last executing test programs: 7.099043925s ago: executing program 0 (id=702): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800"], 0x0, 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$kcm(0x2d, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)) 6.425419842s ago: executing program 0 (id=704): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kfree\x00', r2}, 0x18) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600000000020000000000000000000000bf010100636d61632861657329"], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) 5.887319974s ago: executing program 0 (id=706): open$dir(0x0, 0x22400, 0x1) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3}}], 0x18}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027f"], 0x57) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 4.968003591s ago: executing program 0 (id=710): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="190000000400000004"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x2040400) r1 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) 4.637143554s ago: executing program 0 (id=711): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x1843, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pim6reg0\x00', 0x2}) ioctl$TUNSETDEBUG(r0, 0x400454c9, 0xffffffffffffffff) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) 4.135722904s ago: executing program 0 (id=713): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fstat(0xffffffffffffffff, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in=@initdev}}, {{@in6=@private0}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = syz_open_pts(0xffffffffffffffff, 0x8182) ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000000)={0x2, 0x9, 0x8, 0x8, 0x5, "6c2a0a5692c16ea0c38f93b1a2f388a5d2b72a"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00', 0x4, 0x4, 0x3c8, 0x1f8, 0x110, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local={0x2}}, {@mac=@random="3c192477987a"}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x22}, @broadcast, 0x4, 0x110}}}, {{@arp={@loopback, @private=0xa010102, 0xff, 0xffffff00, 0xd, 0x10, {@mac=@multicast, {[0xff, 0xff, 0x0, 0x0, 0xff]}}, {@empty, {[0x0, 0xff, 0x0, 0x0, 0xff]}}, 0x8, 0x0, 0x0, 0x8, 0x1, 0x5a, 'macvlan0\x00', 'ipvlan0\x00', {0xff}, {}, 0x0, 0x100}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}, {{@arp={@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, 0xff, 0x0, 0x0, 0x0, {@mac=@link_local, {[0xff]}}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_vlan\x00', 'ipvlan1\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x3}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) bpf$PROG_LOAD(0x5, 0x0, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000064000000030a01030000000000000000050000000900010073797a30000000000900030073797a300000000008000a40000000032800048008000240000000120800014000000000140003"], 0xac}, 0x1, 0x0, 0x0, 0x4008805}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3.226688751s ago: executing program 1 (id=715): bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x40080c4) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback, 0xa77}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 2.687967902s ago: executing program 1 (id=716): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2bf, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffffe) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000400)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x4, './file0/file1\x00'}}) 2.167129313s ago: executing program 1 (id=717): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xf, 0x4, 0x4, 0x12}, 0x50) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000780)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) recvmsg$unix(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0xb3}], 0x1, 0x0, 0x0, 0x14}, 0x0) sendmsg$inet(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) 887.803974ms ago: executing program 1 (id=718): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mremap(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000009000/0x4000)=nil) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000001a00)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="8689d46205a34100bf2bbe11a5ce7839edaf02afe39ead95913e9c4f8cf31440006769ebdf12cfacae8e8c03f5db079da7d9ecda75e2a7d49d5cbcb370c4d789390a328ba42c9c60cf2154d1b659aa709e8980a522cfb72f23ad87fb7019706ccae98cfe7c4fd23e8297b8cabc46ede1ac3da78f1b488c6357e7edfcd417df6660af20a54ecdcb02f689ae15ee655d4b7b1ea733e88ee9f53669388dff487c1c49953f3bc142112bd4b582b29b35d43962ed245c2cd5d5df40a3e0ed6beaf3b641e84b0f0dfa121a9efe05269f9f4a0e9bcbf43c7a90a711f453668c730c3badedca687b71a9c27bab9e724cc4a4918713031596ea6fd01124f973f257ccd9665aee7df4a9d64f079d176abc00000000d7af3e2dd4396f72373fb0a787a6129ca41181f5087fb843212550b58e3707d5a0399de36c2503836cbe2133de4f574e9e05c96788b0de1bd13e390445433d96737b964fa8af2ac4b2f0f9390ca93d8d3d810044d024359e067c4553230ab748947d33f8fc115ce9a49e6571c45a05d786cbd49342c236537dbbeec666b07baab917252113a5b9a77283189b518f356debe42d80cf2d0687b9c64d0253a6a09286fded6e4f8557b8fb4f25ca4fb138af8945c74bbc98748eaaa030be5317646f195e6e085ac6ddb29542e3581961259987241f7e7061526a7afec8962e74215fea43703a4e543ee9d1a3c3f5f2a41977ece8fdadcf89ce331ce59bebae5f53513d0e10485d7ddbda60513bf339602510b3a23ea29a0d5d03a61e34d12942ea4a847c884b27b5344a456d02a55f8929cc567e7c792c01fab7a7b32780a14c361000609b817dd91507b04d875279527946fdb8fb92a512485e234d092c28f1d0a0498731ccc0eb10515d510e8945839307b46512ceca6f495fdd2c6ae5eb2ef3b2a40ebdc7edf0048e3fb5e3d97a9ea5113a6b70d20ad5c43f0df95d88c0f121a1884da21a21f0ba47420f8391a97921cc51871dbb272e43710fe71d5e342c3afd10608a8b02f00e8fbd8d570b6faace86c494ecea8913233391e7b7cec3d571bb3032181ed58e1b513e511f79ee562c8cde9b3b74c2e95dcde7fadb5a666bdc0c1684794620ce8cf0c0aee8e90b3ef6e7160d3f055cb4d1ced32e4edc15e7d102952d3237e6c02c591a95a182bf190c0124abc7f1225332ff1c5e1b94e4e9bf02c1a18bd7bfce20707f7298da322560bc1a4cf298d46f5bf8ff41da21e25aa17f65f9ee43ca890b5ef6a3ccf3efedf3ca60a9acef1352ad0c43e6cf375108cf0974ce89a99adba7e6a3f8949dc573440fafe0e3abdd0066057a2d868e8386080f18a421568d8e7a89536a4173861bd55245c8fcf7dcba18edce36d2e85b9630fbc218db9ebd16abb11ac06fdbf2bc3e6394d4c6e7ae71813d30772d487743a2856348fee09989ce03331e7848770fc91e62191c20fe5f4a73c5dae467dd612bdb63b1e50921d38271305d7412103d5a6214d6d534d1d530b9169f882b6926bbd338f0282a8bd9a44603934e5249e83f1d0947b39f82a7843d2b6f796d8abf7ff3e66cfd4519324d71cebbf6580dffc10d555e479e9acaa12c3c59e3732c181aa4223d0fcdac514e9d7c7963c2634964520286b028f60a4ae612b8e6049315139e884cbffd6836253094ad023329183496cf663366ad4d7f7f5f1bd2db9b0d33f106c041fba4494c7da404d45d8955e5459ca4a62862721ec1fa534fd95e262c5814426816e60000000000000000001aa4fb6f40ec24f42f6949cc28d2a0d4eb61cb1664627582d962523586539445b81e9759321652280ecb", 0xffe3, 0x0, 0x0, 0x0) 406.885603ms ago: executing program 1 (id=719): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x0) 0s ago: executing program 1 (id=720): socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'wlan1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b88}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0, 0x0, 0x4}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) socket$can_j1939(0x1d, 0x2, 0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001440)={'\x00', 0x4212}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa1000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r4, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x200000007}) fcntl$lock(r4, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x1a, 0x5, 0x1) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40004}, 0x4000) sendmsg$nl_route_sched(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newtfilter={0x38, 0x2c, 0xd27, 0x70bd2d, 0x25dfdbfa, {0x0, 0x0, 0x0, r8, {0x0, 0x2}, {0xffff}, {0x7, 0xcba0f6a4e5ba9ca3}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000810}, 0x20084084) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r9, 0x560a, &(0x7f00000006c0)={0x3, 0x0, 0x0, 0x0, 0x104, 0x3}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:49741' (ED25519) to the list of known hosts. [ 239.582718][ T30] audit: type=1400 audit(239.120:46): avc: denied { name_bind } for pid=3319 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 240.243943][ T30] audit: type=1400 audit(239.770:47): avc: denied { execute } for pid=3320 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 240.256989][ T30] audit: type=1400 audit(239.780:48): avc: denied { execute_no_trans } for pid=3320 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 247.753008][ T30] audit: type=1400 audit(247.290:49): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 247.770655][ T30] audit: type=1400 audit(247.300:50): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.822855][ T3320] cgroup: Unknown subsys name 'net' [ 247.848750][ T30] audit: type=1400 audit(247.380:51): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 248.133149][ T3320] cgroup: Unknown subsys name 'cpuset' [ 248.206522][ T3320] cgroup: Unknown subsys name 'rlimit' [ 248.572920][ T30] audit: type=1400 audit(248.100:52): avc: denied { setattr } for pid=3320 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.584026][ T30] audit: type=1400 audit(248.110:53): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 248.591671][ T30] audit: type=1400 audit(248.120:54): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 249.426781][ T3322] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 249.438562][ T30] audit: type=1400 audit(248.970:55): avc: denied { relabelto } for pid=3322 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.457926][ T30] audit: type=1400 audit(248.980:56): avc: denied { write } for pid=3322 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 249.588592][ T30] audit: type=1400 audit(249.120:57): avc: denied { read } for pid=3320 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.595433][ T30] audit: type=1400 audit(249.120:58): avc: denied { open } for pid=3320 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.606045][ T3320] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 265.346914][ T30] audit: type=1400 audit(264.880:59): avc: denied { execmem } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 265.463085][ T30] audit: type=1400 audit(264.990:60): avc: denied { read } for pid=3325 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 265.464251][ T30] audit: type=1400 audit(264.990:61): avc: denied { open } for pid=3325 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 265.474995][ T30] audit: type=1400 audit(265.010:62): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 265.576103][ T30] audit: type=1400 audit(265.110:63): avc: denied { module_request } for pid=3325 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 265.927711][ T30] audit: type=1400 audit(265.460:64): avc: denied { sys_module } for pid=3325 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 275.512271][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.667231][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.736632][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.927159][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.168807][ T3326] hsr_slave_0: entered promiscuous mode [ 280.187320][ T3326] hsr_slave_1: entered promiscuous mode [ 280.758545][ T3325] hsr_slave_0: entered promiscuous mode [ 280.775888][ T3325] hsr_slave_1: entered promiscuous mode [ 280.793371][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 280.797065][ T3325] Cannot create hsr debugfs directory [ 283.475674][ T30] audit: type=1400 audit(283.010:65): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.492941][ T30] audit: type=1400 audit(283.030:66): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.496585][ T30] audit: type=1400 audit(283.030:67): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.538258][ T3326] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 283.672543][ T3326] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 283.845927][ T3326] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 284.011289][ T3326] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 284.487318][ T3325] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 284.592863][ T3325] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 284.639193][ T3325] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 284.698998][ T3325] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 290.828265][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.392412][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.765629][ T3325] veth0_vlan: entered promiscuous mode [ 304.874807][ T3325] veth1_vlan: entered promiscuous mode [ 305.340623][ T3325] veth0_macvtap: entered promiscuous mode [ 305.428163][ T3325] veth1_macvtap: entered promiscuous mode [ 305.602926][ T3326] veth0_vlan: entered promiscuous mode [ 305.880690][ T3326] veth1_vlan: entered promiscuous mode [ 306.086199][ T63] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.098851][ T63] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.100607][ T63] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.100848][ T63] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.657289][ T30] audit: type=1400 audit(306.190:68): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 306.673993][ T3326] veth0_macvtap: entered promiscuous mode [ 306.677071][ T30] audit: type=1400 audit(306.210:69): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.6fjjnZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 306.696827][ T30] audit: type=1400 audit(306.230:70): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 306.726322][ T3326] veth1_macvtap: entered promiscuous mode [ 306.732370][ T30] audit: type=1400 audit(306.260:71): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.6fjjnZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 306.743425][ T30] audit: type=1400 audit(306.280:72): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.6fjjnZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4174 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 306.800853][ T30] audit: type=1400 audit(306.330:73): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 306.828658][ T30] audit: type=1400 audit(306.360:74): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 306.846463][ T30] audit: type=1400 audit(306.380:75): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="gadgetfs" ino=4175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 306.915750][ T30] audit: type=1400 audit(306.450:76): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 306.925637][ T30] audit: type=1400 audit(306.460:77): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 307.166055][ T1593] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.177993][ T1593] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.224706][ T2152] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.227314][ T2152] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.238302][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 312.761769][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 312.762752][ T30] audit: type=1400 audit(312.290:85): avc: denied { create } for pid=3480 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 312.763317][ T30] audit: type=1400 audit(312.290:86): avc: denied { setopt } for pid=3480 comm="syz.0.4" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 315.938542][ T30] audit: type=1400 audit(315.470:87): avc: denied { read write } for pid=3489 comm="syz.1.8" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 315.971107][ T30] audit: type=1400 audit(315.500:88): avc: denied { open } for pid=3489 comm="syz.1.8" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 316.038835][ T30] audit: type=1400 audit(315.560:89): avc: denied { ioctl } for pid=3489 comm="syz.1.8" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 316.125336][ T3490] input: syz0 as /devices/virtual/input/input1 [ 317.251251][ T30] audit: type=1400 audit(316.780:90): avc: denied { map } for pid=3484 comm="syz.0.6" path="socket:[4222]" dev="sockfs" ino=4222 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 320.867302][ T30] audit: type=1400 audit(320.400:91): avc: denied { read write } for pid=3497 comm="syz.1.10" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 320.904192][ T30] audit: type=1400 audit(320.440:92): avc: denied { open } for pid=3497 comm="syz.1.10" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 320.921569][ T3498] fuse: Bad value for 'fd' [ 322.382860][ T3500] fuse: Unknown parameter '0x0000000000000003' [ 327.508195][ T3509] fuse: Bad value for 'fd' [ 327.734178][ T3510] fuse: Unknown parameter 'fd0x0000000000000003' [ 328.651291][ T30] audit: type=1400 audit(328.180:93): avc: denied { prog_load } for pid=3511 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 329.011472][ T30] audit: type=1400 audit(328.530:94): avc: denied { create } for pid=3513 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 329.314718][ T30] audit: type=1400 audit(328.840:95): avc: denied { bpf } for pid=3515 comm="syz.0.19" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 333.382300][ T30] audit: type=1400 audit(332.910:96): avc: denied { create } for pid=3515 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 333.748956][ T30] audit: type=1400 audit(332.910:97): avc: denied { bind } for pid=3515 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 333.915550][ T30] audit: type=1400 audit(333.430:98): avc: denied { accept } for pid=3515 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 338.857900][ T3525] fuse: Bad value for 'fd' [ 340.085312][ T3528] fuse: Unknown parameter 'fd0x0000000000000003' [ 340.815185][ T30] audit: type=1400 audit(340.340:99): avc: denied { mounton } for pid=3529 comm="syz.1.23" path="/14/file0" dev="tmpfs" ino=94 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 342.551525][ T30] audit: type=1400 audit(342.080:100): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 343.194349][ T3538] fuse: Invalid rootmode [ 350.493575][ T3552] fuse: Invalid rootmode [ 352.317194][ T30] audit: type=1400 audit(351.850:101): avc: denied { create } for pid=3557 comm="syz.1.34" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 352.338951][ T30] audit: type=1400 audit(351.870:102): avc: denied { ioctl } for pid=3557 comm="syz.1.34" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4393 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 352.472787][ T30] audit: type=1400 audit(352.000:103): avc: denied { read } for pid=3557 comm="syz.1.34" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4393 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 355.014793][ T30] audit: type=1400 audit(354.550:104): avc: denied { map_create } for pid=3561 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 355.058866][ T30] audit: type=1400 audit(354.590:105): avc: denied { map_read map_write } for pid=3561 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 355.095253][ T30] audit: type=1400 audit(354.630:106): avc: denied { perfmon } for pid=3561 comm="syz.1.36" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 355.157238][ T30] audit: type=1400 audit(354.690:107): avc: denied { prog_run } for pid=3561 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.151707][ T3567] fuse: Invalid rootmode [ 370.984186][ T30] audit: type=1400 audit(370.520:108): avc: denied { block_suspend } for pid=3575 comm="syz.0.40" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 373.450970][ T30] audit: type=1400 audit(372.980:109): avc: denied { write } for pid=3581 comm="syz.1.42" name="tcp6" dev="proc" ino=4026532697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 373.475583][ T30] audit: type=1400 audit(373.010:110): avc: denied { name_bind } for pid=3581 comm="syz.1.42" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 373.485613][ T30] audit: type=1400 audit(373.010:111): avc: denied { node_bind } for pid=3581 comm="syz.1.42" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 374.529159][ T3584] fuse: Bad value for 'rootmode' [ 381.960995][ T3599] fuse: Bad value for 'rootmode' [ 382.410703][ T30] audit: type=1400 audit(381.940:112): avc: denied { allowed } for pid=3600 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 382.414099][ T30] audit: type=1400 audit(381.950:113): avc: denied { create } for pid=3600 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 382.418397][ T30] audit: type=1400 audit(381.950:114): avc: denied { write } for pid=3600 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 382.429892][ T30] audit: type=1400 audit(381.960:115): avc: denied { nlmsg_write } for pid=3600 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 382.503290][ T30] audit: type=1400 audit(382.040:116): avc: denied { setopt } for pid=3600 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 384.688249][ T3612] fuse: Bad value for 'rootmode' [ 385.295766][ T3613] process 'syz.1.54' launched './file0' with NULL argv: empty string added [ 387.032012][ T30] audit: type=1400 audit(386.560:117): avc: denied { create } for pid=3622 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 387.081425][ T30] audit: type=1400 audit(386.610:118): avc: denied { read } for pid=3622 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 389.436098][ T30] audit: type=1400 audit(388.970:119): avc: denied { create } for pid=3630 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 389.491872][ T30] audit: type=1400 audit(389.020:120): avc: denied { setopt } for pid=3630 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 389.853886][ T30] audit: type=1400 audit(389.390:121): avc: denied { setopt } for pid=3632 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 390.975599][ T30] audit: type=1400 audit(390.500:122): avc: denied { bind } for pid=3630 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 393.450574][ T30] audit: type=1400 audit(392.980:123): avc: denied { sqpoll } for pid=3645 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 393.496735][ T30] audit: type=1400 audit(393.030:124): avc: denied { map } for pid=3645 comm="syz.0.69" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4545 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 393.524487][ T30] audit: type=1400 audit(393.060:125): avc: denied { write } for pid=3645 comm="syz.0.69" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4545 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 396.572471][ T30] audit: type=1400 audit(396.100:126): avc: denied { read write } for pid=3649 comm="syz.0.71" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 396.596937][ T30] audit: type=1400 audit(396.130:127): avc: denied { open } for pid=3649 comm="syz.0.71" path="/dev/udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 396.701777][ T30] audit: type=1400 audit(396.230:128): avc: denied { ioctl } for pid=3649 comm="syz.0.71" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x7543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 408.767474][ T1071] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 411.335223][ T1071] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 411.336159][ T1071] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 4 [ 411.337473][ T1071] usb 1-1: New USB device found, idVendor=045e, idProduct=009d, bcdDevice= 0.00 [ 411.337770][ T1071] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 412.111056][ T1071] usb 1-1: config 0 descriptor?? [ 412.193202][ T3669] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 413.344033][ T1071] hid-generic 0003:045E:009D.0001: hidraw0: USB HID vff.fa Device [HID 045e:009d] on usb-dummy_hcd.0-1/input0 [ 413.542501][ T1071] usb 1-1: USB disconnect, device number 2 [ 415.607741][ T3680] fuse: Unknown parameter 'user_i00000000000000000000' [ 418.281673][ T3688] Illegal XDP return value 4294967294 on prog (id 3) dev N/A, expect packet loss! [ 418.485442][ T30] audit: type=1400 audit(418.020:129): avc: denied { unmount } for pid=3684 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 421.244307][ T3698] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 421.244307][ T3698] The task syz.0.87 (3698) triggered the difference, watch for misbehavior. [ 423.288934][ T3705] fuse: Unknown parameter 'user_id00000000000000000000' [ 423.797700][ T3694] fido_id[3694]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 426.208489][ T3719] fuse: Bad value for 'fd' [ 444.846695][ T3733] netlink: 44 bytes leftover after parsing attributes in process `syz.1.101'. [ 444.862493][ T30] audit: type=1400 audit(444.350:130): avc: denied { write } for pid=3732 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 444.887352][ T3733] netlink: 43 bytes leftover after parsing attributes in process `syz.1.101'. [ 444.913349][ T3733] netlink: 'syz.1.101': attribute type 6 has an invalid length. [ 444.946459][ T3733] netlink: 'syz.1.101': attribute type 5 has an invalid length. [ 444.948991][ T3733] netlink: 43 bytes leftover after parsing attributes in process `syz.1.101'. [ 450.374976][ T3740] fuse: Unknown parameter '0xffffffffffffffff' [ 451.145169][ T30] audit: type=1400 audit(450.680:131): avc: denied { create } for pid=3743 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 451.201778][ T30] audit: type=1400 audit(450.720:132): avc: denied { write } for pid=3743 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 451.352897][ T30] audit: type=1404 audit(450.880:133): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 451.599138][ T30] audit: type=1400 audit(451.120:134): avc: denied { connect } for pid=3747 comm="syz.0.108" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 451.806712][ T30] audit: type=1400 audit(451.330:135): avc: denied { read } for pid=3745 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 451.997109][ T30] audit: type=1400 audit(451.510:136): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 452.216134][ T30] audit: type=1326 audit(451.750:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.0.