last executing test programs: 6m41.709340728s ago: executing program 1 (id=15): r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f0000000200)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x48, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$chown(0x4, r0, 0xee01, 0x0) 6m41.425825103s ago: executing program 1 (id=16): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) sendmsg$ETHTOOL_MSG_PAUSE_GET(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r1], 0x20}, 0x1, 0x0, 0x0, 0x4000c00}, 0x0) 6m40.515479212s ago: executing program 1 (id=19): r0 = socket(0x40000000015, 0x5, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20, 0x2000000, @ipv4={'\x00', '\xff\xff', @loopback}, 0xb851}, 0x1c) 6m39.798089921s ago: executing program 1 (id=20): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xf, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3e, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}}, 0x0) 6m38.616464814s ago: executing program 1 (id=23): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x200, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x43, 0x2}, {@in6=@remote, 0x4d3, 0x32}, @in=@broadcast, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'cbc(aes)\x00'}}}]}, 0x138}}, 0x0) 6m37.868664894s ago: executing program 1 (id=24): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 5m51.891367041s ago: executing program 32 (id=24): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 27.089949257s ago: executing program 2 (id=400): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fe, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x2}, 0xffffffffffffffff, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000004c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000340)}}, 0x10) 23.931050137s ago: executing program 2 (id=404): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) 23.410315575s ago: executing program 2 (id=406): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000400000000000000000000850000005000000085000000d000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0xe) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000600)={0xf97cff8c, 0x8}, 0x10) 22.898633872s ago: executing program 2 (id=409): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0xffffffffffff8001}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r2, 0x2000000, 0xfe7f, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 21.120511227s ago: executing program 2 (id=410): r0 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x105042, 0x1db) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) semctl$SETALL(0xffffffffffffffff, 0x0, 0x11, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000180)="5c00000013006bcd9e3fe3dc4e48aa31086b8703410000004000000000000000040014000d000a00100000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x0) 16.070197208s ago: executing program 2 (id=417): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @multicast2}}, 0x0, 0x0, 0x27, 0x0, "8a7ecb4d6b3f0cafbcf35cabb63f9e9d198114683021053c2f3bda25afeda865b263ae05982942263fef7decbccfcf7e96961f74d44a9ab0ed3c3e8b01d58bb05c429eefcbc6b655605f8babcf818706"}, 0xd8) 6.337276501s ago: executing program 0 (id=430): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fddbdf251900001e000300000005001d000500"/42], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) syz_genetlink_get_family_id$l2tp(&(0x7f00000008c0), r0) 5.380679431s ago: executing program 0 (id=431): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8ab8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r3, &(0x7f0000000080)='./file0\x00') readlinkat(r3, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 4.760597155s ago: executing program 0 (id=432): fsopen(0x0, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) utimes(&(0x7f0000000840)='./file0\x00', 0x0) 4.432130923s ago: executing program 0 (id=433): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000100003052cbd7000fedbdf2500000020", @ANYRES32=0x0, @ANYBLOB="0000000000080400240012800b0001006d61637365630000140002800500060000000000050007000000000008000500", @ANYRES32=r1], 0x4c}}, 0x0) 3.661408474s ago: executing program 0 (id=434): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, [@printk={@ld}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x34, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32], 0x50) 0s ago: executing program 0 (id=435): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f00000004c0)="b9ff030768441a8cb89e14f00800e075702b1c1d", 0x0, 0x4, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:33838' (ED25519) to the list of known hosts. [ 214.878250][ T30] audit: type=1400 audit(214.380:46): avc: denied { name_bind } for pid=3314 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 215.561181][ T30] audit: type=1400 audit(215.060:47): avc: denied { execute } for pid=3315 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 215.578067][ T30] audit: type=1400 audit(215.070:48): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 223.112725][ T30] audit: type=1400 audit(222.610:49): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 223.127291][ T30] audit: type=1400 audit(222.630:50): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 223.191921][ T3315] cgroup: Unknown subsys name 'net' [ 223.227690][ T30] audit: type=1400 audit(222.730:51): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 223.547980][ T3315] cgroup: Unknown subsys name 'cpuset' [ 223.629198][ T3315] cgroup: Unknown subsys name 'rlimit' [ 223.919484][ T30] audit: type=1400 audit(223.420:52): avc: denied { setattr } for pid=3315 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.939345][ T30] audit: type=1400 audit(223.440:53): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 223.945557][ T30] audit: type=1400 audit(223.450:54): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 224.746792][ T3317] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 224.761583][ T30] audit: type=1400 audit(224.260:55): avc: denied { relabelto } for pid=3317 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.772925][ T30] audit: type=1400 audit(224.270:56): avc: denied { write } for pid=3317 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 224.911232][ T30] audit: type=1400 audit(224.410:57): avc: denied { read } for pid=3315 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.916657][ T30] audit: type=1400 audit(224.420:58): avc: denied { open } for pid=3315 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.941573][ T3315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 244.124194][ T30] audit: type=1400 audit(243.630:59): avc: denied { execmem } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 244.250775][ T30] audit: type=1400 audit(243.750:60): avc: denied { read } for pid=3320 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.258600][ T30] audit: type=1400 audit(243.760:61): avc: denied { open } for pid=3320 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.278871][ T30] audit: type=1400 audit(243.780:62): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 244.338038][ T30] audit: type=1400 audit(243.840:63): avc: denied { module_request } for pid=3320 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 244.574188][ T30] audit: type=1400 audit(244.080:64): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 253.103130][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.147439][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.803517][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.858463][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 257.460803][ T3321] hsr_slave_0: entered promiscuous mode [ 257.475498][ T3321] hsr_slave_1: entered promiscuous mode [ 258.353211][ T3320] hsr_slave_0: entered promiscuous mode [ 258.359124][ T3320] hsr_slave_1: entered promiscuous mode [ 258.369576][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 258.374089][ T3320] Cannot create hsr debugfs directory [ 260.448742][ T30] audit: type=1400 audit(259.950:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.471730][ T30] audit: type=1400 audit(259.970:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.488940][ T30] audit: type=1400 audit(259.990:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.528592][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 260.617454][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 260.662627][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 260.714761][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 261.144515][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 261.206041][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 261.255963][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 261.298207][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 264.078573][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 264.705231][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.648656][ T3320] veth0_vlan: entered promiscuous mode [ 275.849447][ T3320] veth1_vlan: entered promiscuous mode [ 276.244371][ T3320] veth0_macvtap: entered promiscuous mode [ 276.332312][ T3320] veth1_macvtap: entered promiscuous mode [ 276.819013][ T1194] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.833406][ T1194] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.834131][ T1194] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.834403][ T1194] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 277.763877][ T3321] veth0_vlan: entered promiscuous mode [ 277.783575][ T30] audit: type=1400 audit(277.280:68): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 277.817144][ T30] audit: type=1400 audit(277.320:69): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.IFwXOj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 277.885621][ T30] audit: type=1400 audit(277.380:70): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 277.914876][ T3321] veth1_vlan: entered promiscuous mode [ 277.981877][ T30] audit: type=1400 