last executing test programs: 6.19731041s ago: executing program 1 (id=1744): r0 = socket$netlink(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0, r0) 5.928872868s ago: executing program 1 (id=1745): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"/3816], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x6, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x6, 0x0) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r1) 5.738066664s ago: executing program 1 (id=1746): bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x20, 0x4, 0x3, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 5.436943612s ago: executing program 1 (id=1747): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, &(0x7f0000001400)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x3938700}}, &(0x7f00000006c0)) 2.319591523s ago: executing program 0 (id=1751): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000400000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@deltaction={0x40, 0x18, 0x1, 0x0, 0x0, {0xa}, [@TCA_ACT_TAB={0x2c, 0x1, [{0xc, 0x0, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}]}]}, 0x40}}, 0x0) 2.008322032s ago: executing program 0 (id=1752): r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="88000000", @ANYRES16=r0, @ANYBLOB="270e00000000000000000407"], 0x88}, 0x1, 0x40030000000000}, 0x0) 1.768780379s ago: executing program 1 (id=1753): r0 = memfd_secret(0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r1, r0, 0x2e, 0x4608, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r2, 0x4) 1.587100894s ago: executing program 0 (id=1754): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80, 0x0) 1.358889451s ago: executing program 1 (id=1755): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x10, 0x3, 0x0) r0 = io_uring_setup(0x7fdb, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3, 0x0, {}, 0xfe}, 0x18) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)="1000608867a31b2562c602caca64d0ade3305ecce4b076fb56895285babbb503085388", 0x23}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) 1.337194131s ago: executing program 0 (id=1756): mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000008007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1803000000000000000000009f000000850000006d"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r0}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) 890.185104ms ago: executing program 0 (id=1757): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 0s ago: executing program 0 (id=1758): r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) kernel console output (not intermixed with test programs): sadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.041937][ T29] audit: type=1326 audit(454.780:1202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.061446][ T29] audit: type=1326 audit(454.790:1203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.062343][ T29] audit: type=1326 audit(454.790:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.063068][ T29] audit: type=1326 audit(454.790:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.067198][ T29] audit: type=1326 audit(454.800:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=441 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 455.068024][ T29] audit: type=1326 audit(454.800:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5165 comm="syz.0.691" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 472.912498][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 472.912607][ T29] audit: type=1400 audit(472.650:1275): avc: denied { read write } for pid=3281 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 472.915326][ T29] audit: type=1400 audit(472.650:1276): avc: denied { open } for pid=3281 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 472.918108][ T29] audit: type=1400 audit(472.650:1277): avc: denied { ioctl } for pid=3281 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 472.934821][ T29] audit: type=1400 audit(472.670:1278): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 472.949932][ T29] audit: type=1400 audit(472.680:1279): avc: denied { search } for pid=3086 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 472.951407][ T29] audit: type=1400 audit(472.680:1280): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 472.952757][ T29] audit: type=1400 audit(472.680:1281): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 472.954033][ T29] audit: type=1400 audit(472.680:1282): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 473.053912][ T29] audit: type=1400 audit(472.790:1283): avc: denied { create } for pid=5270 comm="syz.1.734" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 473.056131][ T29] audit: type=1400 audit(472.790:1284): avc: denied { map } for pid=5270 comm="syz.1.734" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9106 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 478.530490][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 478.530638][ T29] audit: type=1400 audit(478.260:1300): avc: denied { sqpoll } for pid=5289 comm="syz.1.742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 478.860584][ T29] audit: type=1400 audit(478.590:1301): avc: denied { create } for pid=5292 comm="syz.1.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 478.865490][ T29] audit: type=1400 audit(478.600:1302): avc: denied { module_request } for pid=5292 comm="syz.1.743" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 479.274705][ T29] audit: type=1400 audit(479.000:1303): avc: denied { block_suspend } for pid=5292 comm="syz.1.743" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 480.280318][ T29] audit: type=1400 audit(480.010:1304): avc: denied { setcurrent } for pid=5299 comm="syz.0.745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 480.328643][ T29] audit: type=1401 audit(480.060:1305): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 480.951774][ T29] audit: type=1400 audit(480.690:1306): avc: denied { shutdown } for pid=5303 comm="syz.0.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 480.956635][ T29] audit: type=1400 audit(480.690:1307): avc: denied { getopt } for pid=5303 comm="syz.0.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 481.059999][ T29] audit: type=1326 audit(480.780:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5303 comm="syz.0.746" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 481.064190][ T29] audit: type=1326 audit(480.800:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5303 comm="syz.0.746" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 481.248518][ T5304] sctp: [Deprecated]: syz.0.746 (pid 5304) Use of struct sctp_assoc_value in delayed_ack socket option. [ 481.248518][ T5304] Use struct sctp_sack_info instead [ 482.267460][ T5306] ªªªªªª: renamed from syzkaller0 [ 483.561345][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 483.561448][ T29] audit: type=1400 audit(483.290:1369): avc: denied { create } for pid=5308 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 483.570926][ T29] audit: type=1400 audit(483.300:1370): avc: denied { ioctl } for pid=5308 comm="syz.0.748" path="socket:[9120]" dev="sockfs" ino=9120 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 484.391973][ T5319] wireguard0: entered promiscuous mode [ 484.395031][ T5319] wireguard0: entered allmulticast mode [ 485.334413][ T29] audit: type=1400 audit(485.070:1371): avc: denied { create } for pid=5318 comm="syz.0.751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 485.345721][ T29] audit: type=1326 audit(485.080:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.356692][ T29] audit: type=1326 audit(485.090:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.357546][ T29] audit: type=1326 audit(485.090:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.363260][ T29] audit: type=1326 audit(485.090:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.364151][ T29] audit: type=1326 audit(485.090:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.367489][ T29] audit: type=1326 audit(485.100:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 485.368239][ T29] audit: type=1326 audit(485.100:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5318 comm="syz.0.751" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 486.663368][ T5343] binfmt_misc: register: failed to install interpreter file ./file0 [ 486.984942][ T5345] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 486.986960][ T5345] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 487.654165][ T5355] can0: slcan on ttyS3. [ 487.805336][ T5355] can0 (unregistered): slcan off ttyS3. [ 487.808508][ T5355] Falling back ldisc for ttyS3. [ 489.912866][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 489.912997][ T29] audit: type=1400 audit(489.650:1399): avc: denied { create } for pid=5374 comm="syz.1.777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 489.920520][ T29] audit: type=1400 audit(489.650:1400): avc: denied { write } for pid=5374 comm="syz.1.777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 490.798655][ T29] audit: type=1400 audit(490.510:1401): avc: denied { create } for pid=5386 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 490.873974][ T29] audit: type=1326 audit(490.610:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.876613][ T29] audit: type=1326 audit(490.610:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.888896][ T29] audit: type=1326 audit(490.620:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.890824][ T29] audit: type=1326 audit(490.620:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.891603][ T29] audit: type=1326 audit(490.630:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.895720][ T29] audit: type=1326 audit(490.630:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 490.897965][ T29] audit: type=1326 audit(490.630:1408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5388 comm="syz.0.783" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 495.954541][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 495.954664][ T29] audit: type=1400 audit(495.690:1418): avc: denied { load_policy } for pid=5426 comm="syz.1.799" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 495.955271][ T5427] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 495.956472][ T5427] SELinux: failed to load policy [ 498.938464][ T5431] netlink: 'syz.1.801': attribute type 13 has an invalid length. [ 498.965479][ T5431] gretap0: refused to change device tx_queue_len [ 498.971112][ T5431] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 499.181533][ T29] audit: type=1400 audit(498.920:1419): avc: denied { create } for pid=5432 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 499.187171][ T29] audit: type=1400 audit(498.920:1420): avc: denied { bind } for pid=5432 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 499.193644][ T29] audit: type=1400 audit(498.930:1421): avc: denied { write } for pid=5432 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 499.976923][ T29] audit: type=1400 audit(499.710:1422): avc: denied { read } for pid=5441 comm="syz.1.806" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 