last executing test programs: 5.722683832s ago: executing program 0 (id=508): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000001c00)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000180)=0xb27, 0x4) connect$inet(r0, &(0x7f0000001bc0)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x34, 0x9, 0xa, 0x201, 0x0, 0x0, {0x0, 0x0, 0x9}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xc}, @NFTA_SET_GC_INTERVAL={0x8}, @NFTA_SET_DATA_TYPE={0x8, 0x6, 0x1, 0x0, 0xffffff00}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWFLOWTABLE={0x14, 0x16, 0xa, 0x700, 0x0, 0x0, {0x2, 0x0, 0x5}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}, 0x1, 0x0, 0x0, 0x48000}, 0x4008000) 5.362437782s ago: executing program 0 (id=509): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000006440), r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000006480)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r1, &(0x7f0000006540)={0x0, 0x0, &(0x7f0000006500)={&(0x7f00000064c0)={0x2c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x4}, @NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000080}, 0x24000000) 4.180909673s ago: executing program 1 (id=510): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000380)={{0xff, 0x6, 0x4b, 0x8009}, 'syz1\x00', 0x3b}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0xfffffffffffffffe, 0x2) dup3(r0, r1, 0x0) 3.823054434s ago: executing program 1 (id=511): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000002c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_FLAGS(r0, 0x3ba0, &(0x7f0000000300)={0x48, 0x2, r1, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$IOMMU_GET_HW_INFO(r0, 0x3b8a, &(0x7f0000000400)={0x28, 0x0, r2, 0x57, &(0x7f0000000380)=""/87}) 3.634219965s ago: executing program 0 (id=512): r0 = socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0xc402, 0x80) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000003bc0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) write$P9_RVERSION(r2, &(0x7f0000000580)=ANY=[], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], &(0x7f0000000180)=[0x2], 0x0, 0x1, 0x1}}, 0x40) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000006, 0x12, r1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 3.488099161s ago: executing program 1 (id=513): r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x28}, 0x3ff}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 3.393561612s ago: executing program 0 (id=514): syslog(0x2, &(0x7f0000000040)=""/5, 0x5) 3.05223792s ago: executing program 1 (id=515): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0xfffffffffffffff5, r1, {0x7, 0x1f, 0xfffffffe, 0xfe05a, 0x5000, 0x0, 0x0, 0xc}}, 0x50) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) 2.476206004s ago: executing program 1 (id=516): r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000002c0)={0x1, 0x6}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f00000000c0), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000100)={0x2, 0x1}, 0x2) 492.631686ms ago: executing program 0 (id=517): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0xc000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)={0x40, 0x43, 0x107, 0xfffffffe, 0x25dfdbfc, {0x2, 0x7c}, [@nested={0x4, 0x145}, @nested={0x28, 0x1, 0x0, 0x1, [@nested={0x8, 0x1c, 0x0, 0x1, [@nested={0x4, 0x109}]}, @typed={0x8, 0x26, 0x0, 0x0, @uid}, @typed={0x14, 0x9c, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}, 0x40}}, 0x2004c000) 182.39298ms ago: executing program 1 (id=518): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x8001, 0x6, 0x1, 0x0, 0x0, 0xcc7, 0x8, 0x7, 0xa, 0x100, 0x7, 0x0, 0x7, 0x40, 0x6, 0xffffffff, 0x1, 0x1a449, 0x7, 0x40000003, 0x4089, 0x9, 0xf27, 0xffff, 0x7, 0x8, 0x5, 0x8, 0xc, 0x10000, 0xfffffff8]}) ioctl$COMEDI_BUFINFO(r0, 0xc02c640e, &(0x7f0000000000)={0x1, 0x5, 0x7, 0x9, 0x7f, 0x2}) 0s ago: executing program 0 (id=519): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) write$uinput_user_dev(r0, &(0x7f0000000ec0)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d52c0], [0x0, 0x0, 0x2, 0xb16, 0x0, 0xffffffcb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xf, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfefffffd, 0x0, 0x8], [0x88000001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4], [0x0, 0x0, 0xfffffffc, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x3, 0x2, 0x0, 0xe, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) kernel console output (not intermixed with test programs): [ 48.082892][ T29] audit: type=1400 audit(48.010:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.084647][ T29] audit: type=1400 audit(48.010:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:62355' (ED25519) to the list of known hosts. [ 63.296091][ T29] audit: type=1400 audit(63.220:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.635816][ T29] audit: type=1400 audit(65.550:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.675860][ T29] audit: type=1400 audit(65.590:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.343703][ T29] audit: type=1400 audit(68.270:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.351167][ T29] audit: type=1400 audit(68.280:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.367612][ T3095] cgroup: Unknown subsys name 'net' [ 68.376389][ T29] audit: type=1400 audit(68.300:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.511243][ T3095] cgroup: Unknown subsys name 'cpuset' [ 68.518603][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 68.519433][ T3095] cgroup: Unknown subsys name 'rlimit' [ 68.779186][ T29] audit: type=1400 audit(68.710:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.781109][ T29] audit: type=1400 audit(68.710:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.784465][ T29] audit: type=1400 audit(68.710:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.983509][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.987035][ T29] audit: type=1400 audit(68.920:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.991784][ T29] audit: type=1400 audit(68.920:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.034151][ T29] audit: type=1400 audit(68.960:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.037157][ T29] audit: type=1400 audit(68.960:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.871327][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.808723][ T29] audit: type=1400 audit(77.740:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 77.876212][ T29] audit: type=1400 audit(77.800:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.877201][ T29] audit: type=1400 audit(77.810:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 77.883307][ T29] audit: type=1400 audit(77.810:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 77.912209][ T29] audit: type=1400 audit(77.840:75): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.914456][ T29] audit: type=1400 audit(77.840:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 77.995737][ T29] audit: type=1400 audit(77.920:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.506696][ T29] audit: type=1400 audit(78.430:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.530557][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.540657][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.788181][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.793903][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.492829][ T3100] hsr_slave_0: entered promiscuous mode [ 80.502670][ T3100] hsr_slave_1: entered promiscuous mode [ 80.694251][ T3101] hsr_slave_0: entered promiscuous mode [ 80.697943][ T3101] hsr_slave_1: entered promiscuous mode [ 80.699761][ T3101] debugfs: 'hsr0' already exists in 'hsr' [ 80.700492][ T3101] Cannot create hsr