last executing test programs: 6.387762199s ago: executing program 1 (id=545): r0 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000600)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xc}, {}, {0x1c}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x10, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_VXLAN={0xc, 0x2, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_VXLAN_GBP={0x8, 0x1, 0x21000}]}]}]}}]}, 0x44}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 5.541056593s ago: executing program 1 (id=546): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x44b, 0x0, 0x0, {0x7a}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_FILTERING={0x5, 0x7, 0x7}]}}}]}, 0x3c}}, 0x0) 4.899746631s ago: executing program 1 (id=547): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x66, &(0x7f0000000180)={@local, @empty, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a24b9f", 0x30, 0x2b, 0x0, @remote, @local, {[@routing={0x3a, 0x2, 0x2, 0x1, 0x0, [@mcast1]}], {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}}, 0x0) 4.473456303s ago: executing program 1 (id=548): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2) 4.163134392s ago: executing program 1 (id=549): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000051d0000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000141007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) syz_emit_ethernet(0x3a, &(0x7f00000004c0)={@local, @empty, @void, {@ipv4={0x8100, @udp={{0x5, 0x4, 0x3, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) 3.699698315s ago: executing program 1 (id=551): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) syz_io_uring_setup(0x110, &(0x7f0000000740)={0x0, 0x0, 0x10, 0xfffffffc, 0x1}, &(0x7f0000000480)=0x0, &(0x7f0000000500)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) syz_emit_ethernet(0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd600a841d0014060000000000000000000000ffffac1414aafe800000000000000000bc7c000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078"], 0x0) socket$nl_route(0x10, 0x3, 0x0) r9 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r9, 0xc0105512, &(0x7f0000000200)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) 1.291048653s ago: executing program 0 (id=561): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000b80)={0x20, r1, 0x18cd6c9b148b4151, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0xfffffffc}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) 1.009285461s ago: executing program 0 (id=562): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000f3ff0000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xb7f2}, 0x18) renameat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x0) 880.243925ms ago: executing program 0 (id=563): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$selinux_access(r3, &(0x7f0000000000)={'system_u:object_r:klogd_var_run_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5'}, 0x5f) 648.753472ms ago: executing program 0 (id=564): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$xdp(0x2c, 0x3, 0x0) mremap(&(0x7f0000186000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000ad000/0x3000)=nil) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x201000, 0x1000}, 0x20) 231.814414ms ago: executing program 0 (id=565): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed7f0000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000a00)=@newtaction={0x894, 0x30, 0x12f, 0x4000, 0x0, {}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x7c3, 0x2, 0x3, 0xffffff81, 0x10, 0xc, 0x2, 0x3, 0x40, 0x200, 0x8, 0x9, 0x6, 0x1, 0xaa21, 0x8, 0xa, 0x6, 0x200, 0x1, 0x4, 0xcc37, 0x5, 0xb5, 0x649f, 0x4, 0x0, 0x4, 0xfb1, 0x72a4, 0xd, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x28d, 0x4, 0xc, 0x0, 0xaf, 0x1, 0x6, 0x5, 0xfffffffd, 0x5, 0x80, 0xe, 0x2, 0x7, 0x6, 0x7, 0x1991, 0x8, 0xfffffe29, 0x5, 0x3, 0x101, 0xfff, 0x4, 0x5, 0x8000, 0x4, 0x7, 0x3, 0x0, 0xfffffff3, 0x1, 0x4, 0x80000001, 0x2, 0x3, 0x5, 0x101, 0x1, 0xfffffffc, 0x6, 0xfffffffb, 0x200, 0x1, 0x7329, 0x6, 0x3, 0x100, 0x2, 0x3, 0x6d3, 0x224, 0x7ff, 0x0, 0x6, 0x8, 0xfffff001, 0x6, 0x7eda, 0x3, 0xffff, 0x0, 0x5, 0x249, 0x5, 0x2fbf, 0x2, 0x8000, 0x7, 0x25fe9fd5, 0x1, 0x9, 0x1, 0xe, 0x9, 0x0, 0x3, 0x4f, 0xffffffff, 0x8, 0x1, 0x119203c5, 0xd0, 0x7, 0x80000001, 0x3226, 0x8, 0x3, 0x4, 0xc64f, 0xffffff6d, 0x5, 0x6, 0x6, 0xfffffff7, 0x6, 0x7, 0x5, 0xc, 0xe, 0x7, 0x200, 0x60459141, 0x1, 0x5, 0x6, 0x84, 0x0, 0x1, 0x5, 0x6, 0x29dc, 0x0, 0x2d5, 0x7, 0xfffffffa, 0x1000, 0x6, 0x94, 0x15a, 0x4, 0x6, 0x2, 0x2, 0x2, 0x4, 0xfff, 0x5, 0x1, 0x3, 0x3, 0x80, 0x7a5b054a, 0x8, 0xffffff80, 0x4b1, 0xfff, 0x3, 0xb, 0x8, 0x3, 0x4, 0x2, 0x6, 0xf, 0x2, 0x7, 0x1, 0x77, 0x9, 0x274d, 0x6, 0x40, 0xfffffffe, 0xb, 0x7, 0x1, 0x9ab, 0x7, 0xffffffc0, 0x200, 0x8, 0x3c, 0x2c7, 0x7, 0x8, 0x4, 0x0, 0x99f, 0x5, 0x800, 0x6, 0x31e1, 0x4, 0x4, 0xb, 0x7ff, 0x1e, 0x3, 0xe49, 0x56, 0x9, 0x1, 0x6, 0x2, 0x6a1c, 0x9, 0x8, 0x4dbda2da, 0x7fff, 0x5, 0x5, 0x0, 0x7, 0x8, 0x7fff, 0xed, 0x7fff, 0x1000, 0xcbe, 0x7ff, 0x6, 0x8, 0xb, 0xff, 0x5, 0x0, 0x7, 0x9, 0x0, 0x8, 0x5, 0x4, 0xfffffffd, 0x2, 0xeffe, 0xef4, 0xfffffffa]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xffffbff1}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x3a40da20, 0x9, 0x6, 0x4, 0x8000, 0x7fffffff, 0x2, 0x1, 0x7fff, 0x86, 0x10000, 0x2, 0x40, 0x2, 0x99d, 0x6, 0xffffff92, 0xe9c, 0x3ff, 0x3, 0x10001, 0xa, 0xfffff000, 0x7f, 0x5, 0x0, 0x81, 0x6f0, 0x18e, 0x8, 0x4, 0x3, 0x4, 0x2, 0xffffffff, 0x0, 0x80000000, 0x3, 0x9, 0x10000, 0x2, 0xd, 0x3, 0x5, 0x1, 0x4, 0x8, 0x7, 0x2, 0xd92b, 0x7fffffff, 0x3, 0x90, 0xc0, 0x5b, 0x1, 0x48000, 0x40, 0x5, 0x1000, 0x3, 0x10, 0x0, 0x5, 0x4, 0x6, 0x100, 0xf3, 0x1, 0xa92, 0x0, 0x6, 0x7, 0x0, 0x8, 0x8, 0x10000, 0x3, 0x3, 0x0, 0xa, 0x5, 0x1, 0xee7e, 0x800, 0xd1, 0x7fff, 0x1, 0x4, 0x5, 0x4, 0xffffff89, 0x7, 0xfffffff3, 0x2, 0x2, 0x9, 0x5, 0x2, 0x101, 0x7fffffff, 0xfffff001, 0x64, 0x4, 0xffffffff, 0x5, 0x9, 0x1, 0x0, 0xb3e, 0x8, 0x3, 0x401, 0x401, 0xb, 0x8, 0x2, 0xb, 0x0, 0x0, 0x9, 0xffffffff, 0x25f, 0x7, 0x5, 0x0, 0x9, 0xfffffff9, 0x3, 0xe2, 0x8, 0x1, 0x8, 0x9, 0x0, 0x9, 0x2, 0x1, 0x9, 0x80, 0x5, 0xd3c3, 0x5, 0x2, 0x1, 0x472a8800, 0xc, 0xfffffff0, 0xfffffff8, 0x9, 0x8, 0xfffffffc, 0x9, 0x5, 0x9, 0x5, 0x6, 0x6, 0x7, 0x87f, 0x59, 0x4fedcacd, 0x1, 0x4, 0x7f, 0x2, 0x7, 0x5, 0xfff, 0x3828, 0x0, 0x1, 0x7, 0x401, 0x7f, 0x4, 0x7, 0x2120, 0xfffffffb, 0x80, 0x3, 0xdbff, 0x52b6, 0xfffffffa, 0x49, 0x70, 0x0, 0xe1, 0x401, 0x631, 0x101, 0x3ff, 0x101, 0x0, 0x7fff, 0x80000000, 0x3, 0xfffffff7, 0x3, 0x1, 0x7514, 0x7, 0x3, 0x1, 0x4, 0x2, 0x5, 0x4, 0x10000, 0x3ff, 0x0, 0x100, 0x7ef2, 0x0, 0x1, 0xe, 0xd, 0x4, 0x6, 0x8, 0x4, 0x10001, 0x6, 0x400, 0x436, 0x3, 0x1ff, 0x0, 0xffff76a6, 0x0, 0xbc, 0xa5, 0x0, 0x6, 0x7, 0x1, 0x81, 0x3, 0x2, 0x3, 0x4, 0x6, 0x2445c87b, 0x6, 0xd, 0x9, 0x2, 0x10, 0x4, 0x7, 0x57, 0x5, 0xd, 0x1000, 0x3]}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x400, 0x8, 0x3, 0x7b2, 0x400, {0x1, 0x2, 0x8, 0x624, 0x0, 0xfffffff8}, {0x9, 0x2, 0x7, 0x7ff, 0xff01, 0x4}, 0x6, 0x4, 0x923}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x20000800) 0s ago: executing program 0 (id=566): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000050000000000000000000024000a20000000000a03000000000000000000010000000900010073797a300000000058000000030a0104000000000000000001000000090003803d2175fbe782c2002c00048008000240172af2e40800014000000003080002401c791e7108000240423930ce08000140000000030900010073797a300000000088000000060a010400000000000000000100000008000b400000000014000480100001800b0001006e756d67656e00000900010073797a30000000004c0004804800018008000100666962"], 