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 452.228990][ T30] audit: type=1326 audit(451.760:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.0.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 452.291609][ T30] audit: type=1326 audit(451.780:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.0.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=199 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 452.305484][ T30] audit: type=1326 audit(451.840:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.0.109" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 456.162175][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 456.162896][ T30] audit: type=1400 audit(455.690:188): avc: denied { mounton } for pid=3774 comm="syz.1.121" path="/56/file0" dev="tmpfs" ino=313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 456.288786][ T30] audit: type=1400 audit(455.820:189): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 456.536385][ T30] audit: type=1400 audit(456.070:190): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 456.600956][ T30] audit: type=1400 audit(456.130:191): avc: denied { create } for pid=3772 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 456.610531][ T30] audit: type=1400 audit(456.140:192): avc: denied { mounton } for pid=3772 comm="syz.0.120" path="/63" dev="tmpfs" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 456.704733][ T30] audit: type=1400 audit(456.240:193): avc: denied { name_bind } for pid=3780 comm="syz.1.123" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 456.869190][ T30] audit: type=1400 audit(456.390:194): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 456.975187][ T30] audit: type=1400 audit(456.510:195): avc: denied { map_create } for pid=3782 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 457.096133][ T30] audit: type=1400 audit(456.620:196): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 457.307224][ T30] audit: type=1400 audit(456.820:197): avc: denied { create } for pid=3784 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 460.007178][ T3799] capability: warning: `syz.1.132' uses deprecated v2 capabilities in a way that may be insecure [ 461.330814][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 461.331453][ T30] audit: type=1400 audit(460.860:216): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 462.080481][ T30] audit: type=1400 audit(461.610:217): avc: denied { read } for pid=3806 comm="syz.1.136" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 462.123211][ T30] audit: type=1400 audit(461.660:218): avc: denied { execmem } for pid=3806 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 462.752364][ T30] audit: type=1400 audit(462.290:219): avc: denied { nlmsg_read } for pid=3806 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 462.771001][ T30] audit: type=1400 audit(462.300:220): avc: denied { prog_load } for pid=3806 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 467.775834][ T30] audit: type=1400 audit(467.310:221): avc: denied { create } for pid=3816 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 468.736389][ T30] audit: type=1400 audit(468.270:222): avc: denied { map_create } for pid=3822 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 468.927168][ T30] audit: type=1400 audit(468.460:223): avc: denied { create } for pid=3824 comm="syz.0.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 469.825963][ T30] audit: type=1400 audit(469.360:224): avc: denied { prog_load } for pid=3828 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.349430][ T30] audit: type=1400 audit(469.880:225): avc: denied { create } for pid=3830 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 470.388875][ T30] audit: type=1400 audit(469.910:226): avc: denied { prog_load } for pid=3830 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.410594][ T30] audit: type=1400 audit(469.940:227): avc: denied { create } for pid=3830 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 472.163375][ T30] audit: type=1400 audit(471.690:228): avc: denied { create } for pid=3832 comm="syz.0.148" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 472.678782][ T3835] netlink: 67 bytes leftover after parsing attributes in process `syz.0.149'. [ 473.698627][ T30] audit: type=1400 audit(473.230:229): avc: denied { prog_load } for pid=3840 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 474.684420][ T30] audit: type=1400 audit(474.210:230): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 474.854666][ T30] audit: type=1400 audit(474.390:231): avc: denied { nlmsg_read } for pid=3846 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 475.067890][ T30] audit: type=1400 audit(474.600:232): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 475.255380][ T30] audit: type=1400 audit(474.790:233): avc: denied { prog_load } for pid=3850 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.276865][ T30] audit: type=1400 audit(474.810:234): avc: denied { prog_load } for pid=3851 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.403360][ T30] audit: type=1400 audit(474.930:235): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 475.744041][ T30] audit: type=1400 audit(475.280:236): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 475.792993][ T30] audit: type=1400 audit(475.330:237): avc: denied { prog_load } for pid=3858 comm="syz.0.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 475.806615][ T30] audit: type=1400 audit(475.340:238): avc: denied { allowed } for pid=3858 comm="syz.0.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 478.955027][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 478.962092][ T30] audit: type=1400 audit(478.490:253): avc: denied { create } for pid=3880 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 479.342120][ T30] audit: type=1400 audit(478.870:254): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 479.612441][ T30] audit: type=1400 audit(479.140:255): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 479.722298][ T30] audit: type=1400 audit(479.260:256): avc: denied { create } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 479.732831][ T30] audit: type=1400 audit(479.270:257): avc: denied { prog_load } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.737892][ T30] audit: type=1400 audit(479.270:258): avc: denied { map_create } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.738816][ T30] audit: type=1400 audit(479.270:259): avc: denied { prog_load } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.751871][ T30] audit: type=1400 audit(479.280:260): avc: denied { map_create } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.752936][ T30] audit: type=1400 audit(479.280:261): avc: denied { prog_load } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 479.753335][ T30] audit: type=1400 audit(479.280:262): avc: denied { map_create } for pid=3884 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 484.091640][ T30] kauditd_printk_skb: 58 callbacks suppressed [ 484.099011][ T30] audit: type=1400 audit(483.620:321): avc: denied { map_create } for pid=3914 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 484.131530][ T30] audit: type=1400 audit(483.650:322): avc: denied { prog_load } for pid=3914 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 484.231124][ T30] audit: type=1400 audit(483.760:323): avc: denied { mounton } for pid=3915 comm="syz.0.189" path="/92/file0" dev="tmpfs" ino=494 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 484.375689][ T30] audit: type=1400 audit(483.910:324): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 484.545884][ T30] audit: type=1400 audit(484.080:325): avc: denied { create } for pid=3919 comm="syz.0.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 484.584873][ T30] audit: type=1400 audit(484.120:326): avc: denied { create } for pid=3918 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 484.604265][ T30] audit: type=1400 audit(484.140:327): avc: denied { map_create } for pid=3918 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 484.617864][ T30] audit: type=1400 audit(484.150:328): avc: denied { prog_load } for pid=3918 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 484.755988][ T30] audit: type=1400 audit(484.290:329): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 484.984419][ T30] audit: type=1400 audit(484.520:330): avc: denied { prog_load } for pid=3922 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 489.273882][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 489.276319][ T30] audit: type=1400 audit(488.810:385): avc: denied { prog_load } for pid=3944 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 489.475049][ T30] audit: type=1400 audit(489.010:386): avc: denied { prog_load } for pid=3957 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 489.495445][ T30] audit: type=1400 audit(489.020:387): avc: denied { map_create } for pid=3957 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 489.512468][ T30] audit: type=1400 audit(489.050:388): avc: denied { prog_load } for pid=3957 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 489.531080][ T30] audit: type=1400 audit(489.060:389): avc: denied { prog_load } for pid=3957 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 490.016110][ T30] audit: type=1400 audit(489.550:390): avc: denied { module_request } for pid=3959 comm="syz.0.210" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 490.025128][ T30] audit: type=1400 audit(489.550:391): avc: denied { sys_module } for pid=3959 comm="syz.0.210" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 490.428169][ T30] audit: type=1400 audit(489.960:392): avc: denied { map_create } for pid=3961 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 490.438583][ T30] audit: type=1400 audit(489.970:393): avc: denied { prog_load } for pid=3961 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 490.484373][ T30] audit: type=1400 audit(490.020:394): avc: denied { map_create } for pid=3961 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 493.463850][ T3986] syz.0.223 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 494.565414][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 494.566336][ T30] audit: type=1400 audit(494.100:428): avc: denied { allowed } for pid=3992 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 494.796548][ T30] audit: type=1400 audit(494.310:429): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 495.315046][ T30] audit: type=1400 