debugfs directory [ 81.077644][ T29] audit: type=1400 audit(81.010:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.080889][ T29] audit: type=1400 audit(81.010:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.098041][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.122612][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.142036][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.158247][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 81.204177][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.219554][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.232442][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.241505][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.927718][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.938018][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.606244][ T3100] veth0_vlan: entered promiscuous mode [ 84.628944][ T3100] veth1_vlan: entered promiscuous mode [ 84.650863][ T3101] veth0_vlan: entered promiscuous mode [ 84.669078][ T3101] veth1_vlan: entered promiscuous mode [ 84.693994][ T3100] veth0_macvtap: entered promiscuous mode [ 84.711016][ T3100] veth1_macvtap: entered promiscuous mode [ 84.743347][ T3101] veth0_macvtap: entered promiscuous mode [ 84.761952][ T3101] veth1_macvtap: entered promiscuous mode [ 84.783610][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.786993][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.799301][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.801807][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.851490][ T32] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.857562][ T32] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.857989][ T32] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.858246][ T32] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.929390][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 84.929795][ T29] audit: type=1400 audit(84.860:82): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 84.952151][ T29] audit: type=1400 audit(84.860:83): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.27DxjR/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 84.953265][ T29] audit: type=1400 audit(84.870:84): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.960277][ T29] audit: type=1400 audit(84.870:85): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.27DxjR/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.960571][ T29] audit: type=1400 audit(84.870:86): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.27DxjR/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3079 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.960754][ T29] audit: type=1400 audit(84.880:87): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.976206][ T29] audit: type=1400 audit(84.900:88): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.981470][ T29] audit: type=1400 audit(84.910:89): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="gadgetfs" ino=3080 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.993556][ T29] audit: type=1400 audit(84.920:90): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.998919][ T29] audit: type=1400 audit(84.930:91): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.067863][ T3101] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.596812][ T3801] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 88.229428][ T3833] netlink: 'syz.0.12': attribute type 3 has an invalid length. [ 88.233571][ T3833] netlink: 'syz.0.12': attribute type 3 has an invalid length. [ 89.307025][ T3864] netlink: 20 bytes leftover after parsing attributes in process `syz.1.22'. [ 90.381883][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 90.383059][ T29] audit: type=1326 audit(90.310:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.0.29" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 90.387387][ T29] audit: type=1326 audit(90.320:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.0.29" exe="/syz-executor" sig=0 arch=40000028 syscall=165 compat=0 ip=0x132970 code=0x7ffc0000 [ 90.399126][ T29] audit: type=1326 audit(90.330:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.0.29" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 90.402698][ T29] audit: type=1326 audit(90.330:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3880 comm="syz.0.29" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 91.981124][ T29] audit: type=1326 audit(91.910:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 91.988520][ T29] audit: type=1326 audit(91.920:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x132970 code=0x7ffc0000 [ 91.991601][ T29] audit: type=1326 audit(91.920:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3902 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 92.304216][ T29] audit: type=1400 audit(92.230:138): avc: denied { mount } for pid=3905 comm="syz.0.36" name="/" dev="ramfs" ino=3219 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 92.833637][ T29] audit: type=1400 audit(92.760:139): avc: denied { override_creds } for pid=3911 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 93.980132][ T29] audit: type=1400 audit(93.910:140): avc: denied { create } for pid=3937 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.522402][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 97.523043][ T29] audit: type=1326 audit(97.450:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.538365][ T29] audit: type=1326 audit(97.470:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.540427][ T29] audit: type=1326 audit(97.470:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.542013][ T29] audit: type=1326 audit(97.470:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.543716][ T29] audit: type=1326 audit(97.470:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.551582][ T29] audit: type=1326 audit(97.480:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=438 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.553581][ T29] audit: type=1326 audit(97.480:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.559285][ T29] audit: type=1326 audit(97.490:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3988 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.681071][ T29] audit: type=1326 audit(97.610:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3990 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.690623][ T29] audit: type=1326 audit(97.620:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3990 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 97.799812][ T3993] netlink: 268 bytes leftover after parsing attributes in process `syz.1.60'. [ 102.600549][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 102.600987][ T29] audit: type=1400 audit(102.530:252): avc: denied { name_bind } for pid=4034 comm="syz.0.70" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 103.519793][ T4050] netlink: 8 bytes leftover after parsing attributes in process `syz.1.76'. [ 104.062318][ T29] audit: type=1400 audit(103.990:253): avc: denied { create } for pid=4047 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 104.607551][ T29] audit: type=1326 audit(104.540:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.608141][ T29] audit: type=1326 audit(104.540:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.611763][ T29] audit: type=1326 audit(104.540:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.656404][ T29] audit: type=1326 audit(104.540:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.656895][ T29] audit: type=1326 audit(104.540:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.660057][ T29] audit: type=1326 audit(104.590:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.697880][ T29] audit: type=1326 