last executing test programs: 8m4.276600058s ago: executing program 0 (id=26): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newqdisc={0x70, 0x24, 0x4ee4e6a52ff56541, 0x40000, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x18}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x44, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x8, 0x0, 0x2, 0x8, 0xc, 0x7}, {0x1, 0x0, 0x9, 0x401, 0x0, 0x7fffffff}, 0x2000001, 0x1000, 0x575}}, @TCA_TBF_RATE64={0xc, 0x4, 0x274bdcb7db3981e2}, @TCA_TBF_PRATE64={0xc, 0x5, 0xe1e31d5aa9748ab8}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x20000454}, 0x0) 8m3.356846284s ago: executing program 0 (id=28): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6d, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x9, 0x0, 0xffffffff}, 0x1c) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 8m2.479067129s ago: executing program 0 (id=29): openat$urandom(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x24, 0x1, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@CTA_TUPLE_REPLY={0x4}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x2}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 8m1.365859213s ago: executing program 0 (id=30): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r3, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x4000054) 7m55.766223304s ago: executing program 0 (id=33): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000100)={0x3, 0x1000}, 0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000003c0)=0x2, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff12}, 0x94) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = dup(r1) r3 = open(&(0x7f0000000040)='./file1\x00', 0x1850c2, 0x14c) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) 7m55.198733336s ago: executing program 0 (id=34): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x21, 0x0, 0x0, 0x100000, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000, 0x0, 0x200000000000000}, 0x50) 7m9.396632512s ago: executing program 32 (id=34): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x21, 0x0, 0x0, 0x100000, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000, 0x0, 0x200000000000000}, 0x50) 5m4.691107999s ago: executing program 2 (id=168): msgrcv(0x0, 0x0, 0x0, 0x2, 0x5000) 5m4.445493769s ago: executing program 2 (id=169): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000"], 0x138) write$UHID_DESTROY(r0, &(0x7f0000000340), 0x4) 5m3.345158642s ago: executing program 2 (id=170): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 5m2.386275311s ago: executing program 2 (id=171): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1e) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2a05004, 0x0) chroot(&(0x7f0000000100)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000000)='./file0/../file0\x00') 5m1.559910773s ago: executing program 2 (id=172): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x200, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) close_range(r3, 0xffffffffffffffff, 0x0) 4m58.625373698s ago: executing program 2 (id=173): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 4m58.625152509s ago: executing program 33 (id=173): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r4, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 4.638167897s ago: executing program 3 (id=477): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000680)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "09f500", 0x1c, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x1e, 0x5, "6c50a5"}]}}}}}}}}, 0x0) 4.3158269s ago: executing program 1 (id=478): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') pread64(r2, &(0x7f000001a240)=""/102400, 0x19000, 0x41e) 3.765269902s ago: executing program 3 (id=479): syz_emit_ethernet(0xd2, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffbfff00000000000086dd600489f1009c1100fc010000000000000025030000000000ff020000000000000000000000000001"], 0x0) 3.495182442s ago: executing program 1 (id=480): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x1, 0x2, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) 2.871144677s ago: executing program 3 (id=481): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000400000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.metadata\x00') 2.557461479s ago: executing program 1 (id=482): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001000)=ANY=[@ANYBLOB="2000000076000d0b0000000100000000030000000b00002008"], 0x20}}, 0x0) 2.188404884s ago: executing program 3 (id=483): r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x11080}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x20, 0x1411, 0x1, 0x70bd2d, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x14) sendmsg$ETHTOOL_MSG_DEBUG_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)={0x40, r2, 0x1, 0xfff7fffd, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x14, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x24044815}, 0x0) 1.78247371s ago: executing program 1 (id=484): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.338565807s ago: executing program 3 (id=485): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x8, 0xf9, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_clone3(&(0x7f00000005c0)={0x80000, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) 978.643251ms ago: executing program 1 (id=486): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x14, r2, 0x1, 0x0, 0x25dfdbfb, {0x25}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$DEVLINK_CMD_SB_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x1, 0x2, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) 345.529527ms ago: executing program 3 (id=487): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r0}, &(0x7f0000000080), &(0x7f0000000340)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x88, 0x0, @empty}, {0x0, 0x0, 0x8, 0x0, @gue={{0x2}}}}}}}, 0x0) 0s ago: executing program 1 (id=488): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_wakeup_irq', 0x0, 0x1a0) r1 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f0000001600)={r0, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) kernel console output (not intermixed with test programs): r pid=3318 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 231.821952][ T3320] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 231.830153][ T30] audit: type=1400 audit(231.350:55): avc: denied { relabelto } for pid=3320 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.841966][ T30] audit: type=1400 audit(231.370:56): avc: denied { write } for pid=3320 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 231.921677][ T30] audit: type=1400 audit(231.450:57): avc: denied { read } for pid=3318 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.928398][ T30] audit: type=1400 audit(231.450:58): avc: denied { open } for pid=3318 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.958083][ T3318] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 255.627110][ T30] audit: type=1400 audit(255.150:59): avc: denied { execmem } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 255.678455][ T30] audit: type=1400 audit(255.210:60): avc: denied { read } for pid=3323 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 255.681415][ T30] audit: type=1400 audit(255.210:61): avc: denied { open } for pid=3323 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 255.694260][ T30] audit: type=1400 audit(255.220:62): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 255.741788][ T30] audit: type=1400 audit(255.270:63): avc: denied { module_request } for pid=3323 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 255.922747][ T30] audit: type=1400 audit(255.450:64): avc: denied { sys_module } for pid=3323 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 264.281924][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.474556][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.514400][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.873481][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.199408][ T3323] hsr_slave_0: entered promiscuous mode [ 268.213517][ T3323] hsr_slave_1: entered promiscuous mode [ 268.831884][ T3325] hsr_slave_0: entered promiscuous mode [ 268.849754][ T3325] hsr_slave_1: entered promiscuous mode [ 268.879476][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 268.883095][ T3325] Cannot create hsr debugfs directory [ 271.453791][ T30] audit: type=1400 audit(270.980:65): avc: denied { create } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.473615][ T30] audit: type=1400 audit(271.000:66): avc: denied { write } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.502541][ T30] audit: type=1400 audit(271.030:67): avc: denied { read } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.583314][ T3323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 271.729443][ T3323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 271.778773][ T3323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 271.854246][ T3323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 272.526679][ T3325] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 272.601530][ T3325] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 272.642314][ T3325] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 272.751830][ T3325] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 276.357761][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.494235][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.880053][ T3325] veth0_vlan: entered promiscuous mode [ 290.029678][ T3325] veth1_vlan: entered promiscuous mode [ 290.520419][ T3325] veth0_macvtap: entered promiscuous mode [ 290.749221][ T3325] veth1_macvtap: entered promiscuous mode [ 291.288511][ T1016] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.301875][ T1016] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.302446][ T1016] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.302592][ T1016] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.873028][ T30] audit: type=1400 audit(291.400:68): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 291.921400][ T30] audit: type=1400 audit(291.450:69): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.tjsQIj/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 291.939886][ T30] audit: type=1400 audit(291.470:70): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 291.968308][ T30] audit: type=1400 audit(291.490:71): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.tjsQIj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 291.982452][ T30] audit: type=1400 audit(291.510:72): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.tjsQIj/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 292.025281][ T30] audit: type=1400 audit(291.550:73): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 292.045882][ T30] audit: type=1400 audit(291.570:74): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 292.059534][ T30] audit: type=1400 audit(291.590:75): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="gadgetfs" ino=3831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 292.101801][ T30] audit: type=1400 audit(291.630:76): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 292.118251][ T30] audit: type=1400 audit(291.650:77): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 292.132307][ T3323] veth0_vlan: entered promiscuous mode [ 292.431247][ T3323] veth1_vlan: entered promiscuous mode [ 292.541662][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 292.902220][ T3323] veth0_macvtap: entered promiscuous mode [ 292.953188][ T3323] veth1_macvtap: entered promiscuous mode [ 293.691949][ T1016] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.712109][ T1016] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.712834][ T1016] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.713185][ T1016] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.218433][ T3477] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 297.386242][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 297.387192][ T30] audit: type=1400 audit(296.900:95): avc: denied { allowed } for pid=3481 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 297.561610][ T30] audit: type=1400 audit(297.040:96): avc: denied { sqpoll } for pid=3481 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 298.913167][ T30] audit: type=1400 audit(298.440:97): avc: denied { create } for pid=3481 comm="syz.0.6" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 300.187868][ T30] audit: type=1400 audit(299.720:98): avc: denied { read } for pid=3488 comm="syz.0.8" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 300.192444][ T30] audit: type=1400 audit(299.720:99): avc: denied { open } for pid=3488 comm="syz.0.8" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 300.205833][ T30] audit: type=1400 audit(299.730:100): avc: denied { ioctl } for pid=3488 comm="syz.0.8" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 301.272932][ T3492] syz.1.10 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 301.963171][ T30] audit: type=1400 audit(301.490:101): avc: denied { execmem } for pid=3494 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 302.469478][ T30] audit: type=1400 audit(302.000:102): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.498084][ T30] audit: type=1400 audit(302.000:103): avc: denied { open } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.498918][ T30] audit: type=1400 audit(302.020:104): avc: denied { ioctl } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 302.768629][ T30] audit: type=1400 audit(302.300:105): avc: denied { name_bind } for pid=3496 comm="syz.0.12" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 303.809017][ T30] audit: type=1400 audit(303.330:106): avc: denied { prog_load } for pid=3500 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.821630][ T30] audit: type=1400 audit(303.340:107): avc: denied { bpf } for pid=3500 comm="syz.0.