0x122}}, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f00000006c0)={0x1, 0x4, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfbce0c6a100000000000007010000f8ffffffb702000008000000b703000000000000850000002de4"], &(0x7f0000000500)='GPL\x00', 0x5e, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f00000000c0)={0x1d, r5}, 0x18) connect$can_j1939(r4, &(0x7f0000000140)={0x1d, r5}, 0x18) sendmsg$can_j1939(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)="4480502a", 0x4}}, 0x0) mremap(&(0x7f0000186000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000ad000/0x3000)=nil) recvmsg$can_j1939(r4, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x2) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'dvmrp1\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) kernel console output (not intermixed with test programs): [ 50.421407][ T31] audit: type=1400 audit(50.350:68): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.422459][ T31] audit: type=1400 audit(50.350:69): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:8884' (ED25519) to the list of known hosts. [ 62.051124][ T31] audit: type=1400 audit(61.980:70): avc: denied { name_bind } for pid=3086 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.432316][ T31] audit: type=1400 audit(64.360:71): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.454481][ T31] audit: type=1400 audit(64.380:72): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.500639][ T31] audit: type=1400 audit(68.430:73): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.503580][ T31] audit: type=1400 audit(68.430:74): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.515344][ T3088] cgroup: Unknown subsys name 'net' [ 68.522222][ T31] audit: type=1400 audit(68.450:75): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.660191][ T3088] cgroup: Unknown subsys name 'cpuset' [ 68.665722][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 68.666763][ T3088] cgroup: Unknown subsys name 'rlimit' [ 68.887376][ T31] audit: type=1400 audit(68.810:76): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.889440][ T31] audit: type=1400 audit(68.810:77): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.890138][ T31] audit: type=1400 audit(68.820:78): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.172654][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.174082][ T31] audit: type=1400 audit(69.100:79): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.189492][ T31] audit: type=1400 audit(69.110:80): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.215665][ T31] audit: type=1400 audit(69.140:81): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.216786][ T31] audit: type=1400 audit(69.140:82): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.660571][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.794278][ T31] audit: type=1400 audit(77.720:83): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.838636][ T31] audit: type=1400 audit(77.760:84): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.839391][ T31] audit: type=1400 audit(77.760:85): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.843364][ T31] audit: type=1400 audit(77.770:86): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.857467][ T31] audit: type=1400 audit(77.780:87): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.917765][ T31] audit: type=1400 audit(77.840:88): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.531365][ T31] audit: type=1400 audit(78.460:89): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.720990][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.727524][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.873293][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.883908][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.837361][ T3093] hsr_slave_0: entered promiscuous mode [ 80.840378][ T3093] hsr_slave_1: entered promiscuous mode [ 80.896631][ T3094] hsr_slave_0: entered promiscuous mode [ 80.898965][ T3094] hsr_slave_1: entered promiscuous mode [ 80.900318][ T3094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.900616][ T3094] Cannot create hsr debugfs directory [ 81.356385][ T31] audit: type=1400 audit(81.280:90): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.361712][ T31] audit: type=1400 audit(81.290:91): avc: denied { write } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.362454][ T31] audit: type=1400 audit(81.290:92): avc: denied { read } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.368746][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.383745][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.392371][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.413252][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.480002][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.487541][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.502096][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.514233][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.271433][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.407823][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.272238][ T3093] veth0_vlan: entered promiscuous mode [ 85.287544][ T3093] veth1_vlan: entered promiscuous mode [ 85.382047][ T3093] veth0_macvtap: entered promiscuous mode [ 85.395739][ T3093] veth1_macvtap: entered promiscuous mode [ 85.483136][ T3093] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.483989][ T3093] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.484498][ T3093] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.484925][ T3093] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.652773][ T31] audit: type=1400 audit(85.580:93): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.662708][ T31] audit: type=1400 audit(85.580:94): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.8bsOGV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.670549][ T31] audit: type=1400 audit(85.600:95): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.679158][ T31] audit: type=1400 audit(85.600:96): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.8bsOGV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.685010][ T31] audit: type=1400 audit(85.610:97): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.8bsOGV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.692975][ T31] audit: type=1400 audit(85.620:98): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.696228][ T31] audit: type=1400 audit(85.620:99): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.700039][ T31] audit: type=1400 audit(85.630:100): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.703201][ T31] audit: type=1400 audit(85.630:101): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.704347][ T31] audit: type=1400 audit(85.630:102): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 85.763527][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.772026][ T3094] veth0_vlan: entered promiscuous mode [ 85.793482][ T3094] veth1_vlan: entered promiscuous mode [ 85.878475][ T3094] veth0_macvtap: entered promiscuous mode [ 85.884971][ T3094] veth1_macvtap: entered promiscuous mode [ 85.936464][ T3094] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.936795][ T3094] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.937070][ T3094] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.937434][ T3094] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.636733][ T3778] netlink: 'syz.0.4': attribute type 10 has an invalid length. [ 87.990534][ T3800] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 89.790635][ T3810] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 89.790635][ T3810] The task syz.1.7 (3810) triggered the difference, watch for misbehavior. [ 90.772255][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 90.772379][ T31] audit: type=1326 audit(90.680:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.6" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 91.579793][ T31] audit: type=1400 audit(91.500:117): avc: denied { create } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.639019][ T31] audit: type=1400 audit(91.540:118): avc: denied { write } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.654368][ T31] audit: type=1400 audit(91.580:119): avc: denied { shutdown } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.687657][ T31] audit: type=1400 audit(91.580:120): avc: denied { shutdown } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 92.429731][ T31] audit: type=1400 audit(92.350:121): avc: denied { accept } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 92.490509][ T31] audit: type=1400 audit(92.390:122): avc: denied { ioctl } for pid=3813 comm="syz.1.8" path="socket:[2269]" dev="sockfs" ino=2269 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.886341][ T31] audit: type=1400 audit(92.810:123): avc: denied { read } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.887448][ T31] audit: type=1400 audit(92.810:124): avc: denied { read } for pid=3813 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.693438][ T31] audit: type=1400 audit(93.620:125): avc: denied { create } for pid=3822 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 94.408347][ C0] hrtimer: interrupt took 9882160 ns [ 98.522010][ T3840] netlink: 'syz.1.15': attribute type 10 has an invalid length. [ 99.141096][ T3867] netlink: 'syz.1.21': attribute type 10 has an invalid length. [ 104.604358][ T3904] Zero length message leads to an empty skb [ 110.089917][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 121.931788][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 121.932719][ T31] audit: type=1326 audit(121.860:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3978 comm="syz.1.65" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 123.315218][ T3998] random: crng reseeded on system resumption [ 123.896709][ T31] audit: type=1400 audit(123.820:128): avc: denied { create } for pid=4001 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 127.137220][ T4020] syz.1.76[4020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.137524][ T4020] syz.1.76[4020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.146955][ T4020] syz.1.76[4020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.667488][ T31] audit: type=1400 audit(131.590:129): avc: denied { create } for pid=4052 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.685194][ T31] audit: type=1400 audit(131.610:130): avc: denied { setopt } for pid=4052 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 137.069813][ T31] audit: type=1400 audit(136.990:131): avc: denied { audit_write } for pid=4092 comm="syz.1.100" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 137.091168][ T31] audit: type=1107 audit(137.010:132): pid=4092 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='nor' [ 137.351515][ T31] audit: type=1400 audit(137.280:133): avc: denied { create } for pid=4100 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.363380][ T4101] netlink: 132 bytes leftover after parsing attributes in process `syz.1.103'. [ 137.370673][ T31] audit: type=1400 audit(137.290:134): avc: denied { write } for pid=4100 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.371543][ T31] audit: type=1400 audit(137.290:135): avc: denied { nlmsg_write } for pid=4100 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 138.676642][ T31] audit: type=1400 audit(138.600:136): avc: denied { create } for pid=4109 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 138.705449][ T31] audit: type=1400 audit(138.630:137): avc: denied { bind } for pid=4109 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 138.706276][ T31] audit: type=1400 audit(138.630:138): avc: denied { name_bind } for pid=4109 comm="syz.1.107" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 138.706822][ T31] audit: type=1400 audit(138.630:139): avc: denied { node_bind } for pid=4109 comm="syz.1.107" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 138.729953][ T31] audit: type=1400 audit(138.660:140): avc: denied { write } for pid=4109 comm="syz.1.107" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.601753][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 142.601889][ T31] audit: type=1326 audit(142.530:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.649659][ T31] audit: type=1326 audit(142.530:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.652188][ T31] audit: type=1326 audit(142.580:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.653825][ T31] audit: type=1326 audit(142.580:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.673003][ T31] audit: type=1326 audit(142.600:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.676678][ T31] audit: type=1326 audit(142.600:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.677528][ T31] audit: type=1326 audit(142.600:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.684508][ T31] audit: type=1326 audit(142.610:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.695146][ T31] audit: type=1326 audit(142.610:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 142.697577][ T31] audit: type=1326 audit(142.610:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4150 comm="syz.0.122" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 143.364767][ T4158] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 149.066993][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 149.067111][ T31] audit: type=1400 audit(148.980:182): avc: denied { ioctl } for pid=4206 comm="syz.1.140" path="socket:[3474]" dev="sockfs" ino=3474 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.758955][ T4217] capability: warning: `syz.1.142' uses deprecated v2 capabilities in a way that may be insecure [ 154.030685][ T31] audit: type=1400 audit(153.960:183): avc: denied { setopt } for pid=4235 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 155.445724][ T4251] netlink: 8 bytes leftover after parsing attributes in process `syz.1.155'. [ 155.917212][ T4253] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.012006][ T4253] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.100714][ T4253] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.216631][ T4253] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 156.519725][ T4264] netlink: 152 bytes leftover after parsing attributes in process `syz.1.156'. [ 156.522287][ T4264] tc_dump_action: action bad kind [ 156.699569][ T4253] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.759431][ T4253] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.802440][ T4253] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 156.873917][ T4253] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 