audit(277.480:71): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.IFwXOj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 278.004398][ T30] audit: type=1400 audit(277.500:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.IFwXOj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3596 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 278.073209][ T30] audit: type=1400 audit(277.580:73): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 278.117160][ T30] audit: type=1400 audit(277.620:74): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 278.142927][ T30] audit: type=1400 audit(277.640:75): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=3597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 278.195928][ T30] audit: type=1400 audit(277.700:76): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 278.216482][ T30] audit: type=1400 audit(277.710:77): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 278.719154][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 278.763753][ T3321] veth0_macvtap: entered promiscuous mode [ 278.808470][ T3321] veth1_macvtap: entered promiscuous mode [ 279.856234][ T99] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.862087][ T1194] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.866190][ T1194] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.868482][ T1194] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.943244][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 283.943856][ T30] audit: type=1400 audit(283.420:86): avc: denied { map_read map_write } for pid=3473 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 283.984280][ T30] audit: type=1326 audit(283.470:87): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 284.008365][ T30] audit: type=1400 audit(283.510:88): avc: denied { read write } for pid=3473 comm="syz.0.3" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.028719][ T30] audit: type=1400 audit(283.520:89): avc: denied { open } for pid=3473 comm="syz.0.3" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.042125][ T30] audit: type=1326 audit(283.540:90): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 284.051259][ T30] audit: type=1326 audit(283.550:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 284.099456][ T30] audit: type=1326 audit(283.600:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 284.167108][ T30] audit: type=1326 audit(283.670:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 284.236202][ T30] audit: type=1326 audit(283.740:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 284.276397][ T30] audit: type=1326 audit(283.770:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.2" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 289.599500][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 289.631329][ T30] audit: type=1400 audit(289.100:119): avc: denied { create } for pid=3503 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 289.665029][ T30] audit: type=1400 audit(289.170:120): avc: denied { write } for pid=3503 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 289.678135][ T30] audit: type=1400 audit(289.180:121): avc: denied { read } for pid=3503 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 289.787870][ T3506] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 290.426131][ T30] audit: type=1400 audit(289.930:122): avc: denied { create } for pid=3507 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 290.510934][ T30] audit: type=1400 audit(290.000:123): avc: denied { setopt } for pid=3507 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 290.556875][ T30] audit: type=1400 audit(290.060:124): avc: denied { bind } for pid=3507 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 290.872043][ T30] audit: type=1326 audit(290.370:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3508 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 290.901071][ T30] audit: type=1326 audit(290.380:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3508 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 290.971050][ T30] audit: type=1326 audit(290.470:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3508 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 290.975048][ T30] audit: type=1326 audit(290.470:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3508 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.664375][ T3527] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 294.665160][ T3527] IPv6: NLM_F_CREATE should be set when creating new route [ 294.673832][ T3527] Zero length message leads to an empty skb [ 300.381676][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 300.382596][ T30] audit: type=1400 audit(299.860:140): avc: denied { create } for pid=3530 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 300.383003][ T30] audit: type=1400 audit(299.860:141): avc: denied { write } for pid=3530 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 302.264340][ T3533] infiniband syz!: set down [ 302.274362][ T3533] infiniband syz!: added team_slave_0 [ 302.321600][ T3533] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 302.347753][ T3533] infiniband syz!: Couldn't open port 1 [ 302.533491][ T3533] RDS/IB: syz!: added [ 302.539311][ T3533] smc: adding ib device syz! with port count 1 [ 302.546505][ T3533] smc: ib device syz! port 1 has pnetid [ 310.676856][ T30] audit: type=1326 audit(310.180:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 310.684871][ T30] audit: type=1326 audit(310.190:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 310.691866][ T30] audit: type=1326 audit(310.200:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 310.701717][ T30] audit: type=1326 audit(310.200:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 310.707366][ T30] audit: type=1326 audit(310.210:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=384 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 310.716053][ T30] audit: type=1326 audit(310.220:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 310.729185][ T30] audit: type=1326 audit(310.230:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 310.745280][ T30] audit: type=1326 audit(310.240:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3541 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 311.515513][ T30] audit: type=1326 audit(311.020:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3545 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 311.517330][ T30] audit: type=1326 audit(311.020:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3545 comm="syz.0.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 314.271807][ T3555] netlink: 4 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 319.914048][ T3563] syz.0.40 uses obsolete (PF_INET,SOCK_PACKET) [ 322.261528][ T30] kauditd_printk_skb: 57 callbacks suppressed [ 322.266751][ T30] audit: type=1400 audit(321.760:209): avc: denied { read } for pid=3569 comm="syz.0.42" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 322.288025][ T30] audit: type=1400 audit(321.790:210): avc: denied { open } for pid=3569 comm="syz.0.42" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 322.376918][ T30] audit: type=1400 audit(321.880:211): avc: denied { ioctl } for pid=3569 comm="syz.0.42" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 329.210185][ T30] audit: type=1400 audit(328.710:212): avc: denied { mount } for pid=3574 comm="syz.0.44" name="/" dev="ramfs" ino=4638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 329.849191][ T30] audit: type=1400 audit(329.350:213): avc: denied { mounton } for pid=3576 comm="syz.0.45" path="/30/file0" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 329.885063][ T30] audit: type=1400 audit(329.390:214): avc: denied { mount } for pid=3576 comm="syz.0.45" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 329.938429][ T30] audit: type=1400 audit(329.440:215): avc: denied { unmount } for pid=3576 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 330.552054][ T30] audit: type=1400 audit(330.050:216): avc: denied { name_bind } for pid=3579 comm="syz.0.46" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 330.557355][ T30] audit: type=1400 audit(330.060:217): avc: denied { node_bind } for pid=3579 comm="syz.0.46" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 331.237529][ T30] audit: type=1400 audit(330.730:218): avc: denied { prog_run } for pid=3579 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 331.252434][ T30] audit: type=1400 audit(330.760:219): avc: denied { create } for pid=3579 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 331.272035][ T30] audit: type=1400 audit(330.770:220): avc: denied { ioctl } for pid=3579 comm="syz.0.46" path="socket:[4652]" dev="sockfs" ino=4652 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 331.282888][ T30] audit: type=1400 audit(330.790:221): avc: denied { write } for pid=3579 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 338.958617][ T30] audit: type=1400 audit(338.460:222): avc: denied { execute } for pid=3587 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 339.005736][ T30] audit: type=1400 audit(338.510:223): avc: denied { execute_no_trans } for pid=3587 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 339.203482][ T30] audit: type=1400 audit(338.710:224): avc: denied { read } for pid=3588 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 339.205533][ T30] audit: type=1400 audit(338.710:225): avc: denied { open } for pid=3588 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 339.224407][ T30] audit: type=1400 audit(338.730:226): avc: denied { mounton } for pid=3588 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 339.291382][ T30] audit: type=1400 audit(338.790:227): avc: denied { module_request } for pid=3588 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 339.951483][ T30] audit: type=1400 audit(339.440:228): avc: denied { sys_module } for pid=3588 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 359.485440][ T30] audit: type=1400 audit(358.990:229): avc: denied { create } for pid=3609 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 359.551369][ T30] audit: type=1400 audit(359.050:230): avc: denied { connect } for pid=3609 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 362.118392][ T3588] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 362.175641][ T3588] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 365.011769][ T30] audit: type=1326 audit(364.500:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 365.012747][ T30] audit: type=1326 audit(364.500:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 365.021305][ T30] audit: type=1326 audit(364.520:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 365.062578][ T30] audit: type=1326 audit(364.550:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 365.063530][ T30] audit: type=1326 audit(364.550:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 365.063859][ T30] audit: type=1326 audit(364.550:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 365.064191][ T30] audit: type=1326 audit(364.550:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 365.064591][ T30] audit: type=1326 audit(364.550:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 365.064939][ T30] audit: type=1326 audit(364.560:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 365.065283][ T30] audit: type=1326 audit(364.560:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3629 comm="syz.0.54" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 368.247657][ T3641] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 368.387735][ T3588] hsr_slave_0: entered promiscuous mode [ 368.415988][ T3588] hsr_slave_1: entered promiscuous mode [ 368.424682][ T3588] debugfs: 'hsr0' already exists in 'hsr' [ 368.425340][ T3588] Cannot create hsr debugfs directory [ 371.713314][ T3588] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 371.767503][ T3588] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 371.833624][ T3588] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 371.866401][ T3588] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 372.927178][ T3659] netlink: 284 bytes leftover after parsing attributes in process `syz.0.58'. [ 373.827013][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 373.827790][ T30] audit: type=1400 audit(373.310:295): avc: denied { execute } for pid=3660 comm="syz.0.59" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=4903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 376.422236][ T3588] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.389407][ T30] audit: type=1326 audit(381.890:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 382.427451][ T30] audit: type=1326 audit(381.890:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 382.447937][ T30] audit: type=1326 audit(381.950:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 382.457748][ T30] audit: type=1326 audit(381.960:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 382.489183][ T30] audit: type=1326 audit(381.990:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 382.516435][ T30] audit: type=1326 audit(382.020:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 382.545463][ T30] audit: type=1326 audit(382.050:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 382.578196][ T30] audit: type=1326 audit(382.080:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.0.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 383.337426][ T30] audit: type=1400 audit(382.840:304): avc: denied { ioctl } for pid=3689 comm="syz.0.64" path="socket:[4025]" dev="sockfs" ino=4025 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 389.365960][ T30] audit: type=1400 audit(388.860:305): avc: denied { create } for pid=3708 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 389.372808][ T30] audit: type=1400 audit(388.880:306): avc: denied { write } for pid=3708 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 390.681704][ T30] audit: type=1400 audit(390.180:307): avc: denied { create } for pid=3714 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 390.718841][ T30] audit: type=1400 audit(390.220:308): avc: denied { bind } for pid=3714 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 394.227490][ T3588] veth0_vlan: entered promiscuous mode [ 394.371809][ T3588] veth1_vlan: entered promiscuous mode [ 395.027703][ T3588] veth0_macvtap: entered promiscuous mode [ 395.094494][ T3588] veth1_macvtap: entered promiscuous mode [ 395.700520][ T30] audit: type=1400 audit(395.160:309): avc: denied { ioctl } for pid=3728 comm="syz.0.70" path="socket:[5031]" dev="sockfs" ino=5031 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 396.162182][ T94] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.174395][ T94] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.252495][ T94] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.253186][ T94] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 397.075400][ T3656] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 397.603955][ T3656] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.196820][ T3656] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.687036][ T3656] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.224358][ T30] audit: type=1400 audit(398.710:310): avc: denied { mounton } for pid=3588 comm="syz-executor" path="/syzkaller.kiayp0/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 399.247673][ T30] audit: type=1400 audit(398.740:311): avc: denied { mount } for pid=3588 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 399.347549][ T30] audit: type=1400 audit(398.850:312): avc: denied { mount } for pid=3588 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 399.464031][ T30] audit: type=1400 audit(398.930:313): avc: denied { mounton } for pid=3588 comm="syz-executor" path="/syzkaller.kiayp0/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 399.497548][ T30] audit: type=1400 audit(399.000:314): avc: denied { mounton } for pid=3588 comm="syz-executor" path="/syzkaller.kiayp0/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 399.692477][ T30] audit: type=1400 audit(399.180:315): avc: denied { unmount } for pid=3588 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 399.757197][ T30] audit: type=1400 audit(399.260:316): avc: denied { mounton } for pid=3588 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 399.781709][ T30] audit: type=1400 audit(399.270:317): avc: denied { mount } for pid=3588 comm="syz-executor" name="/" dev="gadgetfs" ino=3597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 399.823007][ T30] audit: type=1400 audit(399.320:318): avc: denied { mount } for pid=3588 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 406.397666][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 406.398474][ T30] audit: type=1400 audit(405.900:322): avc: denied { mac_admin } for pid=3761 comm="syz.0.77" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 406.415351][ T3762] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 406.437279][ T30] audit: type=1400 audit(405.920:323): avc: denied { relabelto } for pid=3761 comm="syz.0.77" name="file0" dev="tmpfs" ino=322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 406.455595][ T30] audit: type=1400 audit(405.960:324): avc: denied { associate } for pid=3761 comm="syz.0.77" name="file0" dev="tmpfs" ino=322 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 407.107859][ T30] audit: type=1400 audit(406.600:325): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 407.305295][ T30] audit: type=1400 audit(406.810:326): avc: denied { append } for pid=3763 comm="syz.2.78" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 407.308223][ T30] audit: type=1400 audit(406.810:327): avc: denied { open } for pid=3763 comm="syz.2.78" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 407.315632][ T3764] random: crng reseeded on system resumption [ 407.755419][ T3764] netlink: 'syz.2.78': attribute type 1 has an invalid length. [ 407.782575][ T3764] netlink: 224 bytes leftover after parsing attributes in process `syz.2.78'. [ 408.477443][ T30] audit: type=1400 audit(407.950:328): avc: denied { ioctl } for pid=3763 comm="syz.2.78" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 408.499423][ T3770] Restarting kernel threads ... [ 408.537163][ T3770] Done restarting kernel threads. [ 409.172024][ T3656] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 409.358360][ T3656] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 409.526289][ T3656] bond0 (unregistering): Released all slaves [ 410.399229][ T30] audit: type=1400 audit(409.900:329): avc: denied { search } for pid=3165 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 410.423440][ T30] audit: type=1400 audit(409.930:330): avc: denied { search } for pid=3165 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 410.452214][ T30] audit: type=1400 audit(409.950:331): avc: denied { search } for pid=3165 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 411.407427][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 411.429034][ T30] audit: type=1400 audit(410.910:335): avc: denied { create } for pid=3775 comm="syz.2.