last executing test programs: 5.288697234s ago: executing program 1 (id=549): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) shmdt(0x0) 4.769508329s ago: executing program 1 (id=551): write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) semop(0x0, 0x0, 0x0) semtimedop(0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@newlink={0x4c, 0x10, 0x403, 0x300, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0xffc}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x4c}}, 0x8000) 4.052496007s ago: executing program 0 (id=552): socket$can_raw(0x1d, 0x3, 0x1) timer_create(0x4, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, 0x0) bind$inet(r0, 0x0, 0x0) socket(0x2000000000000021, 0x2, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) fsync(0xffffffffffffffff) 3.167730827s ago: executing program 1 (id=553): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x6, &(0x7f0000000140)=0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x18) io_submit(r1, 0x2, &(0x7f0000000600)=[&(0x7f0000000300)={0x1802, 0x0, 0x0, 0x5, 0xfffd, r0, 0x0}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) shutdown(r0, 0x0) 3.033183866s ago: executing program 0 (id=554): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="31832abd7000000000001900000018000180140002"], 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) 2.217323411s ago: executing program 1 (id=555): r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='kfree\x00', r1, 0x0, 0x4804}, 0x18) write$selinux_access(r0, &(0x7f0000000740)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a6c645f736f5f7420704a122f7362696e2f6468636c69656e742030"], 0x41) 2.128724667s ago: executing program 0 (id=556): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0), 0x2642, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="93d90400000300", 0x7}, {&(0x7f0000000a00)="13", 0x1}], 0x2) 1.327801221s ago: executing program 0 (id=557): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e22, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000002380)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x9, 0x28, 0x68, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x8, 0x2}}}}}}, 0x0) 1.100478006s ago: executing program 1 (id=558): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000050b6850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000100001000000ddffffff00000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000d50900010073797a3000000000080003400000000114"], 0x64}}, 0x0) 638.466617ms ago: executing program 0 (id=559): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0x34}, 0x18) capset(&(0x7f0000000dc0)={0x20080522}, &(0x7f0000000e00)={0x0, 0x4, 0x4, 0x0, 0x80000, 0xffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x2a, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 242.325564ms ago: executing program 1 (id=560): prctl$PR_SET_NAME(0xf, &(0x7f0000000200)='gtp\x00\xe4\xaa\xae\xdf~2\xa6X\x14\x92\xdarV\xf4U\xf7\xa2\xc3l\x1b@\xaf\xf9\xc9\xa9#\xf0S\xd9=q\xd6\x14\xedt\xc8!W\xe9@\xeb\x7f~\tB0EE\x9a:\xb7\xff\xc1\xfc\x9a\x1f\xf2\xfb\x19\xda#x\xc5F\x1c~\x8c\xe1\xdf\xdc\x01k\f\xde0~\x95\r\xa2\x80\b4M\x14\xe7\xd0\t`n!g\x14\xe6\xd1\xc2\xd3\x88\xf8cVtd\xbeY\xa5\xe7\x16sD\x96}7\n\x88e\x00\xf0\xff\xff\xf0\xcb\x94\xb4S\x00\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r2) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c00018006000100d1a3a700080003400000000114000000110001"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000010007b0000000000000000000500000a480000001e0a010100000000000000000a0000060900020073797a31000000000900010073797a31"], 0x70}, 0x1, 0x0, 0x0, 0x4451099e661a63b1}, 0x0) 0s ago: executing program 0 (id=561): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000005c0), 0x12) syz_open_dev$vcsu(0x0, 0xfffffffffffeffff, 0x8000) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xe02, 0x1c0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) sendfile(r3, r2, 0x0, 0x3a) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46621' (ED25519) to the list of known hosts. [ 255.276417][ T30] audit: type=1400 audit(254.650:46): avc: denied { name_bind } for pid=3314 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 255.924315][ T30] audit: type=1400 audit(255.300:47): avc: denied { execute } for pid=3315 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 255.935588][ T30] audit: type=1400 audit(255.310:48): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 264.140827][ T30] audit: type=1400 audit(263.510:49): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 264.198637][ T30] audit: type=1400 audit(263.570:50): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 264.241757][ T3315] cgroup: Unknown subsys name 'net' [ 264.301280][ T30] audit: type=1400 audit(263.670:51): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 264.738415][ T3315] cgroup: Unknown subsys name 'cpuset' [ 264.818121][ T3315] cgroup: Unknown subsys name 'rlimit' [ 265.257594][ T30] audit: type=1400 audit(264.630:52): avc: denied { setattr } for pid=3315 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 265.266689][ T30] audit: type=1400 audit(264.640:53): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 265.276336][ T30] audit: type=1400 audit(264.640:54): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 266.014191][ T3317] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 266.025198][ T30] audit: type=1400 audit(265.400:55): avc: denied { relabelto } for pid=3317 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.037506][ T30] audit: type=1400 audit(265.410:56): avc: denied { write } for pid=3317 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 266.161786][ T30] audit: type=1400 audit(265.530:57): avc: denied { read } for pid=3315 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.164324][ T30] audit: type=1400 audit(265.540:58): avc: denied { open } for pid=3315 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.181723][ T3315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 308.994368][ T30] audit: type=1400 audit(308.370:59): avc: denied { execmem } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 309.098024][ T30] audit: type=1400 audit(308.470:60): avc: denied { read } for pid=3320 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 309.103328][ T30] audit: type=1400 audit(308.470:61): avc: denied { open } for pid=3320 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 309.127648][ T30] audit: type=1400 audit(308.500:62): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 309.238631][ T30] audit: type=1400 audit(308.610:63): avc: denied { module_request } for pid=3320 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 309.634344][ T30] audit: type=1400 audit(309.010:64): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 319.007390][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.075155][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.624544][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.643222][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.329747][ T3321] hsr_slave_0: entered promiscuous mode [ 323.344390][ T3321] hsr_slave_1: entered promiscuous mode [ 324.133891][ T3320] hsr_slave_0: entered promiscuous mode [ 324.147228][ T3320] hsr_slave_1: entered promiscuous mode [ 324.155415][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 324.157402][ T3320] Cannot create hsr debugfs directory [ 326.375709][ T30] audit: type=1400 audit(325.730:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 326.379569][ T30] audit: type=1400 audit(325.730:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 326.385735][ T30] audit: type=1400 audit(325.730:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 326.433924][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 326.653946][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 326.754097][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 326.888892][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 327.407589][ T3320] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 327.528623][ T3320] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 327.615216][ T3320] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 327.687255][ T3320] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 331.745008][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 332.168853][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.789672][ T3320] veth0_vlan: entered promiscuous mode [ 346.929958][ T3320] veth1_vlan: entered promiscuous mode [ 347.428100][ T3321] veth0_vlan: entered promiscuous mode [ 347.768693][ T3321] veth1_vlan: entered promiscuous mode [ 347.903824][ T3320] veth0_macvtap: entered promiscuous mode [ 348.076083][ T3320] veth1_macvtap: entered promiscuous mode [ 348.755300][ T3321] veth0_macvtap: entered promiscuous mode [ 348.898849][ T3469] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.966279][ T3469] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.977437][ T3469] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.989828][ T745] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.065194][ T3321] veth1_macvtap: entered promiscuous mode [ 349.998821][ T30] audit: type=1400 audit(349.370:68): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.YL8iPj/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 350.018081][ T30] audit: type=1400 audit(349.390:69): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 350.087015][ T30] audit: type=1400 audit(349.460:70): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.YL8iPj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 350.145129][ T30] audit: type=1400 audit(349.520:71): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 350.234213][ T30] audit: type=1400 audit(349.590:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.YL8iPj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 350.291917][ T30] audit: type=1400 audit(349.650:73): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.YL8iPj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 350.429397][ T48] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.431405][ T48] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.431730][ T48] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.432097][ T48] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.576131][ T30] audit: type=1400 audit(349.950:74): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 350.643867][ T30] audit: type=1400 audit(350.020:75): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 350.673742][ T30] audit: type=1400 audit(350.050:76): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=3859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 350.781277][ T30] audit: type=1400 audit(350.150:77): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 351.525971][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 356.469790][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 356.481688][ T30] audit: type=1400 audit(355.840:83): avc: denied { prog_load } for pid=3474 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.494483][ T30] audit: type=1400 audit(355.870:84): avc: denied { bpf } for pid=3474 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 356.533847][ T30] audit: type=1400 audit(355.910:85): avc: denied { perfmon } for pid=3474 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 356.693322][ T30] audit: type=1400 audit(356.050:86): avc: denied { map_create } for pid=3475 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.789501][ T30] audit: type=1400 audit(356.160:87): avc: denied { map_read map_write } for pid=3475 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 357.858267][ T30] audit: type=1400 audit(357.230:88): avc: denied { create } for pid=3479 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 357.937943][ T30] audit: type=1400 audit(357.310:89): avc: denied { write } for pid=3479 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 359.491652][ T30] audit: type=1400 audit(358.850:90): avc: denied { write } for pid=3482 comm="syz.1.5" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 359.519384][ T30] audit: type=1400 audit(358.870:91): avc: denied { open } for pid=3482 comm="syz.1.5" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 359.527092][ T3484] random: crng reseeded on system resumption [ 361.196112][ T30] audit: type=1400 audit(360.570:92): avc: denied { read write } for pid=3488 comm="syz.0.7" name="virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 361.609729][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 361.623607][ T30] audit: type=1400 audit(360.980:94): avc: denied { ioctl } for pid=3488 comm="syz.0.7" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 362.069498][ T3410] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 362.303224][ T3410] usb 1-1: device descriptor read/64, error -71 [ 362.591873][ T3410] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 362.772037][ T3410] usb 1-1: device descriptor read/64, error -71 [ 362.909680][ T3410] usb usb1-port1: attempt power cycle [ 363.301465][ T3410] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 363.329898][ T3410] usb 1-1: device descriptor read/8, error -71 [ 363.621527][ T3410] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 363.693322][ T3410] usb 1-1: device descriptor read/8, error -71 [ 363.813914][ T3410] usb usb1-port1: unable to enumerate USB device [ 365.549821][ T30] audit: type=1400 audit(364.920:95): avc: denied { create } for pid=3482 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 365.708972][ T30] audit: type=1400 audit(365.080:96): avc: denied { sys_admin } for pid=3482 comm="syz.1.5" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 372.946276][ T30] audit: type=1326 audit(372.320:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 372.956258][ T30] audit: type=1326 audit(372.320:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 372.966288][ T30] audit: type=1326 audit(372.320:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 372.981138][ T30] audit: type=1326 audit(372.340:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 372.988799][ T30] audit: type=1326 audit(372.340:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=1 ip=0x132320 code=0x7ffc0000 [ 372.989089][ T30] audit: type=1326 audit(372.340:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 372.989320][ T30] audit: type=1326 audit(372.340:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 372.989498][ T30] audit: type=1326 audit(372.340:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3499 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 373.761541][ T3503] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 373.888544][ T3503] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 373.917387][ T3503] Zero length message leads to an empty skb [ 376.298503][ T30] audit: type=1400 audit(375.670:105): avc: denied { create } for pid=3507 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 377.051356][ T30] audit: type=1400 audit(376.420:106): avc: denied { create } for pid=3509 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 377.292404][ T3510] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12'. [ 377.347042][ C1] vcan0: j1939_session_tx_dat: 0x000000006bce4e38: queue data error: -100 [ 378.605614][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 378.609185][ T30] audit: type=1326 audit(377.980:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 378.622274][ T30] audit: type=1326 audit(377.980:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 378.646236][ T30] audit: type=1326 audit(378.020:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 378.654050][ T30] audit: type=1326 audit(378.020:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 378.663703][ T30] audit: type=1326 audit(378.040:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 378.673838][ T30] audit: type=1326 audit(378.030:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 378.682349][ T30] audit: type=1326 audit(378.040:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 378.683234][ T30] audit: type=1326 audit(378.050:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 378.721886][ T30] audit: type=1326 audit(378.070:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 378.722898][ T30] audit: type=1326 audit(378.070:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3511 comm="syz.0.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 386.496977][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 386.498088][ T30] audit: type=1400 audit(385.860:164): avc: denied { create } for pid=3524 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 386.534949][ T30] audit: type=1400 audit(385.910:165): avc: denied { setopt } for pid=3524 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 387.682115][ T30] audit: type=1400 audit(387.050:166): avc: denied { prog_run } for pid=3526 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 388.349846][ T3529] netlink: 16 bytes leftover after parsing attributes in process `syz.0.20'. [ 389.658817][ T30] audit: type=1400 audit(389.030:167): avc: denied { create } for pid=3535 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 390.727331][ T30] audit: type=1400 audit(390.100:168): avc: denied { allowed } for pid=3539 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 390.784352][ T30] audit: type=1400 audit(390.160:169): avc: denied { create } for pid=3539 comm="syz.0.25" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 390.804989][ T30] audit: type=1400 audit(390.180:170): avc: denied { map } for pid=3539 comm="syz.0.25" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3985 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 390.813064][ T30] audit: type=1400 audit(390.190:171): avc: denied { read write } for pid=3539 comm="syz.0.25" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3985 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 391.202260][ T30] audit: type=1400 audit(390.570:172): avc: denied { write } for pid=3541 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 392.038344][ T30] audit: type=1326 audit(391.410:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 392.044607][ T30] audit: type=1326 audit(391.420:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 392.060958][ T30] audit: type=1326 audit(391.430:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 392.067365][ T30] audit: type=1326 audit(391.440:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=1 ip=0x132320 code=0x7ffc0000 [ 392.079714][ T30] audit: type=1326 audit(391.440:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 392.103725][ T30] audit: type=1326 audit(391.460:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3544 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 393.228215][ T30] audit: type=1400 audit(392.600:179): avc: denied { ioctl } for pid=3546 comm="syz.1.28" path="socket:[4296]" dev="sockfs" ino=4296 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 393.304967][ T30] audit: type=1400 audit(392.680:180): avc: denied { bind } for pid=3546 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 394.912684][ T3553] syzkaller0: entered promiscuous mode [ 394.913494][ T3553] syzkaller0: entered allmulticast mode [ 394.914481][ T30] audit: type=1400 audit(394.280:181): avc: denied { ioctl } for pid=3550 comm="syz.1.30" path="socket:[4010]" dev="sockfs" ino=4010 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 396.466953][ T30] audit: type=1400 audit(395.840:182): avc: denied { create } for pid=3556 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 397.052099][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 397.056489][ T30] audit: type=1326 audit(396.420:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 397.065351][ T30] audit: type=1326 audit(396.440:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 397.087518][ T30] audit: type=1326 audit(396.460:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 397.097362][ T30] audit: type=1326 audit(396.460:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 397.108234][ T30] audit: type=1326 audit(396.470:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 397.124853][ T30] audit: type=1326 audit(396.470:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 397.137100][ T30] audit: type=1326 audit(396.490:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 397.142936][ T30] audit: type=1326 audit(396.490:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 397.151768][ T30] audit: type=1326 audit(396.510:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 397.155242][ T30] audit: type=1326 audit(396.520:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3558 comm="syz.1.33" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 398.678098][ T3565] netlink: 'syz.1.35': attribute type 7 has an invalid length. [ 405.968167][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 405.972407][ T30] audit: type=1326 audit(405.340:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.982120][ T30] audit: type=1326 audit(405.340:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.999369][ T30] audit: type=1326 audit(405.370:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 406.027100][ T30] audit: type=1326 audit(405.400:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=1 ip=0x132320 code=0x7ffc0000 [ 406.057199][ T30] audit: type=1326 audit(405.430:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 406.072776][ T30] audit: type=1326 audit(405.450:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 406.108319][ T30] audit: type=1326 audit(405.480:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3590 comm="syz.0.