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 303.831230][ T30] audit: type=1400 audit(303.360:108): avc: denied { perfmon } for pid=3500 comm="syz.0.14" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 303.867191][ T30] audit: type=1326 audit(303.390:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.14" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa975b3a8 code=0x7ffc0000 [ 303.881257][ T30] audit: type=1326 audit(303.410:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.14" exe="/syz-executor" sig=0 arch=c00000b7 syscall=194 compat=0 ip=0xffffa975b3a8 code=0x7ffc0000 [ 303.916641][ T30] audit: type=1326 audit(303.440:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3500 comm="syz.0.14" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa975b3a8 code=0x7ffc0000 [ 305.724671][ T3507] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 307.729699][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 307.730426][ T30] audit: type=1400 audit(307.260:126): avc: denied { prog_run } for pid=3508 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 310.500026][ T30] audit: type=1326 audit(310.020:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.543335][ T30] audit: type=1326 audit(310.050:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.580517][ T30] audit: type=1326 audit(310.060:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.581709][ T30] audit: type=1326 audit(310.110:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.582433][ T30] audit: type=1326 audit(310.110:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.617327][ T30] audit: type=1326 audit(310.140:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.624006][ T30] audit: type=1326 audit(310.150:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.663114][ T30] audit: type=1326 audit(310.190:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 310.687450][ T30] audit: type=1326 audit(310.210:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3518 comm="syz.1.23" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 312.846544][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 312.847382][ T30] audit: type=1400 audit(312.360:141): avc: denied { create } for pid=3529 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 312.847912][ T30] audit: type=1400 audit(312.370:142): avc: denied { setopt } for pid=3529 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 312.943959][ T30] audit: type=1400 audit(312.470:143): avc: denied { create } for pid=3530 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 314.046218][ T30] audit: type=1400 audit(313.570:144): avc: denied { create } for pid=3536 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 314.127636][ T30] audit: type=1400 audit(313.650:145): avc: denied { write } for pid=3536 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 315.793886][ T30] audit: type=1400 audit(315.320:146): avc: denied { create } for pid=3541 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 315.837274][ T30] audit: type=1400 audit(315.360:147): avc: denied { write } for pid=3541 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 319.113744][ T3551] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 319.138208][ T3551] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 319.144068][ T3551] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 319.144207][ T30] audit: type=1400 audit(318.670:148): avc: denied { firmware_load } for pid=3549 comm="+}[@" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 320.342269][ T30] audit: type=1400 audit(319.870:149): avc: denied { create } for pid=3554 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 327.232700][ T30] audit: type=1400 audit(326.760:150): avc: denied { write } for pid=3558 comm="syz.1.35" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 327.236936][ T30] audit: type=1400 audit(326.760:151): avc: denied { open } for pid=3558 comm="syz.1.35" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 328.371681][ T30] audit: type=1400 audit(327.870:152): avc: denied { sys_module } for pid=3558 comm="syz.1.35" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 335.587623][ T3567] netlink: 4 bytes leftover after parsing attributes in process `syz.1.36'. [ 336.131330][ T30] audit: type=1400 audit(335.660:153): avc: denied { block_suspend } for pid=3565 comm="syz.1.36" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 338.995835][ T30] audit: type=1400 audit(338.520:154): avc: denied { create } for pid=3570 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.014252][ T30] audit: type=1400 audit(338.540:155): avc: denied { setopt } for pid=3570 comm="syz.1.37" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.586590][ T3573] netlink: 'syz.1.38': attribute type 3 has an invalid length. [ 340.326477][ T30] audit: type=1400 audit(339.840:156): avc: denied { read } for pid=3574 comm="syz.1.39" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.326992][ T30] audit: type=1400 audit(339.850:157): avc: denied { open } for pid=3574 comm="syz.1.39" path="net:[4026532709]" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 340.352053][ T3575] netlink: 8 bytes leftover after parsing attributes in process `syz.1.39'. [ 340.758560][ T30] audit: type=1400 audit(340.290:158): avc: denied { read write } for pid=3576 comm="syz.1.40" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 340.761335][ T30] audit: type=1400 audit(340.290:159): avc: denied { open } for pid=3576 comm="syz.1.40" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 341.517942][ T30] audit: type=1400 audit(341.040:160): avc: denied { create } for pid=3579 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 341.539554][ T3580] netlink: 8 bytes leftover after parsing attributes in process `syz.1.41'. [ 341.542486][ T30] audit: type=1400 audit(341.070:161): avc: denied { write } for pid=3579 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 341.547101][ T30] audit: type=1400 audit(341.070:162): avc: denied { nlmsg_write } for pid=3579 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 342.039220][ T30] audit: type=1400 audit(341.570:163): avc: denied { create } for pid=3581 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 342.068600][ T30] audit: type=1400 audit(341.600:164): avc: denied { bind } for pid=3581 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 349.429569][ T30] audit: type=1400 audit(348.940:165): avc: denied { create } for pid=3595 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 349.469015][ T30] audit: type=1400 audit(349.000:166): avc: denied { bind } for pid=3595 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 349.559547][ T30] audit: type=1400 audit(349.090:167): avc: denied { write } for pid=3595 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 359.734871][ T3611] netlink: 88 bytes leftover after parsing attributes in process `syz.1.53'. [ 361.787612][ T30] audit: type=1400 audit(361.310:168): avc: denied { read write } for pid=3613 comm="syz.1.54" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 361.811139][ T30] audit: type=1400 audit(361.340:169): avc: denied { open } for pid=3613 comm="syz.1.54" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 361.861369][ T30] audit: type=1400 audit(361.390:170): avc: denied { ioctl } for pid=3613 comm="syz.1.54" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 362.006798][ T30] audit: type=1400 audit(361.530:171): avc: denied { ioctl } for pid=3613 comm="syz.1.54" path="socket:[5149]" dev="sockfs" ino=5149 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.070564][ T30] audit: type=1400 audit(361.600:172): avc: denied { setopt } for pid=3613 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.119947][ T30] audit: type=1400 audit(361.650:173): avc: denied { write } for pid=3613 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.414581][ C1] vcan0: j1939_tp_rxtimer: 0x00000000381d638f: rx timeout, send abort [ 362.459614][ T30] audit: type=1400 audit(361.970:174): avc: denied { read } for pid=3123 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 362.471341][ T30] audit: type=1400 audit(362.000:175): avc: denied { search } for pid=3123 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 362.484724][ T30] audit: type=1400 audit(362.010:176): avc: denied { search } for pid=3123 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 362.491040][ T30] audit: type=1400 audit(362.020:177): avc: denied { add_name } for pid=3123 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 362.917202][ C1] vcan0: j1939_tp_rxtimer: 0x00000000381d638f: abort rx timeout. Force session deactivation [ 362.922171][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a080d302: rx timeout, send abort [ 363.423530][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a080d302: abort rx timeout. Force session deactivation [ 364.628835][ T3622] Zero length message leads to an empty skb [ 365.053634][ T3624] netlink: 8 bytes leftover after parsing attributes in process `syz.1.58'. [ 367.576537][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 367.577433][ T30] audit: type=1400 audit(367.090:184): avc: denied { mounton } for pid=3631 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 378.098911][ T30] audit: type=1400 audit(377.630:185): avc: denied { allowed } for pid=3662 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 378.122259][ T30] audit: type=1400 audit(377.650:186): avc: denied { create } for pid=3662 comm="syz.1.67" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 378.136730][ T30] audit: type=1400 audit(377.660:187): avc: denied { map } for pid=3662 comm="syz.1.67" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 378.137669][ T30] audit: type=1400 audit(377.660:188): avc: denied { read write } for pid=3662 comm="syz.1.67" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 379.896310][ T30] audit: type=1400 audit(379.410:189): avc: denied { read write } for pid=3667 comm="syz.1.68" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 379.897154][ T30] audit: type=1400 audit(379.420:190): avc: denied { open } for pid=3667 comm="syz.1.68" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 380.148397][ T31] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x4 [ 380.149312][ T31] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x2 [ 380.150903][ T31] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x3 [ 380.248534][ T31] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 381.648733][ T30] audit: type=1400 audit(381.160:191): avc: denied { ioctl } for pid=3672 comm="syz.1.69" path="socket:[4427]" dev="sockfs" ino=4427 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 381.703197][ T30] audit: type=1400 audit(381.230:192): avc: denied { write } for pid=3672 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 382.618209][ T30] audit: type=1400 audit(382.140:193): avc: denied { create } for pid=3677 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 384.252916][ T3631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 384.314189][ T3631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 384.710989][ T3675] fido_id[3675]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 385.519280][ T30] audit: type=1400 audit(385.050:194): avc: denied { write } for pid=3685 comm="syz.1.72" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 385.563852][ T3687] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.72' sets config #1 [ 390.687308][ T3631] hsr_slave_0: entered promiscuous mode [ 390.697438][ T3631] hsr_slave_1: entered promiscuous mode [ 390.704466][ T3631] debugfs: 'hsr0' already exists in 'hsr' [ 390.704840][ T3631] Cannot create hsr debugfs directory [ 393.848025][ T30] audit: type=1400 audit(393.370:195): avc: denied { name_bind } for pid=3711 comm="syz.1.78" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 393.879843][ T30] audit: type=1400 audit(393.410:196): avc: denied { node_bind } for pid=3711 comm="syz.1.78" saddr=224.0.0.2 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 394.864188][ T3631] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 395.054339][ T3631] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 395.296030][ T30] audit: type=1400 audit(394.810:197): avc: denied { create } for pid=3714 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 395.321052][ T3631] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 395.386236][ T30] audit: type=1400 audit(394.900:198): avc: denied { setopt } for pid=3714 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 395.539931][ T3631] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 397.456832][ T30] audit: type=1400 audit(396.970:199): avc: denied { audit_write } for pid=3725 comm="syz.1.81" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 