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.348100][ T30] audit: type=1400 audit(414.850:336): avc: denied { read open } for pid=3790 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=728 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 415.456058][ T30] audit: type=1400 audit(414.940:337): avc: denied { getattr } for pid=3790 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=728 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 415.827349][ T30] audit: type=1400 audit(415.330:338): avc: denied { add_name } for pid=3787 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 415.892401][ T30] audit: type=1400 audit(415.390:339): avc: denied { create } for pid=3787 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 415.906111][ T30] audit: type=1400 audit(415.410:340): avc: denied { write } for pid=3787 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1185 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 415.977603][ T30] audit: type=1400 audit(415.460:341): avc: denied { append } for pid=3787 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1185 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 417.965547][ T30] audit: type=1400 audit(417.470:342): avc: denied { map_create } for pid=3800 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 418.035591][ T30] audit: type=1400 audit(417.540:343): avc: denied { map_read map_write } for pid=3800 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 418.057285][ T30] audit: type=1326 audit(417.560:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3800 comm="syz.2.87" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 418.067470][ T30] audit: type=1326 audit(417.570:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3800 comm="syz.2.87" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 418.092378][ T30] audit: type=1326 audit(417.600:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3800 comm="syz.2.87" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 418.103913][ T30] audit: type=1326 audit(417.610:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3800 comm="syz.2.87" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 418.114107][ T30] audit: type=1400 audit(417.620:348): avc: denied { prog_load } for pid=3800 comm="syz.2.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 418.120983][ T30] audit: type=1400 audit(417.620:349): avc: denied { bpf } for pid=3800 comm="syz.2.87" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 418.125714][ T30] audit: type=1400 audit(417.630:350): avc: denied { perfmon } for pid=3800 comm="syz.2.87" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 418.140861][ T30] audit: type=1326 audit(417.640:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3800 comm="syz.2.87" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 418.208662][ T3801] capability: warning: `syz.2.87' uses deprecated v2 capabilities in a way that may be insecure [ 418.211486][ T3656] hsr_slave_0: left promiscuous mode [ 418.223792][ T3656] hsr_slave_1: left promiscuous mode [ 418.562449][ T3656] veth1_macvtap: left promiscuous mode [ 418.563440][ T3656] veth0_macvtap: left promiscuous mode [ 418.567864][ T3656] veth1_vlan: left promiscuous mode [ 418.582680][ T3656] veth0_vlan: left promiscuous mode [ 423.834546][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 423.836828][ T30] audit: type=1400 audit(423.340:391): avc: denied { create } for pid=3827 comm="syz.2.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 428.239419][ T30] audit: type=1400 audit(427.730:392): avc: denied { execute } for pid=3840 comm="syz.2.101" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=6187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 428.779073][ T30] audit: type=1400 audit(428.280:393): avc: denied { execmem } for pid=3842 comm="syz.2.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 429.243153][ T30] audit: type=1400 audit(428.750:394): avc: denied { create } for pid=3844 comm="syz.2.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 429.311933][ T30] audit: type=1400 audit(428.820:395): avc: denied { create } for pid=3844 comm="syz.2.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 429.423361][ T30] audit: type=1400 audit(428.930:396): avc: denied { setopt } for pid=3844 comm="syz.2.103" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 430.557712][ T3846] pimreg: entered allmulticast mode [ 430.653139][ T3845] pimreg: left allmulticast mode [ 430.916743][ T30] audit: type=1400 audit(430.420:397): avc: denied { write } for pid=3847 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 431.283162][ T30] audit: type=1400 audit(430.780:398): avc: denied { read } for pid=3165 comm="dhcpcd" name="n19" dev="tmpfs" ino=1153 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.307208][ T30] audit: type=1400 audit(430.810:399): avc: denied { open } for pid=3165 comm="dhcpcd" path="/run/udev/data/n19" dev="tmpfs" ino=1153 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 431.705595][ T30] audit: type=1326 audit(431.210:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.2.106" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 431.724402][ T30] audit: type=1326 audit(431.220:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.2.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 431.773066][ T30] audit: type=1326 audit(431.250:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.2.106" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 431.774859][ T30] audit: type=1326 audit(431.280:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3850 comm="syz.2.106" exe="/syz-executor" sig=0 arch=40000028 syscall=349 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 433.316975][ T3861] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 436.576517][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 436.578751][ T30] audit: type=1400 audit(436.080:421): avc: denied { create } for pid=3874 comm="syz.2.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 436.615964][ T30] audit: type=1400 audit(436.120:422): avc: denied { connect } for pid=3874 comm="syz.2.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 436.693770][ T30] audit: type=1400 audit(436.190:423): avc: denied { ioctl } for pid=3874 comm="syz.2.114" path="socket:[5465]" dev="sockfs" ino=5465 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 436.712967][ T30] audit: type=1400 audit(436.210:424): avc: denied { write } for pid=3874 comm="syz.2.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.729168][ T30] audit: type=1400 audit(437.230:425): avc: denied { read write } for pid=3880 comm="syz.0.116" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 437.747648][ T30] audit: type=1400 audit(437.250:426): avc: denied { open } for pid=3880 comm="syz.0.116" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 440.324456][ T30] audit: type=1400 audit(439.830:427): avc: denied { allowed } for pid=3891 comm="syz.2.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 440.394663][ T30] audit: type=1400 audit(439.880:428): avc: denied { create } for pid=3891 comm="syz.2.120" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 440.430840][ T30] audit: type=1400 audit(439.930:429): avc: denied { map } for pid=3891 comm="syz.2.120" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6248 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 440.434789][ T30] audit: type=1400 audit(439.930:430): avc: denied { read write } for pid=3891 comm="syz.2.120" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6248 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 442.885126][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 442.891605][ T30] audit: type=1326 audit(442.380:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 442.914499][ T30] audit: type=1326 audit(442.420:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 442.932683][ T30] audit: type=1326 audit(442.430:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 442.949502][ T30] audit: type=1326 audit(442.450:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 443.017063][ T30] audit: type=1326 audit(442.520:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 443.028179][ T30] audit: type=1326 audit(442.530:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 443.041164][ T30] audit: type=1326 audit(442.540:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 443.051512][ T30] audit: type=1326 audit(442.550:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 443.057061][ T30] audit: type=1326 audit(442.560:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 443.061953][ T30] audit: type=1326 audit(442.560:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 445.621904][ T3914] syz.0.128 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 448.218465][ T30] kauditd_printk_skb: 74 callbacks suppressed [ 448.219604][ T30] audit: type=1326 audit(447.720:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 448.239305][ T30] audit: type=1326 audit(447.740:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 448.243463][ T30] audit: type=1326 audit(447.740:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 448.245136][ T30] audit: type=1326 audit(447.740:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 448.247529][ T30] audit: type=1326 audit(447.740:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 448.251587][ T30] audit: type=1326 audit(447.740:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 448.253768][ T30] audit: type=1326 audit(447.740:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 448.263160][ T30] audit: type=1326 audit(447.740:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3923 comm="syz.0.132" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 451.946268][ T3941] netlink: 36 bytes leftover after parsing attributes in process `syz.0.136'. [ 454.074733][ T30] audit: type=1326 audit(453.570:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 454.075644][ T30] audit: type=1326 audit(453.570:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 454.121754][ T30] audit: type=1326 audit(453.620:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 454.122560][ T30] audit: type=1326 audit(453.620:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 454.177521][ T30] audit: type=1326 audit(453.680:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 454.179478][ T30] audit: type=1326 audit(453.680:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 454.236301][ T30] audit: type=1326 audit(453.740:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 454.240790][ T30] audit: type=1326 audit(453.740:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 454.301178][ T30] audit: type=1326 audit(453.790:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 454.313999][ T30] audit: type=1326 audit(453.820:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3948 comm="syz.0.