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 407.625032][ T30] audit: type=1400 audit(407.000:238): avc: denied { bind } for pid=3592 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 407.663912][ T30] audit: type=1400 audit(407.030:239): avc: denied { setopt } for pid=3592 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 412.688627][ T30] audit: type=1326 audit(412.020:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 412.689533][ T30] audit: type=1326 audit(412.060:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 412.689885][ T30] audit: type=1326 audit(412.060:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 412.717328][ T30] audit: type=1326 audit(412.090:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 412.722970][ T30] audit: type=1326 audit(412.100:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 412.793306][ T30] audit: type=1326 audit(412.150:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 412.799131][ T30] audit: type=1326 audit(412.170:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 412.874652][ T30] audit: type=1326 audit(412.230:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 412.892150][ T30] audit: type=1326 audit(412.260:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 412.915444][ T30] audit: type=1326 audit(412.280:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3602 comm="syz.0.50" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 419.618238][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 419.646768][ T30] audit: type=1400 audit(418.990:260): avc: denied { name_bind } for pid=3613 comm="syz.0.55" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 423.282256][ T30] audit: type=1400 audit(422.650:261): avc: denied { write } for pid=3622 comm="syz.1.60" name="tcp6" dev="proc" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 423.432740][ T30] audit: type=1400 audit(422.800:262): avc: denied { create } for pid=3623 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 423.518958][ T30] audit: type=1326 audit(422.890:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 423.532600][ T30] audit: type=1326 audit(422.900:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 423.537492][ T30] audit: type=1326 audit(422.910:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 423.547668][ T30] audit: type=1326 audit(422.920:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 423.572079][ T30] audit: type=1326 audit(422.940:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 423.573356][ T30] audit: type=1326 audit(422.940:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 423.575967][ T30] audit: type=1326 audit(422.940:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3623 comm="syz.0.59" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 427.375723][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 427.378742][ T30] audit: type=1400 audit(426.750:300): avc: denied { create } for pid=3636 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 427.424390][ T30] audit: type=1400 audit(426.780:301): avc: denied { setopt } for pid=3636 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 428.112377][ T30] audit: type=1400 audit(427.490:302): avc: denied { connect } for pid=3638 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 429.119513][ T30] audit: type=1400 audit(428.490:303): avc: denied { create } for pid=3640 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 441.002808][ T3660] netlink: 36 bytes leftover after parsing attributes in process `syz.1.72'. [ 443.779981][ T30] audit: type=1400 audit(443.150:304): avc: denied { watch watch_reads } for pid=3666 comm="syz.1.76" path="/31" dev="tmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 446.763289][ T30] audit: type=1400 audit(446.130:305): avc: denied { create } for pid=3676 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 446.818949][ T30] audit: type=1400 audit(446.190:306): avc: denied { setopt } for pid=3676 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 447.248464][ T30] audit: type=1326 audit(446.610:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 447.249536][ T30] audit: type=1326 audit(446.610:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 447.264506][ T30] audit: type=1326 audit(446.620:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 447.265449][ T30] audit: type=1326 audit(446.620:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=46 compat=1 ip=0x132320 code=0x7ffc0000 [ 447.265840][ T30] audit: type=1326 audit(446.620:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 447.292000][ T30] audit: type=1326 audit(446.620:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 447.317831][ T30] audit: type=1326 audit(446.690:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3678 comm="syz.0.82" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 460.071604][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 460.072588][ T30] audit: type=1400 audit(459.440:326): avc: denied { create } for pid=3710 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 460.102010][ T30] audit: type=1400 audit(459.470:327): avc: denied { create } for pid=3711 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 460.123476][ T30] audit: type=1400 audit(459.500:328): avc: denied { connect } for pid=3711 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 460.168700][ T30] audit: type=1400 audit(459.540:329): avc: denied { bind } for pid=3711 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 460.231154][ T30] audit: type=1400 audit(459.600:330): avc: denied { write } for pid=3711 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 462.278686][ T30] audit: type=1400 audit(461.650:331): avc: denied { execute } for pid=3719 comm="syz.0.98" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=4588 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 463.098835][ T30] audit: type=1400 audit(462.470:332): avc: denied { nlmsg_write } for pid=3723 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 463.852638][ T3728] netlink: 12 bytes leftover after parsing attributes in process `syz.0.101'. [ 464.218494][ T30] audit: type=1400 audit(463.590:333): avc: denied { create } for pid=3730 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 464.312525][ T3731] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 465.014843][ T30] audit: type=1326 audit(464.390:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 465.021297][ T30] audit: type=1326 audit(464.390:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3734 comm="syz.1.105" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 466.499420][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 466.518200][ T30] audit: type=1400 audit(465.870:349): avc: denied { bind } for pid=3742 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 467.551539][ T30] audit: type=1326 audit(466.920:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 467.594582][ T30] audit: type=1326 audit(466.970:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 467.662068][ T30] audit: type=1326 audit(467.020:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 467.663126][ T30] audit: type=1326 audit(467.030:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 467.672028][ T30] audit: type=1326 audit(467.030:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 467.701405][ T30] audit: type=1326 audit(467.030:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 467.706944][ T30] audit: type=1326 audit(467.080:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 467.800922][ T30] audit: type=1326 audit(467.150:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 467.825827][ T30] audit: type=1326 audit(467.190:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.0.109" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 468.390872][ T3752] veth0_vlan: entered allmulticast mode [ 469.287884][ T3756] syz.0.112 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 470.248946][ T3758] netlink: 'syz.0.113': attribute type 13 has an invalid length. [ 474.246359][ T3767] netlink: 4 bytes leftover after parsing attributes in process `syz.1.117'. [ 477.055500][ T3770] syz_tun: entered allmulticast mode [ 477.114653][ T3768] syz_tun: left allmulticast mode [ 481.355420][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 481.357601][ T30] audit: type=1400 audit(480.730:431): avc: denied { name_bind } for pid=3779 comm="syz.1.123" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 481.376400][ T30] audit: type=1400 audit(480.750:432): avc: denied { node_bind } for pid=3779 comm="syz.1.123" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 482.958285][ T3787] netlink: 36 bytes leftover after parsing attributes in process `syz.1.125'. [ 485.428453][ T30] audit: type=1400 audit(484.800:433): avc: denied { create } for pid=3790 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.482123][ T30] audit: type=1400 audit(484.840:434): avc: denied { write open } for pid=3790 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1313 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.497652][ T30] audit: type=1400 audit(484.840:435): avc: denied { append } for pid=3790 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1313 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 485.522178][ T30] audit: type=1400 audit(484.890:436): avc: denied { getattr } for pid=3790 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 486.269593][ T30] audit: type=1326 audit(485.630:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3798 comm="syz.0.129" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 486.274664][ T30] audit: type=1326 audit(485.630:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3798 comm="syz.0.129" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 486.282882][ T30] audit: type=1326 audit(485.650:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3798 