audit(494.850:430): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 495.447189][ T30] audit: type=1400 audit(494.980:431): avc: denied { kexec_image_load } for pid=3996 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=0 [ 495.545765][ T30] audit: type=1400 audit(495.080:432): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 496.461104][ T30] audit: type=1400 audit(495.990:433): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 496.766651][ T30] audit: type=1400 audit(496.300:434): avc: denied { read write } for pid=4000 comm="syz.1.230" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 496.790821][ T30] audit: type=1400 audit(496.320:435): avc: denied { mounton } for pid=4000 comm="syz.1.230" path="/112/file0" dev="tmpfs" ino=598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 497.056034][ T30] audit: type=1400 audit(496.590:436): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 497.403532][ T30] audit: type=1400 audit(496.940:437): avc: denied { map_create } for pid=4003 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 499.752425][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 499.753239][ T30] audit: type=1400 audit(499.290:455): avc: denied { read write } for pid=4018 comm="syz.1.239" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 499.863332][ T30] audit: type=1400 audit(499.400:456): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 500.305849][ T30] audit: type=1400 audit(499.840:457): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 500.603356][ T30] audit: type=1400 audit(500.130:458): avc: denied { read write } for pid=4022 comm="syz.1.241" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 500.643874][ T30] audit: type=1400 audit(500.180:459): avc: denied { mounton } for pid=4022 comm="syz.1.241" path="/119/file0" dev="tmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 500.935212][ T30] audit: type=1400 audit(500.430:460): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 501.160993][ T30] audit: type=1400 audit(500.690:461): avc: denied { name_bind } for pid=4025 comm="syz.0.243" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 501.546303][ T30] audit: type=1400 audit(501.080:462): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 501.658388][ T30] audit: type=1400 audit(501.190:463): avc: denied { read write } for pid=4028 comm="syz.1.244" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 501.961575][ T30] audit: type=1400 audit(501.490:464): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 504.904743][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 504.905267][ T30] audit: type=1400 audit(504.440:497): avc: denied { prog_load } for pid=4049 comm="syz.1.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.930379][ T30] audit: type=1400 audit(504.460:498): avc: denied { map_create } for pid=4049 comm="syz.1.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.933537][ T30] audit: type=1400 audit(504.470:499): avc: denied { map_create } for pid=4049 comm="syz.1.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 504.991410][ T30] audit: type=1400 audit(504.520:500): avc: denied { mounton } for pid=4053 comm="syz.0.256" path="/126/file0" dev="tmpfs" ino=670 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 505.336192][ T30] audit: type=1400 audit(504.870:501): avc: denied { prog_load } for pid=4056 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 505.346218][ T30] audit: type=1400 audit(504.880:502): avc: denied { create } for pid=4056 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 505.828679][ T30] audit: type=1400 audit(505.360:503): avc: denied { mounton } for pid=4058 comm="syz.0.258" path="/128/file0" dev="tmpfs" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 505.850855][ T30] audit: type=1400 audit(505.370:504): avc: denied { prog_load } for pid=4058 comm="syz.0.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.406665][ T30] audit: type=1400 audit(505.940:505): avc: denied { map_create } for pid=4060 comm="syz.0.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.427718][ T30] audit: type=1400 audit(505.960:506): avc: denied { prog_load } for pid=4060 comm="syz.0.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 506.458328][ T4061] netlink: 'syz.0.259': attribute type 10 has an invalid length. [ 506.461950][ T4061] netlink: 40 bytes leftover after parsing attributes in process `syz.0.259'. [ 506.593597][ T4061] A link change request failed with some changes committed already. Interface netdevsim3 may have been left with an inconsistent configuration, please check. [ 510.258028][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 510.268989][ T30] audit: type=1400 audit(509.790:523): avc: denied { name_bind } for pid=4080 comm="syz.0.269" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 513.219204][ T30] audit: type=1400 audit(512.750:524): avc: denied { prog_load } for pid=4082 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 513.226139][ T30] audit: type=1400 audit(512.760:525): avc: denied { prog_load } for pid=4082 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 513.417912][ T30] audit: type=1400 audit(512.950:526): avc: denied { mounton } for pid=4084 comm="syz.0.271" path="/141/file0" dev="tmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 514.137642][ T30] audit: type=1400 audit(513.670:527): avc: denied { allowed } for pid=4088 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 514.501278][ T30] audit: type=1400 audit(514.030:528): avc: denied { name_bind } for pid=4090 comm="syz.0.274" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 515.992607][ T30] audit: type=1400 audit(515.520:529): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 516.778230][ T30] audit: type=1400 audit(516.310:530): avc: denied { map_create } for pid=4092 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 516.815224][ T30] audit: type=1326 audit(516.350:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.835104][ T30] audit: type=1326 audit(516.350:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.838363][ T30] audit: type=1326 audit(516.370:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.846890][ T30] audit: type=1326 audit(516.380:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.854023][ T30] audit: type=1326 audit(516.390:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=0 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.857955][ T30] audit: type=1326 audit(516.390:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.865093][ T30] audit: type=1326 audit(516.400:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 516.875729][ T30] audit: type=1326 audit(516.410:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4092 comm="syz.1.275" exe="/syz-executor" sig=0 arch=c00000b7 syscall=2 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 518.549062][ T4111] netlink: 'syz.0.283': attribute type 10 has an invalid length. [ 518.555702][ T4111] netlink: 40 bytes leftover after parsing attributes in process `syz.0.283'. [ 518.560977][ T4111] vxcan0: entered promiscuous mode [ 518.564254][ T4111] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 521.104399][ T30] kauditd_printk_skb: 79 callbacks suppressed [ 521.105531][ T30] audit: type=1400 audit(520.640:618): avc: denied { prog_load } for pid=4126 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.115237][ T30] audit: type=1400 audit(520.650:619): avc: denied { read } for pid=4125 comm="syz.1.291" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 521.123255][ T30] audit: type=1400 audit(520.650:620): avc: denied { map_create } for pid=4126 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.134022][ T30] audit: type=1400 audit(520.670:621): avc: denied { prog_load } for pid=4126 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.144310][ T30] audit: type=1400 audit(520.680:622): avc: denied { prog_load } for pid=4126 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.217468][ T30] audit: type=1400 audit(520.750:623): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 521.347461][ T30] audit: type=1400 audit(520.880:624): avc: denied { prog_load } for pid=4130 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 521.353465][ T30] audit: type=1400 audit(520.890:625): avc: denied { create } for pid=4130 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 521.358001][ T30] audit: type=1400 audit(520.890:626): avc: denied { create } for pid=4130 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 521.365897][ T30] audit: type=1400 audit(520.900:627): avc: denied { map_create } for pid=4129 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 522.214672][ T4142] syz.1.297 uses obsolete (PF_INET,SOCK_PACKET) [ 526.447513][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 526.448514][ T30] audit: type=1400 audit(525.980:693): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 526.652555][ T30] audit: type=1400 audit(526.190:694): avc: denied { name_bind } for pid=4172 comm="syz.1.312" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 526.665122][ T30] audit: type=1400 audit(526.190:695): avc: denied { prog_load } for pid=4172 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 526.865037][ T30] audit: type=1400 audit(526.390:696): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 527.092411][ T30] audit: type=1400 audit(526.620:697): avc: denied { create } for pid=4174 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 527.308274][ T30] audit: type=1400 audit(526.840:698): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 527.480412][ T30] audit: type=1400 audit(527.010:699): avc: denied { map_create } for pid=4176 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 527.553684][ T30] audit: type=1400 audit(527.090:700): avc: denied { prog_load } for pid=4176 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 527.567310][ T30] audit: type=1400 audit(527.100:701): avc: denied { map_create } for pid=4176 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 527.583974][ T30] audit: type=1326 audit(527.120:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4176 comm="syz.1.314" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 531.784322][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 531.785322][ T30] audit: type=1400 audit(531.320:730): avc: denied { prog_load } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.796464][ T30] audit: type=1400 audit(531.320:731): avc: denied { prog_load } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.830945][ T30] audit: type=1400 audit(531.350:732): avc: denied { map_create } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.834745][ T30] audit: type=1400 audit(531.370:733): avc: denied { prog_load } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.864472][ T30] audit: type=1400 audit(531.400:734): avc: denied { prog_load } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.882641][ T30] audit: type=1400 audit(531.420:735): avc: denied { map_create } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 531.885578][ T30] audit: type=1400 audit(531.420:736): avc: denied { prog_load } for pid=4199 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 532.805486][ T30] audit: type=1400 audit(532.330:737): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 533.094915][ T30] audit: type=1400 audit(532.630:738): avc: denied { map_create } for pid=4203 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 533.120756][ T30] audit: type=1400 audit(532.650:739): avc: denied { module_request } for pid=4203 comm="syz.1.327" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 536.818809][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 536.832149][ T30] audit: type=1326 audit(536.350:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.832858][ T30] audit: type=1326 audit(536.360:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.853435][ T30] audit: type=1326 audit(536.390:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.862102][ T30] audit: type=1400 audit(536.390:751): avc: denied { prog_load } for pid=4213 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.900372][ T30] audit: type=1326 audit(536.400:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.900985][ T30] audit: type=1326 audit(536.410:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.901374][ T30] audit: type=1326 audit(536.410:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.901613][ T30] audit: type=1400 audit(536.410:755): avc: denied { prog_load } for pid=4213 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 536.901848][ T30] audit: type=1326 audit(536.410:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 536.902101][ T30] audit: type=1326 audit(536.410:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 542.194206][ T30] kauditd_printk_skb: 93 callbacks suppressed [ 542.195131][ T30] audit: type=1400 audit(541.720:851): avc: denied { prog_load } for pid=4264 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.253776][ T4265] mmap: +}[@ (4265) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 542.618273][ T30] audit: type=1400 audit(542.150:852): avc: denied { create } for pid=4266 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 542.640234][ T30] audit: type=1400 audit(542.170:853): avc: denied { map_create } for pid=4266 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.645992][ T30] audit: type=1400 audit(542.180:854): avc: denied { prog_load } for pid=4266 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.820277][ T30] audit: type=1400 audit(542.350:855): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 542.896903][ T30] audit: type=1400 audit(542.430:856): avc: denied { map_create } for pid=4268 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.903407][ T30] audit: type=1400 audit(542.440:857): avc: denied { prog_load } for pid=4268 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.907567][ T30] audit: type=1400 audit(542.440:858): avc: denied { create } for pid=4268 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 542.965719][ T30] audit: type=1400 audit(542.490:859): avc: denied { prog_load } for pid=4269 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 542.994598][ T30] audit: type=1400 audit(542.530:860): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 543.723235][ T4280] netlink: 12 bytes leftover after parsing attributes in process `syz.0.363'. [ 547.221897][ T30] kauditd_printk_skb: 52 callbacks suppressed [ 547.222795][ T30] audit: type=1400 audit(546.710:913): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 547.283285][ T30] audit: type=1400 audit(546.820:914): avc: denied { prog_load } for pid=4302 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 547.328621][ T30] audit: type=1326 audit(546.860:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 547.345746][ T30] audit: type=1326 audit(546.880:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=425 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 547.346716][ T30] audit: type=1400 audit(546.880:917): avc: denied { allowed } for pid=4302 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 547.374094][ T30] audit: type=1326 audit(546.880:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffff8e55c09c code=0x7ffc0000 [ 547.395419][ T30] audit: type=1326 audit(546.910:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 547.410891][ T30] audit: type=1326 audit(546.930:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 547.411964][ T30] audit: type=1326 audit(546.930:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=427 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 547.412397][ T30] audit: type=1326 audit(546.930:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4302 comm="syz.0.374" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 548.749324][ T4311] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 548.753002][ T4311] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 552.444460][ T30] kauditd_printk_skb: 119 callbacks suppressed [ 552.445344][ T30] audit: type=1400 audit(551.970:1042): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 552.618060][ T30] audit: type=1400 audit(552.150:1043): avc: denied { prog_load } for pid=4348 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.636182][ T30] audit: type=1400 audit(552.170:1044): avc: denied { prog_load } for pid=4348 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.652345][ T30] audit: type=1400 audit(552.180:1045): avc: denied { map_create } for pid=4348 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.685086][ T30] audit: type=1400 audit(552.220:1046): avc: denied { map_create } for pid=4349 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.697669][ T30] audit: type=1400 audit(552.230:1047): avc: denied { prog_load } for pid=4349 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 552.716729][ T30] audit: type=1326 audit(552.250:1048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.0.396" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 552.735853][ T30] audit: type=1326 audit(552.260:1049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.0.396" exe="/syz-executor" sig=0 arch=c00000b7 syscall=266 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 552.743565][ T30] audit: type=1326 audit(552.270:1050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.0.396" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 552.756852][ T30] audit: type=1326 audit(552.290:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4349 comm="syz.0.396" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 553.234913][ T4355] netlink: 'syz.0.399': attribute type 21 has an invalid length. [ 553.238101][ T4355] netlink: 100 bytes leftover after parsing attributes in process `syz.0.399'. [ 557.471289][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 557.472140][ T30] audit: type=1400 audit(557.000:1074): avc: denied { create } for pid=4370 comm="syz.1.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 557.785373][ T30] audit: type=1400 audit(557.320:1075): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 558.005006][ T30] audit: type=1400 audit(557.530:1076): avc: denied { map_create } for pid=4372 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.018276][ T30] audit: type=1400 audit(557.550:1077): avc: denied { prog_load } for pid=4372 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.026819][ T30] audit: type=1400 audit(557.560:1078): avc: denied { prog_load } for pid=4372 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.235719][ T30] audit: type=1400 audit(557.770:1079): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 558.378343][ T30] audit: type=1400 audit(557.910:1080): avc: denied { map_create } for pid=4374 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.396121][ T30] audit: type=1400 audit(557.920:1081): avc: denied { prog_load } for pid=4374 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.396695][ T30] audit: type=1400 audit(557.920:1082): avc: denied { prog_load } for pid=4374 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.411149][ T30] audit: type=1400 audit(557.940:1083): avc: denied { prog_load } for pid=4374 comm="syz.1.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.432782][ T4375] netlink: 8 bytes leftover after parsing attributes in process `syz.1.409'. [ 558.503937][ T4375] ip6gre1: entered allmulticast mode [ 562.652709][ T30] kauditd_printk_skb: 41 callbacks suppressed [ 562.653558][ T30] audit: type=1400 audit(562.170:1125): avc: denied { map_create } for pid=4397 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.682912][ T30] audit: type=1400 audit(562.200:1126): avc: denied { prog_load } for pid=4397 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.684028][ T30] audit: type=1400 audit(562.200:1127): avc: denied { prog_load } for pid=4397 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.890807][ T30] audit: type=1400 audit(562.410:1128): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 562.966536][ T30] audit: type=1400 audit(562.490:1129): avc: denied { create } for pid=4399 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 562.992294][ T30] audit: type=1400 audit(562.520:1130): avc: denied { map_create } for pid=4399 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 562.997014][ T30] audit: type=1400 audit(562.520:1131): avc: denied { prog_load } for pid=4399 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.011102][ T30] audit: type=1400 audit(562.540:1132): avc: denied { prog_load } for pid=4399 comm="syz.0.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.282241][ T30] audit: type=1400 audit(562.800:1133): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 563.452073][ T30] audit: type=1400 audit(562.980:1134): avc: denied { prog_load } for pid=4403 comm="syz.1.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.471887][ T4405] netlink: 'syz.1.424': attribute type 4 has an invalid length. [ 563.560530][ T4405] netlink: 'syz.1.424': attribute type 4 has an invalid length. [ 565.927020][ T4425] netlink: 'syz.0.433': attribute type 1 has an invalid length. [ 566.103688][ T4425] 8021q: adding VLAN 0 to HW filter on device bond2 [ 566.124276][ T4425] netlink: 4 bytes leftover after parsing attributes in process `syz.0.433'. [ 566.432839][ T4425] bond2 (unregistering): Released all slaves [ 567.671828][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 567.672633][ T30] audit: type=1400 audit(567.190:1169): avc: denied { prog_load } for pid=4430 comm="syz.0.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 567.811177][ T30] audit: type=1400 audit(567.320:1170): avc: denied { search } for pid=4427 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.951833][ T30] audit: type=1400 audit(567.480:1171): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.979434][ T30] audit: type=1400 audit(567.490:1172): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.980080][ T30] audit: type=1400 audit(567.500:1173): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.980466][ T30] audit: type=1400 audit(567.500:1174): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.980646][ T30] audit: type=1400 audit(567.500:1175): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 567.997444][ T30] audit: type=1400 audit(567.500:1176): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 568.006283][ T30] audit: type=1400 audit(567.540:1177): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 568.017298][ T30] audit: type=1400 audit(567.550:1178): avc: denied { search } for pid=4433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 572.766085][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 572.766497][ T30] audit: type=1400 audit(572.291:1226): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 572.967695][ T30] audit: type=1400 audit(572.491:1227): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 573.117039][ T30] audit: type=1400 audit(572.641:1228): avc: denied { name_bind } for pid=4468 comm="syz.1.451" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 575.077052][ T30] audit: type=1400 audit(574.601:1229): avc: denied { map_create } for pid=4471 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.100904][ T30] audit: type=1400 audit(574.631:1230): avc: denied { prog_load } for pid=4471 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.427463][ T30] audit: type=1400 audit(574.951:1231): avc: denied { prog_load } for pid=4473 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.441034][ T30] audit: type=1400 audit(574.961:1232): avc: denied { prog_load } for pid=4473 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.450905][ T30] audit: type=1400 audit(574.971:1233): avc: denied { prog_load } for pid=4473 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.457592][ T30] audit: type=1400 audit(574.981:1234): avc: denied { prog_load } for pid=4473 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 575.736306][ T30] audit: type=1400 audit(575.261:1235): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 577.090756][ T4489] netlink: 4 bytes leftover after parsing attributes in process `syz.0.460'. [ 577.850613][ T30] kauditd_printk_skb: 76 callbacks suppressed [ 577.851694][ T30] audit: type=1400 audit(577.381:1312): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 577.937745][ T30] audit: type=1400 audit(577.461:1313): avc: denied { create } for pid=4495 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 578.234145][ T30] audit: type=1400 audit(577.761:1314): avc: denied { prog_load } for pid=4497 comm="syz.1.