last executing test programs: 10m34.765717095s ago: executing program 0 (id=387): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000080000000000000000000850000007d00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x8000f28, 0x0) splice(r3, 0x0, r2, 0x0, 0x7f, 0xe) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a44000/0x4000)=nil, 0x4000, 0x0, 0xbc32038f2d035af6, 0xffffffffffffffff, 0x2882c000) r5 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') lseek(r5, 0x2004, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x3a8bc000) 10m27.013305027s ago: executing program 0 (id=389): r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000d00)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000cc0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x4ef, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x2}, r1}}, 0x30) 10m26.428260622s ago: executing program 0 (id=391): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000000000), 0x0) r1 = timerfd_create(0x0, 0x0) timerfd_settime(r1, 0x3, &(0x7f0000000440), 0x0) read(r1, &(0x7f0000000240)=""/123, 0x7b) clock_adjtime(0x0, &(0x7f0000000040)={0xd4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 10m25.363600854s ago: executing program 0 (id=392): r0 = syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4b4, 0x7b1, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x6, [{{0x9, 0x4, 0x0, 0x10, 0x5, 0x3, 0x0, 0x1, 0x0, {0x9, 0x21, 0x0, 0x16, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0xc, 0x0, 0x7}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000280)={0x2c, &(0x7f0000000140)={0x20, 0x6, 0x5, {0x5, 0xb, "c5f8b4"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 10m23.392042244s ago: executing program 0 (id=393): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000080000000000000000000850000007d00000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x8000f28, 0x0) splice(r3, 0x0, r2, 0x0, 0x7f, 0xe) write(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a44000/0x4000)=nil, 0x4000, 0x0, 0xbc32038f2d035af6, 0xffffffffffffffff, 0x2882c000) r5 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') lseek(r5, 0x2004, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x3a8bc000) 10m14.620849495s ago: executing program 0 (id=401): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000cc0)=[{&(0x7f0000000780)="1e", 0x1}], 0x1) recvmmsg(r1, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0xffffffffffffff21, 0x0, 0x0, &(0x7f00000005c0)=""/108, 0x6c}, 0x7fff}], 0x3fffffffffffcbe, 0xfffe, 0x0) 9m28.90496695s ago: executing program 32 (id=401): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000cc0)=[{&(0x7f0000000780)="1e", 0x1}], 0x1) recvmmsg(r1, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0xffffffffffffff21, 0x0, 0x0, &(0x7f00000005c0)=""/108, 0x6c}, 0x7fff}], 0x3fffffffffffcbe, 0xfffe, 0x0) 25.395086754s ago: executing program 1 (id=644): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000001140)=0x10000000) 14.133065502s ago: executing program 2 (id=650): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x2d, 0x9, 0x70bd27, 0x25dfdbfe, {0x5}, [@typed={0x8, 0xa, 0x0, 0x0, @uid}]}, 0x1c}}, 0x20000086) 13.568387686s ago: executing program 2 (id=651): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x0, 0x5, 0x3}) fcntl$lock(r0, 0x26, &(0x7f0000000040)={0x1, 0x2, 0x9, 0x401}) fcntl$lock(r0, 0x6, &(0x7f0000000180)={0x1, 0x0, 0x400000200}) 12.686046843s ago: executing program 2 (id=652): writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4008040) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x40, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x300000000000000, 0x0, 0x0, 0x4, 0x0) 9.719128959s ago: executing program 2 (id=653): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200"], 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2, 0x2, 0x0, @void, @value}, 0x10) 9.140125583s ago: executing program 2 (id=654): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073f97a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000640)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb8b3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000600)='kfree\x00', r1}, 0x18) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03f5"], 0x34}}, 0x0) 8.218055694s ago: executing program 2 (id=655): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x81) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x226) 5.788947068s ago: executing program 1 (id=656): mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0xc0049364, &(0x7f00000000c0)) 5.308340335s ago: executing program 1 (id=657): sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x2d, 0x9, 0x70bd27, 0x25dfdbfe, {0x5}, [@typed={0x8, 0xa, 0x0, 0x0, @uid}]}, 0x1c}}, 0x20000086) 4.872159108s ago: executing program 1 (id=658): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x3d, &(0x7f0000000000)='cgroup\x00\x8d\f\xf3\xcd\xc6X$\x01n-Hg\x144-.\xe2\x053\xe2\xf4\xbf[\xe9\xdddU\x91\x9d,\t\x8d\xc3@\x86,\x7f\xe2Z\xe8L\x80\xdbe~c\xbc\x9b\xcf\x9b\x1cH\x95\xf3'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200"], 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r2, r3, 0x2, 0x2, 0x0, @void, @value}, 0x10) 4.441413451s ago: executing program 1 (id=659): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x256c, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}}}]}}]}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000002540)={0x24, 0x0, 0x0, &(0x7f00000013c0)={0x0, 0x22, 0x5, {[@main=@item_4={0x3, 0x0, 0x9, "83c5b03b"}]}}, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000340)={0x24, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x2, @lang_id={0x0, 0x3, 0x423}}, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000c80)={0x2c, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00030c"], 0x0, 0x0, 0x0}, 0x0) 0s ago: executing program 1 (id=660): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) bind$can_raw(r1, &(0x7f0000000480)={0x1d, r2}, 0x10) close(r1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:57140' (ED25519) to the list of known hosts. [ 173.191024][ T30] audit: type=1400 audit(172.870:46): avc: denied { name_bind } for pid=3304 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 173.553303][ T30] audit: type=1400 audit(173.230:47): avc: denied { execute } for pid=3305 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 173.561017][ T30] audit: type=1400 audit(173.240:48): avc: denied { execute_no_trans } for pid=3305 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 177.489409][ T30] audit: type=1400 audit(177.170:49): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 177.509135][ T30] audit: type=1400 audit(177.180:50): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 177.571707][ T3305] cgroup: Unknown subsys name 'net' [ 177.610997][ T30] audit: type=1400 audit(177.290:51): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 177.922977][ T3305] cgroup: Unknown subsys name 'cpuset' [ 177.996772][ T3305] cgroup: Unknown subsys name 'rlimit' [ 178.266601][ T30] audit: type=1400 audit(177.940:52): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.273779][ T30] audit: type=1400 audit(177.950:53): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 178.284342][ T30] audit: type=1400 audit(177.960:54): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 178.684495][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 178.694294][ T30] audit: type=1400 audit(178.370:55): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 178.700986][ T30] audit: type=1400 audit(178.370:56): avc: denied { write } for pid=3307 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 178.785391][ T30] audit: type=1400 audit(178.460:57): avc: denied { read } for pid=3305 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 178.795129][ T30] audit: type=1400 audit(178.470:58): avc: denied { open } for pid=3305 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 178.830494][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 191.554186][ T30] audit: type=1400 audit(191.220:59): avc: denied { execmem } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 191.642679][ T30] audit: type=1400 audit(191.320:60): avc: denied { read } for pid=3311 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 191.644585][ T30] audit: type=1400 audit(191.320:61): avc: denied { open } for pid=3311 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 191.659068][ T30] audit: type=1400 audit(191.340:62): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 191.705367][ T30] audit: type=1400 audit(191.380:63): avc: denied { module_request } for pid=3310 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 191.855472][ T30] audit: type=1400 audit(191.530:64): avc: denied { sys_module } for pid=3310 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 198.041619][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.080254][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.594281][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.652411][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.691325][ T3311] hsr_slave_0: entered promiscuous mode [ 200.703441][ T3311] hsr_slave_1: entered promiscuous mode [ 201.769915][ T3310] hsr_slave_0: entered promiscuous mode [ 201.776489][ T3310] hsr_slave_1: entered promiscuous mode [ 201.782535][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 201.784756][ T3310] Cannot create hsr debugfs directory [ 203.214708][ T30] audit: type=1400 audit(202.890:65): avc: denied { create } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 203.228466][ T30] audit: type=1400 audit(202.900:66): avc: denied { write } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 203.252021][ T30] audit: type=1400 audit(202.930:67): avc: denied { read } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 203.301659][ T3311] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 203.471133][ T3311] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 203.582358][ T3311] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 203.660189][ T3311] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 204.561256][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 204.642024][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 204.704269][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 204.756592][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 206.775947][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 207.586271][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.731933][ T3311] veth0_vlan: entered promiscuous mode [ 215.837233][ T3311] veth1_vlan: entered