499.992075][ T29] audit: type=1400 audit(499.720:1423): avc: denied { open } for pid=5441 comm="syz.1.806" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 499.997081][ T29] audit: type=1400 audit(499.730:1424): avc: denied { ioctl } for pid=5441 comm="syz.1.806" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 500.560944][ T29] audit: type=1400 audit(500.290:1425): avc: denied { module_load } for pid=5447 comm="syz.1.809" path="/sys/kernel/notes" dev="sysfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 500.565670][ T5448] Invalid ELF header magic: != ELF [ 501.605348][ T29] audit: type=1326 audit(501.340:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.606862][ T29] audit: type=1326 audit(501.340:1427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.621838][ T29] audit: type=1326 audit(501.360:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.624718][ T29] audit: type=1326 audit(501.360:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.627116][ T29] audit: type=1326 audit(501.360:1430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.631831][ T29] audit: type=1326 audit(501.370:1431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.634683][ T29] audit: type=1326 audit(501.370:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.637145][ T29] audit: type=1326 audit(501.370:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.644614][ T29] audit: type=1326 audit(501.380:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=447 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 501.647102][ T29] audit: type=1326 audit(501.380:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5458 comm="syz.1.814" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 505.747990][ T5481] batadv_slave_1: entered promiscuous mode [ 505.760637][ T5481] batadv_slave_1: left promiscuous mode [ 506.100937][ T5483] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 506.103270][ T5483] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 507.167475][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 507.167648][ T29] audit: type=1400 audit(506.900:1440): avc: denied { prog_run } for pid=5486 comm="syz.1.824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 507.871064][ T29] audit: type=1400 audit(507.600:1441): avc: denied { read } for pid=5494 comm="syz.1.826" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 507.873800][ T29] audit: type=1400 audit(507.610:1442): avc: denied { open } for pid=5494 comm="syz.1.826" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 508.755999][ T5502] netlink: 8 bytes leftover after parsing attributes in process `syz.1.829'. [ 508.756889][ T5502] netlink: 4 bytes leftover after parsing attributes in process `syz.1.829'. [ 510.517920][ T29] audit: type=1400 audit(510.250:1443): avc: denied { write } for pid=5519 comm="syz.1.837" name="tcp" dev="proc" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 510.706535][ T29] audit: type=1400 audit(510.440:1444): avc: denied { write } for pid=5521 comm="syz.1.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 510.713264][ T29] audit: type=1400 audit(510.440:1445): avc: denied { nlmsg_write } for pid=5521 comm="syz.1.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 511.787438][ T5533] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 511.791984][ T5533] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 512.028620][ T29] audit: type=1400 audit(511.760:1446): avc: denied { read } for pid=5535 comm="syz.1.844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 514.411124][ T29] audit: type=1400 audit(514.150:1447): avc: denied { create } for pid=5542 comm="syz.1.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 514.420903][ T29] audit: type=1400 audit(514.150:1448): avc: denied { setopt } for pid=5542 comm="syz.1.847" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 514.438993][ T29] audit: type=1400 audit(514.170:1449): avc: denied { getopt } for pid=5542 comm="syz.1.847" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 515.252874][ T29] audit: type=1326 audit(514.990:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.255099][ T29] audit: type=1326 audit(514.990:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.258732][ T29] audit: type=1326 audit(514.990:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.266095][ T29] audit: type=1326 audit(514.990:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.267319][ T29] audit: type=1326 audit(514.990:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.268204][ T29] audit: type=1326 audit(515.000:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 515.276199][ T29] audit: type=1326 audit(515.000:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5548 comm="syz.1.848" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 516.963951][ T5561] netlink: 16 bytes leftover after parsing attributes in process `syz.1.853'. [ 517.337499][ T5563] netlink: 116 bytes leftover after parsing attributes in process `syz.1.854'. [ 518.942206][ T5584] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 518.944381][ T5584] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 519.930083][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 519.930198][ T29] audit: type=1400 audit(519.660:1469): avc: denied { execmem } for pid=5600 comm="syz.1.870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 521.046963][ T5608] netlink: 44 bytes leftover after parsing attributes in process `syz.0.873'. [ 521.734710][ T29] audit: type=1326 audit(521.470:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 521.735820][ T29] audit: type=1326 audit(521.470:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 521.738898][ T29] audit: type=1326 audit(521.470:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=143 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 521.746424][ T29] audit: type=1326 audit(521.480:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 521.747344][ T29] audit: type=1326 audit(521.480:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5611 comm="syz.0.875" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 525.240595][ T29] audit: type=1400 audit(524.920:1475): avc: denied { execute } for pid=5623 comm="syz.0.879" name="file1" dev="tmpfs" ino=1856 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 525.241722][ T29] audit: type=1400 audit(524.920:1476): avc: denied { execute_no_trans } for pid=5623 comm="syz.0.879" path="/364/file1" dev="tmpfs" ino=1856 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 532.002224][ T5654] netlink: 24 bytes leftover after parsing attributes in process `syz.1.890'. [ 532.957387][ T29] audit: type=1326 audit(532.690:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.965872][ T29] audit: type=1326 audit(532.700:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.966997][ T29] audit: type=1326 audit(532.700:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.967911][ T29] audit: type=1326 audit(532.700:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.968961][ T29] audit: type=1326 audit(532.700:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.988614][ T29] audit: type=1326 audit(532.700:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.993459][ T29] audit: type=1326 audit(532.710:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.994465][ T29] audit: type=1326 audit(532.710:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.995441][ T29] audit: type=1326 audit(532.710:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 532.996340][ T29] audit: type=1326 audit(532.730:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5660 comm="syz.1.893" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 537.963223][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 537.963320][ T29] audit: type=1400 audit(537.700:1523): avc: denied { create } for pid=5696 comm="syz.1.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 537.967487][ T29] audit: type=1400 audit(537.700:1524): avc: denied { setopt } for pid=5696 comm="syz.1.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 537.978366][ T29] audit: type=1400 audit(537.710:1525): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 537.987071][ T29] audit: type=1400 audit(537.720:1526): avc: denied { search } for pid=3086 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 537.987982][ T29] audit: type=1400 audit(537.720:1527): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 537.988800][ T29] audit: type=1400 audit(537.720:1528): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 537.990161][ T29] audit: type=1400 audit(537.720:1529): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 538.161592][ T29] audit: type=1326 audit(537.900:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5700 comm="syz.1.907" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 538.163929][ T29] audit: type=1326 audit(537.900:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5700 comm="syz.1.907" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 538.165871][ T29] audit: type=1326 audit(537.900:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5700 comm="syz.1.907" exe="/syz-executor" sig=0 arch=c00000b7 syscall=447 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 539.868364][ T5713] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 539.874942][ T5713] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 540.642723][ T5720] netlink: 55631 bytes leftover after parsing attributes in process `syz.1.912'. [ 543.347498][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 543.347602][ T29] audit: type=1400 audit(543.080:1573): avc: denied { prog_run } for pid=5739 comm="syz.0.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 543.357082][ T29] audit: type=1400 audit(543.090:1574): avc: denied { create } for pid=5739 comm="syz.0.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 543.468252][ T29] audit: type=1400 audit(543.200:1575): avc: denied { getopt } for pid=5747 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 543.476118][ T29] audit: type=1400 audit(543.210:1576): avc: denied { setopt } for pid=5747 comm="syz.1.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 543.991123][ T29] audit: type=1400 audit(543.720:1577): avc: denied { bind } for pid=5754 comm="syz.0.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 544.002416][ T29] audit: type=1400 audit(543.730:1578): avc: denied { name_bind } for pid=5754 comm="syz.0.927" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 544.003235][ T29] audit: type=1400 audit(543.730:1579): avc: denied { node_bind } for pid=5754 comm="syz.0.927" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 544.010142][ T29] audit: type=1400 audit(543.740:1580): avc: denied { write } for pid=5754 comm="syz.0.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 544.010976][ T29] audit: type=1400 audit(543.740:1581): avc: denied { connect } for pid=5754 comm="syz.0.