comm="syz.0.129" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 486.286794][ T30] audit: type=1326 audit(485.650:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3798 comm="syz.0.129" exe="/syz-executor" sig=0 arch=40000028 syscall=308 compat=1 ip=0x132320 code=0x7ffc0000 [ 486.764901][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 486.772297][ T30] audit: type=1400 audit(486.120:444): avc: denied { read } for pid=3797 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 486.968713][ T3801] netlink: 8 bytes leftover after parsing attributes in process `syz.1.130'. [ 487.231602][ T30] audit: type=1326 audit(486.600:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 487.233703][ T30] audit: type=1326 audit(486.600:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 487.238765][ T30] audit: type=1326 audit(486.610:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 487.258232][ T30] audit: type=1326 audit(486.630:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 487.262206][ T30] audit: type=1326 audit(486.630:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 487.267201][ T30] audit: type=1326 audit(486.640:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 487.272266][ T30] audit: type=1326 audit(486.650:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 487.275419][ T30] audit: type=1326 audit(486.650:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 487.284175][ T30] audit: type=1326 audit(486.660:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.131" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 494.846085][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 494.862050][ T30] audit: type=1326 audit(494.220:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 494.872295][ T30] audit: type=1326 audit(494.240:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 494.911759][ T30] audit: type=1326 audit(494.280:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 494.912690][ T30] audit: type=1326 audit(494.280:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=314 compat=1 ip=0x132320 code=0x7ffc0000 [ 494.938715][ T30] audit: type=1326 audit(494.300:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 494.948290][ T30] audit: type=1326 audit(494.320:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 494.966349][ T30] audit: type=1326 audit(494.340:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3826 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 495.682576][ T30] audit: type=1326 audit(495.040:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3828 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 495.683597][ T30] audit: type=1326 audit(495.050:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3828 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 495.702947][ T30] audit: type=1326 audit(495.070:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3828 comm="GPL" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 500.425812][ T3823] netlink: 24 bytes leftover after parsing attributes in process `syz.0.136'. [ 500.433202][ T3823] netlink: 212 bytes leftover after parsing attributes in process `syz.0.136'. [ 500.436419][ T3823] netlink: 32 bytes leftover after parsing attributes in process `syz.0.136'. [ 500.976242][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 500.977139][ T30] audit: type=1400 audit(500.340:494): avc: denied { read write } for pid=3841 comm="syz.1.145" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 500.989459][ T30] audit: type=1400 audit(500.350:495): avc: denied { open } for pid=3841 comm="syz.1.145" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 501.087885][ T30] audit: type=1400 audit(500.460:496): avc: denied { write } for pid=3841 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 501.762872][ T30] audit: type=1326 audit(501.130:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 501.768718][ T30] audit: type=1326 audit(501.140:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 501.785125][ T30] audit: type=1326 audit(501.160:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 501.796852][ T30] audit: type=1326 audit(501.170:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 501.816595][ T30] audit: type=1326 audit(501.190:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=97 compat=1 ip=0x132320 code=0x7ffc0000 [ 501.839204][ T30] audit: type=1326 audit(501.200:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 501.847484][ T30] audit: type=1326 audit(501.220:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.146" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 508.325163][ T30] audit: type=1400 audit(507.700:504): avc: denied { ioctl } for pid=3845 comm="syz.1.147" path="socket:[5491]" dev="sockfs" ino=5491 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 514.066244][ T3865] syzkaller0: entered promiscuous mode [ 514.067074][ T3865] syzkaller0: entered allmulticast mode [ 514.464544][ T30] audit: type=1400 audit(513.830:505): avc: denied { ioctl } for pid=3866 comm="syz.0.156" path="socket:[4853]" dev="sockfs" ino=4853 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 514.514772][ T3867] netlink: 4 bytes leftover after parsing attributes in process `syz.0.156'. [ 522.318248][ T3879] capability: warning: `syz.0.160' uses 32-bit capabilities (legacy support in use) [ 522.348250][ T30] audit: type=1400 audit(521.720:506): avc: denied { write } for pid=3878 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 522.551370][ T30] audit: type=1400 audit(521.920:507): avc: denied { execute } for pid=3873 comm="syz.1.158" path="/75/cpu.stat" dev="tmpfs" ino=401 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 525.707499][ T3886] pimreg: entered allmulticast mode [ 525.717632][ T3886] pimreg: left allmulticast mode [ 531.502063][ T30] audit: type=1400 audit(530.870:508): avc: denied { read } for pid=3881 comm="syz.0.161" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 531.526018][ T30] audit: type=1400 audit(530.900:509): avc: denied { open } for pid=3881 comm="syz.0.161" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 531.582404][ T30] audit: type=1400 audit(530.950:510): avc: denied { ioctl } for pid=3881 comm="syz.0.161" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 550.674255][ T30] audit: type=1326 audit(550.050:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 550.678590][ T30] audit: type=1326 audit(550.050:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 550.703891][ T30] audit: type=1326 audit(550.070:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 550.734007][ T30] audit: type=1326 audit(550.100:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 550.762931][ T30] audit: type=1326 audit(550.120:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 550.898149][ T30] audit: type=1326 audit(550.240:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 550.899106][ T30] audit: type=1326 audit(550.270:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 550.953693][ T30] audit: type=1326 audit(550.310:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 550.974060][ T30] audit: type=1326 audit(550.350:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 550.983277][ T30] audit: type=1326 audit(550.350:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 558.697561][ T3950] all: renamed from team_slave_0 [ 560.157753][ T3956] netlink: 12 bytes leftover after parsing attributes in process `syz.0.192'. [ 561.939217][ T3965] netlink: 40 bytes leftover after parsing attributes in process `syz.1.196'. [ 564.352822][ T3973] netlink: 'syz.1.200': attribute type 13 has an invalid length. [ 567.043349][ T30] kauditd_printk_skb: 51 callbacks suppressed [ 567.046226][ T30] audit: type=1400 audit(566.400:572): avc: denied { block_suspend } for pid=3977 comm="syz.1.202" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 568.205131][ T3982] netlink: 60 bytes leftover after parsing attributes in process `syz.0.203'. [ 568.206885][ T3982] netlink: 60 bytes leftover after parsing attributes in process `syz.0.203'. [ 568.576492][ T3984] syz.1.204 uses obsolete (PF_INET,SOCK_PACKET) [ 568.614212][ T3984] syzkaller1: entered promiscuous mode [ 568.616222][ T3984] syzkaller1: entered allmulticast mode [ 569.307100][ T3982] netlink: 60 bytes leftover after parsing attributes in process `syz.0.203'. [ 569.308301][ T3982] netlink: 60 bytes leftover after parsing attributes in process `syz.0.203'. [ 570.415201][ T3987] netlink: 'syz.1.205': attribute type 13 has an invalid length. [ 574.626991][ T3999] netlink: 'syz.1.210': attribute type 1 has an invalid length. [ 575.064468][ T3999] 8021q: adding VLAN 0 to HW filter on device bond1 [ 575.413583][ T30] audit: type=1400 audit(574.790:573): avc: denied { read write } for pid=4001 comm="syz.1.211" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 575.419105][ T30] audit: type=1400 audit(574.790:574): avc: denied { open } for pid=4001 comm="syz.1.211" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 575.714946][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.715516][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.715670][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.715939][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716114][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716254][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716389][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716543][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716691][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.716866][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 575.877070][ T10] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 578.187709][ T4003] fido_id[4003]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 582.131598][ T30] audit: type=1400 audit(581.500:575): avc: denied { setopt } for pid=4009 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 590.713601][ T30] audit: type=1400 audit(590.080:576): avc: denied { connect } for pid=4025 comm="syz.0.222" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 590.761965][ T30] audit: type=1400 audit(590.130:577): avc: denied { write } for pid=4025 comm="syz.0.222" laddr=fe80::13 lport=60 faddr=fe80::d fport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 591.007113][ T4028] dummy0: entered promiscuous mode [ 591.024857][ T4027] dummy0: left promiscuous mode [ 591.987974][ T4032] process 'syz.1.225' launched './file0' with NULL argv: empty string added [ 