promiscuous mode [ 216.070898][ T3311] veth0_macvtap: entered promiscuous mode [ 216.096262][ T3311] veth1_macvtap: entered promiscuous mode [ 216.364181][ T3311] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.365133][ T3311] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.373038][ T3311] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 216.375838][ T3311] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 217.070623][ T30] audit: type=1400 audit(216.750:68): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 217.100394][ T30] audit: type=1400 audit(216.760:69): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzkaller.mX5jCD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 217.105623][ T30] audit: type=1400 audit(216.780:70): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 217.146239][ T30] audit: type=1400 audit(216.820:71): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzkaller.mX5jCD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 217.167998][ T30] audit: type=1400 audit(216.840:72): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzkaller.mX5jCD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 217.209129][ T30] audit: type=1400 audit(216.880:73): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 217.230063][ T30] audit: type=1400 audit(216.900:74): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 217.240797][ T30] audit: type=1400 audit(216.920:75): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="gadgetfs" ino=3274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 217.288252][ T30] audit: type=1400 audit(216.950:76): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 217.293298][ T30] audit: type=1400 audit(216.970:77): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 217.581382][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 218.450697][ T3310] veth0_vlan: entered promiscuous mode [ 218.561495][ T3310] veth1_vlan: entered promiscuous mode [ 218.914781][ T3310] veth0_macvtap: entered promiscuous mode [ 219.026429][ T3310] veth1_macvtap: entered promiscuous mode [ 219.433864][ T3310] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.434319][ T3310] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.455855][ T3310] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.468861][ T3310] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.827421][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 222.827978][ T30] audit: type=1400 audit(222.500:101): avc: denied { name_bind } for pid=3467 comm="syz.0.8" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 222.843967][ T30] audit: type=1400 audit(222.520:102): avc: denied { node_bind } for pid=3467 comm="syz.0.8" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 224.454234][ T30] audit: type=1400 audit(224.130:103): avc: denied { read write } for pid=3473 comm="syz.0.11" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.456745][ T30] audit: type=1400 audit(224.130:104): avc: denied { open } for pid=3473 comm="syz.0.11" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.527706][ T30] audit: type=1400 audit(224.180:105): avc: denied { ioctl } for pid=3473 comm="syz.0.11" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.889020][ T3383] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 225.145096][ T3383] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 225.146528][ T3383] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 225.153647][ T3383] usb 1-1: New USB device found, idVendor=056a, idProduct=0063, bcdDevice= 0.00 [ 225.160996][ T3383] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 225.221409][ T3383] usb 1-1: config 0 descriptor?? [ 225.801002][ T30] audit: type=1326 audit(225.460:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.11" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x0 [ 230.414145][ T3383] usbhid 1-1:0.0: can't add hid device: -32 [ 230.415679][ T3383] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 231.988033][ T30] audit: type=1400 audit(231.660:107): avc: denied { create } for pid=3479 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 232.008772][ T30] audit: type=1400 audit(231.670:108): avc: denied { write } for pid=3479 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.204219][ T30] audit: type=1400 audit(232.880:109): avc: denied { create } for pid=3485 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 236.464851][ T3383] usb 1-1: USB disconnect, device number 2 [ 239.481455][ T3500] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 239.510060][ T30] audit: type=1400 audit(239.190:110): avc: denied { create } for pid=3499 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 239.553285][ T30] audit: type=1400 audit(239.190:111): avc: denied { create } for pid=3499 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 239.562193][ T30] audit: type=1400 audit(239.240:112): avc: denied { create } for pid=3499 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 239.643296][ T30] audit: type=1400 audit(239.320:113): avc: denied { write } for pid=3499 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 239.643942][ T30] audit: type=1400 audit(239.320:114): avc: denied { nlmsg_write } for pid=3499 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 241.156444][ T30] audit: type=1400 audit(240.830:115): avc: denied { read } for pid=3507 comm="syz.0.23" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 241.160663][ T30] audit: type=1400 audit(240.840:116): avc: denied { open } for pid=3507 comm="syz.0.23" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 241.185412][ T30] audit: type=1400 audit(240.850:117): avc: denied { ioctl } for pid=3507 comm="syz.0.23" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 246.383203][ T30] audit: type=1400 audit(246.060:118): avc: denied { ioctl } for pid=3520 comm="syz.0.28" path="socket:[3361]" dev="sockfs" ino=3361 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 246.401507][ T30] audit: type=1400 audit(246.070:119): avc: denied { setopt } for pid=3520 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 251.746360][ T30] audit: type=1400 audit(251.420:120): avc: denied { setopt } for pid=3537 comm="syz.1.35" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 251.756049][ T30] audit: type=1400 audit(251.430:121): avc: denied { write } for pid=3537 comm="syz.1.35" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 252.991914][ T30] audit: type=1400 audit(252.670:122): avc: denied { read write } for pid=3545 comm="syz.1.39" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 253.002097][ T30] audit: type=1400 audit(252.670:123): avc: denied { open } for pid=3545 comm="syz.1.39" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 255.639819][ T30] audit: type=1400 audit(255.290:124): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 257.414311][ T3566] syzkaller0: entered promiscuous mode [ 257.415049][ T3566] syzkaller0: entered allmulticast mode [ 277.760672][ T3593] netlink: 16 bytes leftover after parsing attributes in process `syz.0.57'. [ 277.761332][ T3593] netlink: 68 bytes leftover after parsing attributes in process `syz.0.57'. [ 281.612620][ T30] audit: type=1326 audit(281.290:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 281.628089][ T30] audit: type=1326 audit(281.290:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 281.632522][ T30] audit: type=1326 audit(281.300:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 281.636137][ T30] audit: type=1326 audit(281.310:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 281.641164][ T30] audit: type=1326 audit(281.310:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=1 ip=0x131f30 code=0x7ffc0000 [ 281.646160][ T30] audit: type=1326 audit(281.320:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3612 comm="syz.1.65" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x0 [ 284.522832][ T30] audit: type=1400 audit(284.200:131): avc: denied { create } for pid=3616 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 288.725840][ T30] audit: type=1400 audit(288.390:132): avc: denied { map } for pid=3625 comm="syz.1.69" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 288.746062][ T30] audit: type=1400 audit(288.420:133): avc: denied { read write } for pid=3625 comm="syz.1.69" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 289.942354][ T30] audit: type=1400 audit(289.620:134): avc: denied { bind } for pid=3630 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 289.952486][ T30] audit: type=1400 audit(289.630:135): avc: denied { name_bind } for pid=3630 comm="syz.1.71" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 289.962808][ T30] audit: type=1400 audit(289.640:136): avc: denied { node_bind } for pid=3630 comm="syz.1.71" saddr=::ffff:0.0.0.0 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 290.009402][ T30] audit: type=1400 audit(289.660:137): avc: denied { name_connect } for pid=3630 comm="syz.1.71" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 290.919093][ T30] audit: type=1400 audit(290.600:138): avc: denied { mounton } for pid=3635 comm="syz.0.73" path="/30/file0" dev="tmpfs" ino=172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 291.276179][ T3230] Process accounting resumed [ 293.733805][ T3648] capability: warning: `syz.0.77' uses deprecated v2 capabilities in a way that may be insecure [ 294.542619][ T30] audit: type=1400 audit(294.220:139): avc: denied { ioctl } for pid=3649 comm="syz.0.78" path="socket:[3547]" dev="sockfs" ino=3547 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.489098][ T3453] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 300.678494][ T3453] usb 1-1: Using ep0 maxpacket: 16 [ 300.927379][ T3453] usb 1-1: config 0 has an invalid interface number: 5 but max is 0 [ 300.928378][ T3453] usb 1-1: config 0 has an invalid descriptor of length 177, skipping remainder of the config [ 300.928821][ T3453] usb 1-1: config 0 has no interface number 0 [ 300.929384][ T3453] usb 1-1: config 0 interface 5 altsetting 0 endpoint 0x6 has an invalid bInterval 0, changing to 7 [ 300.929970][ T3453] usb 1-1: config 0 interface 5 altsetting 0 endpoint 0xB has invalid maxpacket 1024, setting to 64 [ 300.930291][ T3453] usb 1-1: config 0 interface 5 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 300.930750][ T3453] usb 1-1: config 0 interface 5 altsetting 0 has 4 endpoint descriptors, different from the interface descriptor's value: 6 [ 301.085233][ T3453] usb 1-1: New USB device found, idVendor=19d2, idProduct=1270, bcdDevice= 6.42 [ 301.086024][ T3453] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 