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 544.011636][ T29] audit: type=1400 audit(543.740:1582): avc: denied { name_connect } for pid=5754 comm="syz.0.927" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 544.788206][ T5763] netlink: 28 bytes leftover after parsing attributes in process `syz.1.930'. [ 544.788895][ T5763] netlink: 28 bytes leftover after parsing attributes in process `syz.1.930'. [ 544.871776][ T5763] gretap0: entered promiscuous mode [ 544.913081][ T5763] batadv_slave_1: entered promiscuous mode [ 548.732735][ T5785] pim6reg: entered allmulticast mode [ 548.735164][ T5785] pim6reg: left allmulticast mode [ 550.842155][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 550.842498][ T29] audit: type=1326 audit(550.580:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.845960][ T29] audit: type=1326 audit(550.580:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.853788][ T29] audit: type=1326 audit(550.590:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.858002][ T29] audit: type=1326 audit(550.590:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.863004][ T29] audit: type=1326 audit(550.600:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.868224][ T29] audit: type=1326 audit(550.600:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.878538][ T29] audit: type=1326 audit(550.610:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.886889][ T29] audit: type=1326 audit(550.610:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.893180][ T29] audit: type=1326 audit(550.610:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 550.896955][ T29] audit: type=1326 audit(550.630:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.1.944" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 551.858665][ T5803] netlink: 24 bytes leftover after parsing attributes in process `syz.1.948'. [ 556.352209][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 556.352313][ T29] audit: type=1400 audit(556.090:1669): avc: denied { mac_admin } for pid=5837 comm="syz.1.962" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 556.355690][ T5838] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 557.018655][ T29] audit: type=1400 audit(556.750:1670): avc: denied { ioctl } for pid=5843 comm="syz.1.965" path="socket:[10911]" dev="sockfs" ino=10911 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 557.347106][ T29] audit: type=1400 audit(557.080:1671): avc: denied { name_bind } for pid=5845 comm="syz.1.966" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 557.348284][ T29] audit: type=1400 audit(557.080:1672): avc: denied { node_bind } for pid=5845 comm="syz.1.966" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 558.240737][ T29] audit: type=1326 audit(557.970:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.0.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 558.241657][ T29] audit: type=1326 audit(557.970:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.0.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 558.247385][ T29] audit: type=1326 audit(557.980:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.0.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=38 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 558.248699][ T29] audit: type=1326 audit(557.980:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.0.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 558.256309][ T29] audit: type=1326 audit(557.980:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.0.969" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 558.848287][ T29] audit: type=1326 audit(558.580:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.972" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 559.349039][ T5863] binfmt_misc: register: failed to install interpreter file ./file0 [ 562.027274][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 562.027388][ T29] audit: type=1400 audit(561.760:1724): avc: denied { create } for pid=5881 comm="syz.1.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 563.048680][ T29] audit: type=1400 audit(562.780:1725): avc: denied { write } for pid=5884 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 564.818999][ T5908] netlink: 240 bytes leftover after parsing attributes in process `syz.1.993'. [ 565.171087][ T29] audit: type=1326 audit(564.900:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 565.182564][ T29] audit: type=1326 audit(564.920:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 565.190705][ T29] audit: type=1326 audit(564.920:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffbb14ba84 code=0x7ffc0000 [ 565.192080][ T29] audit: type=1400 audit(564.920:1729): avc: denied { read } for pid=5909 comm="syz.1.994" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 565.201096][ T29] audit: type=1400 audit(564.940:1730): avc: denied { open } for pid=5909 comm="syz.1.994" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 565.202946][ T29] audit: type=1326 audit(564.940:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=268 compat=0 ip=0xffffbb14f08c code=0x7ffc0000 [ 565.211626][ T29] audit: type=1326 audit(564.950:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffbb14d528 code=0x7ffc0000 [ 565.214835][ T29] audit: type=1326 audit(564.950:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5909 comm="syz.1.994" exe="/syz-executor" sig=0 arch=c00000b7 syscall=268 compat=0 ip=0xffffbb14f08c code=0x7ffc0000 [ 567.068323][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 567.068437][ T29] audit: type=1400 audit(566.800:1739): avc: denied { connect } for pid=5915 comm="syz.1.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 567.092209][ T29] audit: type=1400 audit(566.830:1740): avc: denied { write } for pid=5915 comm="syz.1.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 567.270656][ T29] audit: type=1400 audit(567.000:1741): avc: denied { create } for pid=5917 comm="syz.0.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 567.275465][ T29] audit: type=1400 audit(567.010:1742): avc: denied { setopt } for pid=5917 comm="syz.0.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 568.492919][ T29] audit: type=1400 audit(568.180:1743): avc: denied { execute } for pid=5931 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 568.494139][ T29] audit: type=1400 audit(568.200:1744): avc: denied { execute_no_trans } for pid=5931 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 569.418525][ T29] audit: type=1400 audit(569.150:1745): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 569.598222][ T87] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.018112][ T87] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.388659][ T87] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.607623][ T87] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 571.022980][ T29] audit: type=1404 audit(570.760:1746): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 571.111784][ T29] audit: type=1404 audit(570.840:1747): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 571.150988][ T29] audit: type=1400 audit(570.870:1748): avc: denied { create } for pid=5936 comm="syz.0.1004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 572.094785][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 572.094891][ T29] audit: type=1400 audit(571.830:1762): avc: denied { read } for pid=5948 comm="syz.0.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 572.098358][ T5949] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1006'. [ 572.125465][ T29] audit: type=1400 audit(571.860:1763): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 572.126818][ T29] audit: type=1400 audit(571.860:1764): avc: denied { search } for pid=3086 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 572.127648][ T29] audit: type=1400 audit(571.860:1765): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 572.128468][ T29] audit: type=1400 audit(571.860:1766): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 572.147955][ T29] audit: type=1400 audit(571.860:1767): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 572.340895][ T87] infiniband syz0: set down [ 573.341302][ T87] gretap0 (unregistering): left promiscuous mode [ 574.815662][ T27] smc: removing ib device syz0 [ 574.825488][ T87] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 574.895086][ T87] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 574.964300][ T87] bond0 (unregistering): Released all slaves [ 575.178988][ T29] audit: type=1400 audit(574.890:1768): avc: denied { search } for pid=3131 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 575.180638][ T29] audit: type=1400 audit(574.900:1769): avc: denied { read } for pid=3131 comm="dhcpcd" name="n20" dev="tmpfs" ino=2230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 575.181457][ T29] audit: type=1400 audit(574.900:1770): avc: denied { open } for pid=3131 comm="dhcpcd" path="/run/udev/data/n20" dev="tmpfs" ino=2230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 575.186343][ T29] audit: type=1400 audit(574.900:1771): avc: denied { getattr } for pid=3131 comm="dhcpcd" path="/run/udev/data/n20" dev="tmpfs" ino=2230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 577.337742][ T5964] sch_tbf: burst 0 is lower than device lo mtu (14) ! [ 577.412191][ T29] audit: type=1400 audit(577.030:1772): avc: denied { read } for pid=5965 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 577.413210][ T29] audit: type=1400 audit(577.030:1773): avc: denied { open } for pid=5965 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 577.414018][ T29] audit: type=1400 audit(577.100:1774): avc: denied { getattr } for pid=5965 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 577.790304][ T29] audit: type=1400 audit(577.520:1775): avc: denied { write } for pid=5962 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=839 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 577.818881][ T29] audit: type=1400 audit(577.550:1776): avc: denied { add_name } for pid=5962 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 577.821293][ T29] audit: type=1400 audit(577.550:1777): avc: denied { create } for pid=5962 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 577.822074][ T29] audit: type=1400 audit(577.550:1778): avc: denied { write } for pid=5962 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=2237 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 577.822870][ T29] audit: type=1400 audit(577.550:1779): avc: denied { append } for pid=5962 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=2237 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 578.879919][ T29] audit: type=1400 audit(578.580:1780): avc: denied { create } for pid=5970 comm="syz.0.1012" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 578.961409][ T29] audit: type=1400 audit(578.670:1781): avc: denied { prog_run } for pid=5970 comm="syz.0.