397.462479][ T30] audit: type=1107 audit(396.990:200): pid=3725 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 398.530155][ T30] audit: type=1400 audit(398.060:201): avc: denied { bind } for pid=3728 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 398.559147][ T30] audit: type=1400 audit(398.070:202): avc: denied { node_bind } for pid=3728 comm="syz.1.82" saddr=fe88::102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 403.079032][ T3631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 404.133011][ T101] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.827960][ T101] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.242494][ T101] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.812207][ T101] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 406.738721][ T30] audit: type=1400 audit(406.230:203): avc: denied { create } for pid=3746 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 406.800142][ T30] audit: type=1400 audit(406.330:204): avc: denied { connect } for pid=3746 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 407.449161][ T30] audit: type=1400 audit(406.980:205): avc: denied { read } for pid=3168 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 413.320179][ T101] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 413.458640][ T101] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 413.562862][ T101] bond0 (unregistering): Released all slaves [ 414.150637][ T30] audit: type=1400 audit(413.680:206): avc: denied { search } for pid=3168 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 414.152392][ T30] audit: type=1400 audit(413.680:207): avc: denied { search } for pid=3168 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 414.165767][ T30] audit: type=1400 audit(413.680:208): avc: denied { search } for pid=3168 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 414.200499][ T30] audit: type=1400 audit(413.730:209): avc: denied { read } for pid=3168 comm="dhcpcd" name="n18" dev="tmpfs" ino=1229 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.205738][ T30] audit: type=1400 audit(413.730:210): avc: denied { open } for pid=3168 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1229 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.269522][ T30] audit: type=1400 audit(413.800:211): avc: denied { getattr } for pid=3168 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1229 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 414.473562][ T101] hsr_slave_0: left promiscuous mode [ 414.618969][ T101] hsr_slave_1: left promiscuous mode [ 415.018634][ T30] audit: type=1400 audit(414.540:212): avc: denied { execute } for pid=3756 comm="syz.1.89" name="file0" dev="tmpfs" ino=344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 415.173661][ T101] veth1_macvtap: left promiscuous mode [ 415.191575][ T101] veth0_macvtap: left promiscuous mode [ 415.209254][ T101] veth1_vlan: left promiscuous mode [ 415.212214][ T101] veth0_vlan: left promiscuous mode [ 419.543623][ T30] audit: type=1400 audit(419.070:213): avc: denied { write } for pid=3765 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 422.367273][ T30] audit: type=1400 audit(421.890:214): avc: denied { read write } for pid=3771 comm="syz.1.95" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 422.407321][ T30] audit: type=1400 audit(421.920:215): avc: denied { open } for pid=3771 comm="syz.1.95" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 422.443615][ T30] audit: type=1400 audit(421.970:216): avc: denied { ioctl } for pid=3771 comm="syz.1.95" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 422.492056][ T30] audit: type=1400 audit(422.020:217): avc: denied { kexec_image_load } for pid=3771 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 423.626386][ T30] audit: type=1400 audit(423.140:218): avc: denied { create } for pid=3773 comm="syz.1.96" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 423.927060][ T30] audit: type=1400 audit(423.430:219): avc: denied { unlink } for pid=3325 comm="syz-executor" name="file0" dev="tmpfs" ino=381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 429.329856][ T30] audit: type=1400 audit(428.860:220): avc: denied { bind } for pid=3780 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 429.382924][ T30] audit: type=1400 audit(428.910:221): avc: denied { setopt } for pid=3780 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 429.513347][ T3781] netlink: 'syz.1.99': attribute type 10 has an invalid length. [ 429.758141][ T3781] netlink: 'syz.1.99': attribute type 10 has an invalid length. [ 431.599940][ T30] audit: type=1400 audit(431.080:222): avc: denied { create } for pid=3783 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 431.689843][ T30] audit: type=1400 audit(431.220:223): avc: denied { connect } for pid=3783 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 432.191711][ T30] audit: type=1400 audit(431.720:224): avc: denied { write } for pid=3783 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 434.387160][ T30] audit: type=1400 audit(433.900:225): avc: denied { read open } for pid=3791 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.403689][ T30] audit: type=1400 audit(433.930:226): avc: denied { getattr } for pid=3791 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 434.963235][ T30] audit: type=1400 audit(434.490:227): avc: denied { add_name } for pid=3789 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 435.039176][ T30] audit: type=1400 audit(434.560:228): avc: denied { create } for pid=3789 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.040202][ T30] audit: type=1400 audit(434.560:229): avc: denied { write } for pid=3789 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1279 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 435.136521][ T30] audit: type=1400 audit(434.650:230): avc: denied { append } for pid=3789 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1279 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 436.460102][ T3797] pim6reg0: tun_chr_ioctl cmd 35108 [ 436.999300][ T30] audit: type=1400 audit(436.530:231): avc: denied { remove_name } for pid=3798 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1279 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 437.000304][ T30] audit: type=1400 audit(436.530:232): avc: denied { unlink } for pid=3798 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1279 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 446.031061][ T3835] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.632977][ T3835] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.141235][ T3835] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.492664][ T3835] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.144700][ T1016] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.277926][ T1016] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.480895][ T37] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.606308][ T37] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 450.502107][ T3631] veth0_vlan: entered promiscuous mode [ 450.682772][ T3631] veth1_vlan: entered promiscuous mode [ 451.202198][ T3631] veth0_macvtap: entered promiscuous mode [ 451.248591][ T3631] veth1_macvtap: entered promiscuous mode [ 451.532951][ T30] audit: type=1400 audit(451.060:233): avc: denied { search } for pid=3857 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.541214][ T30] audit: type=1400 audit(451.070:234): avc: denied { search } for pid=3857 comm="rm" name="dhcpcd" dev="tmpfs" ino=504 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.554224][ T30] audit: type=1400 audit(451.080:235): avc: denied { search } for pid=3857 comm="rm" name="hook-state" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.567490][ T30] audit: type=1400 audit(451.080:236): avc: denied { getattr } for pid=3857 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=1319 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.622155][ T30] audit: type=1400 audit(451.140:237): avc: denied { search } for pid=3857 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.623052][ T30] audit: type=1400 audit(451.140:238): avc: denied { search } for pid=3857 comm="rm" name="dhcpcd" dev="tmpfs" ino=504 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.623459][ T30] audit: type=1400 audit(451.140:239): avc: denied { search } for pid=3857 comm="rm" name="hook-state" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.661317][ T30] audit: type=1400 audit(451.150:240): avc: denied { search } for pid=3857 comm="rm" name="hook-state" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.688926][ T30] audit: type=1400 audit(451.200:241): avc: denied { remove_name } for pid=3857 comm="rm" name="resolv.conf.eth3.link" dev="tmpfs" ino=1319 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 451.689842][ T30] audit: type=1400 audit(451.200:242): avc: denied { unlink } for pid=3857 comm="rm" name="resolv.conf.eth3.link" dev="tmpfs" ino=1319 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 452.282320][ T992] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.284446][ T992] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.361508][ T992] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 452.402731][ T992] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.530183][ T3884] netlink: 4 bytes leftover after parsing attributes in process `syz.2.122'. [ 457.947093][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 457.948015][ T30] audit: type=1400 audit(457.470:277): avc: denied { search } for pid=3886 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 457.948550][ T30] audit: type=1400 audit(457.470:278): avc: denied { search } for pid=3886 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=504 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 457.948969][ T30] audit: type=1400 audit(457.470:279): avc: denied { create } for pid=3892 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 457.949420][ T30] audit: type=1400 audit(457.470:280): avc: denied { search } for pid=3886 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 457.977394][ T30] audit: type=1400 audit(457.470:281): avc: denied { search } for pid=3886 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.010854][ T30] audit: type=1400 audit(457.540:282): avc: denied { bind } for pid=3892 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 458.333042][ T30] audit: type=1400 audit(457.860:283): avc: denied { read open } for pid=3895 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.362609][ T30] audit: type=1400 audit(457.880:284): avc: denied { getattr } for pid=3895 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 458.496138][ T30] audit: type=1400 audit(457.950:285): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 458.497093][ T30] audit: type=1400 audit(458.010:286): avc: denied { open } for pid=3325 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 464.041443][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 464.042819][ T30] audit: type=1400 audit(463.570:302): avc: denied { create } for pid=3923 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.068856][ T3924] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 464.090935][ T30] audit: type=1400 audit(463.620:303): avc: denied { setopt } for pid=3923 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 464.232954][ T30] audit: type=1400 audit(463.760:304): avc: denied { ioctl } for pid=3923 comm="syz.2.139" path="socket:[6013]" dev="sockfs" ino=6013 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.271176][ T3924] batadv_slave_1: entered promiscuous mode [ 464.273211][ T30] audit: type=1400 audit(463.800:305): avc: denied { setopt } for pid=3923 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.296952][ T3924] netlink: 4 bytes leftover after parsing attributes in process `syz.2.139'. [ 464.473292][ T30] audit: type=1400 audit(464.000:306): avc: denied { map_create } for pid=3925 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 464.496833][ T30] audit: type=1400 audit(464.010:307): avc: denied { map_read map_write } for pid=3925 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 465.011934][ T3924] batadv_slave_1 (unregistering): left promiscuous mode [ 466.450825][ T30] audit: type=1400 audit(465.980:308): avc: denied { read } for pid=3932 comm="syz.2.143" dev="nsfs" ino=4026532928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 466.464131][ T30] audit: type=1400 audit(465.990:309): avc: denied { open } for pid=3932 comm="syz.2.143" path="net:[4026532928]" dev="nsfs" ino=4026532928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 466.464725][ T30] audit: type=1400 audit(465.990:310): avc: denied { create } for pid=3932 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 466.495636][ T30] audit: type=1400 audit(466.020:311): avc: denied { connect } for pid=3932 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 469.943205][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 469.943679][ T30] audit: type=1400 audit(469.470:314): avc: denied { create } for pid=3943 comm="syz.2.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 470.003656][ T30] audit: type=1400 audit(469.520:315): avc: denied { write } for pid=3943 comm="syz.2.