301.086620][ T3453] usb 1-1: Product: syz [ 301.087855][ T3453] usb 1-1: Manufacturer: syz [ 301.088165][ T3453] usb 1-1: SerialNumber: syz [ 301.134928][ T3453] usb 1-1: config 0 descriptor?? [ 303.048330][ T30] audit: type=1400 audit(302.660:140): avc: denied { create } for pid=3670 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 303.048903][ T30] audit: type=1400 audit(302.690:141): avc: denied { bind } for pid=3670 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 311.851880][ T10] usb 1-1: USB disconnect, device number 3 [ 313.156452][ T3682] pimreg: entered allmulticast mode [ 313.164376][ T3682] pimreg: left allmulticast mode [ 314.375522][ T3690] process 'syz.1.89' launched './file0' with NULL argv: empty string added [ 314.378373][ T30] audit: type=1400 audit(314.050:142): avc: denied { execute } for pid=3688 comm="syz.1.89" name="file0" dev="tmpfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 314.390755][ T30] audit: type=1400 audit(314.070:143): avc: denied { execute_no_trans } for pid=3688 comm="syz.1.89" path="/51/file0" dev="tmpfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 315.308547][ T3698] netlink: 12 bytes leftover after parsing attributes in process `syz.0.90'. [ 316.196329][ T30] audit: type=1326 audit(315.870:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 316.198764][ T30] audit: type=1326 audit(315.880:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 316.202206][ T30] audit: type=1326 audit(315.880:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 316.203813][ T30] audit: type=1326 audit(315.880:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 316.205084][ T30] audit: type=1326 audit(315.880:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=361 compat=1 ip=0x131f30 code=0x7ffc0000 [ 316.209521][ T30] audit: type=1326 audit(315.880:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 316.212466][ T30] audit: type=1326 audit(315.890:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3702 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 317.855435][ T3712] netlink: 8 bytes leftover after parsing attributes in process `syz.0.97'. [ 317.855988][ T3712] netlink: 8 bytes leftover after parsing attributes in process `syz.0.97'. [ 318.876540][ T30] audit: type=1400 audit(318.550:151): avc: denied { mount } for pid=3715 comm="syz.0.99" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 322.269879][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 322.270396][ T30] audit: type=1400 audit(321.950:153): avc: denied { read write } for pid=3721 comm="syz.0.101" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 322.278347][ T30] audit: type=1400 audit(321.950:154): avc: denied { open } for pid=3721 comm="syz.0.101" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 323.321578][ T3728] Zero length message leads to an empty skb [ 325.760475][ T30] audit: type=1400 audit(325.440:155): avc: denied { setopt } for pid=3737 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 327.551339][ T30] audit: type=1400 audit(327.230:156): avc: denied { append } for pid=3749 comm="syz.1.112" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 327.836522][ T30] audit: type=1400 audit(327.510:157): avc: denied { create } for pid=3752 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 327.846271][ T30] audit: type=1400 audit(327.520:158): avc: denied { getopt } for pid=3752 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 331.764415][ T30] audit: type=1400 audit(331.440:159): avc: denied { watch watch_reads } for pid=3761 comm="syz.0.117" path="/55" dev="tmpfs" ino=295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 332.180095][ T30] audit: type=1326 audit(331.860:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 332.180673][ T30] audit: type=1326 audit(331.860:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 332.194202][ T30] audit: type=1326 audit(331.860:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 332.204318][ T30] audit: type=1326 audit(331.880:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 332.210025][ T30] audit: type=1326 audit(331.890:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f30 code=0x7ffc0000 [ 332.214994][ T30] audit: type=1326 audit(331.890:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3767 comm="syz.1.118" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 333.760934][ T3441] Process accounting resumed [ 335.342337][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 335.345234][ T30] audit: type=1400 audit(335.020:177): avc: denied { setopt } for pid=3785 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 344.409799][ T3820] binfmt_misc: register: failed to install interpreter file ./file2 [ 344.469594][ T30] audit: type=1326 audit(344.150:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 344.472582][ T30] audit: type=1326 audit(344.150:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 344.477492][ T30] audit: type=1326 audit(344.150:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 344.478281][ T30] audit: type=1326 audit(344.150:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=1 ip=0x131f30 code=0x7ffc0000 [ 344.481952][ T30] audit: type=1326 audit(344.160:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 344.492036][ T30] audit: type=1326 audit(344.160:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 344.494469][ T30] audit: type=1326 audit(344.170:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3825 comm="syz.1.137" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 345.809124][ T30] audit: type=1326 audit(345.470:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3832 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 345.810087][ T30] audit: type=1326 audit(345.470:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3832 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 345.810570][ T30] audit: type=1326 audit(345.480:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3832 comm="syz.0.140" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 346.518141][ T3838] netlink: 28 bytes leftover after parsing attributes in process `syz.1.142'. [ 346.519259][ T3838] netlink: 28 bytes leftover after parsing attributes in process `syz.1.142'. [ 346.831617][ T3841] netlink: 8 bytes leftover after parsing attributes in process `syz.1.143'. [ 346.846043][ T3841] netlink: 8 bytes leftover after parsing attributes in process `syz.1.143'. [ 346.851099][ T3841] netlink: 8 bytes leftover after parsing attributes in process `syz.1.143'. [ 346.860220][ T3841] netlink: 8 bytes leftover after parsing attributes in process `syz.1.143'. [ 348.122684][ T3847] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 348.124785][ T3847] SELinux: failed to load policy [ 356.543878][ T3882] netlink: 4 bytes leftover after parsing attributes in process `syz.1.157'. [ 356.551594][ T3882] hsr_slave_0: left promiscuous mode [ 356.562766][ T3882] hsr_slave_1: left promiscuous mode [ 362.484175][ T3899] syz.1.164 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 363.918305][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 363.929673][ T30] audit: type=1400 audit(363.590:201): avc: denied { bind } for pid=3908 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 363.949808][ T30] audit: type=1400 audit(363.630:202): avc: denied { write } for pid=3908 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 364.338938][ T3912] netlink: 'syz.0.170': attribute type 15 has an invalid length. [ 366.304403][ T30] audit: type=1326 audit(365.980:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 366.306591][ T30] audit: type=1326 audit(365.980:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 366.319270][ T30] audit: type=1326 audit(366.000:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 366.324365][ T30] audit: type=1326 audit(366.000:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=390 compat=1 ip=0x131f30 code=0x7ffc0000 [ 366.343413][ T30] audit: type=1326 audit(366.020:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 366.348779][ T30] audit: type=1326 audit(366.020:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 366.356097][ T30] audit: type=1326 audit(366.030:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3918 comm="syz.0.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 366.704852][ T3922] netlink: 32 bytes leftover after parsing attributes in process `syz.1.175'. [ 366.854468][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 366.864877][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 366.866598][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 366.917994][ T3923] netlink: 4 bytes leftover after parsing attributes in process `syz.0.174'. [ 367.161374][ T30] audit: type=1326 audit(366.830:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3925 comm="syz.1.176" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 367.580604][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 367.582597][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 367.584580][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 367.586511][ T3923] netlink: 4 bytes leftover after parsing attributes in process `syz.0.174'. [ 368.267657][ T3923] netlink: 20 bytes leftover after parsing attributes in process `syz.0.174'. [ 371.506090][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 371.519102][ T30] audit: type=1400 audit(371.180:218): avc: denied { read write } for pid=3944 comm="syz.0.184" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 371.519639][ T30] audit: type=1400 audit(371.180:219): avc: denied { open } for pid=3944 comm="syz.0.184" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 371.888218][ T3945] ALSA: seq fatal error: cannot create timer (-19) [ 372.123582][ T30] audit: type=1400 audit(371.790:220): avc: denied { create } for pid=3949 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 372.543323][ T3955] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3955 comm=syz.1.186 [ 372.545614][ T3955] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3955 comm=syz.1.186 [ 372.778683][ T30] audit: type=1400 audit(372.460:221): avc: denied { setopt } for pid=3956 comm="syz.0.