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 580.406980][ T87] batadv_slave_1: left promiscuous mode [ 580.603058][ T87] hsr_slave_0: left promiscuous mode [ 580.653169][ T87] hsr_slave_1: left promiscuous mode [ 580.847798][ T87] veth1_macvtap: left promiscuous mode [ 580.853148][ T87] veth0_macvtap: left promiscuous mode [ 580.854361][ T87] veth1_vlan: left promiscuous mode [ 580.856123][ T87] veth0_vlan: left promiscuous mode [ 587.778462][ T5984] netlink: 'syz.0.1014': attribute type 3 has an invalid length. [ 587.788773][ T5984] netlink: 'syz.0.1014': attribute type 3 has an invalid length. [ 587.801654][ T5984] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1014'. [ 588.666516][ T5991] syz.0.1016 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 589.093431][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 589.093535][ T29] audit: type=1400 audit(588.830:1788): avc: denied { create } for pid=5993 comm="syz.0.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 589.113025][ T29] audit: type=1400 audit(588.850:1789): avc: denied { write } for pid=5993 comm="syz.0.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 590.561712][ T5933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 590.601934][ T5933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 591.178947][ T29] audit: type=1400 audit(590.910:1790): avc: denied { sys_chroot } for pid=6008 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 591.210452][ T29] audit: type=1400 audit(590.940:1791): avc: denied { setgid } for pid=6008 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 591.213270][ T29] audit: type=1400 audit(590.950:1792): avc: denied { setuid } for pid=6008 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 591.235830][ T29] audit: type=1400 audit(590.970:1793): avc: denied { setrlimit } for pid=6008 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 592.072858][ T29] audit: type=1400 audit(591.810:1794): avc: denied { create } for pid=6016 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 592.083550][ T29] audit: type=1400 audit(591.820:1795): avc: denied { getopt } for pid=6016 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 592.579013][ T29] audit: type=1400 audit(592.310:1796): avc: denied { create } for pid=6022 comm="syz.0.1020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 592.588316][ T29] audit: type=1400 audit(592.320:1797): avc: denied { connect } for pid=6022 comm="syz.0.1020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 593.727889][ T5933] hsr_slave_0: entered promiscuous mode [ 593.771814][ T5933] hsr_slave_1: entered promiscuous mode [ 593.821847][ T5933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 593.822472][ T5933] Cannot create hsr debugfs directory [ 594.894281][ T6043] vlan2: entered promiscuous mode [ 594.895805][ T6043] vlan2: entered allmulticast mode [ 594.896138][ T6043] veth1_vlan: entered allmulticast mode [ 595.117204][ T29] audit: type=1400 audit(594.850:1798): avc: denied { ioctl } for pid=6041 comm="syz.0.1025" path="socket:[12234]" dev="sockfs" ino=12234 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 595.132428][ T6043] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1025'. [ 595.537548][ T6043] hsr_slave_1 (unregistering): left promiscuous mode [ 597.281224][ T29] audit: type=1326 audit(597.010:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.301139][ T29] audit: type=1326 audit(597.030:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.303584][ T29] audit: type=1326 audit(597.040:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.312520][ T29] audit: type=1326 audit(597.050:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.326319][ T29] audit: type=1326 audit(597.060:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.327512][ T29] audit: type=1326 audit(597.060:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.353468][ T29] audit: type=1326 audit(597.090:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.358769][ T29] audit: type=1326 audit(597.090:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.370355][ T29] audit: type=1326 audit(597.090:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6057 comm="syz.0.1028" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 597.476340][ T5933] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 597.524134][ T5933] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 597.648593][ T5933] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 597.706238][ T5933] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 600.395918][ T5933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 602.741304][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 602.741507][ T29] audit: type=1326 audit(602.470:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.0.1037" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 602.744022][ T29] audit: type=1326 audit(602.470:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.0.1037" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 602.745438][ T29] audit: type=1326 audit(602.480:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.0.1037" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 602.746884][ T29] audit: type=1326 audit(602.480:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6101 comm="syz.0.1037" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 603.982706][ T6114] Invalid ELF header magic: != ELF [ 603.990268][ T29] audit: type=1400 audit(603.720:1842): avc: denied { module_load } for pid=6112 comm="syz.0.1041" path="/sys/kernel/notes" dev="sysfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 604.365316][ T29] audit: type=1400 audit(604.100:1843): avc: denied { validate_trans } for pid=6115 comm="syz.0.1042" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 604.772418][ T29] audit: type=1400 audit(604.510:1844): avc: denied { ioctl } for pid=6115 comm="syz.0.1042" path="socket:[13342]" dev="sockfs" ino=13342 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 605.907218][ T29] audit: type=1326 audit(605.640:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6127 comm="syz.0.1043" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 605.917787][ T29] audit: type=1326 audit(605.640:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6127 comm="syz.0.1043" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 605.926151][ T29] audit: type=1326 audit(605.660:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6127 comm="syz.0.1043" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 610.235729][ T5933] veth0_vlan: entered promiscuous mode [ 610.326517][ T5933] veth1_vlan: entered promiscuous mode [ 610.608552][ T5933] veth0_macvtap: entered promiscuous mode [ 610.668592][ T5933] veth1_macvtap: entered promiscuous mode [ 610.898824][ T5933] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.900763][ T5933] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.901211][ T5933] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.901708][ T5933] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 610.955483][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 610.955602][ T29] audit: type=1400 audit(610.680:1853): avc: denied { create } for pid=6154 comm="syz.0.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 610.970936][ T29] audit: type=1400 audit(610.700:1854): avc: denied { getopt } for pid=6154 comm="syz.0.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 611.301917][ T29] audit: type=1400 audit(610.980:1855): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzkaller.muSJnM/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 611.303147][ T29] audit: type=1400 audit(610.990:1856): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 611.304606][ T29] audit: type=1400 audit(610.990:1857): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzkaller.muSJnM/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 611.306418][ T29] audit: type=1400 audit(611.000:1858): avc: denied { mount } for pid=5933 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 611.308640][ T29] audit: type=1400 audit(611.010:1859): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzkaller.muSJnM/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 611.325505][ T29] audit: type=1400 audit(611.020:1860): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/syzkaller.muSJnM/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 611.327577][ T29] audit: type=1400 audit(611.040:1861): avc: denied { unmount } for pid=5933 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 611.328504][ T29] audit: type=1400 audit(611.060:1862): avc: denied { mounton } for pid=5933 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 621.010276][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 621.010410][ T29] audit: type=1400 audit(620.720:1871): avc: denied { create } for pid=6174 comm="syz.1.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 623.334363][ T29] audit: type=1400 audit(623.060:1872): avc: denied { read write } for pid=6178 comm="syz.1.1052" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 623.336263][ T29] audit: type=1400 audit(623.060:1873): avc: denied { open } for pid=6178 comm="syz.1.1052" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 626.785219][ T29] audit: type=1400 audit(626.520:1874): avc: denied { setopt } for pid=6189 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 626.788515][ T29] audit: type=1400 audit(626.520:1875): avc: denied { write } for pid=6189 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 626.803133][ T29] audit: type=1400 audit(626.540:1876): avc: denied { connect } for pid=6189 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 626.806023][ T29] audit: type=1400 audit(626.540:1877): avc: denied { name_connect } for pid=6189 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 626.854522][ T29] audit: type=1400 audit(626.590:1878): avc: denied { shutdown } for pid=6189 comm="syz.0.1056" laddr=fe80::10 lport=33795 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 634.192027][ T29] audit: type=1326 audit(633.930:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.198511][ T29] audit: type=1326 audit(633.930:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.223765][ T29] audit: type=1326 audit(633.960:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.236630][ T29] audit: type=1326 audit(633.960:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.244571][ T29] audit: type=1326 audit(633.980:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.256174][ T29] audit: type=1326 audit(633.990:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.257092][ T29] audit: type=1326 audit(633.990:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.278168][ T29] audit: type=1326 audit(633.990:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.282679][ T29] audit: type=1326 audit(634.020:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 634.287249][ T29] audit: type=1326 audit(634.020:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6195 comm="syz.1.1058" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 642.314970][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 642.315072][ T29] audit: type=1326 audit(642.050:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6287 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 642.322170][ T29] audit: type=1326 audit(642.060:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6287 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 642.334131][ T29] audit: type=1326 audit(642.060:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6287 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=3 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 642.335206][ T29] audit: type=1326 audit(642.060:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6287 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 644.061552][ T29] audit: type=1400 audit(643.800:1903): avc: denied { create } for pid=6314 comm="syz.1.