591.997025][ T30] audit: type=1400 audit(591.370:578): avc: denied { execute_no_trans } for pid=4030 comm="syz.1.225" path="/115/file0" dev="tmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 592.053002][ T30] audit: type=1400 audit(591.420:579): avc: denied { create } for pid=4029 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 592.082411][ T30] audit: type=1400 audit(591.450:580): avc: denied { write } for pid=4029 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 592.087508][ T4031] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4031 comm=syz.0.224 [ 594.997847][ T30] audit: type=1326 audit(594.370:581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4042 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 594.998877][ T30] audit: type=1326 audit(594.370:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4042 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 594.999234][ T30] audit: type=1326 audit(594.370:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4041 comm="syz.0.228" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 594.999586][ T30] audit: type=1326 audit(594.370:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4041 comm="syz.0.228" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 595.009323][ T30] audit: type=1326 audit(594.380:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4042 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 595.108572][ T4043] netlink: 20 bytes leftover after parsing attributes in process `syz.0.228'. [ 597.061219][ T30] kauditd_printk_skb: 48 callbacks suppressed [ 597.064440][ T30] audit: type=1326 audit(596.430:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 597.066510][ T30] audit: type=1326 audit(596.430:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 597.071273][ T30] audit: type=1326 audit(596.430:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 597.075326][ T30] audit: type=1326 audit(596.450:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 597.115160][ T30] audit: type=1326 audit(596.490:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 597.117352][ T30] audit: type=1326 audit(596.490:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 597.132799][ T30] audit: type=1326 audit(596.490:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 597.141227][ T30] audit: type=1326 audit(596.490:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 597.154999][ T30] audit: type=1326 audit(596.530:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 597.158965][ T30] audit: type=1326 audit(596.530:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 600.764074][ T4059] ======================================================= [ 600.764074][ T4059] WARNING: The mand mount option has been deprecated and [ 600.764074][ T4059] and is ignored by this kernel. Remove the mand [ 600.764074][ T4059] option from the mount to silence this warning. [ 600.764074][ T4059] ======================================================= [ 602.079695][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 602.091478][ T30] audit: type=1400 audit(601.450:675): avc: denied { sqpoll } for pid=4060 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 607.586016][ T30] audit: type=1326 audit(606.930:676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 607.589752][ T30] audit: type=1326 audit(606.960:677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 607.608001][ T30] audit: type=1326 audit(606.970:678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 607.639821][ T30] audit: type=1326 audit(606.970:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=1 ip=0x132320 code=0x7ffc0000 [ 607.654911][ T30] audit: type=1326 audit(606.990:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 607.655379][ T30] audit: type=1326 audit(606.990:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4072 comm="syz.0.240" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 610.258412][ T30] audit: type=1400 audit(609.630:682): avc: denied { write } for pid=4080 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 613.317468][ T4095] IPv6: Can't replace route, no match found [ 614.192786][ T4100] netlink: 224 bytes leftover after parsing attributes in process `syz.1.252'. [ 614.922916][ T30] audit: type=1400 audit(614.280:683): avc: denied { create } for pid=4103 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 614.936869][ T30] audit: type=1400 audit(614.310:684): avc: denied { bind } for pid=4103 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 616.566820][ T30] audit: type=1400 audit(615.940:685): avc: denied { setopt } for pid=4109 comm="syz.1.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 620.123309][ T4123] netlink: 96 bytes leftover after parsing attributes in process `syz.1.264'. [ 620.759673][ T30] audit: type=1326 audit(620.130:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 620.774929][ T30] audit: type=1326 audit(620.130:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 620.823964][ T30] audit: type=1326 audit(620.180:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 620.835550][ T30] audit: type=1326 audit(620.200:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 620.864917][ T30] audit: type=1326 audit(620.240:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 620.879072][ T30] audit: type=1326 audit(620.250:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 620.909073][ T30] audit: type=1326 audit(620.270:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 620.936422][ T30] audit: type=1326 audit(620.310:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 620.939834][ T30] audit: type=1326 audit(620.310:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 620.947353][ T30] audit: type=1326 audit(620.320:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4126 comm="syz.1.266" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 626.689219][ T4150] netlink: 4 bytes leftover after parsing attributes in process `syz.0.276'. [ 626.888334][ T4150] geneve2: entered promiscuous mode [ 626.889449][ T4150] geneve2: entered allmulticast mode [ 626.912489][ T745] netdevsim netdevsim0 netdevsim0: set [1, 1] type 2 family 0 port 46637 - 0 [ 626.919689][ T745] netdevsim netdevsim0 netdevsim1: set [1, 1] type 2 family 0 port 46637 - 0 [ 626.951216][ T745] netdevsim netdevsim0 netdevsim2: set [1, 1] type 2 family 0 port 46637 - 0 [ 626.955904][ T745] netdevsim netdevsim0 netdevsim3: set [1, 1] type 2 family 0 port 46637 - 0 [ 627.878246][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 627.887683][ T30] audit: type=1400 audit(627.250:712): avc: denied { create } for pid=4151 comm="syz.0.277" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 627.926249][ T30] audit: type=1400 audit(627.300:713): avc: denied { write } for pid=4151 comm="syz.0.277" name="file0" dev="tmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 627.945960][ T30] audit: type=1400 audit(627.300:714): avc: denied { open } for pid=4151 comm="syz.0.277" path="/133/file0" dev="tmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 628.013133][ T30] audit: type=1400 audit(627.390:715): avc: denied { ioctl } for pid=4151 comm="syz.0.277" path="/133/file0" dev="tmpfs" ino=689 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 628.234496][ T30] audit: type=1400 audit(627.610:716): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 629.839965][ T30] audit: type=1400 audit(629.210:717): avc: denied { create } for pid=4157 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 640.536013][ T4182] pim6reg1: entered promiscuous mode [ 640.538472][ T4182] pim6reg1: entered allmulticast mode [ 648.967827][ T30] audit: type=1326 audit(648.320:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 648.978843][ T30] audit: type=1326 audit(648.340:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 648.984831][ T30] audit: type=1326 audit(648.360:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 649.001666][ T30] audit: type=1326 audit(648.360:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 649.002829][ T30] audit: type=1326 audit(648.370:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 649.003200][ T30] audit: type=1326 audit(648.370:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 649.003553][ T30] audit: type=1326 audit(648.370:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 649.024072][ T30] audit: type=1326 audit(648.380:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 649.024960][ T30] audit: type=1326 audit(648.380:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 649.025356][ T30] audit: type=1326 audit(648.380:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.0.297" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 656.543893][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 656.546689][ T30] audit: type=1400 audit(655.900:742): avc: denied { node_bind } for pid=4218 comm="syz.0.304" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 662.102682][ T30] audit: type=1400 audit(661.460:743): avc: denied { write } for pid=4225 comm="gtp" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 666.233112][ T9] hid_parser_main: 22 callbacks suppressed [ 666.234243][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 666.378039][ T9] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 668.905886][ T30] audit: type=1400 audit(668.280:744): avc: denied { bind } for pid=4236 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 668.947708][ T30] audit: type=1326 audit(668.320:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 668.948776][ T30] audit: type=1326 audit(668.320:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 668.963384][ T30] audit: type=1326 audit(668.320:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 668.966543][ T30] audit: type=1326 audit(668.330:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 669.008644][ T30] audit: type=1326 audit(668.360:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="syz.0.312" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=1 ip=0x132320 code=0x7ffc0000 [ 669.009679][ T30] audit: type=1326 audit(668.380:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 669.015715][ T30] audit: type=1326 audit(668.380:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 669.051633][ T30] audit: type=1326 audit(668.420:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 669.076158][ T30] audit: type=1326 audit(668.450:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4236 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 