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 470.096320][ T3946] netlink: 48 bytes leftover after parsing attributes in process `syz.2.146'. [ 472.272080][ T30] audit: type=1326 audit(471.770:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 472.291595][ T30] audit: type=1326 audit(471.820:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=59 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 472.313139][ T30] audit: type=1326 audit(471.830:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 472.350666][ T30] audit: type=1326 audit(471.860:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 472.366294][ T30] audit: type=1326 audit(471.890:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 472.409594][ T30] audit: type=1326 audit(471.930:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.151" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 474.123865][ T3960] netlink: 4276 bytes leftover after parsing attributes in process `syz.1.152'. [ 476.460196][ T30] audit: type=1400 audit(475.990:322): avc: denied { read write } for pid=3965 comm="syz.1.154" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 476.460778][ T30] audit: type=1400 audit(475.990:323): avc: denied { open } for pid=3965 comm="syz.1.154" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 476.572422][ T30] audit: type=1400 audit(476.100:324): avc: denied { create } for pid=3965 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 478.773319][ T30] audit: type=1400 audit(478.300:325): avc: denied { sys_module } for pid=3970 comm="syz.2.156" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 483.117315][ T30] audit: type=1400 audit(482.600:326): avc: denied { execmem } for pid=3992 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 487.000851][ T30] audit: type=1400 audit(486.530:327): avc: denied { write } for pid=3992 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 487.010070][ T30] audit: type=1400 audit(486.530:328): avc: denied { read } for pid=3992 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 488.746029][ T30] audit: type=1400 audit(488.270:329): avc: denied { allowed } for pid=3999 comm="syz.2.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 488.777371][ T30] audit: type=1400 audit(488.300:330): avc: denied { create } for pid=3999 comm="syz.2.163" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 490.282057][ T4011] netlink: 16 bytes leftover after parsing attributes in process `syz.2.166'. [ 490.283260][ T4011] netlink: 'syz.2.166': attribute type 2 has an invalid length. [ 490.289969][ T4011] netlink: 'syz.2.166': attribute type 2 has an invalid length. [ 491.600512][ T30] audit: type=1400 audit(491.130:331): avc: denied { read write } for pid=4016 comm="syz.2.169" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 491.617139][ T30] audit: type=1400 audit(491.150:332): avc: denied { open } for pid=4016 comm="syz.2.169" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 491.821556][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.822584][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.822845][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.823118][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.823363][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.823621][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.823867][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.824126][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.824405][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.824647][ T1923] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 491.990859][ T1923] hid-generic 0000:3000000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 493.757861][ T30] audit: type=1400 audit(493.280:333): avc: denied { mounton } for pid=4023 comm="syz.2.171" path="/26/file0" dev="tmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 493.762072][ T30] audit: type=1400 audit(493.280:334): avc: denied { mount } for pid=4023 comm="syz.2.171" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 493.776886][ T30] audit: type=1400 audit(493.290:335): avc: denied { mounton } for pid=4023 comm="syz.2.171" path="/26/file0" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 493.783377][ T30] audit: type=1400 audit(493.310:336): avc: denied { mount } for pid=4023 comm="syz.2.171" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 493.819302][ T30] audit: type=1400 audit(493.350:337): avc: denied { mounton } for pid=4023 comm="syz.2.171" path="/26/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 494.138463][ T30] audit: type=1400 audit(493.650:338): avc: denied { unmount } for pid=3631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 494.257721][ T30] audit: type=1400 audit(493.790:339): avc: denied { unmount } for pid=3631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 494.818870][ T4019] fido_id[4019]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 496.369528][ T1016] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 497.099348][ T1016] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 497.337171][ T30] audit: type=1400 audit(496.820:340): avc: denied { execute } for pid=4028 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 497.360666][ T30] audit: type=1400 audit(496.890:341): avc: denied { execute_no_trans } for pid=4028 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 497.721751][ T1016] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.082310][ T30] audit: type=1400 audit(497.580:342): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 498.229288][ T1016] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.413348][ T30] audit: type=1400 audit(498.930:343): avc: denied { read } for pid=3168 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 503.439135][ T1016] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 503.540568][ T1016] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 503.601424][ T1016] bond0 (unregistering): Released all slaves [ 504.623448][ T1016] hsr_slave_0: left promiscuous mode [ 504.728177][ T1016] hsr_slave_1: left promiscuous mode [ 505.077885][ T1016] veth1_macvtap: left promiscuous mode [ 505.080584][ T1016] veth0_macvtap: left promiscuous mode [ 505.084081][ T1016] veth1_vlan: left promiscuous mode [ 505.097482][ T1016] veth0_vlan: left promiscuous mode [ 507.744601][ T1923] hid_parser_main: 22 callbacks suppressed [ 507.758131][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.758603][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.758836][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759023][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759154][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759311][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759503][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759735][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.759968][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.760129][ T1923] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 507.877273][ T1923] hid-generic 0000:3000000:0000.0003: hidraw0: HID v0.00 Device [sy] on syz0 [ 509.162524][ T30] audit: type=1326 audit(508.690:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.171235][ T30] audit: type=1326 audit(508.690:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.210825][ T30] audit: type=1326 audit(508.740:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.226498][ T30] audit: type=1326 audit(508.740:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.260422][ T30] audit: type=1326 audit(508.790:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.283542][ T30] audit: type=1326 audit(508.810:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.297589][ T30] audit: type=1326 audit(508.820:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.350607][ T30] audit: type=1326 audit(508.870:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.354411][ T30] audit: type=1326 audit(508.880:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 509.380131][ T30] audit: type=1326 audit(508.880:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4050 comm="syz.1.176" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 510.352021][ T4049] fido_id[4049]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 514.182433][ T973] hid_parser_main: 22 callbacks suppressed [ 514.190016][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.196507][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.207104][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.211837][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.217154][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.220815][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.237172][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.238158][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.238556][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.238927][ T973] hid-generic 0000:3000000:0000.0004: unknown main item tag 0x0 [ 514.282937][ T973] hid-generic 0000:3000000:0000.0004: hidraw0: HID v0.00 Device [sy] on syz0 [ 516.934276][ T4065] fido_id[4065]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 517.814277][ T4076] No such timeout policy "syz1" [ 527.440863][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 527.459843][ T30] audit: type=1400 audit(526.970:357): avc: denied { name_bind } for pid=4106 comm="syz.1.187" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 527.460821][ T30] audit: type=1400 audit(526.970:358): avc: denied { node_bind } for pid=4106 comm="syz.1.187" saddr=fe80::23 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 528.152314][ T30] audit: type=1400 audit(527.660:359): avc: denied { write } for pid=4108 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 528.513073][ T4029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 528.610221][ T4029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.942150][ T30] audit: type=1400 audit(528.460:360): avc: denied { write } for pid=4111 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 532.101253][ T30] audit: type=1326 audit(531.620:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.1.192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 532.149239][ T30] audit: type=1326 audit(531.620:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.1.192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 532.149718][ T30] audit: type=1326 audit(531.680:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.1.192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=278 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 532.150118][ T30] audit: type=1326 audit(531.680:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4124 comm="syz.1.192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 537.661748][ T30] audit: type=1400 audit(537.100:365): avc: denied { create } for pid=4127 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 546.357202][ T4029] hsr_slave_0: entered promiscuous mode [ 546.399728][ T4029] hsr_slave_1: entered promiscuous mode [ 548.047816][ T30] audit: type=1400 audit(547.570:366): avc: denied { read } for pid=4148 comm="syz.1.195" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 548.074553][ T30] audit: type=1400 audit(547.590:367): avc: denied { open } for pid=4148 comm="syz.1.195" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 549.168960][ T30] audit: type=1400 audit(548.700:368): avc: denied { create } for pid=4151 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 549.183093][ T30] audit: type=1400 audit(548.710:369): avc: denied { connect } for pid=4151 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 551.963255][ T4029] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 552.129684][ T4029] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 552.212827][ T4029] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 552.333731][ T4029] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 555.054255][ T30] audit: type=1326 audit(554.570:370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4174 comm="GPL" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 555.083291][ T30] audit: type=1326 audit(554.610:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4174 comm="GPL" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 555.121311][ T30] audit: type=1326 audit(554.630:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4174 comm="GPL" exe="/syz-executor" sig=0 arch=c00000b7 syscall=53 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 555.134728][ T30] audit: type=1326 audit(554.660:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4174 comm="GPL" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 557.590719][ T30] audit: type=1400 audit(557.110:374): avc: denied { mount } for pid=4184 comm="syz.1.201" name="/" dev="ramfs" ino=7730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 558.696038][ T30] audit: type=1400 audit(558.220:375): avc: denied { name_bind } for pid=4187 comm="syz.1.202" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 558.696951][ T30] audit: type=1400 audit(558.220:376): avc: denied { node_bind } for pid=4187 comm="syz.1.202" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 559.196712][ T4029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 570.699064][ T4229] netlink: 16 bytes leftover after parsing attributes in process `syz.1.210'. [ 572.076416][ T30] audit: type=1400 audit(571.600:377): avc: denied { map } for pid=4234 