audit(104.620:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 104.730106][ T29] audit: type=1326 audit(104.660:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4047 comm="syz.1.76" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132970 code=0x7ffc0000 [ 106.057449][ T4049] usb 2-1: new low-speed USB device number 2 using dummy_hcd [ 106.288698][ T4049] usb 2-1: device descriptor read/64, error -71 [ 106.546568][ T4049] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 106.698972][ T4049] usb 2-1: device descriptor read/64, error -71 [ 106.856677][ T4049] usb usb2-port1: attempt power cycle [ 107.289910][ T4049] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 107.337690][ T4049] usb 2-1: device descriptor read/8, error -71 [ 107.600634][ T4049] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 107.642863][ T4049] usb 2-1: device descriptor read/8, error -71 [ 107.770682][ T4049] usb usb2-port1: unable to enumerate USB device [ 117.276945][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 117.277327][ T29] audit: type=1400 audit(117.210:271): avc: denied { write } for pid=4084 comm="syz.1.84" name="ip6_flowlabel" dev="proc" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 117.387235][ T29] audit: type=1400 audit(117.310:272): avc: denied { connect } for pid=4086 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.849817][ T4092] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.948414][ T4092] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.022684][ T4092] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.179805][ T4092] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.308382][ T109] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.309524][ T109] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.356043][ T1392] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.358156][ T1392] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.109968][ T29] audit: type=1400 audit(119.040:273): avc: denied { setopt } for pid=4116 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 120.182674][ T4127] netlink: 20 bytes leftover after parsing attributes in process `syz.1.93'. [ 123.500326][ T4135] mmap: syz.1.95 (4135) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 126.067608][ T4141] binfmt_misc: register: failed to install interpreter file ./file2 [ 127.850195][ T4152] netlink: 108 bytes leftover after parsing attributes in process `syz.1.102'. [ 130.768201][ T29] audit: type=1326 audit(130.700:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.770979][ T29] audit: type=1326 audit(130.700:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.774573][ T29] audit: type=1326 audit(130.700:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.781502][ T29] audit: type=1326 audit(130.710:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.784168][ T29] audit: type=1326 audit(130.710:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.793203][ T29] audit: type=1326 audit(130.720:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.803909][ T29] audit: type=1326 audit(130.730:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.808936][ T29] audit: type=1326 audit(130.740:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x132970 code=0x7ffc0000 [ 130.811729][ T29] audit: type=1326 audit(130.740:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.104" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 131.321430][ T29] audit: type=1400 audit(131.250:283): avc: denied { write } for pid=4158 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 131.590627][ T4165] netlink: 'syz.1.106': attribute type 1 has an invalid length. [ 131.624170][ T4165] 8021q: adding VLAN 0 to HW filter on device bond1 [ 131.701458][ T4165] vlan2: entered promiscuous mode [ 131.702109][ T4165] bond1: entered promiscuous mode [ 131.717279][ T4165] vlan2: entered allmulticast mode [ 131.717783][ T4165] bond1: entered allmulticast mode [ 131.782740][ T4165] bond1: (slave gretap1): making interface the new active one [ 131.783226][ T4165] gretap1: entered promiscuous mode [ 131.798272][ T4165] gretap1: entered allmulticast mode [ 131.811224][ T4165] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 136.369034][ T4242] netlink: 32 bytes leftover after parsing attributes in process `syz.1.119'. [ 136.371724][ T4242] netem: unknown loss type 13 [ 136.372865][ T4242] netem: change failed [ 137.497401][ T4251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4251 comm=syz.0.111 [ 137.497849][ T4251] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4251 comm=syz.0.111 [ 138.316861][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 138.317207][ T29] audit: type=1326 audit(138.110:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.317459][ T29] audit: type=1326 audit(138.120:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.317667][ T29] audit: type=1326 audit(138.120:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.317876][ T29] audit: type=1326 audit(138.120:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=263 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.318077][ T29] audit: type=1326 audit(138.130:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.318274][ T29] audit: type=1326 audit(138.130:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.318508][ T29] audit: type=1326 audit(138.130:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132970 code=0x7ffc0000 [ 138.318712][ T29] audit: type=1326 audit(138.120:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4255 comm="syz.1.124" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 146.571871][ T29] audit: type=1400 audit(146.480:304): avc: denied { create } for pid=4277 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 146.605779][ T29] audit: type=1400 audit(146.510:305): avc: denied { read } for pid=4277 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 149.654813][ T29] audit: type=1400 audit(149.580:306): avc: denied { bind } for pid=4284 comm="syz.1.134" laddr=::1 lport=2 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 149.671062][ T29] audit: type=1400 audit(149.600:307): avc: denied { name_bind } for pid=4284 comm="syz.1.134" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 149.673500][ T29] audit: type=1400 audit(149.600:308): avc: denied { node_bind } for pid=4284 comm="syz.1.134" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 150.492554][ T29] audit: type=1400 audit(150.410:309): avc: denied { read } for pid=4289 comm="syz.1.136" path="socket:[3030]" dev="sockfs" ino=3030 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 153.096671][ T29] audit: type=1326 audit(153.010:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.098926][ T29] audit: type=1326 audit(153.030:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.102336][ T29] audit: type=1326 audit(153.030:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.108472][ T29] audit: type=1326 audit(153.030:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.125877][ T29] audit: type=1326 audit(153.030:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.129722][ T29] audit: type=1326 audit(153.040:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.136772][ T29] audit: type=1326 audit(153.040:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.151939][ T29] audit: type=1326 audit(153.060:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.157717][ T29] audit: type=1326 audit(153.060:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 153.160130][ T29] audit: type=1326 audit(153.060:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4305 comm="syz.1.142" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=0 ip=0x132970 code=0x7ffc0000 [ 157.379697][ T4332] netlink: 24 bytes leftover after parsing attributes in process `syz.1.148'. [ 157.568893][ T4334] netlink: 224 bytes leftover after parsing attributes in process `syz.1.149'. [ 162.185606][ C0] hrtimer: interrupt took 9218352 ns [ 162.866718][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 162.866994][ T29] audit: type=1400 audit(162.800:339): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 163.265182][ T4370] Zero length message leads to an empty skb [ 163.926161][ T29] audit: type=1326 audit(163.850:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 163.937843][ T29] audit: type=1326 audit(163.870:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 163.947580][ T29] audit: type=1326 audit(163.880:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 163.955803][ T29] audit: type=1326 audit(163.880:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 163.964226][ T29] audit: type=1326 audit(163.890:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 164.073586][ T29] audit: type=1326 audit(164.000:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 164.136509][ T29] audit: type=1326 audit(164.060:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 164.146908][ T29] audit: type=1326 audit(164.070:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 164.166248][ T29] audit: type=1326 audit(164.080:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4369 comm="syz.0.162" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 166.571784][ T4408] IPv6: NLM_F_CREATE should be specified when creating new route [ 170.254457][ T4417] netlink: 7 bytes leftover after parsing attributes in process `syz.1.177'. [ 170.612870][ T4419] capability: warning: `syz.1.178' uses 32-bit capabilities (legacy support in use) [ 170.898242][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 170.898475][ T29] audit: type=1400 audit(170.830:372): avc: denied { write } for pid=4420 comm="syz.1.179" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 171.217069][ T29] audit: type=1400 audit(171.150:373): avc: denied { getopt } for pid=4423 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 171.744881][ T29] audit: type=1400 audit(171.670:374): avc: denied { map } for pid=4430 comm="syz.0.184" path="socket:[3786]" dev="sockfs" ino=3786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.756964][ T29] audit: type=1400 audit(171.670:375): avc: denied { read } for pid=4430 comm="syz.0.184" path="socket:[3786]" dev="sockfs" ino=3786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.900977][ T29] audit: type=1400 audit(171.830:376): avc: denied { watch watch_reads } for pid=4431 comm="syz.1.183" path="/119" dev="tmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 172.898332][ T29] audit: type=1400 audit(172.830:377): avc: denied { audit_write } for pid=4439 comm="syz.0.185" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 172.900482][ T29] audit: type=1107 audit(172.830:378): pid=4439 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='ä' [ 173.974604][ T29] audit: type=1326 audit(173.900:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4447 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 173.993737][ T29] audit: type=1326 audit(173.920:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4447 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 173.999609][ T29] audit: type=1326 audit(173.930:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4447 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 176.016732][ T4463] capability: warning: `syz.1.195' uses deprecated v2 capabilities in a way that may be insecure [ 176.425064][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 176.426686][ T29] audit: type=1400 audit(176.350:391): avc: denied { create } for pid=4459 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 176.810646][ T29] audit: type=1400 audit(176.710:392): avc: denied { ioctl } for pid=4471 comm="syz.1.197" path="socket:[4235]" dev="sockfs" ino=4235 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 176.855809][ T29] audit: type=1400 audit(176.780:393): avc: denied { bind } for pid=4471 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 176.869613][ T29] audit: type=1400 audit(176.800:394): avc: denied { read } for pid=4471 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 179.386424][ T29] audit: type=1400 audit(179.310:395): avc: denied { append } for pid=4490 comm="syz.0.205" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 179.828485][ T4497] netlink: 60 bytes leftover after parsing attributes in process `syz.0.206'. [ 179.840587][ T4497] netlink: 60 bytes leftover after parsing attributes in process `syz.0.206'. [ 179.997245][ T29] audit: type=1326 audit(179.930:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.0.207" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 180.028902][ T29] audit: type=1326 audit(179.940:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.0.207" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x132970 code=0x7ffc0000 [ 180.054220][ T29] audit: type=1326 audit(179.980:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4498 comm="syz.0.207" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.715842][ T29] audit: type=1326 audit(181.640:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716262][ T29] audit: type=1326 audit(181.640:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716379][ T29] audit: type=1326 audit(181.640:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716430][ T29] audit: type=1326 audit(181.640:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716473][ T29] audit: type=1326 audit(181.640:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716515][ T29] audit: type=1326 audit(181.640:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.716564][ T29] audit: type=1326 audit(181.640:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.737077][ T29] audit: type=1326 audit(181.660:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.737572][ T29] audit: type=1326 audit(181.670:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 181.751356][ T29] audit: type=1326 audit(181.680:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4512 comm="syz.0.210" exe="/syz-executor" sig=0 arch=40000028 syscall=51 compat=0 ip=0x132970 code=0x7ffc0000 [ 188.166584][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 188.167093][ T29] audit: type=1400 audit(188.090:414): avc: denied { bind } for pid=4561 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 188.533940][ T4567] syzkaller0: entered promiscuous mode [ 188.549396][ T4567] syzkaller0: entered allmulticast mode [ 189.823551][ T4580] netlink: 16 bytes leftover after parsing attributes in process `syz.1.217'. [ 189.832387][ T4580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4580 comm=syz.1.217 [ 189.836429][ T4580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4580 comm=syz.1.217 [ 191.906863][ T4622] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 195.773407][ T29] audit: type=1326 audit(195.700:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.788591][ T29] audit: type=1326 audit(195.720:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.791392][ T29] audit: type=1326 audit(195.720:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.800481][ T29] audit: type=1326 audit(195.730:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.808438][ T29] audit: type=1326 audit(195.740:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.816127][ T29] audit: type=1326 audit(195.740:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.821292][ T29] audit: type=1326 audit(195.750:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.825855][ T29] audit: type=1326 audit(195.750:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.838146][ T29] audit: type=1326 