158.003262][ T31] audit: type=1400 audit(157.930:184): avc: denied { create } for pid=4279 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 158.009477][ T31] audit: type=1400 audit(157.930:185): avc: denied { setopt } for pid=4279 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 158.911600][ T31] audit: type=1326 audit(158.830:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.912652][ T31] audit: type=1326 audit(158.840:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.913440][ T31] audit: type=1326 audit(158.840:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.929847][ T31] audit: type=1326 audit(158.850:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.930849][ T31] audit: type=1326 audit(158.850:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.932269][ T31] audit: type=1326 audit(158.850:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.933138][ T31] audit: type=1326 audit(158.850:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 158.934030][ T31] audit: type=1326 audit(158.860:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4288 comm="syz.0.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 164.360812][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 164.360877][ T31] audit: type=1400 audit(164.290:197): avc: denied { create } for pid=4319 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 164.398402][ T31] audit: type=1400 audit(164.320:198): avc: denied { setopt } for pid=4319 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 164.718689][ T31] audit: type=1400 audit(164.640:199): avc: denied { create } for pid=4321 comm="syz.1.173" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 164.743758][ T31] audit: type=1400 audit(164.670:200): avc: denied { map } for pid=4321 comm="syz.1.173" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 164.744952][ T31] audit: type=1400 audit(164.670:201): avc: denied { read write } for pid=4321 comm="syz.1.173" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 174.166896][ T31] audit: type=1400 audit(174.090:202): avc: denied { write } for pid=4362 comm="syz.0.186" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 178.850942][ T31] audit: type=1326 audit(178.780:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.860872][ T31] audit: type=1326 audit(178.780:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.863447][ T31] audit: type=1326 audit(178.790:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.864237][ T31] audit: type=1326 audit(178.790:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.864914][ T31] audit: type=1326 audit(178.790:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.889006][ T31] audit: type=1326 audit(178.810:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.955854][ T31] audit: type=1326 audit(178.880:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 178.964215][ T31] audit: type=1326 audit(178.890:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4381 comm="syz.0.191" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 187.411776][ T31] audit: type=1400 audit(187.340:211): avc: denied { name_bind } for pid=4407 comm="syz.0.199" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 189.726134][ T4431] syz.0.209[4431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.726622][ T4431] syz.0.209[4431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.727397][ T4431] syz.0.209[4431] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.866327][ T4484] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 197.794483][ T4514] syz.0.235[4514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.794779][ T4514] syz.0.235[4514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.795268][ T4514] syz.0.235[4514] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 200.136195][ T4534] netlink: 'syz.0.239': attribute type 10 has an invalid length. [ 202.613793][ T4647] netlink: 696 bytes leftover after parsing attributes in process `syz.0.243'. [ 203.120992][ T4652] ======================================================= [ 203.120992][ T4652] WARNING: The mand mount option has been deprecated and [ 203.120992][ T4652] and is ignored by this kernel. Remove the mand [ 203.120992][ T4652] option from the mount to silence this warning. [ 203.120992][ T4652] ======================================================= [ 203.141144][ T31] audit: type=1400 audit(203.070:212): avc: denied { unmount } for pid=4649 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 204.844305][ T31] audit: type=1400 audit(204.770:213): avc: denied { create } for pid=4668 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 204.850817][ T31] audit: type=1400 audit(204.780:214): avc: denied { connect } for pid=4668 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 205.141524][ T31] audit: type=1400 audit(205.070:215): avc: denied { ioctl } for pid=4672 comm="syz.0.251" path="socket:[3994]" dev="sockfs" ino=3994 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 205.377737][ T31] audit: type=1400 audit(205.300:216): avc: denied { read } for pid=4668 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 205.890552][ T31] audit: type=1400 audit(205.810:217): avc: denied { write } for pid=4668 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.552481][ T4682] vlan0: entered allmulticast mode [ 206.556196][ T4682] bridge_slave_0: entered allmulticast mode [ 206.600104][ T4682] bridge_slave_0: left allmulticast mode [ 207.644087][ T31] audit: type=1400 audit(207.570:218): avc: denied { ioctl } for pid=4668 comm="syz.1.250" path="socket:[4025]" dev="sockfs" ino=4025 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 207.647332][ T4697] syzkaller1: entered promiscuous mode [ 207.647949][ T4697] syzkaller1: entered allmulticast mode [ 207.709364][ T31] audit: type=1326 audit(207.630:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4668 comm="syz.1.250" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 208.203451][ T4671] syz.1.250 uses obsolete (PF_INET,SOCK_PACKET) [ 210.072163][ T31] audit: type=1326 audit(210.000:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.073646][ T31] audit: type=1326 audit(210.000:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.074723][ T31] audit: type=1326 audit(210.000:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.083307][ T31] audit: type=1326 audit(210.000:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.084086][ T31] audit: type=1326 audit(210.000:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.085179][ T31] audit: type=1326 audit(210.010:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.086055][ T31] audit: type=1326 audit(210.010:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.086778][ T31] audit: type=1326 audit(210.010:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.087475][ T31] audit: type=1326 audit(210.010:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.115178][ T31] audit: type=1326 audit(210.010:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4731 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 210.653387][ T4736] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 213.758804][ T4766] syz.1.268[4766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.759187][ T4766] syz.1.268[4766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.768741][ T4766] syz.1.268[4766] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.798765][ T4766] mmap: syz.1.268 (4766) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 214.464521][ T4772] pimreg4: entered allmulticast mode [ 215.582483][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 215.582593][ T31] audit: type=1326 audit(215.510:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.583911][ T31] audit: type=1326 audit(215.510:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.584634][ T31] audit: type=1326 audit(215.510:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.591167][ T31] audit: type=1326 audit(215.510:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.592036][ T31] audit: type=1326 audit(215.510:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.593236][ T31] audit: type=1326 audit(215.520:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.609584][ T31] audit: type=1326 audit(215.540:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 215.610682][ T31] audit: type=1326 audit(215.540:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4783 comm="syz.1.