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 471.826276][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 471.843138][ T30] audit: type=1400 audit(471.330:547): avc: denied { bind } for pid=3975 comm="syz.2.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 471.867559][ T30] audit: type=1400 audit(471.370:548): avc: denied { setopt } for pid=3975 comm="syz.2.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 472.378420][ T3977] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.719126][ T3982] netlink: 256 bytes leftover after parsing attributes in process `syz.0.144'. [ 473.565173][ T3977] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.259341][ T3977] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.380388][ T30] audit: type=1400 audit(473.880:549): avc: denied { create } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 474.450185][ T30] audit: type=1400 audit(473.950:550): avc: denied { connect } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 474.466758][ T30] audit: type=1400 audit(473.970:551): avc: denied { setopt } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 474.471630][ T30] audit: type=1400 audit(473.980:552): avc: denied { bind } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 474.582705][ T30] audit: type=1400 audit(474.080:553): avc: denied { write } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 474.765016][ T30] audit: type=1400 audit(474.270:554): avc: denied { read } for pid=3988 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 475.107391][ T3977] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.803778][ T30] audit: type=1400 audit(475.300:555): avc: denied { name_bind } for pid=3994 comm="syz.0.148" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 476.208319][ T1015] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.445618][ T1015] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.677558][ T1015] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.816797][ T1015] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.692779][ T30] audit: type=1326 audit(477.200:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 477.699675][ T30] audit: type=1326 audit(477.200:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 477.728528][ T30] audit: type=1326 audit(477.230:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 477.744514][ T30] audit: type=1326 audit(477.230:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 477.745775][ T30] audit: type=1326 audit(477.230:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 477.758823][ T30] audit: type=1326 audit(477.260:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 477.767166][ T30] audit: type=1326 audit(477.260:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 477.783995][ T30] audit: type=1326 audit(477.260:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 477.802413][ T30] audit: type=1326 audit(477.300:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 477.867728][ T30] audit: type=1326 audit(477.320:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3998 comm="syz.2.149" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 481.939572][ T4019] netlink: 'syz.0.155': attribute type 10 has an invalid length. [ 482.802566][ T30] kauditd_printk_skb: 89 callbacks suppressed [ 482.803042][ T30] audit: type=1326 audit(482.300:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 482.803324][ T30] audit: type=1326 audit(482.300:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 482.814842][ T30] audit: type=1326 audit(482.320:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 482.826789][ T30] audit: type=1326 audit(482.320:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 482.833086][ T30] audit: type=1326 audit(482.330:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 482.837662][ T30] audit: type=1326 audit(482.340:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 482.847129][ T30] audit: type=1326 audit(482.350:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 482.847728][ T30] audit: type=1326 audit(482.350:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 482.857774][ T30] audit: type=1326 audit(482.360:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 482.858325][ T30] audit: type=1326 audit(482.360:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.2.159" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 483.443432][ T4027] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.647831][ T4027] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.023353][ T4027] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.534694][ T4027] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 486.142028][ T1015] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.946441][ T4040] bond1: entered promiscuous mode [ 486.957081][ T4040] bond1: entered allmulticast mode [ 486.975668][ T4040] 8021q: adding VLAN 0 to HW filter on device bond1 [ 487.433170][ T4040] bond1 (unregistering): Released all slaves [ 487.768071][ T99] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 488.264203][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 488.265116][ T30] audit: type=1400 audit(487.760:671): avc: denied { create } for pid=4043 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 488.405821][ T1015] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 488.605019][ T30] audit: type=1400 audit(488.110:672): avc: denied { create } for pid=4043 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 488.683265][ T30] audit: type=1326 audit(488.170:673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 488.684606][ T30] audit: type=1326 audit(488.190:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 488.707267][ T30] audit: type=1326 audit(488.210:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 488.708258][ T30] audit: type=1326 audit(488.210:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 488.736109][ T30] audit: type=1326 audit(488.230:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 488.736966][ T30] audit: type=1326 audit(488.230:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 488.737297][ T30] audit: type=1326 audit(488.230:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 488.737616][ T30] audit: type=1326 audit(488.230:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4043 comm="syz.0.165" exe="/syz-executor" sig=0 arch=40000028 syscall=343 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 488.849002][ T99] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 495.256325][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 495.262939][ T30] audit: type=1400 audit(494.760:685): avc: denied { mount } for pid=4057 comm="syz.0.171" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 495.289491][ T30] audit: type=1400 audit(494.790:686): avc: denied { search } for pid=4057 comm="syz.0.171" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 495.291505][ T30] audit: type=1400 audit(494.790:687): avc: denied { search } for pid=4057 comm="syz.0.171" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 495.305559][ T30] audit: type=1400 audit(494.810:688): avc: denied { read open } for pid=4057 comm="syz.0.171" path="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 497.960607][ T30] audit: type=1326 audit(497.460:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4063 comm="syz.0.173" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 502.129314][ T30] audit: type=1400 audit(501.630:690): avc: denied { read } for pid=4075 comm="syz.0.176" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 502.144318][ T30] audit: type=1400 audit(501.640:691): avc: denied { open } for pid=4075 comm="syz.0.176" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 507.449467][ T30] audit: type=1326 audit(506.950:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 507.477468][ T30] audit: type=1326 audit(506.950:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 507.478269][ T30] audit: type=1326 audit(506.980:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 507.534140][ T30] audit: type=1326 audit(507.010:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 507.535053][ T30] audit: type=1326 audit(507.030:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 507.535774][ T30] audit: type=1400 audit(507.030:697): avc: denied { ioctl } for pid=4075 comm="syz.0.176" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 507.560855][ T30] audit: type=1326 audit(507.060:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 507.580854][ T30] audit: type=1326 audit(507.070:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 507.595352][ T30] audit: type=1326 audit(507.100:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 507.605833][ T30] audit: type=1326 audit(507.110:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4079 comm="syz.2.177" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 511.385945][ T4095] SELinux: failed to load policy [ 515.167154][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 515.182701][ T30] audit: type=1400 audit(514.620:724): avc: denied { write } for pid=4108 comm="syz.2.