audit(195.770:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 195.839418][ T29] audit: type=1326 audit(195.770:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4633 comm="syz.0.239" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 197.504806][ T4641] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 198.459702][ T4648] netlink: 'syz.0.244': attribute type 1 has an invalid length. [ 198.521327][ T4648] 8021q: adding VLAN 0 to HW filter on device bond1 [ 198.558294][ T4648] netlink: 4 bytes leftover after parsing attributes in process `syz.0.244'. [ 198.583062][ T4648] bond1 (unregistering): Released all slaves [ 205.710428][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 205.710901][ T29] audit: type=1326 audit(205.630:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711024][ T29] audit: type=1326 audit(205.630:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711065][ T29] audit: type=1326 audit(205.640:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711102][ T29] audit: type=1326 audit(205.640:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711151][ T29] audit: type=1326 audit(205.640:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711192][ T29] audit: type=1326 audit(205.640:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=264 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.711230][ T29] audit: type=1326 audit(205.640:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.712593][ T29] audit: type=1326 audit(205.640:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.713641][ T29] audit: type=1326 audit(205.640:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 205.715054][ T29] audit: type=1326 audit(205.640:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4729 comm="syz.0.251" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 208.343497][ T4747] netlink: 'syz.0.256': attribute type 10 has an invalid length. [ 209.576541][ T4766] veth0_to_team: entered promiscuous mode [ 210.036900][ T4780] netlink: 16 bytes leftover after parsing attributes in process `syz.1.266'. [ 212.220061][ T4802] netlink: 20 bytes leftover after parsing attributes in process `syz.0.273'. [ 212.596666][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 212.597027][ T29] audit: type=1400 audit(212.520:441): avc: denied { write } for pid=4805 comm="syz.0.275" name="mdstat" dev="proc" ino=4026531986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_mdstat_t tclass=file permissive=1 [ 212.822858][ T29] audit: type=1326 audit(212.750:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.839132][ T29] audit: type=1326 audit(212.750:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.839534][ T29] audit: type=1326 audit(212.770:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.857746][ T29] audit: type=1326 audit(212.780:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.858307][ T29] audit: type=1326 audit(212.780:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.866447][ T29] audit: type=1326 audit(212.790:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.881264][ T29] audit: type=1326 audit(212.810:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.884169][ T29] audit: type=1326 audit(212.810:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 212.891304][ T29] audit: type=1326 audit(212.820:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.277" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 215.637088][ T4821] SELinux: Context system_u:object_r:sendmail_exec_t:s0 is not valid (left unmapped). [ 222.738873][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 222.739218][ T29] audit: type=1400 audit(222.670:470): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 222.739355][ T29] audit: type=1400 audit(222.670:471): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 222.742839][ T29] audit: type=1400 audit(222.670:472): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 222.782612][ T29] audit: type=1400 audit(222.710:473): avc: denied { read } for pid=4885 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.793241][ T4886] IPv6: NLM_F_CREATE should be specified when creating new route [ 223.046498][ T29] audit: type=1400 audit(222.930:474): avc: denied { open } for pid=4887 comm="syz.1.297" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.049635][ T29] audit: type=1400 audit(222.940:475): avc: denied { prog_load } for pid=4887 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.051313][ T29] audit: type=1400 audit(222.940:476): avc: denied { bpf } for pid=4887 comm="syz.1.297" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 223.053325][ T29] audit: type=1400 audit(222.960:477): avc: denied { map_create } for pid=4887 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.054939][ T29] audit: type=1400 audit(222.960:478): avc: denied { map_read map_write } for pid=4887 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 223.057079][ T29] audit: type=1400 audit(222.970:479): avc: denied { perfmon } for pid=4887 comm="syz.1.297" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 244.162534][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 244.162889][ T29] audit: type=1400 audit(244.090:503): avc: denied { create } for pid=4923 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 244.171218][ T29] audit: type=1400 audit(244.100:504): avc: denied { setopt } for pid=4923 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 245.391220][ T29] audit: type=1400 audit(245.320:505): avc: denied { mount } for pid=4927 comm="syz.1.310" name="/" dev="ramfs" ino=4793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 245.425055][ T29] audit: type=1400 audit(245.350:506): avc: denied { map } for pid=4927 comm="syz.1.310" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 245.427699][ T29] audit: type=1400 audit(245.350:507): avc: denied { read write } for pid=4927 comm="syz.1.310" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 246.286157][ T29] audit: type=1400 audit(246.200:508): avc: denied { execmem } for pid=4930 comm="syz.1.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 247.906593][ T29] audit: type=1400 audit(247.830:509): avc: denied { write } for pid=4932 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 247.908436][ T29] audit: type=1400 audit(247.830:510): avc: denied { open } for pid=4932 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.051783][ T29] audit: type=1400 audit(247.980:511): avc: denied { search } for pid=4932 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 248.053773][ T29] audit: type=1400 audit(247.980:512): avc: denied { search } for pid=4932 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 249.618255][ T4944] syz_tun: entered promiscuous mode [ 249.618832][ T4944] macvtap1: entered promiscuous mode [ 249.637294][ T4944] syz_tun: left promiscuous mode [ 251.500864][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 251.501325][ T29] audit: type=1400 audit(251.430:527): avc: denied { create } for pid=4954 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 251.517961][ T29] audit: type=1400 audit(251.440:528): avc: denied { write } for pid=4954 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 251.932593][ T29] audit: type=1326 audit(251.860:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.936755][ T29] audit: type=1326 audit(251.870:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.948531][ T29] audit: type=1326 audit(251.880:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.949039][ T29] audit: type=1326 audit(251.880:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.949272][ T29] audit: type=1326 audit(251.880:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.956538][ T29] audit: type=1326 audit(251.890:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.961355][ T29] audit: type=1326 audit(251.890:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 251.974723][ T29] audit: type=1326 audit(251.900:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4956 comm="syz.0.319" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 254.926549][ T4977] netlink: 'syz.1.328': attribute type 10 has an invalid length. [ 257.343329][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 257.346119][ T29] audit: type=1400 audit(257.270:560): avc: denied { ioctl } for pid=4984 comm="syz.1.332" path="socket:[4884]" dev="sockfs" ino=4884 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 258.071531][ T29] audit: type=1326 audit(258.000:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.086153][ T29] audit: type=1326 audit(258.000:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.088556][ T29] audit: type=1326 audit(258.020:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.089170][ T29] audit: type=1326 audit(258.020:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.090991][ T29] audit: type=1326 audit(258.020:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.094713][ T29] audit: type=1326 audit(258.020:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.097270][ T29] audit: type=1326 audit(258.030:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.099464][ T29] audit: type=1326 audit(258.030:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 258.103063][ T29] audit: type=1326 audit(258.030:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4992 comm="syz.1.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 262.354722][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 262.355080][ T29] audit: type=1400 audit(262.280:620): avc: denied { nlmsg_write } for pid=5017 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 263.341657][ T29] audit: type=1400 audit(263.270:621): avc: denied { create } for pid=5021 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 264.410304][ T5033] syz.1.352 uses obsolete (PF_INET,SOCK_PACKET) [ 264.423322][ T29] audit: type=1400 audit(264.350:622): avc: denied { setopt } for pid=5032 comm="syz.1.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.682875][ T29] audit: type=1400 audit(264.610:623): avc: denied { create } for pid=5034 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 264.689400][ T29] audit: type=1400 audit(264.620:624): avc: denied { setopt } for pid=5034 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 264.773012][ T29] audit: type=1400 audit(264.700:625): avc: denied { create } for pid=5034 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.861344][ T29] audit: type=1400 audit(264.790:626): avc: denied { ioctl } for pid=5034 comm="syz.0.353" path="socket:[4933]" dev="sockfs" ino=4933 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.946231][ T29] audit: type=1400 audit(264.880:627): avc: denied { bind } for pid=5034 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 265.036457][ T29] audit: type=1400 audit(264.940:628): avc: denied { ioctl } for pid=5034 comm="syz.0.353" path="socket:[5349]" dev="sockfs" ino=5349 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 265.072072][ T5035] netlink: 4 bytes leftover after parsing attributes in process `syz.0.353'. [ 266.232057][ T5035] netlink: 'syz.0.353': attribute type 6 has an invalid length. [ 266.602310][ T5064] SELinux: Context Ü is not valid (left unmapped). [ 266.602374][ T29] audit: type=1400 audit(266.530:629): avc: denied { mac_admin } for pid=5063 comm="syz.0.355" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 267.892015][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 267.892052][ T5073] SELinux: policydb version 1043 does not match my version range 15-35 [ 267.893288][ T5073] SELinux: failed to load policy [ 267.894324][ T29] audit: type=1400 audit(267.820:633): avc: denied { load_policy } for pid=5071 comm="syz.1.360" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 268.426719][ T29] audit: type=1400 audit(268.350:634): avc: denied { watch watch_reads } for pid=5079 comm="syz.1.363" path="/196" dev="tmpfs" ino=1006 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 269.605717][ T29] audit: type=1400 audit(269.530:635): avc: denied { bind } for pid=5090 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 269.693828][ T29] audit: type=1400 audit(269.620:636): avc: denied { write } for pid=5090 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 270.780165][ T5101] syzkaller0: entered promiscuous mode [ 270.780892][ T5101] syzkaller0: entered allmulticast mode [ 271.202755][ T29] audit: type=1326 audit(271.130:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 271.225682][ T29] audit: type=1326 audit(271.150:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 271.250221][ T29] audit: type=1326 audit(271.180:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 271.265580][ T29] audit: type=1326 audit(271.190:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 271.293159][ T29] audit: type=1326 audit(271.220:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 271.317490][ T29] audit: type=1326 audit(271.250:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5106 comm="syz.0.374" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 279.154326][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 279.156163][ T29] audit: type=1400 audit(279.080:652): avc: denied { create } for pid=5095 comm="syz.1.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 280.723278][ T5120] netlink: 20 bytes leftover after parsing attributes in process `syz.1.379'. [ 280.747385][ T5120] netlink: 8 bytes leftover after parsing attributes in process `syz.1.379'. [ 284.390013][ T29] audit: type=1400 audit(284.310:653): avc: denied { create } for pid=5127 comm="syz.1.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 284.476943][ T5128] geneve2: entered promiscuous mode [ 284.478149][ T5128] geneve2: entered allmulticast mode [ 284.852998][ T5134] netlink: 'syz.0.383': attribute type 10 has an invalid length. [ 284.860391][ T5134] syz_tun: entered promiscuous mode [ 284.962141][ T5136] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 284.977925][ T5136] SELinux: failed to load policy [ 285.077677][ T29] audit: type=1400 audit(285.010:654): avc: denied { setopt } for pid=5137 comm="syz.0.385" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 285.811142][ T29] audit: type=1326 audit(285.730:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 285.811632][ T29] audit: type=1326 audit(285.730:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 285.811720][ T29] audit: type=1326 audit(285.730:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 285.811771][ T29] audit: type=1326 audit(285.730:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 285.811867][ T29] audit: type=1326 audit(285.730:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 285.811922][ T29] audit: type=1400 audit(285.730:660): avc: denied { read } for pid=5148 comm="syz.0.390" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.811977][ T29] audit: type=1400 audit(285.730:661): avc: denied { open } for pid=5148 comm="syz.0.390" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.812026][ T29] audit: type=1326 audit(285.730:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5146 comm="syz.1.389" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=0 ip=0x132970 code=0x7ffc0000 [ 291.583670][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 291.584114][ T29] audit: type=1400 audit(291.510:722): avc: denied { create } for pid=5192 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 292.592327][ T29] audit: type=1400 audit(292.520:723): avc: denied { remount } for pid=5203 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 293.138585][ T5207] netlink: 36 bytes leftover after parsing attributes in process `syz.0.413'. [ 293.510398][ T29] audit: type=1400 audit(293.440:724): avc: denied { write } for pid=5210 comm="syz.0.