last executing test programs: 18.84185482s ago: executing program 1 (id=360): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c840}, 0x20048054) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.504233724s ago: executing program 1 (id=367): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) flistxattr(r0, 0x0, 0x0) 2.384347391s ago: executing program 1 (id=368): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) openat$tun(0xffffffffffffff9c, 0x0, 0x20b41, 0x0) io_uring_enter(0xffffffffffffffff, 0x1046, 0xb6ed, 0x2, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x7}, 0x18) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="18000000640001"], 0x18}}, 0x0) syz_clone(0xc510c080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3000000010000108000000010000000000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b0000000000a40867043ef554766babe947d2d38f841ea28152c812939cc5541d9791d319c4a6ef562b59fa072cbba317e464ff55fcb3cb0803422fca271aa7c138"], 0x30}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) socket$inet6_sctp(0xa, 0x1, 0x84) 1.462825891s ago: executing program 0 (id=371): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_access(r1, &(0x7f00000001c0)={'system_u:object_r:public_content_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xa710}, 0x69) 1.323828109s ago: executing program 0 (id=372): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x1, &(0x7f0000000100)=@raw=[@jmp={0x5, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffe88, 0xfffffffffffffff0}], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) 1.075477482s ago: executing program 0 (id=373): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xc, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000200)={0x4, 0xf74, 0x8, 0xffffffff, 0xb4, 0x2, 0xfff, 0x8001, r2}, &(0x7f00000003c0)=0x20) 714.815811ms ago: executing program 0 (id=374): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f00000003c0)={r0, 0x0, &(0x7f00000005c0)=""/58}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffea4, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r1, 0x0, 0x20000000}, 0x18) rt_tgsigqueueinfo(0x0, 0x0, 0x1c, 0x0) 385.599329ms ago: executing program 1 (id=375): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000feffffff850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) read$rfkill(r1, &(0x7f0000000040), 0x8) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 385.247779ms ago: executing program 0 (id=376): syz_emit_ethernet(0x7a, &(0x7f0000000b00)=ANY=[@ANYBLOB="856b1200ff00aaaaaaaaaaaa86dd60381f3400442f01fc000000000000000000000000000000ff020000000000000000000000000001042088a80000000200000800000086dd0800"], 0x0) 332.927072ms ago: executing program 1 (id=377): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) setitimer(0x1, 0x0, 0x0) 118.622583ms ago: executing program 0 (id=378): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_io_uring_setup(0x417, &(0x7f0000002180)={0x0, 0x4d91, 0x100, 0x1, 0xb9}, &(0x7f0000000140)=0x0, &(0x7f00000000c0)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r1, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0x1f, 0x3}]}, 0x1, 0x1}, 0x1) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r0, 0x0, 0x0, 0x0, 0x200, 0x1, {0x1}}) io_uring_enter(r1, 0x3516, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=379): setresuid(0xee01, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000940)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[@cred={{0x1c}}], 0x20, 0x51}}], 0x1, 0x0) kernel console output (not intermixed with test programs): syzkaller login: [ 35.733415][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 35.733926][ T31] audit: type=1400 audit(35.650:58): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.737000][ T31] audit: type=1400 audit(35.650:59): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:2500' (ED25519) to the list of known hosts. [ 45.474892][ T31] audit: type=1400 audit(45.390:60): avc: denied { name_bind } for pid=3095 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 46.955595][ T31] audit: type=1400 audit(46.880:61): avc: denied { execute } for pid=3096 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 46.984232][ T31] audit: type=1400 audit(46.880:62): avc: denied { execute_no_trans } for pid=3096 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 48.669031][ T31] audit: type=1400 audit(48.590:63): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 48.671639][ T31] audit: type=1400 audit(48.590:64): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.683363][ T3096] cgroup: Unknown subsys name 'net' [ 48.690275][ T31] audit: type=1400 audit(48.610:65): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 48.802783][ T3096] cgroup: Unknown subsys name 'cpuset' [ 48.807107][ T3096] cgroup: Unknown subsys name 'hugetlb' [ 48.807708][ T3096] cgroup: Unknown subsys name 'rlimit' [ 48.974062][ T31] audit: type=1400 audit(48.890:66): avc: denied { setattr } for pid=3096 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.976284][ T31] audit: type=1400 audit(48.900:67): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 48.977316][ T31] audit: type=1400 audit(48.900:68): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 49.093574][ T3098] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 49.096801][ T31] audit: type=1400 audit(49.020:69): avc: denied { relabelto } for pid=3098 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 53.361116][ T3096] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 54.405275][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 54.405690][ T31] audit: type=1400 audit(54.320:73): avc: denied { execmem } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 54.451884][ T31] audit: type=1400 audit(54.370:74): avc: denied { read } for pid=3101 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.452298][ T31] audit: type=1400 audit(54.370:75): avc: denied { open } for pid=3101 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 54.461631][ T31] audit: type=1400 audit(54.380:76): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 54.477224][ T31] audit: type=1400 audit(54.400:77): avc: denied { module_request } for pid=3102 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.479040][ T31] audit: type=1400 audit(54.400:78): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 54.519190][ T31] audit: type=1400 audit(54.440:79): avc: denied { sys_module } for pid=3101 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 54.862387][ T31] audit: type=1400 