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 648.223716][ T29] audit: type=1326 audit(647.960:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.226442][ T29] audit: type=1326 audit(647.960:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.231578][ T29] audit: type=1326 audit(647.960:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.248837][ T29] audit: type=1326 audit(647.980:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.254682][ T29] audit: type=1326 audit(647.990:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.256784][ T29] audit: type=1326 audit(647.990:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.270842][ T29] audit: type=1326 audit(648.000:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.271784][ T29] audit: type=1326 audit(648.000:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.275420][ T29] audit: type=1326 audit(648.010:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 648.282223][ T29] audit: type=1326 audit(648.010:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6355 comm="syz.1.1134" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 651.810144][ T1892] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 651.843710][ T1892] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 653.232097][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 653.232189][ T29] audit: type=1400 audit(652.970:1932): avc: denied { bind } for pid=6416 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 653.235815][ T29] audit: type=1400 audit(652.970:1933): avc: denied { write } for pid=6416 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 653.241404][ T6417] rdma_op 00000000442db345 conn xmit_rdma 0000000000000000 [ 654.170786][ T6426] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1167'. [ 657.135928][ T6450] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1178'. [ 657.662458][ T29] audit: type=1326 audit(657.390:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.663658][ T29] audit: type=1326 audit(657.400:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.666379][ T29] audit: type=1326 audit(657.400:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.678983][ T29] audit: type=1326 audit(657.410:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.680649][ T29] audit: type=1326 audit(657.420:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.683188][ T29] audit: type=1326 audit(657.420:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.685257][ T29] audit: type=1326 audit(657.420:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 657.687367][ T29] audit: type=1326 audit(657.420:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.564786][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 658.565304][ T29] audit: type=1326 audit(658.300:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.568420][ T29] audit: type=1326 audit(658.300:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.573093][ T29] audit: type=1326 audit(658.300:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.574692][ T29] audit: type=1326 audit(658.310:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.584537][ T29] audit: type=1326 audit(658.320:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.585470][ T29] audit: type=1326 audit(658.320:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.600494][ T29] audit: type=1326 audit(658.320:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.601437][ T29] audit: type=1326 audit(658.330:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.603658][ T29] audit: type=1326 audit(658.330:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.604505][ T29] audit: type=1326 audit(658.330:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6455 comm="syz.1.1181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 658.937207][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x1 [ 658.937936][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.952028][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.952885][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.953574][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.954175][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.954719][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.955229][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.955795][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.956311][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.957749][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.958289][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.958837][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.968789][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.970487][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.971029][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.971596][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.972117][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.972684][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.973268][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.973996][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.974699][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.975648][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.976711][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.977383][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.977972][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.978552][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.979977][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.980687][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.981172][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.981746][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 658.982289][ T5493] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 659.018155][ T5493] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 659.498921][ T6468] netlink: 452 bytes leftover after parsing attributes in process `syz.1.1184'. [ 663.987309][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 663.987428][ T29] audit: type=1400 audit(663.720:2020): avc: denied { create } for pid=6499 comm="syz.1.1199" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_nflog_socket permissive=1 [ 664.323782][ T6498] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 665.741043][ T29] audit: type=1400 audit(665.470:2021): avc: denied { create } for pid=6509 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 665.756506][ T29] audit: type=1400 audit(665.480:2022): avc: denied { create } for pid=6509 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 665.770608][ T29] audit: type=1400 audit(665.500:2023): avc: denied { write } for pid=6509 comm="syz.1.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 665.813354][ T6510] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 665.864596][ T6510] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 667.561825][ T29] audit: type=1326 audit(667.290:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 667.563045][ T29] audit: type=1326 audit(667.290:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 667.564142][ T29] audit: type=1326 audit(667.290:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 667.565329][ T29] audit: type=1326 audit(667.290:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 667.576510][ T29] audit: type=1326 audit(667.310:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 667.583000][ T29] audit: type=1326 audit(667.310:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6526 comm="syz.0.1208" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.580240][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 670.580342][ T29] audit: type=1326 audit(670.310:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.581491][ T29] audit: type=1326 audit(670.310:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=186 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.583062][ T29] audit: type=1326 audit(670.310:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.590301][ T29] audit: type=1326 audit(670.320:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=189 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.604023][ T29] audit: type=1326 audit(670.340:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.606221][ T29] audit: type=1326 audit(670.340:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.608544][ T29] audit: type=1326 audit(670.340:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=187 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.617115][ T29] audit: type=1326 audit(670.350:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6562 comm="syz.0.1225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 670.806600][ T6568] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1228'. [ 671.181376][ T29] audit: type=1400 audit(670.920:2047): avc: denied { read } for pid=6566 comm="syz.0.1228" name="vsock" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 671.187071][ T29] audit: type=1400 audit(670.920:2048): avc: denied { open } for pid=6566 comm="syz.0.1228" path="/dev/vsock" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.230369][ T6584] syz.1.1235 uses obsolete (PF_INET,SOCK_PACKET) [ 675.590511][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 675.590628][ T29] audit: type=1400 audit(675.320:2080): avc: denied { create } for pid=6595 comm="syz.0.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 675.598616][ T29] audit: type=1400 audit(675.330:2081): avc: denied { write } for pid=6595 comm="syz.0.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 675.837222][ T29] audit: type=1400 audit(675.570:2082): avc: denied { create } for pid=6598 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 675.855861][ T29] audit: type=1400 audit(675.590:2083): avc: denied { connect } for pid=6598 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 675.860479][ T29] audit: type=1400 audit(675.590:2084): avc: denied { write } for pid=6598 comm="syz.1.