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 217.612112][ T4806] netlink: 'syz.0.279': attribute type 3 has an invalid length. [ 217.769784][ T31] audit: type=1400 audit(217.690:261): avc: denied { write } for pid=4807 comm="syz.1.281" name="tcp6" dev="proc" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 220.414869][ T4849] netlink: 8 bytes leftover after parsing attributes in process `syz.0.284'. [ 220.803334][ T31] audit: type=1400 audit(220.730:262): avc: denied { getopt } for pid=4846 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 221.485248][ T31] audit: type=1400 audit(221.410:263): avc: denied { create } for pid=4854 comm="syz.1.287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 223.481232][ T31] audit: type=1400 audit(223.410:264): avc: denied { mounton } for pid=4872 comm="syz.1.291" path="/129/file0" dev="tmpfs" ino=668 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 223.485708][ T4874] tmpfs: Unsupported parameter 'mpol' [ 223.581590][ T31] audit: type=1326 audit(223.510:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.605063][ T31] audit: type=1326 audit(223.520:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.628618][ T31] audit: type=1326 audit(223.540:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.630632][ T31] audit: type=1326 audit(223.550:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.641878][ T31] audit: type=1326 audit(223.570:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.664889][ T31] audit: type=1326 audit(223.580:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 223.669024][ T31] audit: type=1326 audit(223.580:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4872 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 225.889235][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 225.889353][ T31] audit: type=1400 audit(225.810:287): avc: denied { shutdown } for pid=4897 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 225.889699][ T4900] netlink: 'syz.0.299': attribute type 10 has an invalid length. [ 226.889794][ T4911] bond0: (slave bond_slave_0): Releasing backup interface [ 226.970292][ T4911] bond0: (slave bond_slave_1): Releasing backup interface [ 228.179527][ T31] audit: type=1326 audit(228.100:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.180677][ T31] audit: type=1326 audit(228.100:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.182348][ T31] audit: type=1326 audit(228.110:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.184060][ T31] audit: type=1326 audit(228.110:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.185015][ T31] audit: type=1326 audit(228.110:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.185733][ T31] audit: type=1326 audit(228.110:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.188704][ T31] audit: type=1326 audit(228.110:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.207634][ T31] audit: type=1326 audit(228.130:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 228.221057][ T31] audit: type=1326 audit(228.140:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4921 comm="syz.1.306" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 229.070637][ T4900] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 230.901751][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 230.901858][ T31] audit: type=1326 audit(230.830:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.906668][ T31] audit: type=1326 audit(230.830:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.910931][ T31] audit: type=1326 audit(230.840:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.313" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.912124][ T31] audit: type=1326 audit(230.840:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 230.914374][ T31] audit: type=1326 audit(230.840:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 231.625982][ T31] audit: type=1400 audit(231.550:307): avc: denied { name_connect } for pid=4950 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 231.697195][ T31] audit: type=1400 audit(231.620:308): avc: denied { create } for pid=4953 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 231.717407][ T31] audit: type=1400 audit(231.640:309): avc: denied { ioctl } for pid=4953 comm="syz.0.316" path="socket:[5320]" dev="sockfs" ino=5320 ioctlcmd=0x89fa scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 232.052514][ T31] audit: type=1326 audit(231.980:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.1.317" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 232.069595][ T31] audit: type=1326 audit(231.980:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4961 comm="syz.1.317" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 236.399627][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 236.399713][ T31] audit: type=1400 audit(236.310:355): avc: denied { watch watch_reads } for pid=5030 comm="syz.1.339" path="/proc/402" dev="proc" ino=5410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 237.196931][ T31] audit: type=1326 audit(237.120:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.217686][ T31] audit: type=1326 audit(237.140:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.228621][ T31] audit: type=1326 audit(237.140:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.229448][ T31] audit: type=1326 audit(237.140:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.229923][ T31] audit: type=1326 audit(237.140:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.230336][ T31] audit: type=1326 audit(237.140:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.230757][ T31] audit: type=1326 audit(237.140:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.231283][ T31] audit: type=1326 audit(237.140:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 237.248418][ T31] audit: type=1326 audit(237.160:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.1.341" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 240.501125][ T5062] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5062 comm=syz.1.349 [ 241.435281][ T5093] syz.0.353[5093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.435656][ T5093] syz.0.353[5093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.440383][ T5093] syz.0.353[5093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.066651][ T5099] bond1: entered promiscuous mode [ 242.067191][ T5099] bond1: entered