669.144316][ T4233] fido_id[4233]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 675.335450][ T30] kauditd_printk_skb: 51 callbacks suppressed [ 675.336750][ T30] audit: type=1400 audit(674.710:805): avc: denied { relabelfrom } for pid=4246 comm="syz.1.315" name="" dev="pipefs" ino=7229 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 676.659348][ T4251] Illegal XDP return value 4294967274 on prog (id 16) dev N/A, expect packet loss! [ 678.325515][ T30] audit: type=1400 audit(677.700:806): avc: denied { create } for pid=4253 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 679.168321][ T30] audit: type=1400 audit(678.540:807): avc: denied { ioctl } for pid=4253 comm="syz.0.318" path="socket:[6450]" dev="sockfs" ino=6450 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 682.946449][ T30] audit: type=1400 audit(682.290:808): avc: denied { load_policy } for pid=4262 comm="syz.1.322" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 682.977554][ T4264] SELinux: failed to load policy [ 688.032535][ T30] audit: type=1326 audit(687.370:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 688.033501][ T30] audit: type=1326 audit(687.400:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 688.101828][ T30] audit: type=1326 audit(687.410:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 688.102900][ T30] audit: type=1326 audit(687.410:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 688.103522][ T30] audit: type=1326 audit(687.450:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 688.104065][ T30] audit: type=1326 audit(687.460:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 688.104432][ T30] audit: type=1326 audit(687.470:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 688.104825][ T30] audit: type=1326 audit(687.470:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 688.105168][ T30] audit: type=1326 audit(687.470:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 688.105552][ T30] audit: type=1326 audit(687.470:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4273 comm="syz.1.327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 693.125342][ T4276] SELinux: failed to load policy [ 698.036283][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 698.044309][ T30] audit: type=1400 audit(697.390:833): avc: denied { relabelfrom } for pid=4289 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 698.079131][ T30] audit: type=1400 audit(697.450:834): avc: denied { relabelto } for pid=4289 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 702.918574][ T4301] netlink: 8 bytes leftover after parsing attributes in process `syz.1.338'. [ 703.860907][ T30] audit: type=1326 audit(703.170:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 703.866919][ T30] audit: type=1326 audit(703.230:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 703.894957][ T30] audit: type=1326 audit(703.270:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 703.927430][ T30] audit: type=1326 audit(703.270:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=1 ip=0x132320 code=0x7ffc0000 [ 704.108860][ T30] audit: type=1326 audit(703.480:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 704.109886][ T30] audit: type=1326 audit(703.480:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 704.164531][ T30] audit: type=1326 audit(703.530:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.1.340" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 705.409140][ T30] audit: type=1326 audit(704.780:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4306 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 705.409767][ T30] audit: type=1326 audit(704.780:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4306 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 705.416568][ T30] audit: type=1326 audit(704.790:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4306 comm="syz.1.342" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 710.895123][ T30] kauditd_printk_skb: 60 callbacks suppressed [ 710.913288][ T30] audit: type=1400 audit(710.270:905): avc: denied { name_bind } for pid=4316 comm="syz.1.347" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 715.448619][ T30] audit: type=1400 audit(714.820:906): avc: denied { listen } for pid=4325 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 715.503380][ T30] audit: type=1400 audit(714.880:907): avc: denied { connect } for pid=4325 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 715.611273][ T30] audit: type=1400 audit(714.980:908): avc: denied { accept } for pid=4325 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 715.654441][ T30] audit: type=1400 audit(715.000:909): avc: denied { write } for pid=4325 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 715.701813][ T30] audit: type=1400 audit(715.070:910): avc: denied { read } for pid=4325 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 716.495127][ T30] audit: type=1326 audit(715.860:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 716.551740][ T30] audit: type=1326 audit(715.920:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 716.582136][ T30] audit: type=1326 audit(715.940:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 716.602887][ T30] audit: type=1326 audit(715.970:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 716.641726][ T30] audit: type=1326 audit(716.010:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=385 compat=1 ip=0x132320 code=0x7ffc0000 [ 716.731317][ T30] audit: type=1326 audit(716.100:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 716.758105][ T30] audit: type=1326 audit(716.130:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 716.768234][ T30] audit: type=1326 audit(716.140:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 716.787942][ T30] audit: type=1326 audit(716.160:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 716.798185][ T30] audit: type=1326 audit(716.170:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4327 comm="syz.1.352" exe="/syz-executor" sig=0 arch=40000028 syscall=100 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.138613][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 735.143490][ T30] audit: type=1326 audit(734.510:923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 735.159610][ T30] audit: type=1326 audit(734.530:924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.184357][ T30] audit: type=1326 audit(734.560:925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.211888][ T30] audit: type=1326 audit(734.570:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 735.217023][ T30] audit: type=1326 audit(734.580:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 735.219504][ T30] audit: type=1326 audit(734.580:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.219964][ T30] audit: type=1326 audit(734.590:929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.247070][ T30] audit: type=1326 audit(734.620:930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 735.254453][ T30] audit: type=1326 audit(734.620:931): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 735.275947][ T30] audit: type=1326 audit(734.650:932): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.359" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 740.897464][ T4364] netlink: 'syz.1.366': attribute type 10 has an invalid length. [ 755.768859][ T4407] netlink: 'syz.1.382': attribute type 13 has an invalid length. [ 758.143930][ T30] kauditd_printk_skb: 92 callbacks suppressed [ 758.151807][ T30] audit: type=1400 audit(757.520:1025): avc: denied { create } for pid=4409 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 758.412426][ T30] audit: type=1400 audit(757.780:1026): avc: denied { setopt } for pid=4409 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 758.473559][ T30] audit: type=1400 audit(757.840:1027): avc: denied { ioctl } for pid=4409 comm="syz.1.383" path="socket:[7573]" dev="sockfs" ino=7573 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 765.244000][ T30] audit: type=1400 audit(764.620:1028): avc: denied { write } for pid=4417 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 765.698858][ T4418] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 765.863678][ T4418] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 768.613310][ T4421] netlink: 'syz.1.387': attribute type 13 has an invalid length. [ 779.402310][ T4430] netlink: 32 bytes leftover after parsing attributes in process `+“[@'. [ 780.839012][ T4434] netlink: 'syz.0.392': attribute type 13 has an invalid length. [ 782.952534][ T30] audit: type=1400 audit(782.320:1029): avc: denied { ioctl } for pid=4438 comm="syz.0.394" path="socket:[6677]" dev="sockfs" ino=6677 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 783.024763][ T4439] netlink: 'syz.0.394': attribute type 9 has an invalid length. [ 783.025115][ T4439] netlink: 8 bytes leftover after parsing attributes in process `syz.0.394'. [ 783.236658][ T4439] team_slave_0: entered promiscuous mode [ 783.238255][ T4439] macvlan2: entered promiscuous mode [ 783.263122][ T4439] macvlan2: entered allmulticast mode [ 783.263944][ T4439] team_slave_0: entered allmulticast mode [ 784.475403][ T30] audit: type=1400 audit(783.840:1030): avc: denied { nlmsg_write } for pid=4442 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 785.416143][ T4447] netlink: 'syz.0.398': attribute type 13 has an invalid length. [ 787.927756][ T4456] vlan2: entered allmulticast mode [ 787.928911][ T4456] veth0_to_batadv: entered allmulticast mode [ 791.076048][ T4464] netlink: 'syz.0.404': attribute type 13 has an invalid length. [ 792.588532][ T30] audit: type=1400 audit(791.950:1031): avc: denied { map } for pid=4472 comm="syz.0.407" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 793.209592][ T30] audit: type=1400 audit(792.580:1032): avc: denied { prog_load } for pid=4474 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 793.237435][ T30] audit: type=1400 audit(792.610:1033): avc: denied { map_create } for pid=4474 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 793.289951][ T30] audit: type=1400 audit(792.660:1034): avc: denied { map_read map_write } for pid=4474 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 794.644040][ T4481] netlink: 'syz.0.411': attribute type 13 has an invalid length. [ 798.105318][ T4492] netdevsim netdevsim0: Direct firmware load for ./file0 failed with error -2 [ 798.116355][ T4492] netdevsim netdevsim0: Falling back to sysfs fallback for: ./file0 [ 798.119545][ T30] audit: type=1400 audit(797.490:1035): avc: denied { firmware_load } for pid=4491 comm="syz.0.416" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 805.411714][ T30] audit: type=1326 audit(804.770:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 805.412638][ T30] audit: type=1326 audit(804.780:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 805.419125][ T30] audit: type=1326 audit(804.750:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 805.463320][ T30] audit: type=1326 audit(804.790:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 805.468590][ T30] audit: type=1326 audit(804.830:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 805.475992][ T30] audit: type=1326 audit(804.830:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=1 ip=0x132320 code=0x7ffc0000 [ 805.488601][ T30] audit: type=1326 audit(804.830:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 805.497966][ T30] audit: type=1326 audit(804.820:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 805.508288][ T30] audit: type=1326 audit(804.870:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 805.518626][ T30] audit: type=1326 audit(804.870:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 822.844613][ T4540] SELinux: failed to load policy [ 827.849555][ T4554] capability: warning: `syz.0.437' uses deprecated v2 capabilities in a way that may be insecure [ 828.992443][ T4562] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 829.028187][ T4562] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 830.247554][ T4566] netlink: 24 bytes leftover after parsing attributes in process `syz.0.442'. [ 831.115031][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 831.125360][ T30] audit: type=1326 audit(830.480:1090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 831.137613][ T30] audit: type=1326 audit(830.510:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 831.187997][ T30] audit: type=1326 audit(830.520:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 831.205317][ T30] audit: type=1326 audit(830.580:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 831.225534][ T30] audit: type=1326 audit(830.580:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 831.235759][ T30] audit: type=1326 audit(830.600:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 831.242900][ T30] audit: type=1326 audit(830.620:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 831.293278][ T30] audit: type=1326 audit(830.630:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 831.352418][ T30] audit: type=1326 audit(830.710:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 831.385307][ T30] audit: type=1326 audit(830.760:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4569 comm="syz.0.444" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 832.875526][ T4575] veth1_to_bond: entered allmulticast mode [ 832.897829][ T4575] veth1_to_bond: left allmulticast mode [ 848.570104][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 848.582482][ T30] audit: type=1400 audit(847.940:1117): avc: denied { watch watch_reads } for pid=4610 comm="syz.1.463" path="/246/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 848.615029][ T4612] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 848.629420][ T30] audit: type=1400 audit(848.000:1118): avc: denied { relabelto } for pid=4610 comm="syz.1.463" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 848.666716][ T30] audit: type=1400 audit(848.000:1119): avc: denied { associate } for pid=4610 comm="syz.1.463" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 856.167342][ T30] audit: type=1400 audit(855.540:1120): avc: denied { prog_run } for pid=4632 comm="syz.1.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 856.862123][ T30] audit: type=1326 audit(856.230:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 856.868401][ T30] audit: type=1326 audit(856.240:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 856.884000][ T30] audit: type=1326 audit(856.260:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 856.891414][ T30] audit: type=1326 audit(856.260:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=319 compat=1 ip=0x132320 code=0x7ffc0000 [ 856.898823][ T30] audit: type=1326 audit(856.270:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 856.906303][ T30] audit: type=1326 audit(856.280:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4636 comm="syz.1.472" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 860.586837][ T30] audit: type=1326 audit(859.930:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4650 comm="syz.1.479" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 860.602144][ T30] audit: type=1326 audit(859.970:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4650 comm="syz.1.479" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 860.646450][ T30] audit: type=1326 audit(860.000:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4650 comm="syz.1.479" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 863.476815][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 863.495607][ T30] audit: type=1326 audit(862.850:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 863.543116][ T30] audit: type=1326 audit(862.850:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 863.549267][ T30] audit: type=1326 audit(862.920:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 863.573903][ T30] audit: type=1326 audit(862.940:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 863.577633][ T30] audit: type=1326 audit(862.940:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x132320 code=0x7ffc0000 [ 863.606235][ T30] audit: type=1326 audit(862.980:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 863.611907][ T30] audit: type=1326 audit(862.980:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 863.653473][ T30] audit: type=1326 audit(863.020:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 863.733124][ T30] audit: type=1326 audit(863.080:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 863.733989][ T30] audit: type=1326 audit(863.090:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4657 comm="syz.1.482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.772050][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 869.781081][ T30] audit: type=1326 audit(869.140:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 869.784397][ T30] audit: type=1326 audit(869.150:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.797296][ T30] audit: type=1326 audit(869.170:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 869.806163][ T30] audit: type=1326 audit(869.180:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.821720][ T30] audit: type=1326 audit(869.190:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 869.867537][ T30] audit: type=1326 audit(869.190:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.873190][ T30] audit: type=1326 audit(869.240:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.885662][ T30] audit: type=1326 audit(869.250:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 869.898979][ T30] audit: type=1326 audit(869.270:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 869.908432][ T30] audit: type=1326 audit(869.280:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4675 comm="syz.0.489" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 873.557929][ T4689] mmap: syz.0.494 (4689) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 877.692094][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 877.695735][ T30] audit: type=1326 audit(877.050:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 877.719625][ T30] audit: type=1326 audit(877.090:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 877.735962][ T30] audit: type=1326 audit(877.110:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 877.766048][ T30] audit: type=1326 audit(877.140:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 877.766650][ T30] audit: type=1326 audit(877.140:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 877.768659][ T30] audit: type=1326 audit(877.140:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 877.795985][ T30] audit: type=1326 audit(877.140:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 877.813421][ T30] audit: type=1326 audit(877.180:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 877.814262][ T30] audit: type=1326 audit(877.180:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132320 code=0x7ffc0000 [ 877.814722][ T30] audit: type=1326 audit(877.180:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4700 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 901.597918][ T4725] SELinux: policydb table sizes (7,0) do not match mine (8,7) [ 901.603976][ T4725] SELinux: failed to load policy [ 902.539554][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 902.549779][ T30] audit: type=1326 audit(901.910:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 902.554639][ T30] audit: type=1326 audit(901.920:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 902.561507][ T30] audit: type=1326 audit(901.920:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 902.577113][ T30] audit: type=1326 audit(901.950:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 902.599706][ T30] audit: type=1326 audit(901.970:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 902.604770][ T30] audit: type=1326 audit(901.970:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 902.607869][ T30] audit: type=1326 audit(901.970:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 902.612510][ T30] audit: type=1326 audit(901.970:1243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 902.621132][ T30] audit: type=1326 audit(901.980:1244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 902.650494][ T30] audit: type=1326 audit(902.020:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4726 comm="syz.1.510" exe="/syz-executor" sig=0 arch=40000028 syscall=342 compat=1 ip=0x132320 code=0x7ffc0000 [ 909.516236][ T4745] netlink: 83 bytes leftover after parsing attributes in process `syz.1.518'. [ 910.459263][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 910.467520][ T30] audit: type=1326 audit(909.830:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 910.472963][ T30] audit: type=1326 audit(909.840:1251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 910.491752][ T30] audit: type=1326 audit(909.850:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 910.499628][ T30] audit: type=1326 