audit(54.780:80): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.514299][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.532442][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.535472][ T3102] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.552544][ T3102] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.997901][ T3101] hsr_slave_0: entered promiscuous mode [ 56.000277][ T3101] hsr_slave_1: entered promiscuous mode [ 56.064253][ T3102] hsr_slave_0: entered promiscuous mode [ 56.066167][ T3102] hsr_slave_1: entered promiscuous mode [ 56.068584][ T3102] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 56.070758][ T3102] Cannot create hsr debugfs directory [ 56.281186][ T31] audit: type=1400 audit(56.200:81): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 56.282684][ T31] audit: type=1400 audit(56.200:82): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 56.290772][ T3101] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 56.299458][ T3101] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 56.309589][ T3101] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 56.318198][ T3101] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 56.352913][ T3102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 56.359489][ T3102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 56.366186][ T3102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 56.370543][ T3102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 56.760486][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.814062][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 58.284153][ T3101] veth0_vlan: entered promiscuous mode [ 58.312496][ T3101] veth1_vlan: entered promiscuous mode [ 58.360064][ T3101] veth0_macvtap: entered promiscuous mode [ 58.368076][ T3101] veth1_macvtap: entered promiscuous mode [ 58.404168][ T3101] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.405310][ T3101] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.405576][ T3101] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.405729][ T3101] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.562986][ T3101] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 58.724378][ T3102] veth0_vlan: entered promiscuous mode [ 58.744226][ T3102] veth1_vlan: entered promiscuous mode [ 58.788005][ T3102] veth0_macvtap: entered promiscuous mode [ 58.796580][ T3102] veth1_macvtap: entered promiscuous mode [ 58.848869][ T3102] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.849700][ T3102] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.852408][ T3102] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 58.853972][ T3102] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 59.376092][ T3791] netlink: 'syz.0.5': attribute type 10 has an invalid length. [ 59.743347][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 59.746170][ T31] audit: type=1400 audit(59.660:106): avc: denied { create } for pid=3786 comm="syz.1.2" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 59.757120][ T31] audit: type=1400 audit(59.680:107): avc: denied { read } for pid=3786 comm="syz.1.2" name="file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 59.757375][ T31] audit: type=1400 audit(59.680:108): avc: denied { open } for pid=3786 comm="syz.1.2" path="/0/file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 61.599712][ T31] audit: type=1400 audit(61.510:109): avc: denied { unlink } for pid=3102 comm="syz-executor" name="file0" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 61.967408][ T31] audit: type=1400 audit(61.890:110): avc: denied { setopt } for pid=3813 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 62.001324][ T31] audit: type=1400 audit(61.920:111): avc: denied { execute } for pid=3813 comm="syz.1.12" name="file1" dev="tmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 62.002775][ T3814] process 'syz.1.12' launched './file1' with NULL argv: empty string added [ 62.004348][ T31] audit: type=1400 audit(61.920:112): avc: denied { execute_no_trans } for pid=3813 comm="syz.1.12" path="/1/file1" dev="tmpfs" ino=24 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 62.671291][ T31] audit: type=1400 audit(62.590:113): avc: denied { create } for pid=3823 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 62.685539][ T31] audit: type=1400 audit(62.590:114): avc: denied { shutdown } for pid=3823 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 62.687502][ T31] audit: type=1400 audit(62.610:115): avc: denied { getopt } for pid=3823 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 63.543344][ T3833] smc: net device bond0 applied user defined pnetid SYZ0 [ 64.904525][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 64.905162][ T31] audit: type=1400 audit(64.820:136): avc: denied { ioctl } for pid=3854 comm="syz.0.28" path="cgroup:[4026532658]" dev="nsfs" ino=4026532658 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.130070][ T3857] netlink: 12 bytes leftover after parsing attributes in process `syz.0.29'. [ 65.485944][ T31] audit: type=1400 audit(65.400:137): avc: denied { name_bind } for pid=3862 comm="syz.0.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.486673][ T31] audit: type=1400 audit(65.400:138): avc: denied { node_bind } for pid=3862 comm="syz.0.31" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 66.442280][ T31] audit: type=1400 audit(66.350:139): avc: denied { ioctl } for pid=3872 comm="syz.0.34" path="socket:[2424]" dev="sockfs" ino=2424 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 66.455293][ T31] audit: type=1400 audit(66.380:140): avc: denied { write } for pid=3872 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 67.061252][ T3870] vlan2: entered allmulticast mode [ 67.062962][ T3870] bridge_slave_0: entered allmulticast mode [ 67.100362][ T31] audit: type=1400 audit(67.020:141): avc: denied { create } for pid=3878 comm="syz.0.36" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 67.645852][ T31] audit: type=1400 audit(67.560:142): avc: denied { unlink } for pid=3101 comm="syz-executor" name="file0" dev="tmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 71.557392][ T31] audit: type=1326 audit(71.480:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.41" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 71.559456][ T31] audit: type=1326 audit(71.480:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.41" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 71.577887][ T31] audit: type=1326 audit(71.500:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.41" exe="/syz-executor" sig=0 