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 516.777255][ T30] audit: type=1326 audit(516.270:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 516.785443][ T30] audit: type=1326 audit(516.290:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 516.822985][ T30] audit: type=1326 audit(516.320:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 516.827470][ T30] audit: type=1326 audit(516.330:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 516.852975][ T30] audit: type=1326 audit(516.330:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 516.854158][ T30] audit: type=1326 audit(516.330:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 516.897048][ T30] audit: type=1326 audit(516.400:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 516.916227][ T30] audit: type=1326 audit(516.420:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 516.958484][ T30] audit: type=1326 audit(516.460:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4115 comm="syz.2.192" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.438126][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 520.439492][ T30] audit: type=1326 audit(519.940:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.440984][ T30] audit: type=1326 audit(519.940:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 520.459601][ T30] audit: type=1326 audit(519.960:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.471473][ T30] audit: type=1326 audit(519.960:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 520.482114][ T30] audit: type=1326 audit(519.980:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.504695][ T30] audit: type=1326 audit(520.010:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 520.508596][ T30] audit: type=1326 audit(520.010:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.516062][ T30] audit: type=1326 audit(520.020:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=321 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 520.516580][ T30] audit: type=1326 audit(520.020:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 520.516964][ T30] audit: type=1326 audit(520.020:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.2.197" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 525.495192][ T4144] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=4144 comm=syz.0.205 [ 527.187542][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 527.201830][ T30] audit: type=1400 audit(526.690:756): avc: denied { mount } for pid=4152 comm="syz.2.209" name="/" dev="ramfs" ino=6053 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 527.388301][ T30] audit: type=1326 audit(526.880:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 527.388946][ T30] audit: type=1326 audit(526.880:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 527.389342][ T30] audit: type=1326 audit(526.880:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 527.389581][ T30] audit: type=1326 audit(526.880:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x1300b8 code=0x7ffc0000 [ 527.390399][ T30] audit: type=1326 audit(526.890:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x1300b8 code=0x7ffc0000 [ 527.390679][ T30] audit: type=1326 audit(526.890:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 527.390923][ T30] audit: type=1326 audit(526.890:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 527.399003][ T30] audit: type=1326 audit(526.900:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 527.425526][ T30] audit: type=1326 audit(526.920:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4152 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=332 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 527.535358][ T4153] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 527.630534][ T4153] netlink: 12 bytes leftover after parsing attributes in process `+}[@'. [ 528.223188][ T4159] process 'syz.2.209' launched './file0' with NULL argv: empty string added [ 532.654416][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 532.656063][ T4171] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). [ 532.667702][ T30] audit: type=1400 audit(532.160:800): avc: denied { relabelfrom } for pid=4170 comm="syz.0.216" name="PACKET" dev="sockfs" ino=6093 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 532.673636][ T30] audit: type=1400 audit(532.160:801): avc: denied { mac_admin } for pid=4170 comm="syz.0.216" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 532.674151][ T30] audit: type=1400 audit(532.160:802): avc: denied { relabelto } for pid=4170 comm="syz.0.216" name="PACKET" dev="sockfs" ino=6093 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=packet_socket permissive=1 trawcon="system_u:object_r:iptables_unit_file_t:s0" [ 538.482502][ T30] audit: type=1400 audit(537.980:803): avc: denied { read write } for pid=4191 comm="syz.2.221" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 538.482980][ T30] audit: type=1400 audit(537.980:804): avc: denied { open } for pid=4191 comm="syz.2.221" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 538.652868][ T30] audit: type=1326 audit(538.150:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 538.653373][ T30] audit: type=1326 audit(538.160:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 538.653741][ T30] audit: type=1326 audit(538.160:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 538.669040][ T30] audit: type=1326 audit(538.170:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 538.670734][ T30] audit: type=1326 audit(538.170:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=138 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 538.671242][ T30] audit: type=1326 audit(538.170:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 538.671704][ T30] audit: type=1326 audit(538.170:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 538.672148][ T30] audit: type=1326 audit(538.170:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4193 comm="syz.0.222" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 543.884502][ T4210] netlink: 8 bytes leftover after parsing attributes in process `syz.2.229'. [ 546.131451][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 546.134951][ T30] audit: type=1400 audit(545.630:815): avc: denied { write } for pid=4216 comm="syz.2.232" name="ptype" dev="proc" ino=4026532980 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 547.266286][ T30] audit: type=1326 audit(546.770:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 547.268101][ T30] audit: type=1326 audit(546.770:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 547.274457][ T30] audit: type=1326 audit(546.770:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 547.284419][ T30] audit: type=1326 audit(546.790:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 547.289111][ T30] audit: type=1326 audit(546.790:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 547.298684][ T30] audit: type=1326 audit(546.790:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 547.304401][ T30] audit: type=1326 audit(546.790:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 547.314259][ T30] audit: type=1326 audit(546.820:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 547.325160][ T30] audit: type=1326 audit(546.830:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4222 comm="syz.2.235" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 548.145128][ T4226] netlink: 204 bytes leftover after parsing attributes in process `syz.2.235'. [ 554.465441][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 554.466293][ T30] audit: type=1326 audit(553.970:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 554.474869][ T30] audit: type=1326 audit(553.980:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 554.481827][ T30] audit: type=1326 audit(553.990:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 554.485970][ T30] audit: type=1326 audit(553.990:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 554.490807][ T30] audit: type=1326 audit(553.990:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 554.493836][ T30] audit: type=1326 audit(554.000:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 554.508218][ T30] audit: type=1326 audit(554.010:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4241 comm="syz.2.243" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 556.598177][ T30] audit: type=1400 audit(556.100:862): avc: denied { setopt } for pid=4246 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 556.603669][ T30] audit: type=1400 audit(556.110:863): avc: denied { bind } for pid=4246 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 556.612469][ T30] audit: type=1400 audit(556.120:864): avc: denied { listen } for pid=4246 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 562.645410][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 562.645932][ T30] audit: type=1400 audit(562.150:868): avc: denied { write } for pid=4266 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 562.658450][ T30] audit: type=1400 audit(562.160:869): avc: denied { nlmsg_write } for pid=4266 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 574.101994][ T30] audit: type=1326 audit(573.590:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 574.102664][ T30] audit: type=1326 audit(573.600:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 574.103062][ T30] audit: type=1326 audit(573.600:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 574.106768][ T30] audit: type=1326 audit(573.600:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 574.107195][ T30] audit: type=1326 audit(573.610:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 574.114707][ T30] audit: type=1326 audit(573.610:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 574.117905][ T30] audit: type=1326 audit(573.620:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.2.265" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.142072][ T30] audit: type=1326 audit(584.630:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 585.146542][ T30] audit: type=1326 audit(584.640:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.152762][ T30] audit: type=1326 audit(584.640:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 585.156439][ T30] audit: type=1326 audit(584.650:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.174142][ T30] audit: type=1326 audit(584.660:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 585.175101][ T30] audit: type=1326 audit(584.660:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.195493][ T30] audit: type=1326 audit(584.700:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.214824][ T30] audit: type=1326 audit(584.700:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 585.235804][ T30] audit: type=1326 audit(584.710:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 585.236811][ T30] audit: type=1326 audit(584.740:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4314 comm="syz.0.273" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 590.318520][ C1] hrtimer: interrupt took 923328 ns [ 593.936151][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 593.936695][ T30] audit: type=1400 audit(593.440:915): avc: denied { create } for pid=4345 comm="syz.2.