comm="syz.1.212" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 572.077973][ T30] audit: type=1400 audit(571.600:378): avc: denied { read write } for pid=4234 comm="syz.1.212" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 573.072805][ T30] audit: type=1400 audit(572.600:379): avc: denied { read write } for pid=4239 comm="syz.1.213" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 573.090587][ T30] audit: type=1400 audit(572.620:380): avc: denied { open } for pid=4239 comm="syz.1.213" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 574.404674][ T4244] loop4: detected capacity change from 0 to 1 [ 577.786801][ T30] audit: type=1400 audit(577.310:381): avc: denied { ioctl } for pid=4256 comm="syz.1.216" path="socket:[6512]" dev="sockfs" ino=6512 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 579.463937][ T30] audit: type=1400 audit(578.990:382): avc: denied { bind } for pid=4265 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 579.474426][ T30] audit: type=1400 audit(579.000:383): avc: denied { setopt } for pid=4265 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 579.599719][ T4266] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 579.964887][ T4266] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.359544][ T4266] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 580.630248][ T30] audit: type=1400 audit(580.160:384): avc: denied { ioctl } for pid=4265 comm="syz.1.218" path="socket:[6519]" dev="sockfs" ino=6519 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 581.018881][ T4266] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 582.770015][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 583.102743][ T1022] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 583.340429][ T26] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 583.569944][ T37] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 584.793230][ T4029] veth0_vlan: entered promiscuous mode [ 584.980762][ T4029] veth1_vlan: entered promiscuous mode [ 585.452616][ T4029] veth0_macvtap: entered promiscuous mode [ 585.579089][ T4029] veth1_macvtap: entered promiscuous mode [ 586.208667][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.209277][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.217172][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.222565][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.967378][ T30] audit: type=1400 audit(586.480:385): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/syzkaller.sk36u4/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 586.982946][ T30] audit: type=1400 audit(586.510:386): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 587.103501][ T30] audit: type=1400 audit(586.630:387): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 587.307442][ T30] audit: type=1400 audit(586.780:388): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/syzkaller.sk36u4/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7954 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 587.473806][ T30] audit: type=1400 audit(586.990:389): avc: denied { unmount } for pid=4029 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 587.507055][ T30] audit: type=1400 audit(587.030:390): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 587.509412][ T30] audit: type=1400 audit(587.040:391): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="gadgetfs" ino=3831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 587.559355][ T30] audit: type=1400 audit(587.060:392): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 587.567869][ T30] audit: type=1400 audit(587.100:393): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 587.577632][ T30] audit: type=1400 audit(587.110:394): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 590.672636][ T4301] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.964594][ T4303] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 590.990106][ T4303] SELinux: failed to load policy [ 591.934071][ T4301] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 592.848209][ T4301] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 593.481422][ T4301] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.276416][ T1022] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.797118][ T12] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.311533][ T1022] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.824837][ T4323] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 595.854138][ T37] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.879902][ T4323] SELinux: failed to load policy [ 597.136265][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 597.137175][ T30] audit: type=1400 audit(596.660:398): avc: denied { execute } for pid=4326 comm="syz.3.229" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=8009 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 597.267481][ T30] audit: type=1400 audit(596.790:399): avc: denied { create } for pid=4326 comm="syz.3.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 597.346769][ T30] audit: type=1400 audit(596.870:400): avc: denied { bind } for pid=4326 comm="syz.3.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 597.418796][ T30] audit: type=1400 audit(596.930:401): avc: denied { write } for pid=4326 comm="syz.3.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 601.302138][ T4339] netlink: 31 bytes leftover after parsing attributes in process `syz.3.232'. [ 601.863977][ T4341] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.187143][ T4341] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.494264][ T4341] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 602.733917][ T4341] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 603.151449][ T101] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.307657][ T101] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.558395][ T12] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 603.631302][ T12] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 604.496678][ T4345] SELinux: ebitmap: truncated map [ 604.886676][ T4345] SELinux: failed to load policy [ 605.729579][ T30] audit: type=1400 audit(605.260:402): avc: denied { create } for pid=4348 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 605.759116][ T30] audit: type=1400 audit(605.290:403): avc: denied { connect } for pid=4348 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 605.771241][ T30] audit: type=1400 audit(605.300:404): avc: denied { ioctl } for pid=4348 comm="syz.3.236" path="socket:[8079]" dev="sockfs" ino=8079 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 605.783169][ T30] audit: type=1400 audit(605.310:405): avc: denied { write } for pid=4348 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 606.517192][ T4353] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.664574][ T4353] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 606.872134][ T4353] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.002784][ T4353] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.417471][ T12] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 607.479964][ T12] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 607.589311][ T101] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 607.817005][ T101] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 608.176929][ T30] audit: type=1400 audit(607.700:406): avc: denied { create } for pid=4355 comm="syz.3.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 608.180267][ T30] audit: type=1400 audit(607.700:407): avc: denied { write } for pid=4355 comm="syz.3.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 608.323246][ T4356] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 608.363907][ T4356] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 609.222936][ T30] audit: type=1400 audit(608.750:408): avc: denied { connect } for pid=4358 comm="syz.3.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 610.014100][ T30] audit: type=1326 audit(609.530:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4362 comm="syz.3.242" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x0 [ 610.879248][ T4367] netlink: 48 bytes leftover after parsing attributes in process `syz.1.244'. [ 611.439997][ T30] audit: type=1326 audit(610.970:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.449233][ T30] audit: type=1326 audit(610.970:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.466886][ T30] audit: type=1326 audit(610.990:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.472807][ T30] audit: type=1326 audit(611.000:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.503925][ T30] audit: type=1326 audit(611.030:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.509041][ T30] audit: type=1326 audit(611.030:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.530838][ T30] audit: type=1326 audit(611.060:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=81 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.715452][ T30] audit: type=1326 audit(611.230:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 611.722097][ T30] audit: type=1326 audit(611.250:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.1.246" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 616.886266][ T30] audit: type=1400 audit(616.400:419): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.892954][ T30] audit: type=1400 audit(616.420:420): avc: denied { open } for pid=3325 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 616.913467][ T30] audit: type=1400 audit(616.440:421): avc: denied { ioctl } for pid=3325 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 617.372857][ T30] audit: type=1400 audit(616.890:422): avc: denied { allowed } for pid=4386 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 617.387482][ T30] audit: type=1400 audit(616.910:423): avc: denied { sqpoll } for pid=4386 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 617.410938][ T30] audit: type=1400 audit(616.930:424): avc: denied { create } for pid=4386 comm="syz.1.253" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 617.414200][ T30] audit: type=1400 audit(616.940:425): avc: denied { map } for pid=4386 comm="syz.1.253" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8319 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 617.419418][ T30] audit: type=1400 audit(616.940:426): avc: denied { read write } for pid=4386 comm="syz.1.253" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8319 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 618.126399][ T30] audit: type=1400 audit(617.640:427): avc: denied { create } for pid=4390 comm="syz.3.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 618.127202][ T30] audit: type=1400 audit(617.650:428): avc: denied { module_request } for pid=4390 comm="syz.3.254" kmod="net-pf-42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 619.418034][ T4399] IPv6: NLM_F_CREATE should be specified when creating new route [ 619.560237][ C1] vcan0: j1939_tp_rxtimer: 0x0000000066ef7258: rx timeout, send abort [ 620.060704][ C1] vcan0: j1939_tp_rxtimer: 0x0000000027d8d98d: rx timeout, send abort [ 620.061723][ C1] vcan0: j1939_tp_rxtimer: 0x0000000066ef7258: abort rx timeout. Force session deactivation [ 620.174259][ T4403] mmap: syz.3.259 (4403) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 620.561651][ C1] vcan0: j1939_tp_rxtimer: 0x0000000027d8d98d: abort rx timeout. Force session deactivation [ 622.369609][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 622.370215][ T30] audit: type=1400 audit(621.890:479): avc: denied { create } for pid=4413 comm="syz.3.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 622.418656][ T30] audit: type=1400 audit(621.950:480): avc: denied { getopt } for pid=4413 comm="syz.3.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 622.568701][ T4414] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 624.031510][ T30] audit: type=1400 audit(623.560:481): avc: denied { ioctl } for pid=4417 comm="syz.3.265" path="socket:[8388]" dev="sockfs" ino=8388 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 624.218289][ T30] audit: type=1400 audit(623.740:482): avc: denied { write } for pid=4415 comm="syz.1.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 624.307348][ T4418] syzkaller0: entered promiscuous mode [ 624.308012][ T4418] syzkaller0: entered allmulticast mode [ 624.359790][ T4418] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1500) ! [ 627.020783][ T30] audit: type=1400 audit(626.540:483): avc: denied { connect } for pid=4425 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 629.079488][ T30] audit: type=1400 audit(628.610:484): avc: denied { prog_run } for pid=4431 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 629.891415][ T30] audit: type=1400 audit(629.420:485): avc: denied { create } for pid=4433 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 629.906187][ T30] audit: type=1400 audit(629.430:486): avc: denied { write } for pid=4433 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 634.453615][ T30] audit: type=1400 audit(633.980:487): avc: denied { create } for pid=4446 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 634.483921][ T30] audit: type=1400 audit(634.010:488): avc: denied { setopt } for pid=4446 comm="syz.1.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 636.061308][ T30] audit: type=1400 audit(635.590:489): avc: denied { create } for pid=4454 comm="syz.3.