arch=40000028 syscall=148 compat=0 ip=0x131f30 code=0x7ffc0000 [ 71.587148][ T31] audit: type=1326 audit(71.500:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.41" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 71.588948][ T31] audit: type=1326 audit(71.500:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.41" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 71.879035][ T31] audit: type=1400 audit(71.800:148): avc: denied { write } for pid=3923 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 71.880909][ T31] audit: type=1400 audit(71.800:149): avc: denied { name_connect } for pid=3923 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 75.331332][ T31] audit: type=1400 audit(75.250:150): avc: denied { create } for pid=3934 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 75.351573][ T31] audit: type=1400 audit(75.270:151): avc: denied { accept } for pid=3934 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 79.395053][ T31] audit: type=1400 audit(79.300:152): avc: denied { map } for pid=3998 comm="syz.0.60" path="socket:[2540]" dev="sockfs" ino=2540 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 83.307802][ T31] audit: type=1400 audit(83.230:153): avc: denied { setopt } for pid=4028 comm="syz.1.63" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.532766][ T4031] netlink: 16 bytes leftover after parsing attributes in process `syz.1.64'. [ 83.889160][ T4034] netlink: 256 bytes leftover after parsing attributes in process `syz.1.65'. [ 83.894256][ T4034] netlink: 48 bytes leftover after parsing attributes in process `syz.1.65'. [ 85.945839][ T31] audit: type=1400 audit(85.870:154): avc: denied { create } for pid=4032 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 87.155265][ T4047] lo: entered promiscuous mode [ 87.155827][ T4047] lo: entered allmulticast mode [ 87.633417][ T31] audit: type=1400 audit(87.550:155): avc: denied { mount } for pid=4052 comm="syz.1.73" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 87.658595][ T31] audit: type=1400 audit(87.580:156): avc: denied { unmount } for pid=4052 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 87.951440][ T31] audit: type=1400 audit(87.870:157): avc: denied { setopt } for pid=4054 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 87.958504][ T31] audit: type=1400 audit(87.870:158): avc: denied { bind } for pid=4054 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 87.963541][ T31] audit: type=1400 audit(87.880:159): avc: denied { name_bind } for pid=4054 comm="syz.1.74" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 87.967916][ T31] audit: type=1400 audit(87.890:160): avc: denied { node_bind } for pid=4054 comm="syz.1.74" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 88.620877][ T31] audit: type=1400 audit(88.540:161): avc: denied { allowed } for pid=4060 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 88.676954][ T31] audit: type=1400 audit(88.600:162): avc: denied { create } for pid=4060 comm="syz.1.75" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 90.645245][ T31] audit: type=1400 audit(90.560:163): avc: denied { ioctl } for pid=4066 comm="+}[@" path="socket:[2601]" dev="sockfs" ino=2601 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.584172][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 91.586010][ T31] audit: type=1400 audit(91.500:165): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=43600 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 91.588588][ T31] audit: type=1400 audit(91.500:166): avc: denied { recv } for pid=3096 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=43600 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 91.920681][ T31] audit: type=1326 audit(91.840:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4080 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 91.922192][ T31] audit: type=1326 audit(91.840:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4080 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 91.925706][ T31] audit: type=1326 audit(91.850:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4080 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=339 compat=0 ip=0x131f30 code=0x7ffc0000 [ 91.927492][ T31] audit: type=1326 audit(91.850:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4080 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 91.929265][ T31] audit: type=1326 audit(91.850:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4080 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 92.922053][ T4087] netlink: 288 bytes leftover after parsing attributes in process `syz.1.85'. [ 93.140557][ T4089] netlink: 20 bytes leftover after parsing attributes in process `syz.1.86'. [ 93.145709][ T4089] netlink: 4 bytes leftover after parsing attributes in process `syz.1.86'. [ 96.334336][ T31] audit: type=1326 audit(96.250:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 96.342400][ T31] audit: type=1326 audit(96.260:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131f30 code=0x7ffc0000 [ 96.346777][ T31] audit: type=1326 audit(96.270:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.89" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 98.060274][ T4139] netlink: 32 bytes leftover after parsing attributes in process `syz.0.95'. [ 98.450829][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 98.451126][ T31] audit: type=1326 audit(98.360:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 98.451288][ T31] audit: type=1326 audit(98.370:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 98.451455][ T31] audit: type=1326 audit(98.370:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x131f30 code=0x7ffc0000 [ 98.451587][ T31] audit: type=1326 audit(98.370:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4141 comm="syz.0.96" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 103.004802][ C0] hrtimer: interrupt took 8925680 ns [ 110.520342][ T31] audit: type=1400 audit(110.440:226): avc: denied { map } for pid=4164 comm="syz.1.103" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3404 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 110.526332][ T31] audit: type=1400 audit(110.450:227): avc: denied { read write } for pid=4164 comm="syz.1.103" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3404 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 112.209190][ T4167] IPv6: Can't replace route, no match found [ 113.545426][ T31] audit: type=1400 audit(113.460:228): avc: denied { mount } for pid=4176 