allmulticast mode [ 242.067854][ T5099] 8021q: adding VLAN 0 to HW filter on device bond1 [ 242.095001][ T5099] bond1 (unregistering): Released all slaves [ 243.617006][ T5177] netlink: 'syz.0.360': attribute type 4 has an invalid length. [ 245.062070][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 245.062138][ T31] audit: type=1400 audit(244.990:372): avc: denied { read } for pid=5186 comm="syz.1.364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 245.729367][ T31] audit: type=1400 audit(245.650:373): avc: denied { sqpoll } for pid=5194 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 245.778639][ T31] audit: type=1400 audit(245.700:374): avc: denied { bind } for pid=5194 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 245.803044][ T31] audit: type=1400 audit(245.730:375): avc: denied { write } for pid=5194 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 249.084536][ T31] audit: type=1326 audit(249.010:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 249.087408][ T31] audit: type=1326 audit(249.010:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 249.104099][ T31] audit: type=1326 audit(249.030:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=339 compat=0 ip=0x133450 code=0x7ffc0000 [ 249.105909][ T31] audit: type=1326 audit(249.030:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.378" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 249.765132][ T31] audit: type=1400 audit(249.690:380): avc: denied { append } for pid=5245 comm="syz.1.383" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.765297][ T5247] random: crng reseeded on system resumption [ 251.609519][ T5271] netlink: 'syz.1.392': attribute type 10 has an invalid length. [ 252.460530][ T5282] Driver unsupported XDP return value 0 on prog (id 177) dev N/A, expect packet loss! [ 252.490712][ T5284] netlink: 8 bytes leftover after parsing attributes in process `syz.1.394'. [ 253.186152][ T31] audit: type=1400 audit(253.110:381): avc: denied { create } for pid=5290 comm="syz.0.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 253.677614][ T31] audit: type=1400 audit(253.600:382): avc: denied { write } for pid=5297 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 253.793742][ T31] audit: type=1326 audit(253.720:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.797682][ T31] audit: type=1326 audit(253.720:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.823078][ T31] audit: type=1326 audit(253.740:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.835569][ T31] audit: type=1326 audit(253.760:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.836694][ T31] audit: type=1326 audit(253.760:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.856101][ T31] audit: type=1326 audit(253.760:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=256 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.857095][ T31] audit: type=1326 audit(253.770:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 253.861747][ T31] audit: type=1326 audit(253.770:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5301 comm="syz.1.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 263.135724][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 263.136907][ T31] audit: type=1400 audit(263.060:434): avc: denied { setopt } for pid=5387 comm="syz.0.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 263.177876][ T31] audit: type=1400 audit(263.100:435): avc: denied { read } for pid=5387 comm="syz.0.427" lport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 265.022850][ T5398] vlan0: entered allmulticast mode [ 266.581439][ T31] audit: type=1326 audit(266.510:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.582789][ T31] audit: type=1326 audit(266.510:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.586080][ T31] audit: type=1326 audit(266.510:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.595039][ T31] audit: type=1326 audit(266.520:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.597846][ T31] audit: type=1326 audit(266.520:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.606290][ T31] audit: type=1326 audit(266.530:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.606831][ T31] audit: type=1326 audit(266.530:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 266.607283][ T31] audit: type=1326 audit(266.530:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.438" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 267.299000][ T5442] netlink: 212 bytes leftover after parsing attributes in process `syz.0.445'. [ 267.785383][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 270.901689][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 270.901793][ T31] audit: type=1400 audit(270.830:472): avc: denied { create } for pid=5480 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 270.907104][ T31] audit: type=1400 audit(270.830:473): avc: denied { write } for pid=5480 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 283.392284][ T31] audit: type=1326 audit(283.320:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.397188][ T31] audit: type=1326 audit(283.320:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.420174][ T31] audit: type=1326 audit(283.330:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.421574][ T31] audit: type=1326 audit(283.350:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.441551][ T31] audit: type=1326 audit(283.370:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.442787][ T31] audit: type=1326 audit(283.370:479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.443892][ T31] audit: type=1326 audit(283.370:480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.447808][ T31] audit: type=1326 audit(283.370:481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.466218][ T31] audit: type=1326 audit(283.390:482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 283.509093][ T31] audit: type=1326 audit(283.390:483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5531 comm="syz.0.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 287.852907][ T5550] syz.0.477[5550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.853278][ T5550] syz.0.477[5550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.854017][ T5550] syz.0.477[5550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.499468][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 288.499647][ T31] audit: type=1326 audit(288.410:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.502366][ T31] audit: type=1326 audit(288.420:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.512150][ T31] audit: type=1326 audit(288.430:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.513334][ T31] audit: type=1326 audit(288.430:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.514480][ T31] audit: type=1326 audit(288.440:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.516374][ T31] audit: type=1326 audit(288.440:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.561854][ T31] audit: type=1326 audit(288.440:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.563022][ T31] audit: type=1326 audit(288.450:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 288.565270][ T31] audit: type=1326 audit(288.450:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5574 comm="syz.0.