audit(909.870:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 910.548364][ T30] audit: type=1326 audit(909.900:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 910.554784][ T30] audit: type=1326 audit(909.920:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 910.598078][ T30] audit: type=1326 audit(909.970:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 910.629024][ T30] audit: type=1326 audit(909.990:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 910.629958][ T30] audit: type=1326 audit(910.000:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 910.634744][ T30] audit: type=1326 audit(910.000:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.519" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 912.818189][ T4751] wireguard0: entered promiscuous mode [ 912.818929][ T4751] wireguard0: entered allmulticast mode [ 917.935693][ T4764] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 921.433912][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 921.437493][ T30] audit: type=1326 audit(920.810:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 921.444413][ T30] audit: type=1326 audit(920.820:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 921.475401][ T30] audit: type=1326 audit(920.850:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 921.484535][ T30] audit: type=1326 audit(920.850:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 921.485494][ T30] audit: type=1326 audit(920.860:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 921.523365][ T30] audit: type=1326 audit(920.860:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 921.533992][ T30] audit: type=1326 audit(920.900:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 921.556876][ T30] audit: type=1326 audit(920.930:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 921.573129][ T30] audit: type=1326 audit(920.950:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132320 code=0x7ffc0000 [ 921.592931][ T30] audit: type=1326 audit(920.970:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.530" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 940.605023][ T4796] netlink: 'syz.1.538': attribute type 6 has an invalid length. [ 950.058093][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 950.067002][ T30] audit: type=1326 audit(949.430:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 950.067823][ T30] audit: type=1326 audit(949.440:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 950.085123][ T30] audit: type=1326 audit(949.460:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 950.102241][ T30] audit: type=1326 audit(949.470:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=1 ip=0x132320 code=0x7ffc0000 [ 950.102814][ T30] audit: type=1326 audit(949.470:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 950.104341][ T30] audit: type=1326 audit(949.470:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 950.111138][ T30] audit: type=1326 audit(949.480:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.1.549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 951.713864][ T30] audit: type=1326 audit(951.080:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.552" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 951.718793][ T30] audit: type=1326 audit(951.090:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 951.740975][ T30] audit: type=1326 audit(951.110:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4831 comm="syz.0.552" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 955.565200][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 955.567318][ T30] audit: type=1400 audit(954.930:1331): avc: denied { add_name } for pid=4850 comm="syz.0.561" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 955.572067][ T30] audit: type=1400 audit(954.940:1332): avc: denied { create } for pid=4850 comm="syz.0.561" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 955.576126][ T30] audit: type=1400 audit(954.950:1333): avc: denied { associate } for pid=4850 comm="syz.0.561" name="file0" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 955.584339][ T4851] Unable to handle kernel paging request at virtual address dfff800000000007 [ 955.585051][ T4851] KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f] [ 955.602264][ T30] audit: type=1400 audit(954.980:1334): avc: denied { read } for pid=3120 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 955.604985][ T30] audit: type=1400 audit(954.980:1335): avc: denied { search } for pid=3120 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 955.625372][ T4851] Mem abort info: [ 955.634188][ T30] audit: type=1400 audit(955.000:1336): avc: denied { append } for pid=3120 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 955.645186][ T30] audit: type=1400 audit(955.010:1337): avc: denied { open } for pid=3120 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 955.674513][ T30] audit: type=1400 audit(955.040:1338): avc: denied { getattr } for pid=3120 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 955.676014][ T4851] ESR = 0x0000000096000005 [ 955.676287][ T4851] EC = 0x25: DABT (current EL), IL = 32 bits [ 955.676426][ T4851] SET = 0, FnV = 0 [ 955.676532][ T4851] EA = 0, S1PTW = 0 [ 955.676648][ T4851] FSC = 0x05: level 1 translation fault [ 955.676787][ T4851] Data abort info: [ 955.676877][ T4851] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 955.676974][ T4851] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 955.677078][ T4851] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 955.677279][ T4851] [dfff800000000007] address between user and kernel address ranges [ 955.679617][ T4851] Internal error: Oops: 0000000096000005 [#1] SMP [ 955.688131][ T4851] Modules linked in: [ 955.690011][ T4851] CPU: 1 UID: 0 PID: 4851 Comm: syz.0.561 Not tainted syzkaller #0 PREEMPT [ 955.690761][ T4851] Hardware name: linux,dummy-virt (DT) [ 955.691768][ T4851] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 955.692439][ T4851] pc : simple_xattrs_free+0x48/0x184 [ 955.694101][ T4851] lr : __kernfs_new_node+0x524/0x78c [ 955.695876][ T4851] sp : ffff80008e8e7920 [ 955.697428][ T4851] x29: ffff80008e8e7920 x28: ffff00002cb31ea8 x27: ffff800086f10d18 [ 955.698397][ T4851] x26: ffff00000e16d068 x25: ffff800086f10000 x24: 0000000000000038 [ 955.698943][ T4851] x23: ffff800086f10000 x22: ffff0000131de1e0 x21: 0000000000000000 [ 955.699705][ T4851] x20: 1fffe000059663d3 x19: ffff00002cb31e10 x18: 0000000000000000 [ 955.700545][ T4851] x17: 0000000000000000 x16: ffff00006a050504 x15: ffff800080b292a0 [ 955.701221][ T4851] x14: ffff800080b29048 x13: ffff800080045c90 x12: ffff700011d1cec5 [ 955.701888][ T4851] x11: 1ffff00011d1cec4 x10: ffff700011d1cec4 x9 : dfff800000000000 [ 955.702733][ T4851] x8 : ffff80008e8e7628 x7 : ffff80008e8e7750 x6 : ffff80008e8e76a0 [ 955.703391][ T4851] x5 : ffff80008e8e7688 x4 : 0000000000000003 x3 : 1fffe0000300f721 [ 955.704026][ T4851] x2 : 0000000000000000 x1 : 0000000000000007 x0 : dfff800000000000 [ 955.704913][ T4851] Call trace: [ 955.705626][ T4851] simple_xattrs_free+0x48/0x184 (P) [ 955.707757][ T4851] __kernfs_new_node+0x524/0x78c [ 955.709497][ T4851] kernfs_new_node+0xe8/0x148 [ 955.711146][ T4851] kernfs_create_dir_ns+0x34/0x118 [ 955.711607][ T4851] cgroup_mkdir+0x2bc/0xf94 [ 955.712028][ T4851] kernfs_iop_mkdir+0xd0/0x168 [ 955.712562][ T4851] vfs_mkdir+0x4fc/0x7c0 [ 955.712932][ T4851] do_mkdirat+0x30c/0x3f8 [ 955.713330][ T4851] __arm64_sys_mkdir+0xb8/0x108 [ 955.713822][ T4851] invoke_syscall+0x6c/0x258 [ 955.714549][ T4851] el0_svc_common.constprop.0+0xac/0x230 [ 955.715026][ T4851] do_el0_svc_compat+0x40/0x68 [ 955.715332][ T4851] el0_svc_compat+0x50/0x278 [ 955.715932][ T4851] el0t_32_sync_handler+0x88/0xac [ 955.716651][ T4851] el0t_32_sync+0x19c/0x1a0 [ 955.717652][ T4851] Code: f90002bf d343ff01 d2d00000 f2fbffe0 (38e06820) [ 955.719560][ T4851] ---[ end trace 0000000000000000 ]--- [ 955.721128][ T4851] Kernel panic - not syncing: Oops: Fatal exception [ 955.722253][ T4851] SMP: stopping secondary CPUs [ 955.724091][ T4851] Kernel Offset: disabled [ 955.724414][ T4851] CPU features: 0x208000,1001a001,00008000,0400421b [ 955.724846][ T4851] Memory Limit: none [ 955.726102][ T4851] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:55:56 Registers: info registers vcpu 0 CPU#0 PC=ffff8000855c8168 X00=ffff8000855c8164 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001d21391 X04=1fffe000026ab74b X05=dfff800000000000 X06=0000000000000003 X07=dfff800000000000 X08=dfff800000000000 X09=ffff00006a065140 X10=ffff700011afad1c X11=1ffff00011afad1c X12=ffff700011afad1d X13=0000000000000000 X14=1fffe00002f957bd X15=ffff00000efce22f X16=0000000000000007 X17=0000000000000000 X18=ffff000017cabdc0 X19=ffff8000875967b0 X20=ffff00000e909c80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087596780 X25=0000000000000000 X26=0000000000000004 X27=ffff8000875967b0 X28=1fffe0000389d720 X29=ffff80008d7d66a0 X30=ffff80008045356c SP=ffff80008d7d66a0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=5f6d65747379733d:747865746e6f6374 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=633a725f7463656a:626f3a755f6d6574 Q06=636167656c207463:65667265706d6920 Q07=72657a6565726620:70756f7267632079 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc34d4c00:0000ffffc34d4c00 Q17=ffffff80ffffffd0:0000ffffc34d4bd0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008032e3fc X00=00000000000000c0 X01=ffff7fffe2d65000 X02=0000000000000000 X03=1fffe000031e5391 X04=00000000c4adf024 X05=0000000000040000 X06=ffff000018f2a778 X07=a0a2508c9b9e0079 X08=0000000000000000 X09=ffff800089ab7000 X10=ffff000018f2a750 X11=0000000000000000 X12=000000000000009c X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000872eb588 X20=ffff00006a050458 X21=0000000000000000 X22=0000000000000000 X23=0000000000000001 X24=0000000000000000 X25=ffff800080316064 X26=0000000000000000 X27=00000000000000c0 X28=ffff8000a17277b0 X29=ffff8000a17277d0 X30=ffff80008032e3dc SP=ffff8000a17277b0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0a0a0a0a0a0a0a0a:0a0a0a0a0a0a0a0a Q01=7420745f70756f72:6700005d66333030 Q02=3078302d38333030:3030303030303030 Q03=0000000000000000:00ffff0000000000 Q04=0000000000000000:000000000ff00000 Q05=3030303030303078:305b2065676e6172 Q06=6170206c656e7265:6b20656c646e6168 Q07=2074612074736575:71657220676e6967 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd8bcc150:0000ffffd8bcc150 Q17=ffffff80ffffffd8:0000ffffd8bcc120 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000