comm="syz.1.108" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 113.826599][ T31] audit: type=1400 audit(113.740:229): avc: denied { create } for pid=4179 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 113.827179][ T31] audit: type=1400 audit(113.740:230): avc: denied { ioctl } for pid=4179 comm="syz.1.109" path="socket:[2683]" dev="sockfs" ino=2683 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 115.124851][ T31] audit: type=1400 audit(115.030:231): avc: denied { create } for pid=4187 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.158079][ T31] audit: type=1400 audit(115.080:232): avc: denied { setopt } for pid=4187 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.245003][ T31] audit: type=1400 audit(115.160:233): avc: denied { create } for pid=4189 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 115.248210][ T31] audit: type=1400 audit(115.170:234): avc: denied { write } for pid=4189 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 115.509931][ T31] audit: type=1400 audit(115.430:235): avc: denied { create } for pid=4192 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 115.677117][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 115.677850][ T31] audit: type=1326 audit(115.600:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.685525][ T31] audit: type=1326 audit(115.600:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.686534][ T31] audit: type=1326 audit(115.600:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.687470][ T31] audit: type=1326 audit(115.600:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.688538][ T31] audit: type=1326 audit(115.610:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.691042][ T31] audit: type=1326 audit(115.610:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=293 compat=0 ip=0x131f30 code=0x7ffc0000 [ 115.692159][ T31] audit: type=1326 audit(115.610:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4195 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 119.175107][ T31] audit: type=1400 audit(119.070:244): avc: denied { write } for pid=4198 comm="syz.0.116" name="file0" dev="tmpfs" ino=389 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 119.175572][ T31] audit: type=1400 audit(119.080:245): avc: denied { ioctl } for pid=4198 comm="syz.0.116" path="/73/file0" dev="tmpfs" ino=389 ioctlcmd=0x1276 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 126.459596][ T31] audit: type=1400 audit(126.380:246): avc: denied { append } for pid=4213 comm="syz.1.120" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 126.538204][ T4214] netlink: 4 bytes leftover after parsing attributes in process `syz.1.120'. [ 129.167767][ T31] audit: type=1326 audit(129.090:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.172891][ T31] audit: type=1326 audit(129.090:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.177712][ T31] audit: type=1326 audit(129.100:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.182649][ T31] audit: type=1326 audit(129.100:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.187051][ T31] audit: type=1326 audit(129.100:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.200429][ T31] audit: type=1326 audit(129.110:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.200744][ T31] audit: type=1326 audit(129.120:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.200935][ T31] audit: type=1326 audit(129.120:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.201070][ T31] audit: type=1326 audit(129.120:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4221 comm="syz.0.123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 129.499178][ T4224] netlink: 180 bytes leftover after parsing attributes in process `syz.0.124'. [ 129.841845][ T4226] netlink: 4 bytes leftover after parsing attributes in process `syz.1.125'. [ 129.875314][ T4226] hsr_slave_0 (unregistering): left promiscuous mode [ 131.700210][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 131.700535][ T31] audit: type=1400 audit(131.620:312): avc: denied { mounton } for pid=4256 comm="syz.1.135" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 131.705013][ T4258] tmpfs: Unknown parameter 'defcontextC' [ 132.270537][ T4266] netlink: 'syz.0.139': attribute type 4 has an invalid length. [ 132.921849][ T4296] netlink: 4 bytes leftover after parsing attributes in process `syz.0.143'. [ 134.827725][ T4324] SELinux: syz.1.155 (4324) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 134.959761][ T31] audit: type=1400 audit(134.880:313): avc: denied { setopt } for pid=4325 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 135.077296][ T31] audit: type=1400 audit(135.000:314): avc: denied { connect } for pid=4327 comm="syz.1.157" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.887865][ T4336] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 135.895674][ T4336] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 135.898827][ T4336] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 135.899011][ T31] audit: type=1400 audit(135.820:315): avc: denied { firmware_load } for pid=4335 comm="+}[@" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 138.598040][ T31] audit: type=1400 audit(138.510:316): avc: denied { create } for pid=4342 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 139.209290][ T31] audit: type=1400 audit(139.130:317): avc: denied { write } for pid=4342 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 139.225889][ T31] audit: type=1400 audit(139.140:318): avc: denied { nlmsg_write } for pid=4342 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 147.110306][ T31] audit: type=1326 audit(147.030:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.111284][ T31] audit: type=1326 audit(147.030:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.128092][ T31] audit: type=1326 audit(147.050:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.130864][ T31] audit: type=1326 audit(147.050:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 147.145718][ T31] audit: type=1326 audit(147.070:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4348 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 150.163040][ T31] audit: type=1400 audit(150.080:324): avc: denied { create } for pid=4355 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 150.905215][ T31] audit: type=1400 audit(150.810:325): avc: denied { create } for pid=4360 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 150.905584][ T31] audit: type=1400 audit(150.820:326): avc: denied { connect } for pid=4360 comm="syz.1.