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 373.572893][ T30] audit: type=1400 audit(373.250:222): avc: denied { shutdown } for pid=3959 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 373.590436][ T30] audit: type=1400 audit(373.260:223): avc: denied { getopt } for pid=3959 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 373.673902][ T30] audit: type=1400 audit(373.350:224): avc: denied { create } for pid=3965 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 374.459934][ T30] audit: type=1400 audit(374.130:225): avc: denied { bind } for pid=3969 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 374.500220][ T3971] __nla_validate_parse: 4 callbacks suppressed [ 374.503728][ T3971] netlink: 4 bytes leftover after parsing attributes in process `syz.1.192'. [ 376.187647][ T30] audit: type=1400 audit(375.860:226): avc: denied { create } for pid=3978 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 376.237765][ T30] audit: type=1400 audit(375.910:227): avc: denied { setopt } for pid=3978 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 377.712469][ T3987] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 377.822723][ T3989] netlink: 8 bytes leftover after parsing attributes in process `syz.1.200'. [ 378.190730][ T30] audit: type=1400 audit(377.870:228): avc: denied { setopt } for pid=3990 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 378.688072][ T30] audit: type=1400 audit(378.350:229): avc: denied { write } for pid=3995 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 379.168976][ T30] audit: type=1400 audit(378.850:230): avc: denied { read } for pid=3998 comm="syz.0.207" dev="sockfs" ino=5401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 382.165226][ T4023] SELinux: Context ŸGúòm1Lhð”ý®H±äSiÉâK\‡: is not valid (left unmapped). [ 382.275340][ T30] audit: type=1326 audit(381.950:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 382.278534][ T30] audit: type=1326 audit(381.950:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 382.282656][ T30] audit: type=1326 audit(381.960:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 382.284079][ T30] audit: type=1326 audit(381.960:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x131f30 code=0x7ffc0000 [ 382.286652][ T30] audit: type=1326 audit(381.960:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 382.288850][ T30] audit: type=1326 audit(381.960:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 382.292400][ T30] audit: type=1326 audit(381.970:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4022 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 383.181350][ T4026] netlink: 16 bytes leftover after parsing attributes in process `syz.0.219'. [ 383.503819][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 383.504324][ T30] audit: type=1400 audit(383.180:281): avc: denied { prog_run } for pid=4027 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 384.225450][ T30] audit: type=1400 audit(383.900:282): avc: denied { write } for pid=4031 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 384.478695][ T30] audit: type=1400 audit(384.150:283): avc: denied { create } for pid=4033 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 384.486440][ T30] audit: type=1400 audit(384.160:284): avc: denied { connect } for pid=4033 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 385.438319][ T30] audit: type=1326 audit(385.110:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 385.442217][ T30] audit: type=1326 audit(385.110:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 385.449728][ T30] audit: type=1326 audit(385.110:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 385.453296][ T30] audit: type=1326 audit(385.110:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f30 code=0x7ffc0000 [ 385.469704][ T30] audit: type=1326 audit(385.120:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 385.473446][ T30] audit: type=1326 audit(385.120:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4039 comm="syz.1.226" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 387.949027][ T4054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4054 comm=syz.1.233 [ 387.949519][ T4054] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4054 comm=syz.1.233 [ 388.798533][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 388.803225][ T30] audit: type=1400 audit(388.470:338): avc: denied { create } for pid=4059 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 388.851067][ T30] audit: type=1400 audit(388.530:339): avc: denied { create } for pid=4059 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 388.877825][ T30] audit: type=1400 audit(388.550:340): avc: denied { write } for pid=4059 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 388.878370][ T30] audit: type=1400 audit(388.550:341): avc: denied { nlmsg_write } for pid=4059 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 389.446108][ T4066] netlink: 'syz.1.238': attribute type 10 has an invalid length. [ 389.754483][ T4068] netlink: 'syz.1.240': attribute type 10 has an invalid length. [ 390.012021][ T30] audit: type=1400 audit(389.690:342): avc: denied { create } for pid=4069 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 390.053484][ T30] audit: type=1400 audit(389.730:343): avc: denied { write } for pid=4069 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 390.063133][ T30] audit: type=1400 audit(389.740:344): avc: denied { module_request } for pid=4069 comm="syz.1.241" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 390.322085][ T30] audit: type=1400 audit(390.000:345): avc: denied { read } for pid=4069 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 390.564949][ T30] audit: type=1326 audit(390.240:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 390.573530][ T30] audit: type=1326 audit(390.250:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 396.245458][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 396.246040][ T30] audit: type=1400 audit(395.920:361): avc: denied { create } for pid=4095 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 396.280288][ T30] audit: type=1400 audit(395.960:362): avc: denied { setopt } for pid=4095 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 396.687986][ T30] audit: type=1400 audit(396.350:363): avc: denied { read } for pid=4097 comm="syz.1.252" dev="nsfs" ino=4026532719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 396.688578][ T30] audit: type=1400 audit(396.360:364): avc: denied { open } for pid=4097 comm="syz.1.252" path="net:[4026532719]" dev="nsfs" ino=4026532719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 397.160721][ T30] audit: type=1400 audit(396.840:365): avc: denied { ioctl } for pid=4097 comm="syz.1.252" path="socket:[4054]" dev="sockfs" ino=4054 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 397.818245][ T30] audit: type=1400 audit(397.490:366): avc: denied { sys_module } for pid=4097 comm="syz.1.252" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 399.102862][ T30] audit: type=1326 audit(398.780:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4109 comm="syz.1.256" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 399.104383][ T30] audit: type=1326 audit(398.780:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4109 comm="syz.1.256" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 399.119581][ T30] audit: type=1326 audit(398.800:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4109 comm="syz.1.256" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 399.124608][ T30] audit: type=1326 audit(398.800:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4109 comm="syz.1.256" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 408.181810][ T30] kauditd_printk_skb: 94 callbacks suppressed [ 408.185208][ T30] audit: type=1400 audit(407.860:465): avc: denied { ioctl } for pid=4125 comm="syz.0.261" path="socket:[5662]" dev="sockfs" ino=5662 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 408.195203][ T4126] netlink: 4 bytes leftover after parsing attributes in process `syz.0.261'. [ 416.945491][ T4126] hsr_slave_0: left promiscuous mode [ 416.952619][ T4126] hsr_slave_1: left promiscuous mode [ 417.651859][ T30] audit: type=1400 audit(417.330:466): avc: denied { create } for pid=4130 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 417.669354][ T30] audit: type=1400 audit(417.350:467): avc: denied { setopt } for pid=4130 comm="syz.0.263" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 427.832603][ T30] audit: type=1400 audit(427.510:468): avc: denied { audit_write } for pid=4172 comm="syz.0.281" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 427.871406][ T30] audit: type=1107 audit(427.550:469): pid=4172 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 438.430806][ T30] audit: type=1400 audit(438.110:470): avc: denied { block_suspend } for pid=4192 comm="syz.0.288" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 439.816394][ T4202] netlink: 24 bytes leftover after parsing attributes in process `syz.0.291'. [ 442.247517][ T30] audit: type=1400 audit(441.910:471): avc: denied { name_bind } for pid=4213 comm="syz.0.297" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 445.907919][ T4221] bond1: entered promiscuous mode [ 445.908678][ T4221] bond1: entered allmulticast mode [ 445.911365][ T4221] 8021q: adding VLAN 0 to HW filter on device bond1 [ 447.084047][ T4221] bond1 (unregistering): Released all slaves [ 448.523507][ T30] audit: type=1400 audit(448.200:472): avc: denied { connect } for pid=4229 comm="syz.0.303" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 448.532123][ T30] audit: type=1400 audit(448.210:473): avc: denied { write } for pid=4229 comm="syz.0.303" laddr=fe80::13 lport=60 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 448.554643][ T30] audit: type=1400 audit(448.230:474): avc: denied { bind } for pid=4231 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 448.562247][ T30] audit: type=1400 audit(448.240:475): avc: denied { name_bind } for pid=4231 comm="syz.1.304" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 448.566718][ T30] audit: type=1400 audit(448.240:476): avc: denied { node_bind } for pid=4231 comm="syz.1.304" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 448.598569][ T30] audit: type=1400 audit(448.270:477): avc: denied { write } for pid=4231 comm="syz.1.304" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 448.599920][ T30] audit: type=1400 audit(448.270:478): avc: denied { connect } for pid=4231 comm="syz.1.304" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 448.600237][ T30] audit: type=1400 audit(448.270:479): avc: denied { name_connect } for pid=4231 comm="syz.1.304" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 450.406570][ T30] audit: type=1400 audit(450.080:480): avc: denied { create } for pid=4242 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 450.423059][ T30] audit: type=1400 audit(450.100:481): avc: denied { write } for pid=4242 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 