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 636.090298][ T30] audit: type=1400 audit(635.600:490): avc: denied { write } for pid=4454 comm="syz.3.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 636.109891][ T30] audit: type=1400 audit(635.630:491): avc: denied { module_request } for pid=4454 comm="syz.3.281" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 637.169529][ T30] audit: type=1400 audit(636.690:492): avc: denied { read write } for pid=4029 comm="syz-executor" name="loop3" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 637.187446][ T30] audit: type=1400 audit(636.710:493): avc: denied { open } for pid=4029 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 637.191518][ T30] audit: type=1400 audit(636.710:494): avc: denied { ioctl } for pid=4029 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=641 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 637.454869][ T30] audit: type=1400 audit(636.980:495): avc: denied { create } for pid=4457 comm="syz.3.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 638.270086][ T30] audit: type=1400 audit(637.790:496): avc: denied { prog_load } for pid=4459 comm="syz.3.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.001895][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 640.007437][ T30] audit: type=1400 audit(639.520:501): avc: denied { map_create } for pid=4463 comm="syz.3.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 640.019022][ T30] audit: type=1400 audit(639.520:502): avc: denied { map_read map_write } for pid=4463 comm="syz.3.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 643.257556][ T30] audit: type=1400 audit(642.780:503): avc: denied { create } for pid=4473 comm="syz.3.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 643.272952][ T30] audit: type=1400 audit(642.800:504): avc: denied { setopt } for pid=4473 comm="syz.3.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 645.272461][ T30] audit: type=1400 audit(644.770:505): avc: denied { write } for pid=4478 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 646.048834][ T30] audit: type=1400 audit(645.580:506): avc: denied { create } for pid=4480 comm="syz.3.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 646.099927][ T30] audit: type=1400 audit(645.610:507): avc: denied { write } for pid=4480 comm="syz.3.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 646.914866][ T30] audit: type=1400 audit(646.440:508): avc: denied { prog_run } for pid=4482 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 650.743982][ T30] audit: type=1400 audit(650.270:509): avc: denied { sys_module } for pid=4485 comm="syz.3.295" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 661.302371][ T30] audit: type=1400 audit(660.830:510): avc: denied { allowed } for pid=4525 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 661.861804][ T30] audit: type=1400 audit(661.390:511): avc: denied { name_bind } for pid=4527 comm="syz.1.314" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 661.866572][ T30] audit: type=1400 audit(661.400:512): avc: denied { node_bind } for pid=4527 comm="syz.1.314" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 662.137646][ T30] audit: type=1326 audit(661.670:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.141138][ T30] audit: type=1326 audit(661.670:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.148608][ T30] audit: type=1326 audit(661.680:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=430 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.152693][ T30] audit: type=1326 audit(661.680:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.156236][ T30] audit: type=1326 audit(661.690:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.162630][ T30] audit: type=1326 audit(661.690:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4531 comm="syz.1.316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=431 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 662.172801][ T30] audit: type=1400 audit(661.700:519): avc: denied { mount } for pid=4531 comm="syz.1.316" name="/" dev="configfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 666.864661][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 666.873070][ T30] audit: type=1400 audit(666.390:530): avc: denied { create } for pid=4543 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 666.913423][ T30] audit: type=1400 audit(666.440:531): avc: denied { write } for pid=4543 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 667.441537][ T30] audit: type=1400 audit(666.970:532): avc: denied { create } for pid=4543 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 667.457200][ T30] audit: type=1400 audit(666.990:533): avc: denied { setopt } for pid=4543 comm="syz.1.319" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 667.550423][ T30] audit: type=1400 audit(667.080:534): avc: denied { connect } for pid=4543 comm="syz.1.319" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 669.364731][ T30] audit: type=1400 audit(668.890:535): avc: denied { execute } for pid=4554 comm="syz.3.320" name="file1" dev="tmpfs" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 669.380603][ T4557] process 'syz.3.320' launched './file1' with NULL argv: empty string added [ 669.408569][ T30] audit: type=1400 audit(668.920:536): avc: denied { execute_no_trans } for pid=4554 comm="syz.3.320" path="/61/file1" dev="tmpfs" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 674.830710][ T30] audit: type=1400 audit(674.330:537): avc: denied { block_suspend } for pid=4607 comm="syz.3.321" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 678.454528][ T30] audit: type=1326 audit(677.980:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.463741][ T30] audit: type=1400 audit(677.980:539): avc: denied { read } for pid=4622 comm="syz.3.327" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 678.470181][ T30] audit: type=1326 audit(677.980:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.476289][ T30] audit: type=1400 audit(677.990:541): avc: denied { open } for pid=4622 comm="syz.3.327" path="net:[4026532636]" dev="nsfs" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 678.513539][ T30] audit: type=1326 audit(678.040:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.536392][ T30] audit: type=1326 audit(678.060:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.571896][ T30] audit: type=1326 audit(678.100:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.600984][ T30] audit: type=1326 audit(678.130:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 678.611515][ T30] audit: type=1326 audit(678.140:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.1.326" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 682.126908][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 682.127744][ T30] audit: type=1400 audit(681.640:554): avc: denied { read } for pid=4631 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 682.294308][ T4632] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.533499][ T4632] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.709665][ T4632] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 682.910396][ T4632] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 683.594114][ T4581] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 683.673538][ T4581] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 683.775689][ T4598] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 683.848773][ T4581] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 684.222396][ T30] audit: type=1400 audit(683.750:555): avc: denied { ioctl } for pid=4634 comm="syz.1.331" path="socket:[9298]" dev="sockfs" ino=9298 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 684.718468][ T30] audit: type=1400 audit(684.240:556): avc: denied { create } for pid=4628 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 684.768215][ T4629] $H: renamed from dummy0 (while UP) [ 684.818360][ T4629] $H: entered promiscuous mode [ 684.937491][ T4638] gre1: entered promiscuous mode [ 687.155607][ T30] audit: type=1400 audit(686.680:557): avc: denied { create } for pid=4644 comm="syz.1.335" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 687.177498][ T30] audit: type=1400 audit(686.700:558): avc: denied { map } for pid=4644 comm="syz.1.335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 687.187659][ T30] audit: type=1400 audit(686.710:559): avc: denied { read write } for pid=4644 comm="syz.1.335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 688.321172][ T4648] netlink: 4 bytes leftover after parsing attributes in process `syz.3.336'. [ 688.387637][ T4648] netlink: 12 bytes leftover after parsing attributes in process `syz.3.336'. [ 696.726283][ T30] audit: type=1326 audit(696.250:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4683 comm="syz.1.350" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 696.742124][ T30] audit: type=1326 audit(696.260:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4683 comm="syz.1.350" exe="/syz-executor" sig=0 arch=c00000b7 syscall=158 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 696.742898][ T30] audit: type=1326 audit(696.270:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4683 comm="syz.1.350" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 697.540081][ T30] audit: type=1400 audit(697.070:563): avc: denied { write } for pid=4687 comm="syz.1.352" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 704.200719][ T30] audit: type=1400 audit(703.730:564): avc: denied { prog_load } for pid=4706 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 704.223579][ T30] audit: type=1400 audit(703.730:565): avc: denied { bpf } for pid=4706 comm="syz.3.360" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 704.232277][ T30] audit: type=1400 audit(703.750:566): avc: denied { perfmon } for pid=4706 comm="syz.3.360" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 704.257115][ T30] audit: type=1400 audit(703.780:567): avc: denied { map_create } for pid=4706 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 704.495931][ T30] audit: type=1400 audit(704.010:568): avc: denied { read write } for pid=4029 comm="syz-executor" name="loop3" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 704.499494][ T30] audit: type=1400 audit(704.030:569): avc: denied { open } for pid=4029 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 704.510214][ T30] audit: type=1400 audit(704.040:570): avc: denied { ioctl } for pid=4029 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=641 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 704.731614][ T30] audit: type=1400 audit(704.250:571): avc: denied { module_request } for pid=4708 comm="syz.3.361" kmod="netdev-netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 705.157232][ T30] audit: type=1400 audit(704.660:572): avc: denied { name_bind } for pid=4711 comm="syz.1.362" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 705.184033][ T30] audit: type=1400 audit(704.710:573): avc: denied { sys_module } for pid=4708 comm="syz.3.361" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 708.763231][ T4724] netlink: 'syz.3.367': attribute type 8 has an invalid length. [ 708.763871][ T4724] netem: change failed [ 709.379945][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 709.387291][ T30] audit: type=1400 audit(708.910:577): avc: denied { create } for pid=4726 comm="syz.3.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 709.462052][ T30] audit: type=1400 audit(708.990:578): avc: denied { write } for pid=4726 comm="syz.3.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 709.470628][ T4727] netlink: 28 bytes leftover after parsing attributes in process `syz.3.368'. [ 709.497553][ T4727] netlink: 20 bytes leftover after parsing attributes in process `syz.3.368'. [ 709.961359][ T30] audit: type=1400 audit(709.490:579): avc: denied { map_read map_write } for pid=4729 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 710.033784][ T30] audit: type=1400 audit(709.560:580): avc: denied { execmem } for pid=4729 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 710.051965][ T30] audit: type=1400 audit(709.580:581): avc: denied { create } for pid=4729 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.074772][ T30] audit: type=1400 audit(709.600:582): avc: denied { write } for pid=4729 comm="syz.3.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.149284][ T4731] netlink: 'syz.1.369': attribute type 2 has an invalid length. [ 710.149837][ T4731] netlink: 5356 bytes leftover after parsing attributes in process `syz.1.369'. [ 711.102732][ T30] audit: type=1400 audit(710.630:583): avc: denied { nlmsg_write } for pid=4732 comm="syz.3.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 711.120059][ T4737] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4737 comm=syz.3.371 [ 712.274338][ T30] audit: type=1400 audit(711.800:584): avc: denied { create } for pid=4734 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 712.797880][ T4733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4733 comm=syz.3.371 [ 714.002502][ T30] audit: type=1326 audit(713.520:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4747 comm="syz.3.373" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 714.022552][ T30] audit: type=1326 audit(713.550:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4747 comm="syz.3.373" exe="/syz-executor" sig=0 arch=c00000b7 syscall=103 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 717.079795][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 717.080808][ T30] audit: type=1400 audit(716.610:589): avc: denied { write } for pid=4756 comm="syz.1.377" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 718.141450][ T30] audit: type=1400 audit(717.670:590): avc: denied { allowed } for pid=4759 comm="syz.3.