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 151.059421][ T31] audit: type=1400 audit(150.980:327): avc: denied { view } for pid=4362 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 151.248816][ T4365] netlink: 4 bytes leftover after parsing attributes in process `syz.1.170'. [ 151.388490][ T31] audit: type=1326 audit(151.310:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4366 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 152.618741][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 152.618974][ T31] audit: type=1326 audit(152.540:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4383 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 152.628968][ T31] audit: type=1326 audit(152.550:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4383 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 152.636973][ T31] audit: type=1326 audit(152.560:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4383 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=52 compat=0 ip=0x131f30 code=0x7ffc0000 [ 152.640399][ T31] audit: type=1326 audit(152.560:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4383 comm="syz.1.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 153.847574][ T31] audit: type=1400 audit(153.770:350): avc: denied { associate } for pid=4399 comm="syz.1.185" name="0" dev="devpts" ino=3 scontext=system_u:object_r:mouse_device_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 154.025501][ T31] audit: type=1326 audit(153.940:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4403 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 154.037335][ T31] audit: type=1326 audit(153.960:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4403 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x131f30 code=0x7ffc0000 [ 154.037823][ T31] audit: type=1326 audit(153.960:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4403 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 154.037947][ T31] audit: type=1326 audit(153.960:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4403 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 154.044184][ T31] audit: type=1326 audit(153.960:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4403 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 154.122847][ T4406] mmap: syz.1.188 (4406) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 156.383185][ T4437] netlink: 8 bytes leftover after parsing attributes in process `syz.0.198'. [ 157.082711][ T4442] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 157.083050][ T4442] IPv6: NLM_F_CREATE should be set when creating new route [ 157.106474][ T4442] Zero length message leads to an empty skb [ 158.167745][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 158.169569][ T31] audit: type=1400 audit(158.090:364): avc: denied { create } for pid=4450 comm="syz.0.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 158.245432][ T4454] netlink: 76 bytes leftover after parsing attributes in process `syz.1.205'. [ 162.109175][ T4470] macvtap0: entered promiscuous mode [ 162.111494][ T4470] macvtap0: left promiscuous mode [ 168.814964][ T31] audit: type=1326 audit(168.730:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.835610][ T31] audit: type=1326 audit(168.760:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.846433][ T31] audit: type=1326 audit(168.770:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.848005][ T31] audit: type=1326 audit(168.770:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.849711][ T31] audit: type=1326 audit(168.770:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.850679][ T31] audit: type=1326 audit(168.770:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.854518][ T31] audit: type=1326 audit(168.770:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.855870][ T31] audit: type=1326 audit(168.770:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.857029][ T31] audit: type=1326 audit(168.780:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 168.860009][ T31] audit: type=1326 audit(168.780:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4490 comm="syz.1.217" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 173.808169][ T4515] netlink: 4 bytes leftover after parsing attributes in process `syz.1.228'. [ 174.143881][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 174.144366][ T31] audit: type=1326 audit(174.060:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.145134][ T31] audit: type=1326 audit(174.060:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.147503][ T31] audit: type=1326 audit(174.070:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.147917][ T31] audit: type=1326 audit(174.070:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.152770][ T31] audit: type=1326 audit(174.070:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=234 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.153043][ T31] audit: type=1326 audit(174.070:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4516 comm="kfree" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.846479][ T31] audit: type=1326 audit(174.760:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4525 comm="syz.1.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.859836][ T31] audit: type=1326 audit(174.780:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4525 comm="syz.1.233" exe="/syz-executor" sig=0 arch=40000028 syscall=0 compat=0 ip=0x131f30 code=0x7ffc0000 [ 174.860345][ T31] audit: type=1326 audit(174.780:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4525 comm="syz.1.233" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 175.101113][ T31] audit: type=1326 audit(175.020:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4527 comm="syz.1.234" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 178.085743][ T4557] syz_tun: entered allmulticast mode [ 178.110486][ T4557] SELinux: failure in sel_netif_sid_slow(), invalid network interface (0) [ 178.111027][ T4557] mroute: pending queue full, dropping entries [ 178.186605][ T4556] syz_tun: left allmulticast mode [ 181.039141][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 181.039600][ T31] audit: type=1326 audit(180.960:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.1.255" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x0 [ 182.173981][ T31] audit: type=1400 audit(182.090:421): avc: denied { create } for pid=4580 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 182.207845][ T31] audit: type=1400 audit(182.130:422): avc: denied { bind } for pid=4580 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 182.219622][ T31] audit: type=1400 audit(182.140:423): avc: denied { listen } for pid=4580 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 182.238619][ T31] audit: type=1400 audit(182.160:424): avc: denied { accept } for pid=4580 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 185.456730][ T31] audit: type=1400 audit(185.370:425): avc: denied { load_policy } for pid=4590 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 185.492712][ T4591] SELinux: ebitmap: truncated map [ 185.516390][ T4591] SELinux: failed to load policy [ 186.163625][ T31] audit: type=1400 audit(186.080:426): avc: denied { create } for pid=4594 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.195672][ T31] audit: type=1400 audit(186.120:427): avc: denied { setopt } for pid=4594 comm="syz.1.260" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 186.503178][ T31] audit: type=1400 audit(186.420:428): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 186.802274][ T31] audit: type=1326 audit(186.720:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.819691][ T31] audit: type=1326 audit(186.740:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.830815][ T31] audit: type=1326 audit(186.750:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.831417][ T31] audit: type=1326 audit(186.750:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.844935][ T31] audit: type=1326 audit(186.750:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.855890][ T31] audit: type=1326 audit(186.770:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 186.865639][ T31] audit: type=1326 audit(186.770:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4598 comm="syz.1.262" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.515733][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 198.521306][ T31] audit: type=1400 audit(198.430:445): avc: denied { validate_trans } for pid=4654 comm="syz.1.277" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 198.855246][ T31] audit: type=1326 audit(198.770:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.865239][ T31] audit: type=1326 audit(198.780:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.868304][ T31] audit: type=1326 audit(198.790:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.880017][ T31] audit: type=1326 audit(198.800:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.886121][ T31] audit: type=1326 audit(198.810:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.888356][ T31] audit: type=1326 audit(198.810:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.895341][ T31] audit: type=1326 audit(198.810:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.897129][ T31] audit: type=1326 audit(198.820:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 198.901640][ T31] audit: type=1326 audit(198.820:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.278" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=0 ip=0x131f30 code=0x7ffc0000 [ 202.805751][ T4687] bond0: (slave bond_slave_0): Releasing backup interface [ 202.845398][ T4687] bond0: (slave bond_slave_1): Releasing backup interface [ 211.755650][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 211.756756][ T31] audit: type=1400 audit(211.670:496): avc: denied { read } for pid=4693 comm="syz.0.288" path="socket:[4083]" dev="sockfs" ino=4083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 215.352187][ T31] audit: type=1400 audit(215.270:497): avc: denied { create } for pid=4697 comm="syz.1.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 215.362526][ T31] audit: type=1400 audit(215.280:498): avc: denied { setopt } for pid=4697 comm="syz.1.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 221.490586][ T31] audit: type=1400 audit(221.410:499): avc: denied { connect } for pid=4704 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 221.510303][ T4705] netlink: 132 bytes leftover after parsing attributes in process `syz.1.292'. [ 224.505884][ T31] audit: type=1400 audit(224.420:500): avc: denied { setopt } for pid=4709 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 224.564384][ T31] audit: type=1400 audit(224.480:501): avc: denied { name_bind } for pid=4711 comm="syz.0.295" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 224.831050][ T31] audit: type=1326 audit(224.750:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.831318][ T31] audit: type=1326 audit(224.750:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.854920][ T31] audit: type=1326 audit(224.770:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.860936][ T31] audit: type=1326 audit(224.780:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.861104][ T31] audit: type=1326 audit(224.780:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.867533][ T31] audit: type=1326 audit(224.790:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4719 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x131f30 code=0x7ffc0000 [ 224.868773][ T31] audit: type=1326 audit(224.790:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15f9e4 code=0x7ffc0000 [ 224.936182][ T4717] netlink: 4 bytes leftover after parsing attributes in process `syz.0.297'. [ 226.690402][ T4734] syz.0.303 uses obsolete (PF_INET,SOCK_PACKET) [ 226.914178][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 226.914488][ T31] audit: type=1400 audit(226.830:513): avc: denied { bind } for pid=4737 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 226.923362][ T31] audit: type=1400 audit(226.840:514): avc: denied { write } for pid=4737 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 227.257037][ T4742] ip6gretap1: entered allmulticast mode [ 227.456354][ T31] audit: type=1400 audit(227.380:515): avc: denied { setopt } for pid=4737 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 237.427730][ T31] audit: type=1326 audit(237.350:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.428984][ T31] audit: type=1326 audit(237.350:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.431701][ T31] audit: type=1326 audit(237.350:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.433614][ T31] audit: type=1326 audit(237.350:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.435531][ T31] audit: type=1326 audit(237.360:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.436633][ T31] audit: type=1326 audit(237.360:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.438146][ T31] audit: type=1326 audit(237.360:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.441804][ T31] audit: type=1400 audit(237.360:523): avc: denied { write } for pid=4759 comm="syz.1.311" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 237.449560][ T31] audit: type=1326 audit(237.370:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 237.450378][ T31] audit: type=1326 audit(237.370:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 243.240809][ T4781] SELinux: Context Ü is not valid (left unmapped). [ 244.310910][ T4787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4787 comm=syz.0.322 [ 244.480827][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 244.481887][ T31] audit: type=1326 audit(244.400:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.527960][ T31] audit: type=1326 audit(244.440:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.538425][ T31] audit: type=1326 audit(244.450:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.572089][ T31] audit: type=1326 audit(244.480:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.634929][ T31] audit: type=1326 audit(244.550:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.635214][ T31] audit: type=1326 audit(244.550:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.635373][ T31] audit: type=1326 audit(244.550:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.635523][ T31] audit: type=1326 audit(244.550:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.635711][ T31] audit: type=1326 audit(244.550:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 244.635764][ T31] audit: type=1326 audit(244.550:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4788 comm="syz.0.323" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 247.766675][ T4814] netlink: 8 bytes leftover after parsing attributes in process `syz.0.333'. [ 247.766960][ T4814] netlink: 12 bytes leftover after parsing attributes in process `syz.0.333'. [ 247.819652][ T4814] bond1: entered promiscuous mode [ 247.820294][ T4814] bond1: entered allmulticast mode [ 247.821190][ T4814] 8021q: adding VLAN 0 to HW filter on device bond1 [ 248.265904][ T4849] netlink: 'syz.0.334': attribute type 21 has an invalid length. [ 252.910058][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 252.910360][ T31] audit: type=1400 audit(252.830:600): avc: denied { mounton } for pid=4875 comm="syz.0.345" path="/" dev="configfs" ino=1112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 252.938219][ T31] audit: type=1400 audit(252.860:601): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 253.110315][ T31] audit: type=1326 audit(253.030:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.110661][ T31] audit: type=1326 audit(253.030:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.112782][ T31] audit: type=1326 audit(253.030:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.117086][ T31] audit: type=1326 audit(253.030:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.117381][ T31] audit: type=1326 audit(253.030:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.117616][ T31] audit: type=1326 audit(253.040:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.129991][ T31] audit: type=1326 audit(253.050:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.130277][ T31] audit: type=1326 audit(253.050:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 253.420615][ T4887] netlink: 'syz.0.349': attribute type 13 has an invalid length. [ 255.003679][ T4887] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.004298][ T4887] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.006578][ T4887] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.006716][ T4887] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 257.066671][ T4906] lo: left promiscuous mode [ 257.067235][ T4906] lo: left allmulticast mode [ 272.470398][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 272.470641][ T31] audit: type=1400 audit(272.390:618): avc: denied { create } for pid=4936 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 272.767322][ T31] audit: type=1326 audit(272.690:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4939 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 272.772962][ T31] audit: type=1326 audit(272.690:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4939 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x131f30 code=0x7ffc0000 [ 272.783215][ T31] audit: type=1326 audit(272.690:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4939 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 272.787005][ T31] audit: type=1326 audit(272.710:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4939 comm="syz.0.363" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f30 code=0x7ffc0000 [ 274.452735][ T4983] SELinux: failed to load policy [ 274.605425][ T31] audit: type=1400 audit(274.510:623): avc: denied { compute_member } for pid=4985 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 275.920606][ T4998] syz.1.377 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 276.091166][ T5000] 8<--- cut here --- [ 276.091483][ T5000] Unable to handle kernel NULL pointer dereference at virtual address 0000000e when read [ 276.095271][ T31] audit: type=1400 audit(276.010:624): avc: denied { read } for pid=2908 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 276.101276][ T31] audit: type=1400 audit(276.010:625): avc: denied { search } for pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 276.101584][ T31] audit: type=1400 audit(276.020:626): avc: denied { write } for pid=2908 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 276.101769][ T31] audit: type=1400 audit(276.020:627): avc: denied { add_name } for pid=2908 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 276.125943][ T5000] [0000000e] *pgd=84612003, *pmd=df082003 [ 276.127257][ T5000] Internal error: Oops: 205 [#1] SMP ARM [ 276.127743][ T5000] Modules linked in: [ 276.128331][ T5000] CPU: 1 UID: 0 PID: 5000 Comm: syz.0.378 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 276.128603][ T5000] Hardware name: ARM-Versatile Express [ 276.128859][ T5000] PC is at io_ring_buffers_peek+0x24/0x258 [ 276.129522][ T5000] LR is at io_buffers_peek+0x68/0x8c [ 276.129678][ T5000] pc : [<80889660>] lr : [<80889da4>] psr: 20000013 [ 276.129854][ T5000] sp : dfa9dd90 ip : dfa9ddd8 fp : dfa9ddd4 [ 276.130059][ T5000] r10: 00000240 r9 : 00000000 r8 : 8551abc0 [ 276.130274][ T5000] r7 : 8545380c r6 : 85453800 r5 : dfa9de14 r4 : 859a5180 [ 276.130464][ T5000] r3 : 00000001 r2 : 8545380c r1 : dfa9de14 r0 : 859a5180 [ 276.130733][ T5000] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 276.130989][ T5000] Control: 30c5387d Table: 8551a9c0 DAC: 00000000 [ 276.131213][ T5000] Register r0 information: slab io_kiocb start 859a5180 pointer offset 0 size 192 [ 276.132078][ T5000] Register r1 information: 2-page vmalloc region starting at 0xdfa9c000 allocated at kernel_clone+0xac/0x3e4 [ 276.132591][ T5000] Register r2 information: slab kmalloc-256 start 85453800 pointer offset 12 size 256 [ 276.132949][ T5000] Register r3 information: non-paged memory [ 276.133224][ T5000] Register r4 information: slab io_kiocb start 859a5180 pointer offset 0 size 192 [ 276.133575][ T5000] Register r5 information: 2-page vmalloc region starting at 0xdfa9c000 allocated at kernel_clone+0xac/0x3e4 [ 276.133871][ T5000] Register r6 information: slab kmalloc-256 start 85453800 pointer offset 0 size 256 [ 276.134164][ T5000] Register r7 information: slab kmalloc-256 start 85453800 pointer offset 12 size 256 [ 276.134459][ T5000] Register r8 information: slab kmalloc-64 start 8551abc0 pointer offset 0 size 64 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 276.135287][ T5000] Register r9 information: NULL pointer [ 276.135585][ T5000] Register r10 information: non-paged memory [ 276.135769][ T5000] Register r11 information: 2-page vmalloc region starting at 0xdfa9c000 allocated at kernel_clone+0xac/0x3e4 [ 276.136051][ T5000] Register r12 information: 2-page vmalloc region starting at 0xdfa9c000 allocated at kernel_clone+0xac/0x3e4 [ 276.136745][ T5000] Process syz.0.378 (pid: 5000, stack limit = 0xdfa9c000) [ 276.137241][ T5000] Stack: (0xdfa9dd90 to 0xdfa9e000) [ 276.137635][ T5000] dd80: 81a4c354 8030cb14 84c43100 00000001 [ 276.137979][ T5000] dda0: 00010000 8545380c 00000000 859a5180 dfa9de14 85453800 8545380c 00000000 [ 276.138515][ T5000] ddc0: 80000001 00000240 dfa9ddec dfa9ddd8 80889da4 80889648 8505e780 859a5180 [ 276.138806][ T5000] dde0: dfa9de54 dfa9ddf0 808932d4 80889d48 00000000 dfa9ddd8 85453800 d2e3469e [ 276.139044][ T5000] de00: 00010001 00000001 84c43128 00000000 00000000 8545380c 00000000 00000000 [ 276.139563][ T5000] de20: 00010001 d2e3469e dfa9de54 859a5180 81cf0ca0 00000000 00000000 00000000 [ 276.139785][ T5000] de40: 80000001 84870c00 dfa9de7c dfa9de58 808822b4 8089302c 859a5180 80000001 [ 276.140013][ T5000] de60: 0000001b 81cf0b5c 856ef0c0 00000000 dfa9debc dfa9de80 80886d84 80882274 [ 276.140297][ T5000] de80: 859a53c0 859a5480 859a5540 81cf0ca0 859a56c0 84c43000 859a51ec 859a5180 [ 276.140569][ T5000] dea0: 85a60000 00000000 00000000 84870c00 dfa9df14 dfa9dec0 8088789c 80886d48 [ 276.140844][ T5000] dec0: 8088e258 81a4c2f8 00000000 00000000 00000800 00000800 81cf0b5c 00000800 [ 276.141116][ T5000] dee0: 84c43000 d2e3469e 856efb40 00000000 84c43000 00003516 856efb40 00000000 [ 276.141396][ T5000] df00: 84870c00 00000000 dfa9dfa4 dfa9df18 80888344 8088769c ecac8b10 84c43040 [ 276.141746][ T5000] df20: 00000000 00000000 81a500d0 81a4ffa0 dfa9df54 dfa9df40 8026b438 8029ce24 [ 276.142039][ T5000] df40: dfa9dfb0 40000000 dfa9df84 dfa9df58 802229dc 8026b3f4 00000000 8281d05c [ 276.142372][ T5000] df60: dfa9dfb0 0014c490 ecac8b10 80222930 00000000 d2e3469e dfa9dfac 00000000 [ 276.142691][ T5000] df80: 00000000 002e630c 000001aa 8020029c 84870c00 000001aa 00000000 dfa9dfa8 [ 276.143037][ T5000] dfa0: 80200060 80888218 00000000 00000000 00000004 00003516 00000000 00000000 [ 276.143296][ T5000] dfc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76b180bc [ 276.143608][ T5000] dfe0: 76b17ec0 76b17eb0 0001939c 00131f30 60000010 00000004 00000000 00000000 [ 276.144100][ T5000] Call trace: [ 276.144392][ T5000] [<8088963c>] (io_ring_buffers_peek) from [<80889da4>] (io_buffers_peek+0x68/0x8c) [ 276.145216][ T5000] r10:00000240 r9:80000001 r8:00000000 r7:8545380c r6:85453800 r5:dfa9de14 [ 276.145609][ T5000] r4:859a5180 [ 276.145807][ T5000] [<80889d3c>] (io_buffers_peek) from [<808932d4>] (io_recv+0x2b4/0x46c) [ 276.146244][ T5000] r5:859a5180 r4:8505e780 [ 276.146456][ T5000] [<80893020>] (io_recv) from [<808822b4>] (__io_issue_sqe+0x4c/0x1c0) [ 276.146896][ T5000] r10:84870c00 r9:80000001 r8:00000000 r7:00000000 r6:00000000 r5:81cf0ca0 [ 276.147372][ T5000] r4:859a5180 [ 276.147593][ T5000] [<80882268>] (__io_issue_sqe) from [<80886d84>] (io_issue_sqe+0x48/0x59c) [ 276.148031][ T5000] r9:00000000 r8:856ef0c0 r7:81cf0b5c r6:0000001b r5:80000001 r4:859a5180 [ 276.148352][ T5000] [<80886d3c>] (io_issue_sqe) from [<8088789c>] (io_submit_sqes+0x20c/0x938) [ 276.148781][ T5000] r10:84870c00 r9:00000000 r8:00000000 r7:85a60000 r6:859a5180 r5:859a51ec [ 276.149169][ T5000] r4:84c43000 [ 276.149324][ T5000] [<80887690>] (io_submit_sqes) from [<80888344>] (sys_io_uring_enter+0x138/0x780) [ 276.150035][ T5000] r10:00000000 r9:84870c00 r8:00000000 r7:856efb40 r6:00003516 r5:84c43000 [ 276.150503][ T5000] r4:00000000 [ 276.150714][ T5000] [<8088820c>] (sys_io_uring_enter) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 276.151340][ T5000] Exception stack(0xdfa9dfa8 to 0xdfa9dff0) [ 276.151775][ T5000] dfa0: 00000000 00000000 00000004 00003516 00000000 00000000 [ 276.152224][ T5000] dfc0: 00000000 00000000 002e630c 000001aa 002d0000 00000000 00006364 76b180bc [ 276.152729][ T5000] dfe0: 76b17ec0 76b17eb0 0001939c 00131f30 [ 276.153109][ T5000] r10:000001aa r9:84870c00 r8:8020029c r7:000001aa r6:002e630c r5:00000000 [ 276.153571][ T5000] r4:00000000 [ 276.153974][ T5000] Code: e1a08002 e5912000 e50b2030 e1a05001 (e1d920be) [ 276.156035][ T5000] ---[ end trace 0000000000000000 ]--- [ 276.216330][ T5000] Kernel panic - not syncing: Fatal exception [ 276.218650][ T5000] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:49:46 Registers: info registers vcpu 0 CPU#0 R00=843d7c40 R01=00000036 R02=eb2c5000 R03=eb2c5018 R04=8445e005 R05=843d7c40 R06=80a628e8 R07=8445e005 R08=80a628e8 R09=000000f0 R10=00000482 R11=ebd65e24 R12=00000002 R13=ebd65e18 R14=8295b2ec R15=80a628f8 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000007 R01=7e8d4120 R02=7e9f9000 R03=00000000 R04=7e8d416c R05=00000000 R06=005ccff0 R07=00d30680 R08=00000114 R09=00d30750 R10=00000001 R11=7e8d4104 R12=00000001 R13=7e8d40c0 R14=0000d664 R15=7e9fd4f0 PSR=20010010 --C- A S usr32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=00000000 s03=00000000 d01=0000000000000000 s04=ef0cee00 s05=ef0cee00 d02=ef0cee00ef0cee00 s06=08040200 s07=80402000 d03=8040200008040200 s08=00000c00 s09=c0200c03 d04=c0200c0300000c00 s10=08040201 s11=80402000 d05=8040200008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000