455.263234][ T30] audit: type=1400 audit(454.940:482): avc: denied { bind } for pid=4255 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 455.280132][ T4256] af_packet: tpacket_rcv: packet too big, clamped from 56584 to 4. macoff=68 [ 455.547333][ T30] audit: type=1400 audit(455.220:483): avc: denied { create } for pid=4257 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 455.558619][ T30] audit: type=1400 audit(455.230:484): avc: denied { setopt } for pid=4257 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 455.882613][ T30] audit: type=1400 audit(455.560:485): avc: denied { bind } for pid=4257 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 467.338798][ T30] audit: type=1400 audit(467.000:486): avc: denied { create } for pid=4265 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 468.161966][ T30] audit: type=1400 audit(467.840:487): avc: denied { create } for pid=4271 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 468.174391][ T30] audit: type=1400 audit(467.850:488): avc: denied { bind } for pid=4271 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 468.179482][ T30] audit: type=1400 audit(467.850:489): avc: denied { setopt } for pid=4271 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 469.706721][ T4278] syz.1.322 uses obsolete (PF_INET,SOCK_PACKET) [ 470.565519][ T30] audit: type=1400 audit(470.230:490): avc: denied { create } for pid=4281 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 470.582450][ T30] audit: type=1400 audit(470.260:491): avc: denied { ioctl } for pid=4281 comm="syz.0.324" path="socket:[6431]" dev="sockfs" ino=6431 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 470.594709][ T30] audit: type=1400 audit(470.270:492): avc: denied { connect } for pid=4281 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 470.608855][ T4282] netlink: 4 bytes leftover after parsing attributes in process `syz.0.324'. [ 471.857582][ T30] audit: type=1400 audit(471.530:493): avc: denied { ioctl } for pid=4286 comm="syz.0.326" path="socket:[6016]" dev="sockfs" ino=6016 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 486.268607][ T30] audit: type=1400 audit(485.940:494): avc: denied { connect } for pid=4298 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 487.426246][ T30] audit: type=1400 audit(487.100:495): avc: denied { bind } for pid=4308 comm="syz.1.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 488.227915][ T30] audit: type=1400 audit(487.900:496): avc: denied { read write } for pid=4314 comm="syz.1.337" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 488.228712][ T30] audit: type=1400 audit(487.900:497): avc: denied { open } for pid=4314 comm="syz.1.337" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 488.369019][ T30] audit: type=1326 audit(488.000:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.0.336" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 488.372010][ T30] audit: type=1326 audit(488.050:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.0.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 488.375049][ T30] audit: type=1326 audit(488.050:500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.0.336" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 488.380241][ T30] audit: type=1326 audit(488.050:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.0.336" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 488.383137][ T30] audit: type=1326 audit(488.060:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.0.336" exe="/syz-executor" sig=0 arch=40000028 syscall=29 compat=1 ip=0x131f30 code=0x7ffc0000 [ 491.325340][ T30] audit: type=1400 audit(491.000:503): avc: denied { create } for pid=4331 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 491.335359][ T30] audit: type=1400 audit(491.010:504): avc: denied { connect } for pid=4331 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 491.814395][ T30] audit: type=1400 audit(491.490:505): avc: denied { execmem } for pid=4334 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 495.883546][ T30] audit: type=1400 audit(495.560:506): avc: denied { read } for pid=4334 comm="syz.0.345" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 495.891810][ T30] audit: type=1400 audit(495.570:507): avc: denied { open } for pid=4334 comm="syz.0.345" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 495.939866][ T30] audit: type=1400 audit(495.620:508): avc: denied { ioctl } for pid=4334 comm="syz.0.345" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 499.911087][ T4340] netlink: 40 bytes leftover after parsing attributes in process `syz.1.346'. [ 504.713626][ T30] audit: type=1400 audit(504.390:509): avc: denied { create } for pid=4341 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 507.342866][ T30] audit: type=1400 audit(507.020:510): avc: denied { shutdown } for pid=4346 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 507.378536][ T30] audit: type=1400 audit(507.050:511): avc: denied { name_connect } for pid=4346 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 514.269634][ T30] audit: type=1400 audit(513.940:512): avc: denied { name_bind } for pid=4356 comm="syz.1.351" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 514.273117][ T30] audit: type=1400 audit(513.940:513): avc: denied { node_bind } for pid=4356 comm="syz.1.351" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 515.302432][ T30] audit: type=1400 audit(514.980:514): avc: denied { relabelfrom } for pid=4364 comm="syz.1.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 515.313255][ T30] audit: type=1400 audit(514.990:515): avc: denied { relabelto } for pid=4364 comm="syz.1.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 515.792673][ T30] audit: type=1400 audit(515.470:516): avc: denied { read write } for pid=4367 comm="syz.1.355" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 515.802236][ T30] audit: type=1400 audit(515.470:517): avc: denied { open } for pid=4367 comm="syz.1.355" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 515.806079][ T30] audit: type=1400 audit(515.480:518): avc: denied { ioctl } for pid=4367 comm="syz.1.355" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 515.832127][ T4368] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 515.840803][ T4368] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 518.289932][ T30] audit: type=1400 audit(517.810:519): avc: denied { sqpoll } for pid=4374 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 526.943383][ T30] audit: type=1400 audit(526.620:520): avc: denied { accept } for pid=4381 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 526.956799][ T30] audit: type=1400 audit(526.630:521): avc: denied { write } for pid=4381 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 531.140404][ T30] audit: type=1400 audit(530.790:522): avc: denied { bind } for pid=4387 comm="syz.0.361" lport=129 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 531.143552][ T30] audit: type=1400 audit(530.810:523): avc: denied { name_bind } for pid=4387 comm="syz.0.361" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 531.149603][ T30] audit: type=1400 audit(530.820:524): avc: denied { node_bind } for pid=4387 comm="syz.0.361" saddr=::ffff:0.0.0.0 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 532.023187][ T30] audit: type=1400 audit(531.700:525): avc: denied { read write } for pid=4392 comm="syz.0.363" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 532.033022][ T30] audit: type=1400 audit(531.710:526): avc: denied { open } for pid=4392 comm="syz.0.363" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 532.051792][ T30] audit: type=1400 audit(531.730:527): avc: denied { mounton } for pid=4392 comm="syz.0.363" path="/178/file0" dev="tmpfs" ino=923 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 532.092014][ T30] audit: type=1400 audit(531.760:528): avc: denied { mount } for pid=4392 comm="syz.0.363" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 532.672150][ T30] audit: type=1400 audit(532.350:529): avc: denied { read } for pid=4392 comm="syz.0.363" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 532.683722][ T30] audit: type=1400 audit(532.350:530): avc: denied { open } for pid=4392 comm="syz.0.363" path="/178/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 532.848316][ T4394] block device autoloading is deprecated and will be removed. [ 532.991069][ T30] audit: type=1400 audit(532.670:531): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 533.903659][ T30] audit: type=1400 audit(533.580:532): avc: denied { getopt } for pid=4398 comm="syz.0.365" lport=33056 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 538.252359][ T4411] netlink: 16 bytes leftover after parsing attributes in process `syz.1.370'. [ 538.525229][ T30] audit: type=1400 audit(538.200:533): avc: denied { append } for pid=4412 comm="syz.1.371" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 538.564157][ T4413] loop6: detected capacity change from 0 to 7 [ 539.031565][ T4415] netlink: 16 bytes leftover after parsing attributes in process `syz.1.372'. [ 541.110061][ T3452] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 541.307951][ T3452] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 541.308666][ T3452] usb 1-1: New USB device found, idVendor=1bc7, idProduct=9010, bcdDevice=36.53 [ 541.309184][ T3452] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 541.373357][ T3452] usb 1-1: config 0 descriptor?? [ 541.458741][ T3452] option 1-1:0.0: GSM modem (1-port) converter detected [ 541.626578][ T3452] usb 1-1: USB disconnect, device number 4 [ 541.714645][ T3452] option 1-1:0.0: device disconnected [ 541.835968][ T30] audit: type=1400 audit(541.480:534): avc: denied { ioctl } for pid=4423 comm="syz.1.375" path="socket:[7341]" dev="sockfs" ino=7341 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 542.282033][ T4430] capability: warning: `syz.0.376' uses 32-bit capabilities (legacy support in use) [ 542.383491][ T30] audit: type=1400 audit(542.050:535): avc: denied { mount } for pid=4428 comm="syz.0.376" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 542.588281][ T30] audit: type=1400 audit(542.260:536): avc: denied { unmount } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 543.082329][ T30] audit: type=1400 audit(542.760:537): avc: denied { create } for pid=4433 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 543.119405][ T30] audit: type=1400 audit(542.790:538): avc: denied { connect } for pid=4433 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 544.167753][ T30] audit: type=1400 