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 676.971429][ T29] audit: type=1326 audit(676.710:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6601 comm="syz.0.1243" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 676.974116][ T29] audit: type=1326 audit(676.710:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6601 comm="syz.0.1243" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 676.977275][ T29] audit: type=1326 audit(676.710:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6601 comm="syz.0.1243" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 676.983145][ T29] audit: type=1326 audit(676.720:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6601 comm="syz.0.1243" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 676.997340][ T29] audit: type=1326 audit(676.720:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6601 comm="syz.0.1243" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 682.750297][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 682.750423][ T29] audit: type=1400 audit(682.480:2139): avc: denied { create } for pid=6642 comm="syz.1.1260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 683.527211][ T6648] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 683.533937][ T6648] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 684.263302][ T29] audit: type=1400 audit(684.000:2140): avc: denied { read } for pid=6653 comm="syz.1.1265" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 684.264852][ T29] audit: type=1400 audit(684.000:2141): avc: denied { open } for pid=6653 comm="syz.1.1265" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 684.277670][ T29] audit: type=1400 audit(684.010:2142): avc: denied { ioctl } for pid=6653 comm="syz.1.1265" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 687.434216][ T29] audit: type=1326 audit(687.170:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.1277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 687.437404][ T29] audit: type=1326 audit(687.170:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.1277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 687.464722][ T29] audit: type=1326 audit(687.170:2145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.1277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 687.468363][ T29] audit: type=1326 audit(687.200:2146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.1277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=89 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 687.477018][ T29] audit: type=1326 audit(687.210:2147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6683 comm="syz.1.1277" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 688.237216][ T29] audit: type=1400 audit(687.970:2148): avc: denied { create } for pid=6690 comm="syz.1.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 688.657155][ T29] audit: type=1400 audit(688.390:2149): avc: denied { write } for pid=6690 comm="syz.1.1280" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 693.984319][ T6730] siw: device registration error -23 [ 695.094703][ T6736] netlink: 3 bytes leftover after parsing attributes in process `syz.0.1299'. [ 695.397947][ T6740] siw: device registration error -23 [ 696.354309][ T29] audit: type=1400 audit(696.090:2150): avc: denied { create } for pid=6750 comm="syz.1.1306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 696.374959][ T29] audit: type=1400 audit(696.110:2151): avc: denied { sys_admin } for pid=6750 comm="syz.1.1306" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 696.376441][ T29] audit: type=1400 audit(696.110:2152): avc: denied { checkpoint_restore } for pid=6750 comm="syz.1.1306" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 696.657413][ T6753] siw: device registration error -23 [ 697.291450][ T29] audit: type=1326 audit(697.020:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.292414][ T29] audit: type=1326 audit(697.030:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.303548][ T29] audit: type=1326 audit(697.030:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.310724][ T29] audit: type=1326 audit(697.040:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.311714][ T29] audit: type=1326 audit(697.040:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.316488][ T29] audit: type=1326 audit(697.050:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.317439][ T29] audit: type=1326 audit(697.050:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6762 comm="syz.0.1312" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 697.632960][ T6767] siw: device registration error -23 [ 698.833872][ T6783] siw: device registration error -23 [ 701.527563][ T6808] xt_hashlimit: max too large, truncated to 1048576 [ 702.270851][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 702.270973][ T29] audit: type=1400 audit(702.000:2262): avc: denied { write } for pid=6809 comm="syz.0.1334" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 703.012526][ T29] audit: type=1400 audit(702.750:2263): avc: denied { bind } for pid=6816 comm="syz.0.1337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 703.014719][ T29] audit: type=1400 audit(702.750:2264): avc: denied { name_bind } for pid=6816 comm="syz.0.1337" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 703.018153][ T29] audit: type=1400 audit(702.750:2265): avc: denied { node_bind } for pid=6816 comm="syz.0.1337" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 704.485797][ T29] audit: type=1326 audit(704.220:2266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 704.490149][ T29] audit: type=1326 audit(704.220:2267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 704.498380][ T29] audit: type=1326 audit(704.230:2268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 704.499834][ T29] audit: type=1326 audit(704.230:2269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 704.500906][ T29] audit: type=1326 audit(704.230:2270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 704.503443][ T29] audit: type=1326 audit(704.240:2271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6824 comm="syz.0.1340" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 706.966031][ T6843] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1348'. [ 709.151666][ T6873] siw: device registration error -23 [ 709.294276][ T6875] bond1: entered promiscuous mode [ 709.295086][ T6875] bond1: entered allmulticast mode [ 709.298882][ T6875] 8021q: adding VLAN 0 to HW filter on device bond1 [ 710.285044][ T6875] bond1 (unregistering): Released all slaves [ 711.022286][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 711.022403][ T29] audit: type=1326 audit(710.760:2283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6890 comm="syz.1.1372" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 711.023878][ T29] audit: type=1326 audit(710.760:2284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6890 comm="syz.1.1372" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 711.035527][ T29] audit: type=1326 audit(710.760:2285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6890 comm="syz.1.1372" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 722.787838][ T6924] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1384'. [ 724.436520][ T29] audit: type=1326 audit(724.170:2286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6945 comm="syz.0.1395" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 724.438419][ T29] audit: type=1326 audit(724.170:2287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6945 comm="syz.0.1395" exe="/syz-executor" sig=0 arch=c00000b7 syscall=154 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 724.455301][ T29] audit: type=1326 audit(724.170:2288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6945 comm="syz.0.1395" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa794d528 code=0x7ffc0000 [ 724.901955][ T6953] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1398'. [ 725.313956][ T6959] netlink: 'syz.1.1401': attribute type 32 has an invalid length. [ 727.911875][ T29] audit: type=1326 audit(727.650:2289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 727.915848][ T29] audit: type=1326 audit(727.650:2290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 727.916714][ T29] audit: type=1326 audit(727.650:2291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 727.919073][ T29] audit: type=1326 audit(727.650:2292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=81 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 728.035600][ T29] audit: type=1326 audit(727.760:2293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 728.057251][ T29] audit: type=1326 audit(727.790:2294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.464563][ T29] audit: type=1326 audit(729.200:2295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.472263][ T29] audit: type=1326 audit(729.200:2296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.473379][ T29] audit: type=1326 audit(729.210:2297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.474194][ T29] audit: type=1326 audit(729.210:2298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.486433][ T29] audit: type=1326 audit(729.210:2299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.487545][ T29] audit: type=1326 audit(729.220:2300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.488352][ T29] audit: type=1326 audit(729.220:2301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.502957][ T29] audit: type=1326 audit(729.220:2302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.503876][ T29] audit: type=1326 audit(729.230:2303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 729.504626][ T29] audit: type=1326 audit(729.230:2304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.1.1413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 731.302137][ T7005] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1421'. [ 735.082281][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 735.082383][ T29] audit: type=1326 audit(134218462.817:2328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.085560][ T29] audit: type=1326 audit(134218462.817:2329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.088752][ T29] audit: type=1326 audit(134218462.817:2330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.102051][ T29] audit: type=1326 audit(134218462.837:2331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.104780][ T29] audit: type=1326 audit(134218462.837:2332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=109 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.106869][ T29] audit: type=1326 audit(134218462.837:2333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.116513][ T29] audit: type=1326 audit(134218462.847:2334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.1.1437" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.852598][ T29] audit: type=1326 audit(134218463.587:2335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7056 comm="syz.1.1440" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.853673][ T29] audit: type=1326 audit(134218463.587:2336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7056 comm="syz.1.1440" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 735.872570][ T29] audit: type=1326 audit(134218463.607:2337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7056 comm="syz.1.1440" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 736.947944][ T7066] xt_CT: No such helper "snmp_trap" [ 738.205448][ T7030] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 738.225820][ T7030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 738.226908][ T7079] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1444'. [ 738.312081][ T7077] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.1444'. [ 740.231146][ T7030] hsr_slave_0: entered promiscuous mode [ 740.290872][ T7030] hsr_slave_1: entered promiscuous mode [ 740.352287][ T7030] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 740.352885][ T7030] Cannot create hsr debugfs directory [ 741.263799][ T7030] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 741.377775][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 741.377893][ T29] audit: type=1326 audit(134218469.107:2352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.400325][ T29] audit: type=1326 audit(134218469.107:2353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.401325][ T29] audit: type=1326 audit(134218469.127:2354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.407583][ T29] audit: type=1326 audit(134218469.137:2355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.408662][ T29] audit: type=1326 audit(134218469.137:2356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.411272][ T29] audit: type=1326 audit(134218469.137:2357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.412644][ T29] audit: type=1326 audit(134218469.137:2358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=7 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.413647][ T29] audit: type=1326 audit(134218469.137:2359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.417440][ T29] audit: type=1326 audit(134218469.137:2360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=150 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.423740][ T29] audit: type=1326 audit(134218469.157:2361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7114 comm="syz.1.1457" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 741.527801][ T7030] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 741.762381][ T7030] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 742.640578][ T7030] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 742.678430][ T7030] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 742.723096][ T7030] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 742.755769][ T7030] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 743.074315][ T7129] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 744.628955][ T7030] 8021q: adding VLAN 0 to HW filter on device bond0 [ 745.280343][ T7149] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1467'. [ 746.675307][ T7163] netlink: 100 bytes leftover after parsing attributes in process `syz.1.1472'. [ 747.328547][ T7170] x_tables: ip6_tables: SNPT target: used from hooks FORWARD, but only usable from INPUT/POSTROUTING [ 748.436313][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 748.436418][ T29] audit: type=1400 audit(134218476.167:2377): avc: denied { map } for pid=7182 comm="syz.1.1478" path="socket:[16103]" dev="sockfs" ino=16103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 748.437594][ T29] audit: type=1400 audit(134218476.167:2378): avc: denied { read } for pid=7182 comm="syz.1.1478" path="socket:[16103]" dev="sockfs" ino=16103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 749.185286][ T29] audit: type=1326 audit(134218476.917:2379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.190092][ T29] audit: type=1326 audit(134218476.917:2380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.204240][ T29] audit: type=1326 audit(134218476.937:2381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.210051][ T29] audit: type=1326 audit(134218476.937:2382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.215822][ T29] audit: type=1326 audit(134218476.947:2383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.220913][ T29] audit: type=1326 audit(134218476.947:2384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.222138][ T29] audit: type=1326 audit(134218476.947:2385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 749.227667][ T29] audit: type=1326 audit(134218476.947:2386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7189 comm="syz.1.1479" exe="/syz-executor" sig=0 arch=c00000b7 syscall=138 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 751.120533][ T7030] veth0_vlan: entered promiscuous mode [ 751.236369][ T7030] veth1_vlan: entered promiscuous mode [ 751.433548][ T7030] veth0_macvtap: entered promiscuous mode [ 751.456838][ T7030] veth1_macvtap: entered promiscuous mode [ 751.668146][ T7030] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.668710][ T7030] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.675835][ T7030] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 751.676359][ T7030] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 754.190589][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 754.190700][ T29] audit: type=1400 audit(134218481.837:2388): avc: denied { block_suspend } for pid=7230 comm="syz.0.1495" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 755.631047][ T7251] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1502'. [ 756.402022][ T29] audit: type=1400 audit(134218484.127:2389): avc: denied { mount } for pid=7260 comm="syz.0.1507" name="/" dev="ramfs" ino=16300 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 757.051707][ T29] audit: type=1400 audit(134218484.717:2390): avc: denied { setopt } for pid=7271 comm="syz.0.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 757.401567][ T29] audit: type=1400 audit(134218485.127:2391): avc: denied { load_policy } for pid=7274 comm="syz.0.1513" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 757.403808][ T7275] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 757.404771][ T7275] SELinux: failed to load policy [ 758.802372][ T7284] x_tables: ip6_tables: socket match: used from hooks OUTPUT, but only valid from PREROUTING/INPUT [ 758.830430][ T7285] netlink: 76 bytes leftover after parsing attributes in process `syz.1.1518'. [ 759.203852][ T7289] siw: device registration error -23 [ 759.618394][ T7291] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1521'. [ 761.292391][ T7310] vlan2: entered promiscuous mode [ 761.294827][ T7310] vlan2: entered allmulticast mode [ 761.295165][ T7310] veth1_vlan: entered allmulticast mode [ 761.471337][ T7310] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1530'. [ 762.075544][ T7310] hsr_slave_1 (unregistering): left promiscuous mode [ 763.898160][ T7331] siw: device registration error -23 [ 765.358855][ T7345] siw: device registration error -23 [ 766.044916][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x1 [ 766.045561][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.046046][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.046511][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.046936][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.047440][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.047974][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.048395][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.048879][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.060483][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.061232][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.061681][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.062097][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.062500][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.062950][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.065431][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.066014][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.066427][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.066851][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.067255][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.067692][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.068108][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.068525][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.068955][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.080797][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.081401][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.081832][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.082244][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.082671][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.083098][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.083596][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.084022][ T1892] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 766.126589][ T1892] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 767.375024][ T7357] siw: device registration error -23 [ 777.258293][ T29] audit: type=1400 audit(134218504.977:2392): avc: denied { mount } for pid=7403 comm="syz.0.1569" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 782.824852][ T29] audit: type=1326 audit(134218510.557:2393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.0.1580" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 782.828793][ T29] audit: type=1326 audit(134218510.557:2394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.0.1580" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 782.840091][ T29] audit: type=1326 audit(134218510.567:2395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.0.1580" exe="/syz-executor" sig=0 arch=c00000b7 syscall=180 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 782.842423][ T29] audit: type=1326 audit(134218510.577:2396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.0.1580" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 782.844633][ T29] audit: type=1326 audit(134218510.577:2397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.0.1580" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 783.080167][ T29] audit: type=1400 audit(134218510.807:2398): avc: denied { watch watch_reads } for pid=7434 comm="syz.1.1583" path="/325/file0" dev="tmpfs" ino=1658 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 783.563129][ T29] audit: type=1400 audit(134218511.297:2399): avc: denied { write } for pid=7443 comm="syz.1.1587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 783.565401][ T29] audit: type=1400 audit(134218511.297:2400): avc: denied { nlmsg_read } for pid=7443 comm="syz.1.1587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 784.337749][ T7457] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1593'. [ 784.581660][ T29] audit: type=1326 audit(134218512.307:2401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.1.1594" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 784.583819][ T29] audit: type=1326 audit(134218512.317:2402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7458 comm="syz.1.1594" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 785.352077][ T7470] netlink: 'syz.0.1599': attribute type 4 has an invalid length. [ 785.620917][ T7474] netlink: 332 bytes leftover after parsing attributes in process `syz.0.1601'. [ 795.828642][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 795.828848][ T29] audit: type=1326 audit(134218523.557:2449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7537 comm="syz.1.1630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 795.837706][ T29] audit: type=1326 audit(134218523.557:2450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7537 comm="syz.1.1630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 