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.336765][ T30] audit: type=1400 audit(577.871:1315): avc: denied { prog_load } for pid=4498 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.349568][ T30] audit: type=1400 audit(577.881:1316): avc: denied { map_create } for pid=4498 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.353055][ T30] audit: type=1400 audit(577.881:1317): avc: denied { prog_load } for pid=4498 comm="syz.0.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.449878][ T30] audit: type=1400 audit(577.971:1318): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 578.656744][ T30] audit: type=1400 audit(578.181:1319): avc: denied { map_create } for pid=4501 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.671657][ T30] audit: type=1400 audit(578.191:1320): avc: denied { prog_load } for pid=4501 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 578.675768][ T30] audit: type=1400 audit(578.201:1321): avc: denied { prog_load } for pid=4501 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 579.172972][ T4507] netlink: 176 bytes leftover after parsing attributes in process `syz.1.469'. [ 583.242100][ T30] kauditd_printk_skb: 105 callbacks suppressed [ 583.246405][ T30] audit: type=1400 audit(582.771:1427): avc: denied { prog_load } for pid=4538 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 583.273889][ T30] audit: type=1400 audit(582.801:1428): avc: denied { create } for pid=4538 comm="syz.0.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 583.704760][ T30] audit: type=1400 audit(583.221:1429): avc: denied { mount } for pid=4541 comm="syz.0.486" name="/" dev="hugetlbfs" ino=7384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=0 [ 584.110451][ T30] audit: type=1400 audit(583.641:1430): avc: denied { execmem } for pid=4543 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 584.720914][ T30] audit: type=1400 audit(584.241:1431): avc: denied { map_create } for pid=4543 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 584.735186][ T30] audit: type=1400 audit(584.261:1432): avc: denied { prog_load } for pid=4543 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 584.743758][ T30] audit: type=1400 audit(584.261:1433): avc: denied { prog_load } for pid=4543 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 584.755674][ T30] audit: type=1400 audit(584.271:1434): avc: denied { prog_load } for pid=4543 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 585.555321][ T30] audit: type=1400 audit(585.081:1435): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 585.675171][ T30] audit: type=1400 audit(585.201:1436): avc: denied { map_create } for pid=4546 comm="syz.1.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 588.359828][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 588.360799][ T30] audit: type=1400 audit(587.881:1463): avc: denied { map_create } for pid=4558 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 588.375226][ T30] audit: type=1400 audit(587.901:1464): avc: denied { prog_load } for pid=4558 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 588.573823][ T30] audit: type=1400 audit(588.102:1465): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 588.889120][ T30] audit: type=1400 audit(588.412:1466): avc: denied { prog_load } for pid=4560 comm="syz.1.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 589.151142][ T30] audit: type=1400 audit(588.682:1467): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 589.318586][ T30] audit: type=1400 audit(588.842:1468): avc: denied { map_create } for pid=4562 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 589.332350][ T30] audit: type=1400 audit(588.862:1469): avc: denied { prog_load } for pid=4562 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 589.354220][ T30] audit: type=1400 audit(588.882:1470): avc: denied { prog_load } for pid=4562 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 589.373495][ T30] audit: type=1400 audit(588.902:1471): avc: denied { create } for pid=4562 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 589.594188][ T30] audit: type=1400 audit(589.122:1472): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 593.430564][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 593.431023][ T30] audit: type=1400 audit(592.952:1511): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 593.695708][ T30] audit: type=1400 audit(593.222:1512): avc: denied { map_create } for pid=4583 comm="syz.1.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.700920][ T30] audit: type=1400 audit(593.232:1513): avc: denied { prog_load } for pid=4583 comm="syz.1.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 593.966075][ T30] audit: type=1400 audit(593.492:1514): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 594.152334][ T30] audit: type=1400 audit(593.682:1515): avc: denied { prog_load } for pid=4585 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 594.172736][ T30] audit: type=1400 audit(593.702:1516): avc: denied { create } for pid=4585 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 594.182024][ T30] audit: type=1400 audit(593.712:1517): avc: denied { create } for pid=4585 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 594.451640][ T30] audit: type=1400 audit(593.972:1518): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 594.553989][ T30] audit: type=1400 audit(594.082:1519): avc: denied { map_create } for pid=4587 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 594.562607][ T30] audit: type=1400 audit(594.092:1520): avc: denied { prog_load } for pid=4587 comm="syz.1.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 598.390669][ T4599] netlink: 8 bytes leftover after parsing attributes in process `syz.0.512'. [ 598.544667][ T4599] netlink: 4 bytes leftover after parsing attributes in process `syz.0.512'. [ 599.004663][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 599.005572][ T30] audit: type=1400 audit(598.522:1539): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 599.334049][ T30] audit: type=1400 audit(598.862:1540): avc: denied { create } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 599.385775][ T30] audit: type=1400 audit(598.912:1541): avc: denied { prog_load } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 599.404157][ T30] audit: type=1400 audit(598.932:1542): avc: denied { prog_load } for pid=4601 comm="syz.0.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 599.415220][ T30] audit: type=1400 audit(598.942:1543): avc: denied { create } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 599.430005][ T30] audit: type=1400 audit(598.952:1544): avc: denied { create } for pid=4601 comm="syz.0.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 599.434227][ T30] audit: type=1400 audit(598.962:1545): avc: denied { create } for pid=4601 comm="syz.0.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 599.453640][ T30] audit: type=1400 audit(598.982:1546): avc: denied { create } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=0 [ 599.462842][ T30] audit: type=1400 audit(598.992:1547): avc: denied { create } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 599.521008][ T30] audit: type=1400 audit(599.042:1548): avc: denied { map_create } for pid=4600 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 599.673165][ T4602] netlink: 'syz.1.513': attribute type 21 has an invalid length. [ 599.673557][ T4602] netlink: 128 bytes leftover after parsing attributes in process `syz.1.513'. [ 599.681041][ T4602] netlink: 'syz.1.513': attribute type 5 has an invalid length. [ 599.681431][ T4602] netlink: 3 bytes leftover after parsing attributes in process `syz.1.513'. [ 604.015610][ T30] kauditd_printk_skb: 48 callbacks suppressed [ 604.019191][ T30] audit: type=1400 audit(603.542:1597): avc: denied { prog_load } for pid=4636 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 604.224836][ T30] audit: type=1400 audit(603.752:1598): avc: denied { create } for pid=4636 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 604.427733][ T30] audit: type=1400 audit(603.952:1599): avc: denied { create } for pid=4636 comm="syz.1.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 604.704311][ T30] audit: type=1400 audit(604.222:1600): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 604.939085][ T30] audit: type=1400 audit(604.472:1601): avc: denied { read } for pid=4641 comm="syz.1.530" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 604.948891][ T30] audit: type=1400 audit(604.472:1602): avc: denied { create } for pid=4641 comm="syz.1.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 605.085419][ T30] audit: type=1400 audit(604.612:1603): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 605.302110][ T30] audit: type=1400 audit(604.832:1604): avc: denied { prog_load } for pid=4644 comm="syz.0.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 605.321868][ T30] audit: type=1326 audit(604.852:1605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4643 comm="syz.1.531" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 605.333179][ T30] audit: type=1326 audit(604.862:1606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4643 comm="syz.1.531" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 608.564330][ T4674] IPv6: Can't replace route, no match found [ 609.479603][ T30] kauditd_printk_skb: 78 callbacks suppressed [ 609.480627][ T30] audit: type=1400 audit(609.013:1685): avc: denied { prog_load } for pid=4681 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 609.503937][ T30] audit: type=1400 audit(609.033:1686): avc: denied { create } for pid=4681 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 609.519239][ T30] audit: type=1400 audit(609.053:1687): avc: denied { create } for pid=4681 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 609.815240][ T30] audit: type=1400 audit(609.343:1688): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 609.870253][ T30] audit: type=1400 audit(609.403:1689): avc: denied { map_create } for pid=4683 comm="syz.0.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 609.892805][ T30] audit: type=1400 audit(609.423:1690): avc: denied { prog_load } for pid=4683 comm="syz.0.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 610.101643][ T30] audit: type=1400 audit(609.613:1691): avc: denied { execute } for pid=4685 comm="syz.1.552" dev="hugetlbfs" ino=7629 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=0 [ 610.345258][ T30] audit: type=1400 audit(609.873:1692): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 610.354500][ T30] audit: type=1400 audit(609.883:1693): avc: denied { create } for pid=4687 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 610.664353][ T30] audit: type=1400 audit(610.193:1694): avc: denied { map_create } for pid=4689 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.127452][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 616.132342][ T30] audit: type=1400 audit(615.653:1727): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 616.371368][ T30] audit: type=1400 audit(615.903:1728): avc: denied { map_create } for pid=4713 comm="syz.1.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.385617][ T30] audit: type=1400 audit(615.913:1729): avc: denied { map_create } for pid=4713 comm="syz.1.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.405023][ T30] audit: type=1400 audit(615.933:1730): avc: denied { prog_load } for pid=4713 comm="syz.1.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.502531][ T30] audit: type=1400 audit(616.033:1731): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 616.679884][ T30] audit: type=1400 audit(616.213:1732): avc: denied { map_create } for pid=4703 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.684109][ T30] audit: type=1400 audit(616.213:1733): avc: denied { prog_load } for pid=4703 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 616.698711][ T30] audit: type=1400 audit(616.223:1734): avc: denied { prog_load } for pid=4703 comm="syz.0.