audit(543.830:539): avc: denied { mounton } for pid=4436 comm="syz.0.378" path="/187/file0" dev="tmpfs" ino=970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 545.007996][ T30] audit: type=1400 audit(544.670:540): avc: denied { search } for pid=4439 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.008649][ T30] audit: type=1400 audit(544.680:541): avc: denied { search } for pid=4439 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=933 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.009080][ T30] audit: type=1400 audit(544.680:542): avc: denied { search } for pid=4439 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=937 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.009397][ T30] audit: type=1400 audit(544.680:543): avc: denied { search } for pid=4439 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.066392][ T30] audit: type=1400 audit(544.740:544): avc: denied { read open } for pid=4442 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.087965][ T30] audit: type=1400 audit(544.760:545): avc: denied { getattr } for pid=4442 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.121985][ T4443] netlink: 8 bytes leftover after parsing attributes in process `syz.1.380'. [ 545.122508][ T4443] netlink: 12 bytes leftover after parsing attributes in process `syz.1.380'. [ 545.252775][ T30] audit: type=1400 audit(544.930:546): avc: denied { add_name } for pid=4439 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 545.254473][ T30] audit: type=1400 audit(544.930:547): avc: denied { create } for pid=4439 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 545.256712][ T30] audit: type=1400 audit(544.930:548): avc: denied { write open } for pid=4439 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2144 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 545.749651][ T4446] binder: 4445:4446 ioctl c0306201 0 returned -14 [ 569.377950][ T3230] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 569.774085][ T3230] usb 1-1: config 0 interface 0 altsetting 16 endpoint 0x81 has invalid wMaxPacketSize 0 [ 569.774649][ T3230] usb 1-1: config 0 interface 0 altsetting 16 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 569.775067][ T3230] usb 1-1: config 0 interface 0 has no altsetting 0 [ 569.775357][ T3230] usb 1-1: New USB device found, idVendor=04b4, idProduct=07b1, bcdDevice= 0.00 [ 569.775584][ T3230] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 569.815893][ T3230] usb 1-1: config 0 descriptor?? [ 570.316038][ T3230] hid (null): unknown global tag 0xc [ 570.328301][ T3230] hid (null): global environment stack underflow [ 570.396330][ T3230] hid-generic 0003:04B4:07B1.0001: unknown global tag 0xc [ 570.400462][ T3230] hid-generic 0003:04B4:07B1.0001: item 0 1 1 12 parsing failed [ 570.414036][ T3230] hid-generic 0003:04B4:07B1.0001: probe with driver hid-generic failed with error -22 [ 570.548968][ T3441] usb 1-1: USB disconnect, device number 5 [ 577.057481][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 577.058789][ T30] audit: type=1400 audit(576.725:558): avc: denied { read write } for pid=4499 comm="syz.1.396" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 577.065316][ T30] audit: type=1400 audit(576.735:559): avc: denied { open } for pid=4499 comm="syz.1.396" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 577.074225][ T30] audit: type=1400 audit(576.745:560): avc: denied { ioctl } for pid=4499 comm="syz.1.396" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 578.373381][ T30] audit: type=1400 audit(578.045:561): avc: denied { ioctl } for pid=4508 comm="syz.1.400" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7527 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 582.360588][ T4519] xfrm0: Master is either lo or non-ether device [ 599.343796][ T4539] netlink: 128 bytes leftover after parsing attributes in process `syz.1.411'. [ 599.345471][ T4539] netlink: 24 bytes leftover after parsing attributes in process `syz.1.411'. [ 622.865342][ T4563] netlink: 28 bytes leftover after parsing attributes in process `syz.1.419'. [ 622.892831][ T4563] veth1_macvtap: left promiscuous mode [ 625.452302][ T30] audit: type=1400 audit(625.125:562): avc: denied { execute } for pid=4564 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 625.470288][ T30] audit: type=1400 audit(625.135:563): avc: denied { execute_no_trans } for pid=4564 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 625.671570][ T30] audit: type=1400 audit(625.345:564): avc: denied { mounton } for pid=4565 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 633.326074][ T4588] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 633.353432][ T4588] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 633.554680][ T4565] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 633.596081][ T4565] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 633.850076][ T30] audit: type=1400 audit(633.525:565): avc: denied { read write } for pid=4590 comm="syz.1.422" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 633.853016][ T30] audit: type=1400 audit(633.525:566): avc: denied { open } for pid=4590 comm="syz.1.422" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 636.100244][ T97] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.522955][ T97] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 636.945294][ T97] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 637.313637][ T97] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.416336][ T30] audit: type=1400 audit(638.085:567): avc: denied { read } for pid=3154 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 639.218373][ T30] audit: type=1400 audit(638.885:568): avc: denied { accept } for pid=4598 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 642.072970][ T97] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 642.186070][ T97] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 642.271195][ T97] bond0 (unregistering): Released all slaves [ 643.603410][ T97] veth1_macvtap: left promiscuous mode [ 643.607648][ T97] veth0_macvtap: left promiscuous mode [ 643.611348][ T97] veth1_vlan: left promiscuous mode [ 643.614608][ T97] veth0_vlan: left promiscuous mode [ 651.866069][ T4565] hsr_slave_0: entered promiscuous mode [ 651.889617][ T4565] hsr_slave_1: entered promiscuous mode [ 654.731632][ T4565] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 654.821573][ T4565] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 654.891876][ T4565] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 654.952421][ T4565] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 658.669113][ T4648] mmap: syz.1.430 (4648): VmData 17506304 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 658.684034][ T4565] 8021q: adding VLAN 0 to HW filter on device bond0 [ 658.698968][ T30] audit: type=1400 audit(658.355:569): avc: denied { read } for pid=4628 comm="syz.1.430" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 658.699592][ T30] audit: type=1400 audit(658.355:570): avc: denied { open } for pid=4628 comm="syz.1.430" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 658.731605][ T30] audit: type=1400 audit(658.395:571): avc: denied { ioctl } for pid=4628 comm="syz.1.430" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 675.491623][ T30] audit: type=1400 audit(675.165:572): avc: denied { read } for pid=4700 comm="syz.1.431" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 675.510682][ T30] audit: type=1400 audit(675.185:573): avc: denied { open } for pid=4700 comm="syz.1.431" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 675.531905][ T30] audit: type=1400 audit(675.205:574): avc: denied { ioctl } for pid=4700 comm="syz.1.431" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 676.493266][ T4565] veth0_vlan: entered promiscuous mode [ 676.716034][ T4565] veth1_vlan: entered promiscuous mode [ 677.436274][ T4565] veth0_macvtap: entered promiscuous mode [ 677.670093][ T4565] veth1_macvtap: entered promiscuous mode [ 678.557482][ T4565] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 678.558073][ T4565] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 678.558404][ T4565] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 678.558609][ T4565] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 679.352564][ T30] audit: type=1400 audit(679.025:575): avc: denied { mounton } for pid=4565 comm="syz-executor" path="/syzkaller.un6C1k/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 679.449994][ T30] audit: type=1400 audit(679.105:576): avc: denied { mount } for pid=4565 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 679.573954][ T30] audit: type=1400 audit(679.245:577): avc: denied { mounton } for pid=4565 comm="syz-executor" path="/syzkaller.un6C1k/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 679.621010][ T30] audit: type=1400 audit(679.285:578): avc: denied { mounton } for pid=4565 comm="syz-executor" path="/syzkaller.un6C1k/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8337 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 679.824359][ T30] audit: type=1400 audit(679.495:579): avc: denied { unmount } for pid=4565 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 679.847932][ T30] audit: type=1400 audit(679.505:580): avc: denied { mounton } for pid=4565 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 679.968282][ T30] audit: type=1400 audit(679.635:581): avc: denied { mount } for pid=4565 comm="syz-executor" name="/" dev="gadgetfs" ino=3274 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 681.871420][ T4727] trusted_key: encrypted_key: master key parameter 'u' is invalid [ 682.891339][ T4730] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.893971][ T4730] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 696.861022][ T4758] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 696.866368][ T4758] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 727.454613][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 727.455733][ T30] audit: type=1400 audit(727.125:585): avc: denied { create } for pid=4792 comm="syz.2.453" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 727.488374][ T30] audit: type=1400 audit(727.155:586): avc: denied { write } for pid=4792 comm="syz.2.453" name="file0" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 727.499661][ T30] audit: type=1400 audit(727.165:587): avc: denied { open } for pid=4792 comm="syz.2.453" path="/8/file0" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 734.592610][ T30] audit: type=1400 audit(734.255:588): avc: denied { ioctl } for pid=4792 comm="syz.2.453" path="/8/file0" dev="tmpfs" ino=58 