795.838891][ T29] audit: type=1326 audit(134218523.567:2451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7537 comm="syz.1.1630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=9 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 795.841252][ T29] audit: type=1326 audit(134218523.567:2452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7537 comm="syz.1.1630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 795.842105][ T29] audit: type=1326 audit(134218523.567:2453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7537 comm="syz.1.1630" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 797.315018][ T29] audit: type=1400 audit(134218525.047:2454): avc: denied { execute } for pid=7547 comm="syz.0.1635" path=2F6D656D66643A01FDAE2E2BA68CB63F32193994532C7C783F55655BBDE1210333BC2723FF179B25F35B642006202864656C6574656429 dev="hugetlbfs" ino=17245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 797.546736][ T7546] netlink: 3 bytes leftover after parsing attributes in process `syz.1.1634'. [ 798.177206][ T7555] siw: device registration error -23 [ 805.742807][ T29] audit: type=1400 audit(134218533.477:2455): avc: denied { write } for pid=7621 comm="syz.1.1668" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 805.743098][ T7623] random: crng reseeded on system resumption [ 805.743854][ T29] audit: type=1400 audit(134218533.477:2456): avc: denied { open } for pid=7621 comm="syz.1.1668" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 805.810262][ T29] audit: type=1326 audit(134218533.537:2457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7621 comm="syz.1.1668" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x0 [ 807.468620][ T29] audit: type=1400 audit(134218535.197:2458): avc: denied { setattr } for pid=7640 comm="syz.0.1676" name="CAN_RAW" dev="sockfs" ino=17385 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 807.865422][ T29] audit: type=1400 audit(134218535.597:2459): avc: denied { setopt } for pid=7644 comm="syz.0.1678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 809.359008][ T29] audit: type=1326 audit(134218537.087:2460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7659 comm="syz.0.1685" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 809.372826][ T29] audit: type=1326 audit(134218537.107:2461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7659 comm="syz.0.1685" exe="/syz-executor" sig=0 arch=c00000b7 syscall=174 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 809.378444][ T29] audit: type=1326 audit(134218537.107:2462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7659 comm="syz.0.1685" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 810.275846][ T7670] siw: device registration error -23 [ 811.832503][ T7685] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1697'. [ 812.181340][ T29] audit: type=1326 audit(134218539.907:2463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.187809][ T29] audit: type=1326 audit(134218539.917:2464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.191615][ T29] audit: type=1326 audit(134218539.917:2465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.210154][ T29] audit: type=1326 audit(134218539.937:2466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.211575][ T29] audit: type=1326 audit(134218539.937:2467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.212413][ T29] audit: type=1326 audit(134218539.937:2468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.213641][ T29] audit: type=1326 audit(134218539.937:2469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.214738][ T29] audit: type=1326 audit(134218539.947:2470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.215770][ T29] audit: type=1326 audit(134218539.947:2471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 812.216761][ T29] audit: type=1326 audit(134218539.947:2472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7688 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa894d528 code=0x7ffc0000 [ 819.573808][ T7770] netlink: 108 bytes leftover after parsing attributes in process `syz.1.1738'. [ 819.624430][ T7770] netlink: 108 bytes leftover after parsing attributes in process `syz.1.1738'. [ 819.625054][ T7770] netlink: 84 bytes leftover after parsing attributes in process `syz.1.1738'. [ 819.643495][ T7770] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 819.710023][ T7770] netlink: 'syz.1.1738': attribute type 29 has an invalid length. [ 824.477585][ T7799] IPv6: NLM_F_CREATE should be specified when creating new route [ 824.871280][ T7801] netlink: 116 bytes leftover after parsing attributes in process `syz.0.1752'. [ 825.136666][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 825.136773][ T29] audit: type=1326 audit(134218552.867:2491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.140642][ T29] audit: type=1326 audit(134218552.877:2492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.145662][ T29] audit: type=1326 audit(134218552.877:2493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.147767][ T29] audit: type=1326 audit(134218552.877:2494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.154510][ T29] audit: type=1326 audit(134218552.887:2495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.155517][ T29] audit: type=1326 audit(134218552.887:2496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.163185][ T29] audit: type=1326 audit(134218552.887:2497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.164220][ T29] audit: type=1326 audit(134218552.887:2498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.184316][ T29] audit: type=1326 audit(134218552.897:2499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 825.185314][ T29] audit: type=1326 audit(134218552.897:2500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7804 comm="syz.0.1754" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9df4d528 code=0x7ffc0000 [ 826.753083][ C0] vxcan1: j1939_tp_rxtimer: 0x0000000057af6fe3: rx timeout, send abort [ 826.761435][ C0] vxcan1: j1939_xtp_rx_abort_one: 0x0000000057af6fe3: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 826.763876][ C0] ------------[ cut here ]------------ [ 826.764229][ C0] refcount_t: underflow; use-after-free. [ 826.765568][ C0] WARNING: CPU: 0 PID: 15 at lib/refcount.c:28 refcount_warn_saturate+0x138/0x19c [ 826.766045][ C0] Modules linked in: [ 826.766957][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller-12128-gf788b5ef1ca9 #0 [ 826.767473][ C0] Hardware name: linux,dummy-virt (DT) [ 826.768031][ C0] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 826.768441][ C0] pc : refcount_warn_saturate+0x138/0x19c [ 826.769237][ C0] lr : refcount_warn_saturate+0x138/0x19c [ 826.770532][ C0] sp : ffff80008d0874e0 [ 826.770907][ C0] x29: ffff80008d0874e0 x28: ffff000019d4bc1c x27: 0000000000000002 [ 826.771670][ C0] x26: 1fffe00003da9c00 x25: 1fffe00003da9c18 x24: ffff00001ed4e0c2 [ 826.772173][ C0] x23: ffff000019d4bc1c x22: 0000000000000000 x21: ffff800084ea451c [ 826.772731][ C0] x20: ffff000019d4bc1c x19: 0000000000000003 x18: 000000009be2c94c [ 826.773221][ C0] x17: 0000000000000000 x16: 0000000000000000 x15: 1fffe00001b508dc [ 826.773686][ C0] x14: 1ffff000110e62fd x13: ffff00000da84700 x12: ffff700010dc5a99 [ 826.774148][ C0] x11: 1ffff00010dc5a98 x10: ffff700010dc5a98 x9 : dfff800000000000 [ 826.774690][ C0] x8 : 0000000000000003 x7 : 0000000000000001 x6 : ffff700010dc5a98 [ 826.775141][ C0] x5 : ffff800086e2d4c0 x4 : 1fffe00001b50791 x3 : dfff800000000000 [ 826.775676][ C0] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000da83c80 [ 826.776284][ C0] Call trace: [ 826.776714][ C0] refcount_warn_saturate+0x138/0x19c (P) [ 826.777152][ C0] refcount_warn_saturate+0x138/0x19c (L) [ 826.777524][ C0] sk_skb_reason_drop+0x154/0x174 [ 826.777908][ C0] j1939_session_destroy+0x104/0x36c [ 826.778204][ C0] j1939_xtp_rx_abort_one+0x140/0x4e0 [ 826.778488][ C0] j1939_tp_recv+0x680/0xb90 [ 826.778768][ C0] j1939_can_recv+0x5b4/0x834 [ 826.779045][ C0] can_rcv_filter+0x1ec/0x6b8 [ 826.779615][ C0] can_receive+0x244/0x440 [ 826.779932][ C0] can_rcv+0x14c/0x22c [ 826.780276][ C0] __netif_receive_skb_one_core+0xf4/0x168 [ 826.780834][ C0] __netif_receive_skb+0x24/0x14c [ 826.781126][ C0] process_backlog+0x384/0x1588 [ 826.781632][ C0] __napi_poll.constprop.0+0x94/0x3b8 [ 826.781926][ C0] net_rx_action+0x808/0xb84 [ 826.782266][ C0] handle_softirqs+0x2d8/0xdb4 [ 826.782559][ C0] run_ksoftirqd+0x90/0xcc [ 826.782829][ C0] smpboot_thread_fn+0x4f8/0x8e4 [ 826.783094][ C0] kthread+0x27c/0x300 [ 826.783342][ C0] ret_from_fork+0x10/0x20 [ 826.784011][ C0] irq event stamp: 856939 [ 826.784414][ C0] hardirqs last enabled at (856938): [] __up_console_sem+0x74/0x94 [ 826.784929][ C0] hardirqs last disabled at (856939): [] el1_dbg+0x24/0x9c [ 826.785334][ C0] softirqs last enabled at (856878): [] handle_softirqs+0x88c/0xdb4 [ 826.785755][ C0] softirqs last disabled at (856883): [] run_ksoftirqd+0x90/0xcc [ 826.786248][ C0] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) VM DIAGNOSIS: 08:22:59 Registers: info registers vcpu 0 CPU#0 PC=ffff80008033bc44 X00=00000000000003c0 X01=00000000ffffe7e2 X02=0000000000000000 X03=ffff80008033bbec X04=ffff700011a10d81 X05=ffff80008d086c00 X06=ffff700011a10d80 X07=0000000000000001 X08=ffff80008d086c07 X09=dfff800000000000 X10=ffff700011a10d80 X11=1ffff00011a10d80 X12=ffff700011a10d81 X13=0000000000000004 X14=0000000000000000 X15=0000000000000002 X16=0000000000000000 X17=0000000000000000 X18=000000009be2c94c X19=1ffff00011a10db3 X20=ffff80008d086d90 X21=ffff80008d086d98 X22=ffff800086e9a400 X23=1ffff00011a10d7c X24=ffff80008d086c00 X25=00000000ffffe7e2 X26=000000000000000d X27=00000000ffffe7e2 X28=0000000000000080 X29=ffff80008d086b80 X30=ffff80008033bbec SP=ffff80008d086b80 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=000000524f525245:0000000000000000 Q05=000000524f525245:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc1d29090:0000ffffc1d29090 Q17=ffffff80ffffffd0:0000ffffc1d29060 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000852f8e84 X00=ffff8000852f8e80 X01=ffff800083c71250 X02=0000000000000000 X03=ffff8000803fc03c X04=ffff700011988c21 X05=ffff80008cc46100 X06=ffff700011988c20 X07=0000000000000001 X08=ffff80008cc46103 X09=dfff800000000000 X10=ffff700011988c20 X11=1ffff00011988c20 X12=ffff700011988c21 X13=ffff00000f674700 X14=1ffff000110e62fc X15=1fffe00001ece8dc X16=0000000000000000 X17=0000000000000000 X18=00000000b75c753d X19=ffff80008cc46100 X20=00000000000281d4 X21=000000c0516fc400 X22=ffff8000803f478c X23=dfff800000000000 X24=ffff80008cc46108 X25=000000000000c350 X26=ffff000069f822c0 X27=0000000000989680 X28=0000000000000000 X29=ffff80008dcd79a0 X30=ffff800083c71268 SP=ffff80008dcd79a0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0200000000000000:0200000000000000 Q01=0000000200000000:0000000000000000 Q02=0000000000000002:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000002:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff7b20ff0:0000fffff7b20ff0 Q17=ffffff80ffffffd0:0000fffff7b20fc0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000