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 291.498272][ T31] audit: type=1326 audit(291.390:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5594 comm="syz.0.485" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 291.756055][ T5598] netlink: 60 bytes leftover after parsing attributes in process `syz.0.486'. [ 291.961801][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 291.962555][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.962955][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.963323][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.963690][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.964083][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.965084][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.965491][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 291.965856][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.966228][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.966602][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.966967][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.967315][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x4 [ 291.967709][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.978825][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.979406][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.980795][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.981266][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.981627][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.981992][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.982362][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.982709][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.983080][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.983446][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.983815][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.984397][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.984753][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.985123][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.985490][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.999012][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 291.999614][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.000027][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.000387][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.000767][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.001144][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.001616][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.002057][ T5587] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 292.027621][ T5587] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 293.739417][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 293.739574][ T31] audit: type=1326 audit(293.640:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.741290][ T31] audit: type=1326 audit(293.670:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.746336][ T5620] syz.0.489[5620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.746560][ T31] audit: type=1326 audit(293.670:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.746607][ T5620] syz.0.489[5620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.747131][ T5620] syz.0.489[5620] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.756937][ T31] audit: type=1326 audit(293.680:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.761488][ T31] audit: type=1326 audit(293.680:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.772772][ T31] audit: type=1326 audit(293.690:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.794894][ T31] audit: type=1326 audit(293.720:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.796310][ T31] audit: type=1326 audit(293.720:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.800392][ T31] audit: type=1326 audit(293.730:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x133450 code=0x7ffc0000 [ 293.805804][ T31] audit: type=1326 audit(293.730:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5618 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 298.892368][ T5671] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 299.130378][ T5671] usb 2-1: Using ep0 maxpacket: 32 [ 299.173815][ T5671] usb 2-1: config 4 has an invalid interface number: 130 but max is 0 [ 299.193116][ T5671] usb 2-1: config 4 has no interface number 0 [ 299.199219][ T5671] usb 2-1: config 4 interface 130 altsetting 0 has an endpoint descriptor with address 0xED, changing to 0x8D [ 299.199787][ T5671] usb 2-1: config 4 interface 130 altsetting 0 bulk endpoint 0x8D has invalid maxpacket 162 [ 299.200301][ T5671] usb 2-1: New USB device found, idVendor=1266, idProduct=1006, bcdDevice=bc.e8 [ 299.200701][ T5671] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 299.210142][ T5680] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 299.316716][ T5671] option 2-1:4.130: GSM modem (1-port) converter detected [ 299.485797][ T5671] usb 2-1: USB disconnect, device number 2 [ 299.524885][ T5671] option 2-1:4.130: device disconnected [ 301.783607][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 301.783698][ T31] audit: type=1400 audit(301.710:617): avc: denied { setopt } for pid=5711 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 302.092320][ T31] audit: type=1326 audit(301.990:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.118869][ T31] audit: type=1326 audit(302.030:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.119801][ T31] audit: type=1326 audit(302.030:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.129266][ T31] audit: type=1326 audit(302.050:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.130333][ T31] audit: type=1326 audit(302.050:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.140309][ T31] audit: type=1326 audit(302.060:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.141541][ T31] audit: type=1326 audit(302.070:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.142336][ T31] audit: type=1326 audit(302.070:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 302.149285][ T31] audit: type=1326 audit(302.070:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5716 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 303.413450][ T5739] netlink: 28 bytes leftover after parsing attributes in process `syz.0.517'. [ 303.414106][ T5739] netlink: 28 bytes leftover after parsing attributes in process `syz.0.517'. [ 305.926648][ T5773] SELinux: policydb version 0 does not match my version range 15-33 [ 305.940636][ T5773] SELinux: failed to load policy [ 309.034493][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 309.034650][ T31] audit: type=1400 audit(308.960:657): avc: denied { setopt } for pid=5799 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 309.179537][ T31] audit: type=1400 audit(309.100:658): avc: denied { bind } for pid=5801 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 309.647097][ T31] audit: type=1326 audit(309.570:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.658674][ T31] audit: type=1326 audit(309.580:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.674790][ T31] audit: type=1326 audit(309.600:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.676246][ T31] audit: type=1326 audit(309.600:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.680204][ T31] audit: type=1326 audit(309.600:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.680942][ T31] audit: type=1326 audit(309.610:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.681552][ T31] audit: type=1326 audit(309.610:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 309.684616][ T31] audit: type=1326 audit(309.610:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5804 comm="syz.1.538" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 312.791263][ T5805] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 314.210836][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 314.210928][ T31] audit: type=1326 audit(314.140:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5822 comm="syz.1.543" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 314.225117][ T31] audit: type=1326 audit(314.150:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5822 comm="syz.1.543" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x133450 code=0x7ffc0000 [ 314.299038][ T31] audit: type=1326 audit(314.170:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5822 comm="syz.1.543" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 314.300491][ T31] audit: type=1326 audit(314.170:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5822 comm="syz.1.543" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 316.486575][ T31] audit: type=1400 audit(316.410:686): avc: denied { map } for pid=5842 comm="syz.1.548" path="socket:[7170]" dev="sockfs" ino=7170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 316.495703][ T31] audit: type=1400 audit(316.420:687): avc: denied { read } for pid=5842 comm="syz.1.548" path="socket:[7170]" dev="sockfs" ino=7170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 317.156417][ T31] audit: type=1326 audit(317.080:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.0.550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 317.157372][ T31] audit: type=1326 audit(317.080:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.0.550" exe="/syz-executor" sig=0 arch=40000028 syscall=264 compat=0 ip=0x133450 code=0x7ffc0000 [ 317.158081][ T31] audit: type=1326 audit(317.080:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5846 comm="syz.0.550" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 317.612679][ T31] audit: type=1400 audit(317.540:691): avc: denied { relabelfrom } for pid=5848 comm="syz.0.552" name="NETLINK" dev="sockfs" ino=6214 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 320.097012][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 320.097123][ T31] audit: type=1400 audit(320.020:693): avc: denied { compute_member } for pid=5885 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 320.739428][ T5893] syz.0.565[5893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.739646][ T5893] syz.0.565[5893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.740108][ T5893] syz.0.565[5893] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.905547][ T5896] netlink: 60 bytes leftover after parsing attributes in process `syz.0.566'. [ 320.906782][ T5896] netlink: 60 bytes leftover after parsing attributes in process `syz.0.566'. [ 321.014762][ T31] audit: type=1400 audit(320.940:694): avc: denied { connect } for pid=5894 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 321.050936][ T5896] ------------[ cut here ]------------ [ 321.051637][ T5896] WARNING: CPU: 0 PID: 5896 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 321.052778][ T5896] refcount_t: underflow; use-after-free. [ 321.053060][ T5896] Modules linked in: [ 321.055124][ T5896] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 321.056214][ T5896] CPU: 0 UID: 0 PID: 5896 Comm: syz.0.566 Not tainted 6.12.0-syzkaller #0 [ 321.056567][ T5896] Hardware name: ARM-Versatile Express [ 321.057258][ T5896] Call trace: [ 321.057739][ T5896] [<819be5f8>] (dump_backtrace) from [<819be6f4>] (show_stack+0x18/0x1c) [ 321.059653][ T5896] r7:00000000 r6:82623304 r5:00000000 r4:82043260 [ 321.068742][ T5896] [<819be6dc>] (show_stack) from [<819dc71c>] (dump_stack_lvl+0x54/0x7c) [ 321.069560][ T5896] [<819dc6c8>] (dump_stack_lvl) from [<819dc75c>] (dump_stack+0x18/0x1c) [ 321.070550][ T5896] r5:00000000 r4:82871d18 [ 321.070829][ T5896] [<819dc744>] (dump_stack) from [<819bf220>] (panic+0x120/0x374) [ 321.071988][ T5896] [<819bf100>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 321.072440][ T5896] r3:8260c604 r2:00000001 r1:8202b7cc r0:82033298 [ 321.072716][ T5896] r7:80849f88 [ 321.073011][ T5896] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 321.073465][ T5896] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 321.074037][ T5896] r8:00000009 r7:82091f80 r6:ea9b9c74 r5:82efbc00 r4:00000000 [ 321.074517][ T5896] [<80242940>] (warn_slowpath_fmt) from [<80849f88>] (refcount_warn_saturate+0x13c/0x174) [ 321.075002][ T5896] r10:00000000 r9:84befe84 r8:00000000 r7:00000000 r6:8184859c r5:00000002 [ 321.075528][ T5896] r4:8414a3c0 [ 321.075712][ T5896] [<80849e4c>] (refcount_warn_saturate) from [<814b0fac>] (sk_skb_reason_drop+0x1d8/0x248) [ 321.077161][ T5896] [<814b0dd4>] (sk_skb_reason_drop) from [<8184859c>] (j1939_session_destroy+0x78/0x200) [ 321.077691][ T5896] r9:84befe84 r8:00000000 r7:ea9b9f20 r6:8487ba50 r5:8487ba00 r4:8414a3c0 [ 321.079118][ T5896] [<81848524>] (j1939_session_destroy) from [<818498b8>] (j1939_session_put+0x54/0x58) [ 321.079889][ T5896] r6:8487ba00 r5:84c3c780 r4:00000004 [ 321.080303][ T5896] [<81849864>] (j1939_session_put) from [<818478e8>] (j1939_sk_sendmsg+0x41c/0x548) [ 321.080867][ T5896] [<818474cc>] (j1939_sk_sendmsg) from [<8149bc48>] (__sock_sendmsg+0x44/0x78) [ 321.081297][ T5896] r10:00000000 r9:ea9b9dc4 r8:ea9b9dc4 r7:84c3c780 r6:84c3c780 r5:ea9b9f20 [ 321.081818][ T5896] r4:00000000 [ 321.082031][ T5896] [<8149bc04>] (__sock_sendmsg) from [<8149cc48>] (____sys_sendmsg+0x2a4/0x2c4) [ 321.082893][ T5896] r7:84c3c780 r6:00000000 r5:00000000 r4:ea9b9f20 [ 321.083258][ T5896] [<8149c9a4>] (____sys_sendmsg) from [<8149e9e0>] (___sys_sendmsg+0x9c/0xd0) [ 321.083707][ T5896] r10:ea9b9e24 r9:20000280 r8:00000000 r7:00000000 r6:84c3c780 r5:ea9b9f20 [ 321.084135][ T5896] r4:00000000 [ 321.084352][ T5896] [<8149e944>] (___sys_sendmsg) from [<8149ee70>] (__sys_sendmsg+0x8c/0xd8) [ 321.085225][ T5896] r10:00000128 r9:82efbc00 r8:84ba06c0 r7:00000000 r6:20000280 r5:84ba06c1 [ 321.085891][ T5896] r4:00000006 [ 321.086348][ T5896] [<8149ede4>] (__sys_sendmsg) from [<8149eed0>] (sys_sendmsg+0x14/0x18) [ 321.087683][ T5896] r8:8020029c r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 321.088195][ T5896] [<8149eebc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 321.089546][ T5896] Exception stack(0xea9b9fa8 to 0xea9b9ff0) [ 321.090051][ T5896] 9fa0: 00000000 00000000 00000006 20000280 00000000 00000000 [ 321.090592][ T5896] 9fc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76bf10bc [ 321.090980][ T5896] 9fe0: 76bf0ec0 76bf0eb0 00018af0 00133450 [ 321.092849][ T5896] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:15:34 Registers: info registers vcpu 0 CPU#0 R00=ea9b9b20 R01=82033384 R02=82872154 R03=00000098 R04=00000000 R05=82043260 R06=82871d18 R07=00000000 R08=00000000 R09=00000000 R10=00001708 R11=ea9b9b5c R12=ea9b9b60 R13=ea9b9b18 R14=80242c80 R15=819af034 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=8548d43c R01=8548d288 R02=8149fee0 R03=84416000 R04=84416000 R05=00000001 R06=819e9844 R07=e885dc60 R08=e885dcbc R09=00000002 R10=8548d288 R11=e885dc2c R12=e885dc08 R13=e885dc48 R14=814b927c R15=819e9cc0 PSR=20000113 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000