ioctlcmd=0x1274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 737.283365][ T4799] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 737.300790][ T4799] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 748.851779][ T30] audit: type=1400 audit(748.525:589): avc: denied { create } for pid=4804 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 748.863583][ T30] audit: type=1400 audit(748.525:590): avc: denied { write } for pid=4804 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 748.933066][ T30] audit: type=1400 audit(748.585:591): avc: denied { unlink } for pid=4565 comm="syz-executor" name="file0" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 762.092815][ T30] audit: type=1400 audit(761.765:592): avc: denied { watch_reads } for pid=4820 comm="syz.1.462" path="/253" dev="tmpfs" ino=1306 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 762.859011][ T4823] netlink: 28 bytes leftover after parsing attributes in process `syz.1.463'. [ 762.860159][ T4823] netlink: 'syz.1.463': attribute type 7 has an invalid length. [ 762.860547][ T4823] netlink: 'syz.1.463': attribute type 8 has an invalid length. [ 762.860890][ T4823] netlink: 4 bytes leftover after parsing attributes in process `syz.1.463'. [ 764.730238][ T4829] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 764.739875][ T4829] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 767.224164][ T30] audit: type=1400 audit(766.895:593): avc: denied { listen } for pid=4831 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 767.268076][ T30] audit: type=1400 audit(766.935:594): avc: denied { accept } for pid=4831 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 777.670264][ T4845] syz_tun: entered allmulticast mode [ 777.780464][ T4843] syz_tun: left allmulticast mode [ 780.473242][ T4856] sch_tbf: burst 32855 is lower than device lo mtu (65550) ! [ 780.772733][ T30] audit: type=1400 audit(780.445:595): avc: denied { getopt } for pid=4854 comm="syz.2.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 783.740977][ T4855] infiniband syz0: set down [ 783.743197][ T4855] infiniband syz0: added ipvlan0 [ 783.965841][ T4855] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 784.060772][ T4855] infiniband syz0: Couldn't open port 1 [ 784.433642][ T4855] RDS/IB: syz0: added [ 784.440416][ T4855] smc: adding ib device syz0 with port count 1 [ 784.445643][ T4855] smc: ib device syz0 port 1 has pnetid [ 791.102872][ T30] audit: type=1400 audit(790.775:596): avc: denied { read } for pid=4869 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 791.644462][ T30] audit: type=1400 audit(791.315:597): avc: denied { setopt } for pid=4869 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 791.663421][ T30] audit: type=1400 audit(791.335:598): avc: denied { write } for pid=4869 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 792.950294][ T4873] wireguard0: entered promiscuous mode [ 792.950909][ T4873] wireguard0: entered allmulticast mode [ 797.702884][ T30] audit: type=1400 audit(797.375:599): avc: denied { wake_alarm } for pid=4882 comm="syz.2.484" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 805.171657][ T30] audit: type=1400 audit(804.845:600): avc: denied { mount } for pid=4884 comm="syz.2.485" name="/" dev="autofs" ino=8571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 809.354792][ T4896] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 809.366597][ T4896] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 810.116479][ T4899] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 810.125536][ T4899] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 820.229236][ T30] audit: type=1400 audit(819.895:601): avc: denied { unmount } for pid=4565 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 820.884741][ T4912] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 820.935388][ T4912] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 828.812760][ T4934] No control pipe specified [ 829.480048][ T4936] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 829.503513][ T4936] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 833.138041][ T4941] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 838.015095][ T4947] No control pipe specified [ 838.754254][ T30] audit: type=1326 audit(838.425:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 838.768366][ T30] audit: type=1326 audit(838.435:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 838.784677][ T30] audit: type=1326 audit(838.455:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 838.800784][ T30] audit: type=1326 audit(838.455:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=1 ip=0x131f30 code=0x7ffc0000 [ 838.811453][ T30] audit: type=1326 audit(838.455:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 838.821251][ T30] audit: type=1326 audit(838.455:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 838.826286][ T30] audit: type=1326 audit(838.475:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4948 comm="syz.1.504" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 846.412020][ T30] audit: type=1400 audit(846.075:609): avc: denied { execute_no_trans } for pid=4952 comm="syz.1.506" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 856.858330][ T30] audit: type=1400 audit(856.505:610): avc: denied { map } for pid=4966 comm="syz.2.510" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.862130][ T30] audit: type=1400 audit(856.525:611): avc: denied { execute } for pid=4966 comm="syz.2.510" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.274278][ T4974] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4974 comm=syz.1.512 [ 860.277646][ T30] audit: type=1400 audit(859.945:612): avc: denied { nlmsg_write } for pid=4973 comm="syz.1.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 872.406198][ T5007] netlink: 24 bytes leftover after parsing attributes in process `syz.2.521'. [ 877.368423][ T30] audit: type=1400 audit(877.035:613): avc: denied { ioctl } for pid=5003 comm="syz.1.520" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 877.527978][ T5012] input: syz1 as /devices/virtual/input/input1 [ 892.638289][ T30] audit: type=1400 audit(892.295:614): avc: denied { create } for pid=5030 comm="syz.2.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 897.629456][ T5038] netlink: 'syz.1.528': attribute type 111 has an invalid length. [ 899.657468][ T30] audit: type=1400 audit(899.325:615): avc: denied { ioctl } for pid=5044 comm="syz.1.531" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 937.884899][ T30] audit: type=1400 audit(937.555:616): avc: denied { mounton } for pid=5179 comm="syz.2.553" path="/proc/170/task" dev="proc" ino=9744 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 942.582448][ T5200] netlink: 4 bytes leftover after parsing attributes in process `syz.1.561'. [ 946.573107][ T30] audit: type=1400 audit(946.245:617): avc: denied { write } for pid=5186 comm="syz.2.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 954.710076][ T30] audit: type=1400 audit(954.375:618): avc: denied { create } for pid=5225 comm="syz.1.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 955.921688][ T30] audit: type=1400 audit(955.595:619): avc: denied { open } for pid=5229 comm="syz.1.572" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 955.962324][ T30] audit: type=1400 audit(955.635:620): avc: denied { ioctl } for pid=5229 comm="syz.1.572" path="/dev/ptyq6" dev="devtmpfs" ino=117 ioctlcmd=0x540f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 957.534157][ T5238] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 957.581599][ T5238] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 967.484525][ T5260] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 967.513901][ T5260] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 967.832810][ T30] audit: type=1400 audit(967.505:621): avc: denied { listen } for pid=5244 comm="syz.1.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 968.902601][ T30] audit: type=1326 audit(968.555:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 968.953976][ T30] audit: type=1326 audit(968.615:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 968.955070][ T30] audit: type=1326 audit(968.615:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 969.023361][ T30] audit: type=1326 audit(968.675:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 969.024497][ T30] audit: type=1326 audit(968.695:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=244 compat=1 ip=0x131f30 code=0x7ffc0000 [ 969.025224][ T30] audit: type=1326 audit(968.695:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 969.025703][ T30] audit: type=1326 audit(968.695:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5263 comm="syz.2.585" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 999.973325][ T5284] netlink: 12 bytes leftover after parsing attributes in process `syz.2.592'. [ 1025.019153][ T30] audit: type=1400 audit(1024.655:629): avc: denied { write } for pid=5306 comm="syz.1.599" name="fib_triestat" dev="proc" ino=4026532734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1038.814747][ T30] audit: type=1400 audit(1038.485:630): avc: denied { setopt } for pid=5322 comm="syz.1.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1041.794405][ T30] audit: type=1326 audit(1041.465:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1041.803213][ T30] audit: type=1326 audit(1041.475:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1041.805204][ T30] audit: type=1326 audit(1041.475:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1041.817464][ T30] audit: type=1326 audit(1041.485:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1041.821170][ T30] audit: type=1326 audit(1041.495:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=460 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1041.821500][ T30] audit: type=1326 audit(1041.495:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1041.822022][ T30] audit: type=1326 audit(1041.495:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5332 comm="syz.1.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1050.613308][ T30] audit: type=1400 audit(1050.285:638): avc: denied { append } for pid=5336 comm="syz.1.609" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1050.631914][ T30] audit: type=1400 audit(1050.305:639): avc: denied { open } for pid=5336 comm="syz.1.609" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1050.643763][ T5347] random: crng reseeded on system resumption [ 1054.223188][ T5343] netlink: 32 bytes leftover after parsing attributes in process `syz.2.610'. [ 1095.664301][ T5394] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1095.675901][ T5394] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1103.448503][ T30] audit: type=1400 audit(1103.115:640): avc: denied { read } for pid=5403 comm="syz.2.