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 718.249139][ T30] audit: type=1400 audit(717.700:591): avc: denied { create } for pid=4759 comm="syz.3.379" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 718.250215][ T30] audit: type=1400 audit(717.760:592): avc: denied { map } for pid=4759 comm="syz.3.379" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9524 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 718.250581][ T30] audit: type=1400 audit(717.760:593): avc: denied { read write } for pid=4759 comm="syz.3.379" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9524 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 718.543002][ T30] audit: type=1326 audit(718.070:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4759 comm="syz.3.379" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x0 [ 720.352265][ T30] audit: type=1400 audit(719.880:595): avc: denied { create } for pid=4759 comm="syz.3.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 722.149593][ T30] audit: type=1400 audit(721.680:596): avc: denied { ioctl } for pid=4773 comm="syz.3.384" path="socket:[8997]" dev="sockfs" ino=8997 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 722.250414][ T30] audit: type=1400 audit(721.780:597): avc: denied { ioctl } for pid=4773 comm="syz.3.384" path="socket:[8999]" dev="sockfs" ino=8999 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 723.317841][ T4780] netlink: 'syz.1.387': attribute type 13 has an invalid length. [ 724.166696][ T30] audit: type=1400 audit(723.670:598): avc: denied { mount } for pid=4778 comm="syz.1.387" name="/" dev="mqueue" ino=3411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 724.354173][ T30] audit: type=1400 audit(723.880:599): avc: denied { getattr } for pid=4781 comm="syz.3.388" name="[io_uring]" dev="anon_inodefs" ino=9011 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 725.811440][ T4786] netlink: 44 bytes leftover after parsing attributes in process `syz.3.389'. [ 729.493075][ T4577] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.494214][ T4577] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.494574][ T4577] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 729.507365][ T4577] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 731.713443][ T4791] netlink: 40 bytes leftover after parsing attributes in process `syz.1.391'. [ 733.321357][ T4797] vlan2: entered allmulticast mode [ 733.327267][ T4797] bridge_slave_0: entered allmulticast mode [ 735.770018][ T30] audit: type=1400 audit(735.300:600): avc: denied { create } for pid=4807 comm="syz.3.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 735.788562][ T30] audit: type=1400 audit(735.320:601): avc: denied { write } for pid=4807 comm="syz.3.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 736.189883][ T30] audit: type=1400 audit(735.720:602): avc: denied { sqpoll } for pid=4809 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 736.398972][ T30] audit: type=1400 audit(735.930:603): avc: denied { create } for pid=4812 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 737.953376][ T30] audit: type=1326 audit(737.480:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4819 comm="syz.3.403" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x0 [ 738.540061][ T30] audit: type=1400 audit(738.070:605): avc: denied { connect } for pid=4819 comm="syz.3.403" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 738.554377][ T30] audit: type=1400 audit(738.080:606): avc: denied { write } for pid=4819 comm="syz.3.403" laddr=fe80::10 lport=60 faddr=fe80::3c fport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 738.847780][ T30] audit: type=1326 audit(738.370:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4826 comm="syz.1.405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 738.854688][ T30] audit: type=1326 audit(738.380:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4826 comm="syz.1.405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 738.889922][ T30] audit: type=1326 audit(738.420:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4826 comm="syz.1.405" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 741.090494][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 741.091308][ T30] audit: type=1400 audit(740.620:616): avc: denied { kexec_image_load } for pid=4834 comm="syz.3.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 744.483011][ T4854] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4854 comm=syz.3.417 [ 746.278742][ T4852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4852 comm=syz.3.417 [ 748.306549][ T30] audit: type=1326 audit(747.830:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.309671][ T30] audit: type=1326 audit(747.830:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.320044][ T30] audit: type=1326 audit(747.850:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=97 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.353922][ T30] audit: type=1326 audit(747.880:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.376046][ T30] audit: type=1326 audit(747.890:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=189 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.376875][ T30] audit: type=1326 audit(747.900:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.377216][ T30] audit: type=1326 audit(747.900:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.401631][ T30] audit: type=1326 audit(747.900:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=427 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.402503][ T30] audit: type=1326 audit(747.930:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 748.402895][ T30] audit: type=1326 audit(747.930:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4862 comm="syz.3.418" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 750.952964][ T4875] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4875 comm=syz.1.422 [ 752.268307][ T4873] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4873 comm=syz.1.422 [ 754.016856][ T30] audit: type=1400 audit(753.530:627): avc: denied { read } for pid=4888 comm="syz.3.426" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 754.017752][ T30] audit: type=1400 audit(753.530:628): avc: denied { open } for pid=4888 comm="syz.3.426" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 754.038166][ T30] audit: type=1400 audit(753.570:629): avc: denied { ioctl } for pid=4888 comm="syz.3.426" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 757.572566][ T4903] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4903 comm=syz.3.431 [ 758.228431][ T4907] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4907 comm=syz.3.431 [ 759.269399][ T30] audit: type=1400 audit(758.800:630): avc: denied { prog_run } for pid=4908 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 761.192007][ T30] audit: type=1400 audit(760.720:631): avc: denied { relabelfrom } for pid=4923 comm="syz.1.439" name="NETLINK" dev="sockfs" ino=9870 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 761.192975][ T4925] SELinux: Context system_u:object_r:utempter_exec_t:s0 is not valid (left unmapped). [ 761.199401][ T30] audit: type=1400 audit(760.720:632): avc: denied { relabelto } for pid=4923 comm="syz.1.439" name="NETLINK" dev="sockfs" ino=9870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_netfilter_socket permissive=1 trawcon="system_u:object_r:utempter_exec_t:s0" [ 761.752924][ T4929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4929 comm=syz.3.438 [ 762.341594][ T4924] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4924 comm=syz.3.438 [ 764.818581][ T4942] netlink: 28 bytes leftover after parsing attributes in process `syz.1.445'. [ 765.945788][ T4944] syz.3.446 uses obsolete (PF_INET,SOCK_PACKET) [ 765.957351][ T30] audit: type=1400 audit(765.480:633): avc: denied { create } for pid=4943 comm="syz.3.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 766.030461][ T4944] 8021q: VLANs not supported on vcan0 [ 768.173536][ T30] audit: type=1326 audit(767.700:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.183959][ T30] audit: type=1326 audit(767.710:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.233967][ T30] audit: type=1326 audit(767.730:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.242330][ T30] audit: type=1326 audit(767.730:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.243293][ T30] audit: type=1326 audit(767.770:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.308682][ T30] audit: type=1326 audit(767.820:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.352804][ T30] audit: type=1326 audit(767.870:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.364714][ T30] audit: type=1326 audit(767.890:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 768.421512][ T30] audit: type=1326 audit(767.950:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4960 comm="syz.3.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 777.477449][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 777.478372][ T30] audit: type=1326 audit(777.000:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.521774][ T30] audit: type=1326 audit(777.040:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.522836][ T30] audit: type=1326 audit(777.050:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.523231][ T30] audit: type=1326 audit(777.050:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.591363][ T30] audit: type=1326 audit(777.110:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.597640][ T30] audit: type=1326 audit(777.130:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.654819][ T30] audit: type=1326 audit(777.180:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.671552][ T30] audit: type=1326 audit(777.190:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.700416][ T30] audit: type=1326 audit(777.220:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 777.758636][ T30] audit: type=1326 audit(777.280:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4979 comm="syz.1.462" exe="/syz-executor" sig=0 arch=c00000b7 syscall=190 compat=0 ip=0xffffa355b3a8 code=0x7ffc0000 [ 782.090750][ T4997] IPv6: NLM_F_CREATE should be specified when creating new route [ 783.769911][ T4999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 784.603304][ T4999] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 784.604188][ T4999] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 784.670251][ T4999] veth1_vlan: left promiscuous mode [ 784.698546][ T4999] veth0_vlan: left promiscuous mode [ 784.718807][ T4999] veth0_vlan: entered promiscuous mode [ 784.810026][ T4999] veth1_vlan: entered promiscuous mode [ 784.963426][ T4999] veth1_macvtap: left promiscuous mode [ 785.011220][ T4999] veth0_macvtap: left promiscuous mode [ 785.043994][ T4999] veth0_macvtap: entered promiscuous mode [ 785.079618][ T4999] veth1_macvtap: entered promiscuous mode [ 786.400116][ T4591] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.402037][ T4591] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.403994][ T4591] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 786.406387][ T4591] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 790.410271][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 790.410884][ T30] audit: type=1400 audit(789.940:662): avc: denied { write } for pid=5011 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 791.706222][ T30] audit: type=1400 audit(791.230:663): avc: denied { name_bind } for pid=5015 comm="syz.3.477" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 791.707035][ T30] audit: type=1400 audit(791.230:664): avc: denied { node_bind } for pid=5015 comm="syz.3.477" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 794.150888][ T30] audit: type=1400 audit(793.680:665): avc: denied { create } for pid=5027 comm="syz.3.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 794.232366][ T30] audit: type=1400 audit(793.760:666): avc: denied { write } for pid=5027 comm="syz.3.