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 294.217202][ T29] audit: type=1400 audit(294.130:725): avc: denied { mounton } for pid=5213 comm="syz.1.416" path="/219/file0" dev="tmpfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 294.890566][ T29] audit: type=1400 audit(294.820:726): avc: denied { write } for pid=5221 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 295.446870][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 295.447333][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 295.712761][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 295.717105][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 296.087110][ T5234] netlink: 20 bytes leftover after parsing attributes in process `syz.1.423'. [ 296.396801][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 296.397425][ T5228] netlink: 4 bytes leftover after parsing attributes in process `syz.0.422'. [ 296.429250][ T29] audit: type=1400 audit(296.360:727): avc: denied { create } for pid=5236 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 300.230982][ T29] audit: type=1400 audit(300.160:728): avc: denied { lock } for pid=5270 comm="syz.0.438" path="socket:[5708]" dev="sockfs" ino=5708 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 303.202247][ T5313] netlink: 'syz.1.448': attribute type 12 has an invalid length. [ 304.288809][ T29] audit: type=1400 audit(304.200:729): avc: denied { connect } for pid=5324 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 305.802572][ T29] audit: type=1400 audit(305.730:730): avc: denied { mount } for pid=5336 comm="syz.0.459" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 306.178672][ T29] audit: type=1400 audit(306.110:731): avc: denied { getopt } for pid=5339 comm="syz.1.460" lport=10 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 306.450955][ T29] audit: type=1400 audit(306.380:732): avc: denied { read } for pid=5336 comm="syz.0.459" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 306.458947][ T29] audit: type=1400 audit(306.390:733): avc: denied { open } for pid=5336 comm="syz.0.459" path="/224/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 306.479511][ T5342] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 306.480009][ T5342] block device autoloading is deprecated and will be removed. [ 306.481954][ T29] audit: type=1400 audit(306.410:734): avc: denied { ioctl } for pid=5336 comm="syz.0.459" path="/224/file0/file0" dev="fuse" ino=64 ioctlcmd=0x92b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 306.534498][ T29] audit: type=1400 audit(306.460:735): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 306.816605][ T29] audit: type=1400 audit(306.750:736): avc: denied { mounton } for pid=5352 comm="syz.1.464" path="/proc/508/task" dev="proc" ino=6420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 306.827222][ T29] audit: type=1400 audit(306.760:737): avc: denied { mount } for pid=5352 comm="syz.1.464" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 307.743219][ T29] audit: type=1400 audit(307.670:738): avc: denied { read } for pid=5365 comm="syz.1.469" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 307.743721][ T29] audit: type=1400 audit(307.670:739): avc: denied { open } for pid=5365 comm="syz.1.469" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 310.750028][ T5402] kernel profiling enabled (shift: 9) [ 312.746061][ T4409] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 312.906383][ T4409] usb 2-1: Using ep0 maxpacket: 8 [ 312.976182][ T4409] usb 2-1: New USB device found, idVendor=12d1, idProduct=fae2, bcdDevice=70.8b [ 312.976606][ T4409] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 312.976983][ T4409] usb 2-1: Product: syz [ 312.977039][ T4409] usb 2-1: Manufacturer: syz [ 312.977069][ T4409] usb 2-1: SerialNumber: syz [ 312.983259][ T4409] usb 2-1: config 0 descriptor?? [ 313.037510][ T4409] option 2-1:0.0: GSM modem (1-port) converter detected [ 313.240616][ T4637] usb 2-1: USB disconnect, device number 6 [ 313.243960][ T4637] option 2-1:0.0: device disconnected [ 313.675993][ T4745] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 313.936080][ T4745] usb 1-1: Using ep0 maxpacket: 8 [ 313.998325][ T4745] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 313.999121][ T4745] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 314.027891][ T4745] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 314.060816][ T4745] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 314.062392][ T4745] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 314.072837][ T4745] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 314.330885][ T4745] usb 1-1: GET_CAPABILITIES returned 0 [ 314.352860][ T4745] usbtmc 1-1:16.0: can't read capabilities [ 314.549514][ T4637] usb 1-1: USB disconnect, device number 2 [ 315.440412][ T5483] syzkaller1: entered promiscuous mode [ 315.440865][ T5483] syzkaller1: entered allmulticast mode [ 316.325897][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 316.329167][ T29] audit: type=1400 audit(316.240:747): avc: denied { read } for pid=5489 comm="syz.1.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 316.935947][ T4637] atkbd serio2: keyboard reset failed on [ 316.984954][ T29] audit: type=1400 audit(316.910:748): avc: denied { bind } for pid=5500 comm="syz.1.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 317.021695][ T29] audit: type=1400 audit(316.930:749): avc: denied { write } for pid=5500 comm="syz.1.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 317.533827][ T5505] binder: 5503:5505 ioctl c0306201 20004a40 returned -14 [ 317.604725][ T5506] block nbd0: NBD_DISCONNECT [ 317.617669][ T5506] block nbd0: Disconnected due to user request. [ 317.624074][ T5506] block nbd0: shutting down sockets [ 317.966536][ T29] audit: type=1400 audit(317.890:750): avc: denied { mount } for pid=5507 comm="syz.1.496" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 318.090683][ T5510] block nbd0: shutting down sockets [ 318.308954][ T29] audit: type=1400 audit(318.240:751): avc: denied { append } for pid=5508 comm="syz.0.497" name="nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 318.311070][ T29] audit: type=1400 audit(318.240:752): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 318.322004][ T5510] block nbd0: NBD_DISCONNECT [ 318.326904][ T5510] block nbd0: Send disconnect failed -32 [ 318.984478][ T5512] binder: 5511:5512 ioctl c0306201 20000000 returned -22 [ 319.421449][ T29] audit: type=1400 audit(319.350:753): avc: denied { write } for pid=5516 comm="syz.0.501" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 319.501361][ T29] audit: type=1400 audit(319.430:754): avc: denied { read } for pid=5516 comm="syz.0.501" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 319.593361][ T5517] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 320.117674][ T29] audit: type=1400 audit(320.050:755): avc: denied { mounton } for pid=5523 comm="syz.0.502" path="/244/file0" dev="tmpfs" ino=1250 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 322.658346][ T29] audit: type=1400 audit(322.580:756): avc: denied { bind } for pid=5541 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 322.749477][ T29] audit: type=1400 audit(322.680:757): avc: denied { listen } for pid=5541 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 322.793089][ T29] audit: type=1400 audit(322.720:758): avc: denied { accept } for pid=5541 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 323.870351][ T29] audit: type=1400 audit(323.800:759): avc: denied { ioctl } for