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1179.736069][ T5500] fuse: Unknown parameter 'user_id00000000000000000000' [ 1182.399136][ T30] audit: type=1326 audit(1182.065:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1182.419644][ T30] audit: type=1326 audit(1182.085:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1182.424043][ T30] audit: type=1326 audit(1182.095:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1182.441421][ T30] audit: type=1326 audit(1182.115:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1182.448994][ T30] audit: type=1326 audit(1182.115:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1182.468393][ T30] audit: type=1326 audit(1182.135:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1182.472282][ T30] audit: type=1326 audit(1182.145:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1182.532598][ T30] audit: type=1326 audit(1182.155:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1182.533822][ T30] audit: type=1326 audit(1182.195:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 1182.534375][ T30] audit: type=1326 audit(1182.195:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5505 comm="syz.2.652" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f30 code=0x7ffc0000 [ 1186.613381][ T97] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.115747][ T97] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.426053][ T97] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.871897][ T97] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1193.048728][ T97] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1193.156305][ T97] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1193.212595][ T97] bond0 (unregistering): Released all slaves [ 1196.830245][ T97] hsr_slave_0: left promiscuous mode [ 1196.848354][ T97] hsr_slave_1: left promiscuous mode [ 1197.026577][ T97] veth1_macvtap: left promiscuous mode [ 1197.061602][ T97] veth0_macvtap: left promiscuous mode [ 1197.062984][ T97] veth1_vlan: left promiscuous mode [ 1197.063590][ T97] veth0_vlan: left promiscuous mode [ 1199.097868][ T5110] smc: removing ib device syz0 [ 1206.530407][ T3230] ================================================================== [ 1206.531597][ T3230] BUG: KASAN: slab-use-after-free in __ethtool_get_link_ksettings+0x13c/0x164 [ 1206.532963][ T3230] Read of size 8 at addr ffff00001705c2e8 by task kworker/0:2/3230 [ 1206.533062][ T3230] [ 1206.533990][ T3230] CPU: 0 UID: 0 PID: 3230 Comm: kworker/0:2 Not tainted 6.15.0-syzkaller-03645-g3d413f0cfd7e #0 PREEMPT [ 1206.534114][ T3230] Hardware name: linux,dummy-virt (DT) [ 1206.534356][ T3230] Workqueue: events smc_ib_port_event_work [ 1206.534724][ T3230] Call trace: [ 1206.534898][ T3230] show_stack+0x18/0x24 (C) [ 1206.535040][ T3230] dump_stack_lvl+0xa4/0xf4 [ 1206.535099][ T3230] print_report+0xf4/0x60c [ 1206.535147][ T3230] kasan_report+0xc8/0x108 [ 1206.535189][ T3230] __asan_report_load8_noabort+0x20/0x2c [ 1206.535227][ T3230] __ethtool_get_link_ksettings+0x13c/0x164 [ 1206.535267][ T3230] ipvlan_ethtool_get_link_ksettings+0x34/0x54 [ 1206.535311][ T3230] __ethtool_get_link_ksettings+0xd4/0x164 [ 1206.535350][ T3230] ib_get_eth_speed+0xe8/0x908 [ 1206.535393][ T3230] rxe_query_port+0xec/0x298 [ 1206.535436][ T3230] ib_query_port+0x300/0x5f4 [ 1206.535477][ T3230] smc_ib_port_event_work+0x104/0x8f8 [ 1206.535556][ T3230] process_one_work+0x7cc/0x18d4 [ 1206.535650][ T3230] worker_thread+0x734/0xb84 [ 1206.535733][ T3230] kthread+0x348/0x5fc [ 1206.535827][ T3230] ret_from_fork+0x10/0x20 [ 1206.536189][ T3230] [ 1206.537137][ T3230] Allocated by task 4565: [ 1206.537399][ T3230] kasan_save_stack+0x3c/0x64 [ 1206.537517][ T3230] kasan_save_track+0x20/0x3c [ 1206.537728][ T3230] kasan_save_alloc_info+0x40/0x54 [ 1206.537819][ T3230] __kasan_kmalloc+0xb8/0xbc [ 1206.537898][ T3230] __kvmalloc_node_noprof+0x270/0x650 [ 1206.537979][ T3230] alloc_netdev_mqs+0x6c/0xfcc [ 1206.538060][ T3230] rtnl_create_link+0x908/0xc1c [ 1206.538138][ T3230] rtnl_newlink+0x9bc/0x1810 [ 1206.538212][ T3230] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1206.538288][ T3230] netlink_rcv_skb+0x1a8/0x348 [ 1206.538368][ T3230] rtnetlink_rcv+0x18/0x24 [ 1206.538443][ T3230] netlink_unicast+0x3c0/0x670 [ 1206.538521][ T3230] netlink_sendmsg+0x644/0xa54 [ 1206.538599][ T3230] __sock_sendmsg+0xc8/0x168 [ 1206.538681][ T3230] __sys_sendto+0x1d8/0x270 [ 1206.538754][ T3230] __arm64_sys_sendto+0xc0/0x134 [ 1206.538835][ T3230] invoke_syscall+0x6c/0x258 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1206.538913][ T3230] el0_svc_common.constprop.0+0xac/0x230 [ 1206.538988][ T3230] do_el0_svc_compat+0x40/0x68 [ 1206.539062][ T3230] el0_svc_compat+0x4c/0x17c [ 1206.539141][ T3230] el0t_32_sync_handler+0x98/0x13c [ 1206.539218][ T3230] el0t_32_sync+0x19c/0x1a0 [ 1206.539333][ T3230] [ 1206.539419][ T3230] Freed by task 97: [ 1206.539503][ T3230] kasan_save_stack+0x3c/0x64 [ 1206.539586][ T3230] kasan_save_track+0x20/0x3c [ 1206.539665][ T3230] kasan_save_free_info+0x4c/0x74 [ 1206.539739][ T3230] __kasan_slab_free+0x50/0x6c [ 1206.539825][ T3230] kfree+0x1bc/0x444 [ 1206.539900][ T3230] kvfree+0x3c/0x4c [ 1206.539974][ T3230] netdev_release+0x70/0x98 [ 1206.540054][ T3230] device_release+0xe4/0x1e8 [ 1206.540137][ T3230] kobject_put+0x17c/0x430 [ 1206.540220][ T3230] netdev_run_todo+0x570/0xd38 [ 1206.540299][ T3230] rtnl_unlock+0x10/0x1c [ 1206.540377][ T3230] default_device_exit_batch+0x618/0x88c [ 1206.540453][ T3230] ops_exit_list+0xf0/0x140 [ 1206.540533][ T3230] cleanup_net+0x438/0x93c [ 1206.540612][ T3230] process_one_work+0x7cc/0x18d4 [ 1206.540689][ T3230] worker_thread+0x734/0xb84 [ 1206.540764][ T3230] kthread+0x348/0x5fc [ 1206.540844][ T3230] ret_from_fork+0x10/0x20 [ 1206.540932][ T3230] [ 1206.541052][ T3230] The buggy address belongs to the object at ffff00001705c000 [ 1206.541052][ T3230] which belongs to the cache kmalloc-cg-4k of size 4096 [ 1206.541199][ T3230] The buggy address is located 744 bytes inside of [ 1206.541199][ T3230] freed 4096-byte region [ffff00001705c000, ffff00001705d000) [ 1206.541292][ T3230] [ 1206.541423][ T3230] The buggy address belongs to the physical page: [ 1206.541969][ T3230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff00001705a000 pfn:0x57058 [ 1206.542853][ T3230] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1206.543057][ T3230] memcg:ffff00001811ef01 [ 1206.543271][ T3230] flags: 0x1ffc00000000240(workingset|head|node=0|zone=0|lastcpupid=0x7ff) [ 1206.544056][ T3230] page_type: f5(slab) [ 1206.544716][ T3230] raw: 01ffc00000000240 ffff00000dc0b500 fffffdffc05b7a10 fffffdffc06c6e10 [ 1206.544834][ T3230] raw: ffff00001705a000 0000000000040003 00000000f5000000 ffff00001811ef01 [ 1206.544984][ T3230] head: 01ffc00000000240 ffff00000dc0b500 fffffdffc05b7a10 fffffdffc06c6e10 [ 1206.545066][ T3230] head: ffff00001705a000 0000000000040003 00000000f5000000 ffff00001811ef01 [ 1206.545142][ T3230] head: 01ffc00000000003 fffffdffc05c1601 00000000ffffffff 00000000ffffffff [ 1206.545215][ T3230] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 1206.545326][ T3230] page dumped because: kasan: bad access detected [ 1206.545409][ T3230] [ 1206.545480][ T3230] Memory state around the buggy address: [ 1206.546013][ T3230] ffff00001705c180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1206.546253][ T3230] ffff00001705c200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1206.546373][ T3230] >ffff00001705c280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1206.546480][ T3230] ^ [ 1206.546656][ T3230] ffff00001705c300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1206.546877][ T3230] ffff00001705c380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1206.547173][ T3230] ================================================================== [ 1206.587792][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 1206.587940][ T30] audit: type=1400 audit(1206.245:673): avc: denied { write } for pid=3305 comm="syz-executor" path="pipe:[2012]" dev="pipefs" ino=2012 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1206.597451][ T3230] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 05:52:00 Registers: info registers vcpu 0 CPU#0 PC=ffff80008546b34c X00=0000000000000101 X01=0000000000000007 X02=0000000000000000 X03=1fffe00003c2874e X04=00000000f201f1f1 X05=00000000f1f1f1f1 X06=1ffff00010000e20 X07=1fffe00003c28742 X08=0000000000000000 X09=ffff800089747000 X10=ffff000012bc4710 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=0000000000000003 X15=ffff000013ad7121 X16=a0910000133fffff X17=c987e17465f88b45 X18=1fffe0000275ae24 X19=0000000000000006 X20=ffff00001544f662 X21=1fffe00003c2874b X22=1fffe00002a89ecd X23=ffff80008d3ef440 X24=ffff00001e143a00 X25=ffff000012965940 X26=dfff800000000000 X27=ffff80008d3ef440 X28=ffff80008d40b240 X29=ffff800080006f80 X30=ffff800084ae15e0 SP=ffff800080006f60 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=6572207265767265:730073250a0d0a0d Q02=725f6e6173616b20:205d303332335420 Q03=0000000000000000:00ff00ff00000000 Q04=0000000000000000:000000000f0f0000 Q05=323a302f72656b72:6f776b203a6d6d6f Q06=206465746e696174:20746f4e20323a30 Q07=72656c6c616b7a79:732d302e35312e36 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffc89f4a0:0000fffffc89f4a0 Q17=ffffff80ffffffd8:0000fffffc89f470 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081b69724 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=1fffe00001dac62f X04=0000000000000000 X05=ffff80008d9579e0 X06=ffff700011b2af3c X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011b2af3c X11=1ffff00011b2af3c X12=ffff700011b2af3d X13=0000000000008000 X14=3a302f72656b726f X15=617420746f4e2032 X16=2e36206465746e69 X17=7a79732d302e3531 X18=ffff80008d45787c X19=ffff00000ed63080 X20=ffff800087aa24a0 X21=ffff80008d44b000 X22=000000000000003a X23=dfff800000000000 X24=ffff00000ed72034 X25=0000000000000003 X26=0000000000000f01 X27=1fffe00001dac65a X28=ffff00000ed632d0 X29=ffff80008d9579d0 X30=ffff800081b6968c SP=ffff80008d9579d0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=766c6f7365726269:6c2f343662696c2f Q01=00322e6f732e766c:6f73657262696c2f Q02=0000000000000000:000000000f000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:000000000c000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000