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 795.043664][ T30] audit: type=1326 audit(794.570:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.3.485" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 795.059285][ T30] audit: type=1326 audit(794.590:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.3.485" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 795.082261][ T30] audit: type=1326 audit(794.610:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.3.485" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 795.102932][ T30] audit: type=1326 audit(794.610:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.3.485" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 795.123223][ T30] audit: type=1326 audit(794.640:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5031 comm="syz.3.485" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9635b3a8 code=0x7ffc0000 [ 796.104014][ T5038] loop9: detected capacity change from 0 to 7 [ 796.109497][ T5038] Buffer I/O error on dev loop9, logical block 0, async page read [ 796.111247][ T5038] Buffer I/O error on dev loop9, logical block 0, async page read [ 796.112282][ T5038] loop9: unable to read partition table [ 796.113358][ T5038] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 796.113358][ T5038] ) failed (rc=-5) [ 796.169882][ T5038] [ 796.172035][ T5038] ====================================================== [ 796.172420][ T5038] WARNING: possible circular locking dependency detected [ 796.173151][ T5038] syzkaller #0 Not tainted [ 796.173470][ T5038] ------------------------------------------------------ [ 796.173838][ T5038] syz.1.488/5038 is trying to acquire lock: [ 796.174238][ T5038] ffff00000e16ca20 (&root->kernfs_iattr_rwsem){++++}-{4:4}, at: kernfs_iop_getattr+0x88/0xf0 [ 796.177012][ T5038] [ 796.177012][ T5038] but task is already holding lock: [ 796.177389][ T5038] ffff00001456c520 (&q->q_usage_counter(io)#26){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 796.178178][ T5038] [ 796.178178][ T5038] which lock already depends on the new lock. [ 796.178178][ T5038] [ 796.178480][ T5038] [ 796.178480][ T5038] the existing dependency chain (in reverse order) is: [ 796.178735][ T5038] [ 796.178735][ T5038] -> #2 (&q->q_usage_counter(io)#26){++++}-{0:0}: [ 796.179226][ T5038] blk_alloc_queue+0x538/0x644 [ 796.179445][ T5038] blk_mq_alloc_queue+0x144/0x220 [ 796.179734][ T5038] __blk_mq_alloc_disk+0x20/0x1a4 [ 796.179978][ T5038] loop_add+0x3b0/0x938 [ 796.180227][ T5038] loop_init+0xd0/0x138 [ 796.180455][ T5038] do_one_initcall+0x130/0x7f0 [ 796.180673][ T5038] kernel_init_freeable+0x48c/0x714 [ 796.180931][ T5038] kernel_init+0x24/0x1dc [ 796.181163][ T5038] ret_from_fork+0x10/0x20 [ 796.181405][ T5038] [ 796.181405][ T5038] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 796.181766][ T5038] fs_reclaim_acquire+0x138/0x160 [ 796.181939][ T5038] kmem_cache_alloc_noprof+0x60/0x6e4 [ 796.182114][ T5038] __kernfs_iattrs+0x10c/0x330 [ 796.182326][ T5038] __kernfs_setattr+0x4c/0x2a0 [ 796.182492][ T5038] kernfs_iop_setattr+0xc0/0xf4 [ 796.182697][ T5038] notify_change+0x3d0/0xbe4 [ 796.182881][ T5038] do_truncate+0x174/0x1bc [ 796.183073][ T5038] path_openat+0x17c4/0x24b0 [ 796.183241][ T5038] do_filp_open+0x184/0x360 [ 796.183485][ T5038] do_sys_openat2+0xe0/0x160 [ 796.183738][ T5038] __arm64_sys_openat+0x12c/0x1bc [ 796.184107][ T5038] invoke_syscall+0x6c/0x258 [ 796.184485][ T5038] el0_svc_common.constprop.0+0xac/0x230 [ 796.184957][ T5038] do_el0_svc+0x40/0x58 [ 796.185166][ T5038] el0_svc+0x54/0x288 [ 796.185327][ T5038] el0t_64_sync_handler+0xa0/0xe4 [ 796.185663][ T5038] el0t_64_sync+0x198/0x19c [ 796.185870][ T5038] [ 796.185870][ T5038] -> #0 (&root->kernfs_iattr_rwsem){++++}-{4:4}: [ 796.186310][ T5038] __lock_acquire+0x1638/0x2380 [ 796.186539][ T5038] lock_acquire+0x310/0x38c [ 796.186729][ T5038] down_read+0xb4/0x314 [ 796.186891][ T5038] kernfs_iop_getattr+0x88/0xf0 [ 796.187064][ T5038] vfs_getattr_nosec+0x1fc/0x374 [ 796.187246][ T5038] vfs_getattr+0x40/0x54 [ 796.187414][ T5038] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 796.187618][ T5038] lo_ioctl+0xde4/0x161c [ 796.187809][ T5038] blkdev_ioctl+0x22c/0x7f4 [ 796.187971][ T5038] __arm64_sys_ioctl+0x124/0x1a4 [ 796.188187][ T5038] invoke_syscall+0x6c/0x258 [ 796.188394][ T5038] el0_svc_common.constprop.0+0xac/0x230 [ 796.188586][ T5038] do_el0_svc+0x40/0x58 [ 796.188784][ T5038] el0_svc+0x54/0x288 [ 796.188937][ T5038] el0t_64_sync_handler+0xa0/0xe4 [ 796.189133][ T5038] el0t_64_sync+0x198/0x19c [ 796.189354][ T5038] [ 796.189354][ T5038] other info that might help us debug this: [ 796.189354][ T5038] [ 796.189794][ T5038] Chain exists of: [ 796.189794][ T5038] &root->kernfs_iattr_rwsem --> fs_reclaim --> &q->q_usage_counter(io)#26 [ 796.189794][ T5038] [ 796.190856][ T5038] Possible unsafe locking scenario: [ 796.190856][ T5038] [ 796.191103][ T5038] CPU0 CPU1 [ 796.191270][ T5038] ---- ---- [ 796.191441][ T5038] lock(&q->q_usage_counter(io)#26); [ 796.191699][ T5038] lock(fs_reclaim); [ 796.191947][ T5038] lock(&q->q_usage_counter(io)#26); [ 796.192242][ T5038] rlock(&root->kernfs_iattr_rwsem); [ 796.192515][ T5038] [ 796.192515][ T5038] *** DEADLOCK *** [ 796.192515][ T5038] [ 796.192750][ T5038] 3 locks held by syz.1.488/5038: [ 796.192946][ T5038] #0: ffff00001469e440 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_global_lock_killable+0x2c/0xbc [ 796.193386][ T5038] #1: ffff00001456c520 (&q->q_usage_counter(io)#26){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 796.193836][ T5038] #2: ffff00001456c558 (&q->q_usage_counter(queue)#10){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 796.194339][ T5038] [ 796.194339][ T5038] stack backtrace: [ 796.195163][ T5038] CPU: 0 UID: 0 PID: 5038 Comm: syz.1.488 Not tainted syzkaller #0 PREEMPT [ 796.195770][ T5038] Hardware name: linux,dummy-virt (DT) [ 796.196249][ T5038] Call trace: [ 796.196634][ T5038] show_stack+0x18/0x24 (C) [ 796.196958][ T5038] dump_stack_lvl+0xa4/0xf4 [ 796.197208][ T5038] dump_stack+0x1c/0x28 [ 796.197380][ T5038] print_circular_bug+0x28c/0x370 [ 796.197557][ T5038] check_noncircular+0x168/0x17c [ 796.197751][ T5038] __lock_acquire+0x1638/0x2380 [ 796.197943][ T5038] lock_acquire+0x310/0x38c [ 796.198098][ T5038] down_read+0xb4/0x314 [ 796.198281][ T5038] kernfs_iop_getattr+0x88/0xf0 [ 796.198453][ T5038] vfs_getattr_nosec+0x1fc/0x374 [ 796.198627][ T5038] vfs_getattr+0x40/0x54 [ 796.198824][ T5038] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 796.199049][ T5038] lo_ioctl+0xde4/0x161c [ 796.199204][ T5038] blkdev_ioctl+0x22c/0x7f4 [ 796.199366][ T5038] __arm64_sys_ioctl+0x124/0x1a4 [ 796.199542][ T5038] invoke_syscall+0x6c/0x258 [ 796.199853][ T5038] el0_svc_common.constprop.0+0xac/0x230 [ 796.200209][ T5038] do_el0_svc+0x40/0x58 [ 796.200539][ T5038] el0_svc+0x54/0x288 [ 796.200825][ T5038] el0t_64_sync_handler+0xa0/0xe4 [ 796.201156][ T5038] el0t_64_sync+0x198/0x19c [ 796.206974][ T5038] Buffer I/O error on dev loop9, logical block 0, async page read [ 796.207694][ T5038] Buffer I/O error on dev loop9, logical block 0, async page read [ 796.207984][ T5038] loop9: unable to read partition table [ 796.208631][ T5038] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 796.208631][ T5038] ) failed (rc=-5) [ 796.272029][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 796.272602][ T30] audit: type=1400 audit(795.800:678): avc: denied { write } for pid=3318 comm="syz-executor" path="pipe:[2598]" dev="pipefs" ino=2598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 797.708187][ T4581] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 797.987182][ T4581] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.210800][ T4581] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.333534][ T4581] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.808132][ T30] audit: type=1400 audit(798.340:679): avc: denied { read } for pid=3168 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 800.498431][ T4581] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 800.561757][ T4581] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 800.611061][ T4581] bond0 (unregistering): Released all slaves [ 800.718267][ T30] audit: type=1400 audit(800.250:680): avc: denied { search } for pid=3168 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 800.720182][ T30] audit: type=1400 audit(800.250:681): avc: denied { search } for pid=3168 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 800.726428][ T30] audit: type=1400 audit(800.250:682): avc: denied { search } for pid=3168 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 800.729331][ T30] audit: type=1400 audit(800.260:683): avc: denied { read } for pid=3168 comm="dhcpcd" name="n26" dev="tmpfs" ino=2433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 800.731621][ T30] audit: type=1400 audit(800.260:684): avc: denied { open } for pid=3168 comm="dhcpcd" path="/run/udev/data/n26" dev="tmpfs" ino=2433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 800.734089][ T30] audit: type=1400 audit(800.260:685): avc: denied { getattr } for pid=3168 comm="dhcpcd" path="/run/udev/data/n26" dev="tmpfs" ino=2433 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 800.978807][ T4581] hsr_slave_0: left promiscuous mode [ 800.998782][ T4581] hsr_slave_1: left promiscuous mode [ 801.059175][ T4581] veth1_macvtap: left promiscuous mode [ 801.061684][ T4581] veth0_macvtap: left promiscuous mode [ 801.066278][ T4581] veth1_vlan: left promiscuous mode [ 801.068784][ T4581] veth0_vlan: left promiscuous mode [ 804.762498][ T30] audit: type=1400 audit(804.290:686): avc: denied { read open } for pid=5046 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 804.770046][ T30] audit: type=1400 audit(804.290:687): avc: denied { getattr } for pid=5046 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=669 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 804.906301][ T30] audit: type=1400 audit(804.430:688): avc: denied { add_name } for pid=5045 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 804.911478][ T30] audit: type=1400 audit(804.440:689): avc: denied { create } for pid=5045 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 804.927153][ T30] audit: type=1400 audit(804.450:690): avc: denied { write } for pid=5045 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth9.link" dev="tmpfs" ino=2437 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 804.927889][ T30] audit: type=1400 audit(804.450:691): avc: denied { append } for pid=5045 comm="dhcpcd-run-hook" name="resolv.conf.eth9.link" dev="tmpfs" ino=2437 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.091238][ T4581] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.266677][ T4581] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.399280][ T4581] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 805.466563][ T30] audit: type=1400 audit(804.990:692): avc: denied { remove_name } for pid=5048 comm="rm" name="resolv.conf.eth9.link" dev="tmpfs" ino=2437 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 805.477493][ T30] audit: type=1400 audit(804.990:693): avc: denied { unlink } for pid=5048 comm="rm" name="resolv.conf.eth9.link" dev="tmpfs" ino=2437 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 805.554044][ T4581] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 807.293860][ T4581] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 807.368182][ T4581] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 807.429585][ T4581] bond0 (unregistering): Released all slaves [ 807.701332][ T4581] hsr_slave_0: left promiscuous mode [ 807.710446][ T4581] hsr_slave_1: left promiscuous mode [ 807.746981][ T4581] veth1_macvtap: left promiscuous mode [ 807.747885][ T4581] veth0_macvtap: left promiscuous mode [ 807.748916][ T4581] veth1_vlan: left promiscuous mode [ 807.749638][ T4581] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 16:34:37 Registers: info registers vcpu 0 CPU#0 PC=ffff80008031c544 X00=0000000000000019 X01=0000000000000000 X02=0000000000000000 X03=0000000000000000 X04=1fffe0000258b3d1 X05=ffff00006a0675d0 X06=ffff60000d40ceba X07=0000000000000001 X08=ffff00006a0675d3 X09=dfff800000000000 X10=ffff60000d40ceba X11=1fffe0000d40ceba X12=ffff60000d40cebb X13=0000000000000001 X14=0000000000000001 X15=fffffffffffecf10 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000898eaec0 X20=ffff000012c5a9c8 X21=0000000000000002 X22=ffff800089ad3070 X23=ffff000012c59e80 X24=0000000000000002 X25=ffff800088c80000 X26=00000000000000c8 X27=0000000000000003 X28=0000000000000002 X29=ffff80008ecb7130 X30=ffff80008031c530 SP=ffff80008ecb7130 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000004c03000000:0000004c03000000 Q01=0000000000000000:000000000000004c Q02=0000000000000000:0000000000000000 Q03=0000000000000028:000000000000024c Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdc4be900:0000ffffdc4be900 Q17=ffffff80ffffffd0:0000ffffdc4be8d0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085496830 X00=ffff80008549682c X01=0000000000000000 X02=0000000000000000 X03=1fffe00002893001 X04=dfff800000000000 X05=1fffe00002893001 X06=0000000041b58ab3 X07=1ffff00011ac2ff4 X08=ffff80008d2e3f83 X09=00000000000000c0 X10=ffff00006a08e08c X11=1ffff00011a5c7f0 X12=ffff700011a5c7f1 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff80008d610000 X17=ffff7fffe2f40000 X18=0000000000000000 X19=ffff8000873f6ff0 X20=ffff000014498000 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873f6fc0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873f6ff0 X28=ffff800085541b40 X29=ffff80008d617de0 X30=ffff8000804451c0 SP=ffff80008d617de0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=7269762f73656369:7665642f7379732f Q01=33706f6f6c2f6b63:6f6c622f6c617574 Q02=6b636f6c622f6c61:75747269762f7365 Q03=307570632f302f71:6d2f33706f6f6c2f Q04=3303330333033303:3303330333033303 Q05=bcbcbc0000303003:bcbcbc0000303003 Q06=0000000000000073:0000aaaac827c3c0 Q07=0000000000000074:0000aaaac8279600 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffff4f1740:0000ffffff4f1740 Q17=ffffff80ffffffd0:0000ffffff4f1710 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000