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 617.568256][ T30] audit: type=1400 audit(617.083:1735): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 617.790265][ T30] audit: type=1400 audit(617.323:1736): avc: denied { map_create } for pid=4718 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 621.158046][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 621.159069][ T30] audit: type=1400 audit(620.663:1775): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 621.454672][ T30] audit: type=1400 audit(620.983:1776): avc: denied { create } for pid=4740 comm="syz.1.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 621.479474][ T30] audit: type=1400 audit(621.003:1777): avc: denied { prog_load } for pid=4740 comm="syz.1.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 621.628623][ T30] audit: type=1400 audit(621.153:1778): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 621.872853][ T30] audit: type=1400 audit(621.403:1779): avc: denied { create } for pid=4744 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 621.888137][ T30] audit: type=1400 audit(621.413:1780): avc: denied { prog_load } for pid=4744 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 621.933165][ T30] audit: type=1400 audit(621.463:1781): avc: denied { map_create } for pid=4745 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 621.949092][ T30] audit: type=1400 audit(621.483:1782): avc: denied { prog_load } for pid=4745 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 621.960326][ T30] audit: type=1400 audit(621.493:1783): avc: denied { prog_load } for pid=4745 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 622.158156][ T30] audit: type=1400 audit(621.683:1784): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 622.341973][ T4751] netlink: 12 bytes leftover after parsing attributes in process `syz.1.583'. [ 622.628724][ T4751] 8021q: adding VLAN 0 to HW filter on device bond1 [ 622.639053][ T4751] netlink: 4 bytes leftover after parsing attributes in process `syz.1.583'. [ 622.984214][ T4751] bond1 (unregistering): Released all slaves [ 626.189938][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 626.193001][ T30] audit: type=1400 audit(625.724:1829): avc: denied { map_create } for pid=4770 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 626.213067][ T30] audit: type=1400 audit(625.744:1830): avc: denied { prog_load } for pid=4770 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 626.220667][ T30] audit: type=1400 audit(625.744:1831): avc: denied { prog_load } for pid=4770 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 626.264525][ T30] audit: type=1326 audit(625.794:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.591" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 626.266875][ T30] audit: type=1326 audit(625.794:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.591" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 626.273666][ T30] audit: type=1326 audit(625.794:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.591" exe="/syz-executor" sig=0 arch=c00000b7 syscall=151 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 626.310424][ T30] audit: type=1326 audit(625.834:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.591" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 626.316624][ T30] audit: type=1326 audit(625.844:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4770 comm="syz.0.591" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 626.688169][ T30] audit: type=1400 audit(626.214:1837): avc: denied { create } for pid=4772 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 626.701201][ T30] audit: type=1400 audit(626.234:1838): avc: denied { create } for pid=4772 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 629.037905][ T4792] binfmt_misc: register: failed to install interpreter file ./file0 [ 631.353462][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 631.354309][ T30] audit: type=1326 audit(630.884:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4810 comm="syz.1.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 631.378359][ T30] audit: type=1326 audit(630.914:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4810 comm="syz.1.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 631.393567][ T30] audit: type=1400 audit(630.924:1895): avc: denied { create } for pid=4811 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 631.405912][ T30] audit: type=1400 audit(630.934:1896): avc: denied { prog_load } for pid=4811 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 631.409784][ T30] audit: type=1400 audit(630.944:1897): avc: denied { prog_load } for pid=4811 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 631.429869][ T30] audit: type=1326 audit(630.954:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4810 comm="syz.1.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 631.430456][ T30] audit: type=1400 audit(630.954:1899): avc: denied { map_create } for pid=4810 comm="syz.1.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 631.433445][ T30] audit: type=1326 audit(630.954:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4810 comm="syz.1.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 631.433758][ T30] audit: type=1326 audit(630.964:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4810 comm="syz.1.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 631.433958][ T30] audit: type=1400 audit(630.964:1902): avc: denied { prog_load } for pid=4810 comm="syz.1.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 632.044222][ T4820] IPv6: Can't replace route, no match found [ 632.196151][ T4823] ALSA: seq fatal error: cannot create timer (-22) [ 633.397605][ T4836] netlink: 14 bytes leftover after parsing attributes in process `syz.0.623'. [ 636.431108][ T30] kauditd_printk_skb: 90 callbacks suppressed [ 636.433687][ T30] audit: type=1400 audit(635.964:1993): avc: denied { prog_load } for pid=4852 comm="syz.1.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 636.459554][ T30] audit: type=1400 audit(635.994:1994): avc: denied { execute } for pid=4852 comm="+}[@" dev="tmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 636.646750][ T30] audit: type=1400 audit(636.174:1995): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 636.667460][ T30] audit: type=1400 audit(636.194:1996): avc: denied { create } for pid=4856 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 636.692787][ T30] audit: type=1400 audit(636.224:1997): avc: denied { map_create } for pid=4856 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 636.711886][ T30] audit: type=1400 audit(636.244:1998): avc: denied { prog_load } for pid=4856 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 636.882412][ T30] audit: type=1400 audit(636.414:1999): avc: denied { map_create } for pid=4858 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 636.958164][ T30] audit: type=1400 audit(636.484:2000): avc: denied { prog_load } for pid=4858 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 637.034611][ T30] audit: type=1400 audit(636.564:2001): avc: denied { mount } for pid=4858 comm="syz.1.635" name="/" dev="ramfs" ino=8225 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=0 [ 637.048029][ T30] audit: type=1400 audit(636.574:2002): avc: denied { prog_load } for pid=4860 comm="syz.0.636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 641.663319][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 641.671426][ T30] audit: type=1400 audit(641.194:2039): avc: denied { prog_load } for pid=4881 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 642.077708][ T30] audit: type=1400 audit(641.605:2040): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 642.413948][ T30] audit: type=1400 audit(641.945:2041): avc: denied { map_create } for pid=4884 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 642.440100][ T30] audit: type=1400 audit(641.975:2042): avc: denied { prog_load } for pid=4884 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 642.458400][ T30] audit: type=1400 audit(641.975:2043): avc: denied { prog_load } for pid=4884 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 643.015386][ T30] audit: type=1400 audit(642.545:2044): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 643.418437][ T30] audit: type=1400 audit(642.955:2045): avc: denied { prog_load } for pid=4889 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 643.467890][ T30] audit: type=1400 audit(642.985:2046): avc: denied { prog_load } for pid=4889 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 643.527680][ T30] audit: type=1400 audit(643.065:2047): avc: denied { map_create } for pid=4889 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 643.540634][ T30] audit: type=1400 audit(643.065:2048): avc: denied { prog_load } for pid=4889 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 646.952305][ T30] kauditd_printk_skb: 44 callbacks suppressed [ 646.957361][ T30] audit: type=1400 audit(646.485:2093): avc: denied { create } for pid=4921 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 647.161755][ T30] audit: type=1400 audit(646.695:2094): avc: denied { map_create } for pid=4923 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.180907][ T30] audit: type=1400 audit(646.715:2095): avc: denied { prog_load } for pid=4923 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.188859][ T30] audit: type=1400 audit(646.725:2096): avc: denied { prog_load } for pid=4923 comm="syz.0.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.203656][ T30] audit: type=1400 audit(646.735:2097): avc: denied { sys_module } for pid=4923 comm="syz.0.665" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 647.711075][ T30] audit: type=1400 audit(647.245:2098): avc: denied { prog_load } for pid=4928 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.718427][ T30] audit: type=1400 audit(647.255:2099): avc: denied { prog_load } for pid=4928 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.922275][ T30] audit: type=1400 audit(647.455:2100): avc: denied { map_create } for pid=4930 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.931227][ T30] audit: type=1400 audit(647.465:2101): avc: denied { prog_load } for pid=4930 comm="syz.0.668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 647.952803][ T30] audit: type=1326 audit(647.485:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4930 comm="syz.0.668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e55c068 code=0x7ffc0000 [ 652.134997][ T30] kauditd_printk_skb: 96 callbacks suppressed [ 652.140523][ T30] audit: type=1400 audit(651.665:2199): avc: denied { prog_load } for pid=4975 comm="syz.1.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.198947][ T30] audit: type=1400 audit(651.735:2200): avc: denied { prog_load } for pid=4976 comm="syz.0.691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.360680][ T30] audit: type=1400 audit(651.895:2201): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 652.621777][ T30] audit: type=1400 audit(652.155:2202): avc: denied { create } for pid=4980 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 652.645522][ T30] audit: type=1400 audit(652.175:2203): avc: denied { prog_load } for pid=4979 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.650436][ T30] audit: type=1400 audit(652.185:2204): avc: denied { map_create } for pid=4979 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.653538][ T30] audit: type=1400 audit(652.185:2205): avc: denied { prog_load } for pid=4979 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.658241][ T30] audit: type=1400 audit(652.195:2206): avc: denied { prog_load } for pid=4979 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 652.672304][ T30] audit: type=1400 audit(652.205:2207): avc: denied { relabelfrom } for pid=4979 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=0 [ 652.949243][ T30] audit: type=1400 audit(652.485:2208): avc: denied { prog_load } for pid=4983 comm="syz.0.