2.1397 Not tainted syzkaller #0 PREEMPT [ 774.322479][ T9130] Hardware name: ARM-Versatile Express [ 774.322841][ T9130] Call trace: [ 774.323106][ T9130] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 774.324205][ T9130] r7:00000000 r6:8281f77c r5:00000000 r4:8226023c [ 774.324495][ T9130] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 774.325343][ T9130] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 774.326367][ T9130] r5:00000000 r4:82a77d18 [ 774.327081][ T9130] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 774.327560][ T9130] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 774.328065][ T9130] r7:80e4d2ec [ 774.328209][ T9130] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 774.328691][ T9130] r3:8280c684 r2:00000001 r1:82246c58 r0:8224e6d4 [ 774.329058][ T9130] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 774.329526][ T9130] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 774.332767][ T9130] r8:00000009 r7:82347994 r6:dfb198e4 r5:84178c00 r4:00000000 [ 774.338369][ T9130] [<80254bd0>] (warn_slowpath_fmt) from [<80e4d2ec>] (nsim_fib_event_nb+0x218/0x52c) [ 774.339429][ T9130] r10:89b83d00 r9:85b927c4 r8:00000001 r7:89b83d00 r6:dfb199ec r5:85b920c0 [ 774.339860][ T9130] r4:84142e00 [ 774.340020][ T9130] [<80e4d0d4>] (nsim_fib_event_nb) from [<802855f8>] (notifier_call_chain+0x60/0x1b4) [ 774.340481][ T9130] r10:dfb199ec r9:dfb19b34 r8:80e4d0d4 r7:00000000 r6:ffffffff r5:84142e00 [ 774.340950][ T9130] r4:00000000 [ 774.341209][ T9130] [<80285598>] (notifier_call_chain) from [<80285874>] (atomic_notifier_call_chain+0x3c/0x50) [ 774.344301][ T9130] r10:dfb19a40 r9:dfb19b34 r8:00000003 r7:00000005 r6:dfb199ec r5:00000001 [ 774.346855][ T9130] r4:85b18588 [ 774.347105][ T9130] [<80285838>] (atomic_notifier_call_chain) from [<815b821c>] (call_fib_notifiers+0x44/0x58) [ 774.347648][ T9130] r6:85b18580 r5:dfb199ec r4:00000001 [ 774.347920][ T9130] [<815b81d8>] (call_fib_notifiers) from [<81870b64>] (call_fib6_notifiers+0x18/0x1c) [ 774.349213][ T9130] r7:00000000 r6:89b83d00 r5:00000000 r4:00000000 [ 774.349686][ T9130] [<81870b4c>] (call_fib6_notifiers) from [<818464f4>] (call_fib6_multipath_entry_notifiers+0x48/0x6c) [ 774.350516][ T9130] [<818464ac>] (call_fib6_multipath_entry_notifiers) from [<81842d4c>] (ip6_route_multipath_add+0x5c8/0x7ac) [ 774.351434][ T9130] r4:00000001 [ 774.351645][ T9130] [<81842784>] (ip6_route_multipath_add) from [<81842fb0>] (inet6_rtm_newroute+0x80/0xc4) [ 774.354318][ T9130] r10:00000000 r9:00000000 r8:82c1f568 r7:85e13000 r6:85a95d40 r5:85e13000 [ 774.359797][ T9130] r4:dfb19c48 [ 774.360105][ T9130] [<81842f30>] (inet6_rtm_newroute) from [<81591298>] (rtnetlink_rcv_msg+0x2e0/0x334) [ 774.360504][ T9130] r6:0000000a r5:81842f30 r4:85a95d40 [ 774.360698][ T9130] [<81590fb8>] (rtnetlink_rcv_msg) from [<81671310>] (netlink_rcv_skb+0xc0/0x120) [ 774.361178][ T9130] r10:00000000 r9:00000000 r8:85559d80 r7:0000004c r6:85a95d40 r5:81590fb8 [ 774.361526][ T9130] r4:85e13000 [ 774.361697][ T9130] [<81671250>] (netlink_rcv_skb) from [<8158fe64>] (rtnetlink_rcv+0x18/0x1c) [ 774.362216][ T9130] r7:85e13000 r6:85b18080 r5:0000004c r4:85efc000 [ 774.362541][ T9130] [<8158fe4c>] (rtnetlink_rcv) from [<81670adc>] (netlink_unicast+0x1f0/0x30c) [ 774.362922][ T9130] [<816708ec>] (netlink_unicast) from [<81670dc4>] (netlink_sendmsg+0x1cc/0x444) [ 774.363249][ T9130] r9:00000000 r8:00000000 r7:84ac9800 r6:0000004c r5:85e13000 r4:dfb19f20 [ 774.363550][ T9130] [<81670bf8>] (netlink_sendmsg) from [<81542d20>] (__sock_sendmsg+0x44/0x78) [ 774.363901][ T9130] r10:00000000 r9:dfb19dc4 r8:dfb19dc4 r7:00000000 r6:837f9900 r5:dfb19f20 [ 774.364178][ T9130] r4:00000000 [ 774.364324][ T9130] [<81542cdc>] (__sock_sendmsg) from [<81544074>] (____sys_sendmsg+0x298/0x2cc) [ 774.364685][ T9130] r7:00000000 r6:837f9900 r5:00000000 r4:dfb19f20 [ 774.364979][ T9130] [<81543ddc>] (____sys_sendmsg) from [<8154603c>] (___sys_sendmsg+0x9c/0xd0) [ 774.365305][ T9130] r10:dfb19e24 r9:20000100 r8:00000000 r7:00000000 r6:837f9900 r5:dfb19f20 [ 774.365596][ T9130] r4:00000000 [ 774.365774][ T9130] [<81545fa0>] (___sys_sendmsg) from [<815464d4>] (__sys_sendmsg+0x8c/0xe0) [ 774.366178][ T9130] r10:00000128 r9:84178c00 r8:85dd09c0 r7:00000000 r6:20000100 r5:85dd09c1 [ 774.366522][ T9130] r4:00000004 [ 774.366667][ T9130] [<81546448>] (__sys_sendmsg) from [<8154653c>] (sys_sendmsg+0x14/0x18) [ 774.367000][ T9130] r8:8020029c r7:00000128 r6:002f6308 r5:00000000 r4:00000000 [ 774.367333][ T9130] [<81546528>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 774.367705][ T9130] Exception stack(0xdfb19fa8 to 0xdfb19ff0) [ 774.368008][ T9130] 9fa0: 00000000 00000000 00000004 20000100 00000000 00000000 [ 774.368308][ T9130] 9fc0: 00000000 00000000 002f6308 00000128 002e0000 00000000 00006364 76f210bc [ 774.368827][ T9130] 9fe0: 76f20ec0 76f20eb0 0001948c 001322c0 [ 774.371653][ T9130] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:37:17 Registers: info registers vcpu 0 CPU#0 R00=deb938d4 R01=deb938d4 R02=00000000 R03=e0bcd75f R04=deb938d4 R05=00000000 R06=00000110 R07=00120000 R08=00000000 R09=dfc1de28 R10=deb9179c R11=dfc1dddc R12=dfc1dda8 R13=dfc1dda8 R14=80469aa8 R15=804c6194 PSR=60000113 -ZC- A S svc32 s00=000cffff s01=00650000 d00=00650000000cffff s02=00000000 s03=00000300 d01=0000030000000000 s04=296065b0 s05=3614c6a6 d02=3614c6a6296065b0 s06=cc9af4de s07=2419651a d03=2419651acc9af4de s08=3c9b1170 s09=af082df5 d04=af082df53c9b1170 s10=c3425377 s11=8c26c71c d05=8c26c71cc3425377 s12=00000005 s13=00000000 d06=0000000000000005 s14=00000000 s15=d20a0000 d07=d20a000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=314e8e6c s33=dd3f954b d16=dd3f954b314e8e6c s34=6ce2d986 s35=28bc6fad d17=28bc6fad6ce2d986 s36=0e303b8a s37=14b6ebaf d18=14b6ebaf0e303b8a s38=60db0861 s39=be939dea d19=be939dea60db0861 s40=c8bce2c7 s41=ff4441f7 d20=ff4441f7c8bce2c7 s42=bfca9004 s43=d07d1ef3 d21=d07d1ef3bfca9004 s44=86e8215c s45=2298bc0d d22=2298bc0d86e8215c s46=6bc87e7a s47=bd760598 d23=bd7605986bc87e7a s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00440000 s53=002c0000 d26=002c000000440000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ffae0000 d29=ffae000003e60000 s60=000cffff s61=00090000 d30=00090000000cffff s62=00000000 s63=00000300 d31=0000030000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=82864430 R01=00000000 R02=00000058 R03=82826fd0 R04=3fffeb24 R05=82826f88 R06=dfb196b4 R07=dfb196c0 R08=0003d460 R09=82864430 R10=00000000 R11=dfb19680 R12=00000000 R13=dfb1962c R14=802e6770 R15=81a0a400 PSR=60010193 -ZC- A S svc32 s00=00180000 s01=00140000 d00=0014000000180000 s02=00100000 s03=000c0000 d01=000c000000100000 s04=027797ce s05=d276bf3d d02=d276bf3d027797ce s06=c8e9788f s07=c76c027b d03=c76c027bc8e9788f s08=c358e760 s09=da9a7741 d04=da9a7741c358e760 s10=5da9978e s11=109711c7 d05=109711c75da9978e s12=8ef6d53e s13=28164aa1 d06=28164aa18ef6d53e s14=f586b63c s15=5832e6fe d07=5832e6fef586b63c s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=7b142833 s33=fbc85c11 d16=fbc85c117b142833 s34=36af8f8b s35=e1d814c5 d17=e1d814c536af8f8b s36=9935dfb8 s37=1fbef512 d18=1fbef5129935dfb8 s38=774e2d8b s39=a262f29d d19=a262f29d774e2d8b s40=fe72ca54 s41=89f8a255 d20=89f8a255fe72ca54 s42=f43885fc s43=e2a5a69c d21=e2a5a69cf43885fc s44=29828368 s45=c0adeef4 d22=c0adeef429828368 s46=4a5a8fc8 s47=c8aec811 d23=c8aec8114a5a8fc8 s48=0000000b s49=000a0004 d24=000a00040000000b s50=00080000 s51=00000000 d25=0000000000080000 s52=00000300 s53=ffc20000 d26=ffc2000000000300 s54=000cffff s55=00090000 d27=00090000000cffff s56=00000000 s57=00000300 d28=0000030000000000 s58=ffd60000 s59=000cffff d29=000cffffffd60000 s60=00020000 s61=00000000 d30=0000000000020000 s62=00000300 s63=ffea0000 d31=ffea000000000300 FPSCR: 00000000