pid=5544 comm="syz.0.509" path="socket:[5969]" dev="sockfs" ino=5969 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 324.187453][ T5551] input: syz1 as /devices/virtual/input/input4 [ 324.526907][ T5558] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 324.632068][ T29] audit: type=1400 audit(324.560:760): avc: denied { execute } for pid=5563 comm="syz.0.512" path="/249/file0" dev="tmpfs" ino=1276 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 324.636551][ T29] audit: type=1804 audit(324.570:761): pid=5564 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.0.512" name="/newroot/249/file0" dev="tmpfs" ino=1276 res=1 errno=0 [ 327.421050][ T4869] atkbd serio3: keyboard reset failed on [ 328.236498][ T5580] 8<--- cut here --- [ 328.236624][ T5580] Unable to handle kernel paging request at virtual address fee08001 when write [ 328.236775][ T5580] [fee08001] *pgd=80000080007003, *pmd=00000000 [ 328.241511][ T5580] Internal error: Oops: a06 [#1] SMP ARM [ 328.246007][ T5580] Modules linked in: [ 328.248237][ T5580] CPU: 1 UID: 0 PID: 5580 Comm: syz.1.518 Not tainted syzkaller #0 PREEMPT [ 328.256855][ T5580] Hardware name: ARM-Versatile Express [ 328.260764][ T5580] PC is at parport_attach+0x174/0x1d0 [ 328.261357][ T5580] LR is at parport_attach+0x164/0x1d0 [ 328.265278][ T5580] pc : [<813ce490>] lr : [<813ce480>] psr: 60000013 [ 328.265842][ T5580] sp : dfa91d30 ip : dfa91d30 fp : dfa91d54 [ 328.266248][ T5580] r10: 82b25910 r9 : 00000003 r8 : 84015c00 [ 328.266527][ T5580] r7 : dfa91d90 r6 : 84015c00 r5 : 00000000 r4 : 00000000 [ 328.266813][ T5580] r3 : fee08001 r2 : 81e1773c r1 : 00000001 r0 : 813ce100 [ 328.267221][ T5580] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 328.267667][ T5580] Control: 30c5387d Table: 86167840 DAC: 00000000 [ 328.267979][ T5580] Register r0 information: non-slab/vmalloc memory [ 328.269026][ T5580] Register r1 information: non-paged memory [ 328.269356][ T5580] Register r2 information: non-slab/vmalloc memory [ 328.269628][ T5580] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 328.270352][ T5580] Register r4 information: NULL pointer [ 328.270634][ T5580] Register r5 information: NULL pointer [ 328.270894][ T5580] Register r6 information: slab kmalloc-192 start 84015c00 pointer offset 0 size 192 [ 328.272124][ T5580] Register r7 information: 2-page vmalloc region starting at 0xdfa90000 allocated at kernel_clone+0xac/0x3ec [ 328.272728][ T5580] Register r8 information: slab kmalloc-192 start 84015c00 pointer offset 0 size 192 [ 328.273145][ T5580] Register r9 information: non-paged memory [ 328.273396][ T5580] Register r10 information: non-slab/vmalloc memory [ 328.273670][ T5580] Register r11 information: 2-page vmalloc region starting at 0xdfa90000 allocated at kernel_clone+0xac/0x3ec [ 328.274198][ T5580] Register r12 information: 2-page vmalloc region starting at 0xdfa90000 allocated at kernel_clone+0xac/0x3ec [ 328.274729][ T5580] Process syz.1.518 (pid: 5580, stack limit = 0xdfa90000) [ 328.275234][ T5580] Stack: (0xdfa91d30 to 0xdfa92000) [ 328.275676][ T5580] 1d20: 823f12b8 84015c00 829d1bf4 829d1bf4 [ 328.276139][ T5580] 1d40: 81e17bfc 84015c44 dfa91d8c dfa91d58 813ca520 813ce328 200000c0 00000000 [ 328.276503][ T5580] 1d60: dfa91d7c 200000c0 84015c00 b5403587 200000c0 85ffa400 40946400 00000003 [ 328.276964][ T5580] 1d80: dfa91e4c dfa91d90 813c606c 813ca424 656d6f63 705f6964 6f707261 00007472 [ 328.277339][ T5580] 1da0: 00000000 00008001 00000006 00000001 00000000 00000000 00000cc7 00000008 [ 328.277758][ T5580] 1dc0: 00000007 0000000a 00000100 00000007 00000000 00000007 00000040 00000006 [ 328.278264][ T5580] 1de0: ffffffff 00000001 0001a449 00000007 40000003 00004089 00000009 00000f27 [ 328.278654][ T5580] 1e00: 0000ffff 00000007 00000008 00000005 00000008 0000000c 00010000 fffffff8 [ 328.279114][ T5580] 1e20: 00000000 1fe4f8f8 00000000 84949cc0 84015c00 200000c0 200000c0 85ffa400 [ 328.279466][ T5580] 1e40: dfa91f14 dfa91e50 813c7038 813c5f78 00000000 00000000 00000000 1fe4f8f8 [ 328.279872][ T5580] 1e60: 00000000 00000000 824625b4 0000005f 83d8a448 84015c30 841e2204 85ffa400 [ 328.280248][ T5580] 1e80: dfa91ee4 dfa91e90 807a779c 8079db94 00000064 00000001 00000000 dfa91eac [ 328.280659][ T5580] 1ea0: 85bd9f10 83430660 00006400 0000000b dfa91ea0 00000000 00000000 1fe4f8f8 [ 328.281068][ T5580] 1ec0: 84949cc0 40946400 200000c0 200000c0 84949cc0 00000003 dfa91ef4 dfa91ee8 [ 328.281455][ T29] audit: type=1400 audit(328.210:762): avc: denied { write } for pid=3095 comm="syz-executor" path="pipe:[558]" dev="pipefs" ino=558 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 328.282615][ T5580] 1ee0: 807a78bc 1fe4f8f8 dfa91f14 40946400 00000000 84949cc1 200000c0 84949cc0 [ 328.283099][ T5580] 1f00: 00000003 85ffa400 dfa91fa4 dfa91f18 805789d0 813c6a68 ecac8b10 85ffa400 [ 328.283431][ T5580] 1f20: dfa91f3c dfa91f30 81a608b8 81a60788 dfa91f54 dfa91f40 8025c484 8028d914 [ 328.283911][ T5580] 1f40: dfa91fb0 40000000 dfa91f84 dfa91f58 802229ec 8025c440 00000000 8281cfb4 [ 328.284281][ T5580] 1f60: dfa91fb0 0014ced0 ecac8b10 80222940 00000000 1fe4f8f8 dfa91fac 00000000 [ 328.284802][ T5580] 1f80: 00000000 00316308 00000036 8020029c 85ffa400 00000036 00000000 dfa91fa8 [ 328.285427][ T5580] 1fa0: 80200060 805788ac 00000000 00000000 00000003 40946400 200000c0 00000000 [ 328.285758][ T5580] 1fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f130bc [ 328.286495][ T5580] 1fe0: 76f12ec0 76f12eb0 0001928c 00132970 60000010 00000003 00000000 00000000 [ 328.286972][ T5580] Call trace: [ 328.287438][ T5580] [<813ce31c>] (parport_attach) from [<813ca520>] (comedi_device_attach+0x108/0x250) [ 328.288100][ T5580] r6:84015c44 r5:81e17bfc r4:829d1bf4 [ 328.288432][ T5580] [<813ca418>] (comedi_device_attach) from [<813c606c>] (do_devconfig_ioctl+0x100/0x220) [ 328.288907][ T5580] r10:00000003 r9:40946400 r8:85ffa400 r7:200000c0 r6:b5403587 r5:84015c00 [ 328.289263][ T5580] r4:200000c0 SYZFAIL: failed to recv rpc [ 328.289437][ T5580] [<813c5f6c>] (do_devconfig_ioctl) from [<813c7038>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 328.290149][ T5580] r8:85ffa400 r7:200000c0 r6:200000c0 r5:84015c00 r4:84949cc0 [ 328.290471][ T5580] [<813c6a5c>] (comedi_unlocked_ioctl) from [<805789d0>] (sys_ioctl+0x130/0xba0) [ 328.291001][ T5580] r10:85ffa400 r9:00000003 r8:84949cc0 r7:200000c0 r6:84949cc1 r5:00000000 [ 328.291439][ T5580] r4:40946400 [ 328.291692][ T5580] [<805788a0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 328.292170][ T5580] Exception stack(0xdfa91fa8 to 0xdfa91ff0) [ 328.292536][ T5580] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 328.292889][ T5580] 1fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f130bc [ 328.293345][ T5580] 1fe0: 76f12ec0 76f12eb0 0001928c 00132970 [ 328.295573][ T5580] r10:00000036 r9:85ffa400 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 328.296184][ T5580] r4:00000000 [ 328.296827][ T5580] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 328.297573][ T5580] ---[ end trace 0000000000000000 ]--- [ 328.298719][ T5580] Kernel panic - not syncing: Fatal exception [ 328.301460][ T5580] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:44:51 Registers: info registers vcpu 0 CPU#0 R00=84aba400 R01=84769740 R02=0000ed7b R03=dddd6098 R04=00000020 R05=86085540 R06=85fa4d00 R07=84085000 R08=82c2c240 R09=00000000 R10=00000040 R11=df80182c R12=df801770 R13=df801770 R14=8158c148 R15=8158bfc8 PSR=20000113 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=dfa9184b R01=00000020 R02=fffffffd R03=00000003 R04=dfa91850 R05=00000001 R06=dfa9184b R07=dfa9184b R08=dfa91774 R09=82247cec R10=00000004 R11=dfa9171c R12=dfa9184b R13=dfa91700 R14=81a55490 R15=81a327f4 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000