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 599.110808][ T30] audit: type=1326 audit(598.610:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 599.111344][ T30] audit: type=1326 audit(598.610:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 599.150940][ T30] audit: type=1326 audit(598.620:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 599.151518][ T30] audit: type=1326 audit(598.650:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 599.151929][ T30] audit: type=1326 audit(598.650:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 599.152193][ T30] audit: type=1326 audit(598.650:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 599.152480][ T30] audit: type=1326 audit(598.650:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 599.152782][ T30] audit: type=1326 audit(598.650:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=336 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 599.173892][ T30] audit: type=1326 audit(598.680:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 599.174878][ T30] audit: type=1326 audit(598.680:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.296" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 603.128702][ T4395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4395 comm=syz.0.305 [ 603.159187][ T4395] netlink: 12 bytes leftover after parsing attributes in process `syz.0.305'. [ 607.359168][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 607.371743][ T30] audit: type=1400 audit(606.860:972): avc: denied { write } for pid=4414 comm="syz.2.311" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 612.422882][ T4429] netlink: 642 bytes leftover after parsing attributes in process `syz.2.316'. [ 613.516157][ T30] audit: type=1400 audit(613.010:973): avc: denied { ioctl } for pid=4432 comm="syz.2.318" path="socket:[8197]" dev="sockfs" ino=8197 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 615.305946][ T4442] netlink: 100 bytes leftover after parsing attributes in process `syz.0.321'. [ 615.593759][ T4445] IPv6: Can't replace route, no match found [ 616.914654][ T30] audit: type=1326 audit(616.420:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 616.919243][ T30] audit: type=1326 audit(616.420:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 616.938445][ T30] audit: type=1326 audit(616.440:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 616.962541][ T30] audit: type=1326 audit(616.460:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 616.972929][ T30] audit: type=1326 audit(616.460:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 616.998172][ T30] audit: type=1326 audit(616.500:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 617.017281][ T30] audit: type=1326 audit(616.510:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 617.039325][ T30] audit: type=1326 audit(616.540:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 617.048989][ T30] audit: type=1326 audit(616.550:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.2.324" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 618.009352][ T4454] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 618.025788][ T4454] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 630.338348][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 630.338765][ T30] audit: type=1400 audit(629.840:1021): avc: denied { create } for pid=4493 comm="syz.2.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 631.333435][ T30] audit: type=1400 audit(630.840:1022): avc: denied { accept } for pid=4498 comm="syz.2.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 632.771950][ T4506] veth0: entered promiscuous mode [ 632.842427][ T4506] netlink: 4 bytes leftover after parsing attributes in process `syz.0.344'. [ 636.768049][ T30] audit: type=1400 audit(636.270:1023): avc: denied { create } for pid=4503 comm="syz.2.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 636.798136][ T30] audit: type=1400 audit(636.290:1024): avc: denied { setopt } for pid=4503 comm="syz.2.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 639.238636][ T30] audit: type=1326 audit(638.740:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 639.239209][ T30] audit: type=1326 audit(638.740:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 639.248443][ T30] audit: type=1326 audit(638.750:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 639.259449][ T30] audit: type=1326 audit(638.760:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 639.274269][ T30] audit: type=1326 audit(638.770:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 639.288494][ T30] audit: type=1326 audit(638.770:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 639.289328][ T30] audit: type=1326 audit(638.780:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 639.297741][ T30] audit: type=1326 audit(638.780:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4519 comm="syz.2.349" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 639.738978][ T4522] netlink: 'syz.2.350': attribute type 1 has an invalid length. [ 639.739758][ T4522] netlink: 224 bytes leftover after parsing attributes in process `syz.2.350'. [ 640.986469][ T4529] 8021q: VLANs not supported on ip6tnl0 [ 648.849363][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 648.850339][ T30] audit: type=1400 audit(648.350:1038): avc: denied { execute } for pid=4559 comm="+}[@" name="file0" dev="tmpfs" ino=1059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 648.859276][ T30] audit: type=1400 audit(648.360:1039): avc: denied { execute_no_trans } for pid=4559 comm="+}[@" path="/205/file0" dev="tmpfs" ino=1059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 650.374003][ T30] audit: type=1326 audit(649.880:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 650.378517][ T30] audit: type=1326 audit(649.880:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 650.383212][ T30] audit: type=1326 audit(649.880:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 650.401890][ T30] audit: type=1326 audit(649.900:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 650.404113][ T30] audit: type=1326 audit(649.900:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 650.407763][ T30] audit: type=1326 audit(649.900:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 650.412518][ T30] audit: type=1326 audit(649.900:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 650.415741][ T30] audit: type=1326 audit(649.900:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4565 comm="syz.2.369" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 656.454160][ T30] kauditd_printk_skb: 87 callbacks suppressed [ 656.455293][ T30] audit: type=1400 audit(655.960:1135): avc: denied { getopt } for pid=4590 comm="syz.2.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 657.536101][ T4597] netlink: 3 bytes leftover after parsing attributes in process `syz.2.383'. [ 659.070561][ T4608] netlink: 8 bytes leftover after parsing attributes in process `syz.2.387'. [ 659.071337][ T4608] netlink: 4 bytes leftover after parsing attributes in process `syz.2.387'. [ 661.075949][ T30] audit: type=1400 audit(660.580:1136): avc: denied { module_load } for pid=4619 comm="syz.0.393" path="/sys/power/wakeup_count" dev="sysfs" ino=873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 663.461349][ T30] audit: type=1400 audit(662.960:1137): avc: denied { read } for pid=4630 comm="syz.0.398" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 664.503869][ T30] audit: type=1326 audit(663.990:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 664.513091][ T30] audit: type=1326 audit(664.020:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 664.532211][ T30] audit: type=1326 audit(664.020:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 664.552423][ T30] audit: type=1326 audit(664.050:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 664.558649][ T30] audit: type=1326 audit(664.050:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 664.605258][ T30] audit: type=1326 audit(664.050:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 664.612717][ T30] audit: type=1326 audit(664.110:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 664.667497][ T30] audit: type=1326 audit(664.170:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 664.673962][ T30] audit: type=1326 audit(664.170:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.0.401" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 667.532961][ T4649] SELinux: failed to load policy [ 671.129306][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 671.137832][ T30] audit: type=1326 audit(670.630:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 671.138901][ T30] audit: type=1326 audit(670.630:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 671.139234][ T30] audit: type=1326 audit(670.640:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 671.139557][ T30] audit: type=1326 audit(670.640:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 671.166823][ T30] audit: type=1326 audit(670.640:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 671.167897][ T30] audit: type=1326 audit(670.660:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 671.168277][ T30] audit: type=1326 audit(670.660:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 671.168641][ T30] audit: type=1326 audit(670.660:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 671.185486][ T30] audit: type=1326 audit(670.660:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 671.186588][ T30] audit: type=1326 audit(670.670:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4659 comm="syz.0.412" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 673.787446][ T4656] netlink: 'syz.2.410': attribute type 10 has an invalid length. [ 673.788275][ T4656] netlink: 40 bytes leftover after parsing attributes in process `syz.2.410'. [ 675.652445][ T4674] netlink: 'syz.0.418': attribute type 10 has an invalid length. [ 675.655053][ T4674] netlink: 40 bytes leftover after parsing attributes in process `syz.0.418'. [ 675.816056][ T4674] A link change request failed with some changes committed already. Interface netdevsim3 may have been left with an inconsistent configuration, please check. [ 678.158112][ T4680] SELinux: Context Ü is not valid (left unmapped). [ 679.189285][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 679.195213][ T30] audit: type=1400 audit(678.690:1205): avc: denied { create } for pid=4683 comm="+}[@" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 679.231218][ T30] audit: type=1400 audit(678.720:1206): avc: denied { write } for pid=4683 comm="+}[@" name="file0" dev="tmpfs" ino=1219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 679.233809][ T30] audit: type=1400 audit(678.730:1207): avc: denied { open } for pid=4683 comm="+}[@" path="/236/file0" dev="tmpfs" ino=1219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 679.248533][ T30] audit: type=1400 audit(678.750:1208): avc: denied { ioctl } for pid=4683 comm="+}[@" path="/236/file0" dev="tmpfs" ino=1219 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 679.421628][ T30] audit: type=1400 audit(678.920:1209): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=1219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 680.534556][ T4688] netlink: 264 bytes leftover after parsing attributes in process `syz.0.425'. [ 680.535620][ T4688] netlink: 56 bytes leftover after parsing attributes in process `syz.0.425'. [ 681.106036][ T4690] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 681.141658][ T30] audit: type=1400 audit(680.640:1210): avc: denied { bind } for pid=4689 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 681.144779][ T30] audit: type=1400 audit(680.650:1211): avc: denied { name_bind } for pid=4689 comm="syz.0.426" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 681.155586][ T30] audit: type=1400 audit(680.660:1212): avc: denied { node_bind } for pid=4689 comm="syz.0.426" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 681.201438][ T30] audit: type=1400 audit(680.700:1213): avc: denied { block_suspend } for pid=4689 comm="syz.0.426" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 686.047193][ T30] audit: type=1326 audit(685.550:1214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 686.049516][ T30] audit: type=1326 audit(685.550:1215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 686.061443][ T30] audit: type=1326 audit(685.570:1216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 686.064656][ T30] audit: type=1326 audit(685.570:1217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 686.069041][ T30] audit: type=1326 audit(685.570:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=269 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 686.077336][ T30] audit: type=1326 audit(685.580:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 686.086313][ T30] audit: type=1326 audit(685.580:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 686.086760][ T30] audit: type=1326 audit(685.590:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4703 comm="syz.0.432" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 687.553246][ T4708] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.947703][ T4708] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.483398][ T4708] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 689.238673][ T4708] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 692.144961][ T4712] ------------[ cut here ]------------ [ 692.145735][ T4712] verifier bug: not inlined functions bpf_probe_read_user#112 is missing func(1) [ 692.186785][ T4712] WARNING: CPU: 1 PID: 4712 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 692.190174][ T4712] Modules linked in: [ 692.191884][ T4712] CPU: 1 UID: 0 PID: 4712 Comm: syz.0.435 Not tainted syzkaller #0 PREEMPT [ 692.193961][ T4712] Hardware name: linux,dummy-virt (DT) [ 692.194773][ T4712] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 692.195250][ T4712] pc : do_misc_fixups+0xa938/0xcf04 [ 692.195587][ T4712] lr : do_misc_fixups+0xa938/0xcf04 [ 692.195911][ T4712] sp : ffff8000a2d47450 [ 692.196317][ T4712] x29: ffff8000a2d47450 x28: ffff0000137a0000 x27: ffff0000137a6130 [ 692.197223][ T4712] x26: ffff0000137a6148 x25: ffff0000137a0000 x24: 0000000000000000 [ 692.197887][ T4712] x23: ffff0000137a6128 x22: 1ffff00011bffa13 x21: ffff80008dffd098 [ 692.198517][ T4712] x20: ffff800085585480 x19: ffff80008556d4a0 x18: 0000000000000000 [ 692.199200][ T4712] x17: 0000000000000000 x16: ffff00006a0ad4c4 x15: 0000000000000000 [ 692.200100][ T4712] x14: 00000000000016f0 x13: 0000000000000000 x12: ffff600001db0941 [ 692.200637][ T4712] x11: 1fffe00001db0940 x10: ffff600001db0940 x9 : dfff800000000000 [ 692.201503][ T4712] x8 : ffff00000ed84a03 x7 : 0000000000000001 x6 : ffff600001db0940 [ 692.202221][ T4712] x5 : ffff00000ed84a00 x4 : ffff600001db0941 x3 : 1fffe0000d41773e [ 692.202907][ T4712] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000134ddac0 [ 692.203790][ T4712] Call trace: [ 692.204415][ T4712] do_misc_fixups+0xa938/0xcf04 (P) [ 692.205002][ T4712] bpf_check+0x3c84/0x9508 [ 692.205407][ T4712] bpf_prog_load+0xe2c/0x1b74 [ 692.205810][ T4712] __sys_bpf+0x9c4/0x29c8 [ 692.206121][ T4712] __arm64_sys_bpf+0x70/0xa4 [ 692.206447][ T4712] invoke_syscall+0x6c/0x258 [ 692.206734][ T4712] el0_svc_common.constprop.0+0xac/0x230 [ 692.207055][ T4712] do_el0_svc_compat+0x40/0x68 [ 692.207352][ T4712] el0_svc_compat+0x4c/0x184 [ 692.207690][ T4712] el0t_32_sync_handler+0x88/0xac [ 692.208032][ T4712] el0t_32_sync+0x19c/0x1a0 [ 692.208659][ T4712] irq event stamp: 218 [ 692.208971][ T4712] hardirqs last enabled at (217): [] finish_task_switch.isra.0+0x1a8/0x854 [ 692.209460][ T4712] hardirqs last disabled at (218): [] el1_brk64+0x1c/0x48 [ 692.210114][ T4712] softirqs last enabled at (158): [] handle_softirqs+0x88c/0xdb4 [ 692.210758][ T4712] softirqs last disabled at (143): [] __do_softirq+0x14/0x20 [ 692.211367][ T4712] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 692.274789][ T30] audit: type=1400 audit(691.750:1222): avc: denied { write } for pid=3315 comm="syz-executor" path="pipe:[2874]" dev="pipefs" ino=2874 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 706.657581][ T1015] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.857181][ T1015] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.006519][ T1015] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.202303][ T1015] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.972486][ T30] audit: type=1400 audit(707.470:1223): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 709.694016][ T1015] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 709.799102][ T1015] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 709.877616][ T1015] bond0 (unregistering): Released all slaves [ 712.945601][ T1015] hsr_slave_0: left promiscuous mode [ 712.994845][ T1015] hsr_slave_1: left promiscuous mode [ 713.271413][ T1015] veth1_macvtap: left promiscuous mode [ 713.272585][ T1015] veth0_macvtap: left promiscuous mode [ 713.274603][ T1015] veth1_vlan: left promiscuous mode [ 713.276155][ T1015] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 06:07:24 Registers: info registers vcpu 0 CPU#0 PC=ffff800085443b0c X00=ffff800085443b08 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002fc2b59 X04=000000005373ab4c X05=0000000000040000 X06=ffff000017e16758 X07=7a3a013e4a5f9b9f X08=0000000000000000 X09=ffff8000897e5000 X10=ffff000017e16550 X11=0000000000000000 X12=000000000000009c X13=0000000000000000 X14=ffff00006a08e468 X15=ffff00006a08e054 X16=0000000000000000 X17=1fffe000029e49e0 X18=ffff00001fe4e290 X19=ffff8000873534f0 X20=ffff000017e15ac0 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873534c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873534f0 X28=ffff00006a09ef80 X29=ffff8000800059d0 X30=ffff800080439f54 SP=ffff8000800059d0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=ffffffffffffffff:ffffffffffffffff Q01=0000000000000000:0098968001312d00 Q02=00000000ffffffff:0000000000000000 Q03=0000000000000000:ffffffffffffffff Q04=ffffffffffffffff:00000000ffffffff Q05=ffffffffffffffff:0000000000000000 Q06=63627c2a6476787c:2a64767c2a72737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff1db6f50:0000fffff1db6f50 Q17=ffffff80ffffffd8:0000fffff1db6f20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085443b0c X00=ffff800085443b08 X01=0000000000000000 X02=0000000000000000 X03=1fffe0000269bb59 X04=ffff8000a2d46e40 X05=ffff7000145a8d94 X06=ffff0000134ddac0 X07=00000000f2f2f2f2 X08=00000000f3f3f300 X09=00000000f2000000 X10=00000000f204f204 X11=1ffff00010e36374 X12=ffff700010e36375 X13=0000000000000001 X14=203533342e302e7a X15=6e69617420746f4e X16=6b7a797320646574 X17=30232072656c6c61 X18=0000000000000000 X19=ffff8000873534f0 X20=ffff0000134ddac0 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873534c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873534f0 X28=1fffe0000d415ab5 X29=ffff8000a2d46b90 X30=ffff800080439f54 SP=ffff8000a2d46b90 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=7369203231312372:6573755f64616572 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6f6974636e756620:64656e696c6e6920 Q06=636e75662064656e:696c6e6920746f6e Q07=5f65626f72705f66:706220736e6f6974 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9c48f70:0000ffffc9c48f70 Q17=ffffff80ffffffd0:0000ffffc9c48f40 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000