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 653.281705][ T4988] netlink: 'syz.0.696': attribute type 13 has an invalid length. [ 653.422875][ T4988] gretap0: refused to change device tx_queue_len [ 653.433265][ T4988] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 656.611091][ T5010] netlink: 'syz.0.706': attribute type 4 has an invalid length. [ 656.771693][ T5010] netlink: 'syz.0.706': attribute type 4 has an invalid length. [ 657.158045][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 657.158607][ T30] audit: type=1400 audit(656.675:2256): avc: denied { mount } for pid=5013 comm="syz.0.710" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 657.386172][ T30] audit: type=1326 audit(656.915:2257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.386704][ T30] audit: type=1326 audit(656.925:2258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.387108][ T30] audit: type=1400 audit(656.925:2259): avc: denied { prog_load } for pid=5015 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 657.394971][ T30] audit: type=1326 audit(656.925:2260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.395402][ T30] audit: type=1326 audit(656.925:2261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.411723][ T30] audit: type=1326 audit(656.935:2262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.412626][ T30] audit: type=1326 audit(656.935:2263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.439667][ T30] audit: type=1326 audit(656.975:2264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=187 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 657.447509][ T30] audit: type=1326 audit(656.985:2265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5015 comm="syz.1.709" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9195c068 code=0x7ffc0000 [ 659.601701][ T5029] netdevsim netdevsim1: Direct firmware load for ./file0/file1 failed with error -2 [ 662.236403][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 662.246159][ T30] audit: type=1400 audit(661.776:2308): avc: denied { map_create } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.251611][ T30] audit: type=1400 audit(661.786:2309): avc: denied { prog_load } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.272408][ T30] audit: type=1400 audit(661.806:2310): avc: denied { create } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 662.288991][ T30] audit: type=1400 audit(661.826:2311): avc: denied { create } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 662.425388][ T30] audit: type=1400 audit(661.956:2312): avc: denied { prog_load } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.432710][ T30] audit: type=1400 audit(661.966:2313): avc: denied { prog_load } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.451308][ T30] audit: type=1400 audit(661.986:2314): avc: denied { prog_load } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.504669][ T30] audit: type=1400 audit(662.036:2315): avc: denied { prog_load } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 662.684463][ T30] audit: type=1400 audit(662.216:2316): avc: denied { create } for pid=5037 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=0 [ 662.886993][ T5038] ------------[ cut here ]------------ [ 662.887474][ T5038] WARNING: CPU: 1 PID: 5038 at drivers/gpu/drm/vkms/vkms_crtc.c:97 vkms_get_vblank_timestamp+0x128/0x16c [ 662.891837][ T5038] Modules linked in: [ 662.893554][ T5038] CPU: 1 UID: 0 PID: 5038 Comm: syz.1.720 Not tainted syzkaller #0 PREEMPT [ 662.894575][ T5038] Hardware name: linux,dummy-virt (DT) [ 662.895761][ T5038] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 662.896481][ T5038] pc : vkms_get_vblank_timestamp+0x128/0x16c [ 662.896942][ T5038] lr : vkms_get_vblank_timestamp+0x20/0x16c [ 662.897356][ T5038] sp : ffff80008f836c30 [ 662.897712][ T5038] x29: ffff80008f836c30 x28: ffff00001f134800 x27: 0000000000000003 [ 662.898594][ T5038] x26: ffff00000f6fc080 x25: 0000000000000001 x24: 1fffe00001ee4c38 [ 662.899261][ T5038] x23: ffff800085ab5080 x22: ffff80008f836e00 x21: 0000009a3bcd0e30 [ 662.899925][ T5038] x20: ffff00000f6fc080 x19: ffff00000f726080 x18: 0000000000000002 [ 662.900610][ T5038] x17: ffff8000870bef80 x16: ffff00006a0ad4c4 x15: ffff800080af526c [ 662.901221][ T5038] x14: ffff800081b3bd94 x13: 0000000000000000 x12: ffff80008e539000 [ 662.901832][ T5038] x11: 1fffe00003e26b22 x10: ffff600003e26b22 x9 : dfff800000000000 [ 662.902573][ T5038] x8 : 0000000041b58ab3 x7 : ffff700011f06d96 x6 : dfff800000000000 [ 662.903296][ T5038] x5 : 0000000000000000 x4 : 1fffe00001ee4c4a x3 : 0000000000000000 [ 662.903968][ T5038] x2 : 1fffe00001ee4c35 x1 : 0000000000000000 x0 : 0000009a3bcd0e30 [ 662.904941][ T5038] Call trace: [ 662.905509][ T5038] vkms_get_vblank_timestamp+0x128/0x16c (P) [ 662.906110][ T5038] drm_crtc_get_last_vbltimestamp+0x140/0x184 [ 662.906544][ T5038] drm_crtc_next_vblank_start+0x11c/0x244 [ 662.906936][ T5038] drm_atomic_helper_wait_for_fences+0x184/0x614 [ 662.907317][ T5038] drm_atomic_helper_commit+0x170/0x2b4 [ 662.907682][ T5038] drm_atomic_commit+0x18c/0x23c [ 662.908084][ T5038] drm_client_modeset_commit_atomic+0x4a4/0x5f8 [ 662.908478][ T5038] drm_client_modeset_commit_locked+0x108/0x3f8 [ 662.908869][ T5038] drm_fb_helper_pan_display+0x260/0x844 [ 662.909256][ T5038] fb_pan_display+0x1d0/0x5f8 [ 662.909609][ T5038] fb_set_var+0x5f8/0xf70 [ 662.910091][ T5038] fbcon_resize+0x94c/0xd1c [ 662.910445][ T5038] vc_do_resize+0x290/0xdcc [ 662.910787][ T5038] __vc_resize+0x44/0x6c [ 662.911112][ T5038] vt_ioctl+0x11cc/0x249c [ 662.911435][ T5038] tty_ioctl+0x1c8/0x14f8 [ 662.911770][ T5038] __arm64_sys_ioctl+0x124/0x1a4 [ 662.912167][ T5038] invoke_syscall+0x6c/0x258 [ 662.912513][ T5038] el0_svc_common.constprop.0+0xac/0x230 [ 662.912911][ T5038] do_el0_svc+0x40/0x58 [ 662.913508][ T5038] el0_svc+0x50/0x1a0 [ 662.913888][ T5038] el0t_64_sync_handler+0xa0/0xe4 [ 662.914446][ T5038] el0t_64_sync+0x198/0x19c [ 662.915138][ T5038] irq event stamp: 3310 [ 662.915471][ T5038] hardirqs last enabled at (3309): [] exit_to_kernel_mode+0x38/0x118 [ 662.916139][ T5038] hardirqs last disabled at (3310): [] el1_brk64+0x1c/0x48 [ 662.916633][ T5038] softirqs last enabled at (3304): [] handle_softirqs+0x88c/0xdb4 [ 662.917155][ T5038] softirqs last disabled at (3297): [] __do_softirq+0x14/0x20 [ 662.917777][ T5038] ---[ end trace 0000000000000000 ]--- [ 662.920534][ C1] vkms_vblank_simulate: vblank timer overrun [ 662.969258][ T30] audit: type=1400 audit(662.466:2317): avc: denied { write } for pid=3320 comm="syz-executor" path="pipe:[3371]" dev="pipefs" ino=3371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 665.319834][ T1093] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 665.598571][ T1093] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 665.839513][ T1093] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 666.101086][ T1093] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 667.422126][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 667.437990][ T30] audit: type=1400 audit(666.956:2320): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.485311][ T30] audit: type=1400 audit(667.006:2321): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.486263][ T30] audit: type=1400 audit(667.006:2322): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.486662][ T30] audit: type=1400 audit(667.006:2323): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.487007][ T30] audit: type=1400 audit(667.006:2324): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.501130][ T30] audit: type=1400 audit(667.036:2325): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.542432][ T30] audit: type=1400 audit(667.066:2326): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.555001][ T30] audit: type=1400 audit(667.086:2327): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.556036][ T30] audit: type=1400 audit(667.086:2328): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 667.556397][ T30] audit: type=1400 audit(667.086:2329): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.437139][ T30] kauditd_printk_skb: 751 callbacks suppressed [ 672.437597][ T30] audit: type=1400 audit(671.976:3081): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.443651][ T30] audit: type=1400 audit(671.976:3082): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.465389][ T30] audit: type=1400 audit(671.996:3083): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.470828][ T30] audit: type=1400 audit(672.006:3084): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.508974][ T30] audit: type=1400 audit(672.046:3085): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.555082][ T30] audit: type=1400 audit(672.066:3086): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.573852][ T30] audit: type=1400 audit(672.086:3087): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.574472][ T30] audit: type=1400 audit(672.106:3088): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.575032][ T30] audit: type=1400 audit(672.106:3089): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 672.575267][ T30] audit: type=1400 audit(672.106:3090): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 673.030904][ T1093] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 673.195495][ T1093] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 673.269694][ T1093] bond0 (unregistering): Released all slaves [ 674.213752][ T1093] hsr_slave_0: left promiscuous mode [ 674.285585][ T1093] hsr_slave_1: left promiscuous mode [ 674.451023][ T1093] veth1_macvtap: left promiscuous mode [ 674.466700][ T1093] veth0_macvtap: left promiscuous mode [ 674.469911][ T1093] veth1_vlan: left promiscuous mode [ 674.486578][ T1093] veth0_vlan: left promiscuous mode [ 677.448040][ T30] kauditd_printk_skb: 797 callbacks suppressed [ 677.456233][ T30] audit: type=1400 audit(676.986:3888): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.471147][ T30] audit: type=1400 audit(677.006:3889): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.509529][ T30] audit: type=1400 audit(677.046:3890): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.524002][ T30] audit: type=1400 audit(677.056:3891): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.531032][ T30] audit: type=1400 audit(677.056:3892): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.544680][ T30] audit: type=1400 audit(677.056:3893): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.557929][ T30] audit: type=1400 audit(677.096:3894): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.569418][ T30] audit: type=1400 audit(677.106:3895): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.584358][ T30] audit: type=1400 audit(677.106:3896): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 677.594383][ T30] audit: type=1400 audit(677.116:3897): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.456421][ T30] kauditd_printk_skb: 1061 callbacks suppressed [ 682.459171][ T30] audit: type=1400 audit(681.997:4959): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.468725][ T30] audit: type=1400 audit(682.007:4960): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.476003][ T30] audit: type=1400 audit(682.017:4961): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.485844][ T30] audit: type=1400 audit(682.027:4962): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.491570][ T30] audit: type=1400 audit(682.027:4963): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.499347][ T30] audit: type=1400 audit(682.037:4964): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.513240][ T30] audit: type=1400 audit(682.047:4965): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.513895][ T30] audit: type=1400 audit(682.047:4966): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.514150][ T30] audit: type=1400 audit(682.047:4967): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 682.514396][ T30] audit: type=1400 audit(682.047:4968): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 685.630394][ T1093] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 685.999090][ T1093] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 686.438404][ T1093] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 686.658683][ T1093] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 687.465467][ T30] kauditd_printk_skb: 1346 callbacks suppressed [ 687.473020][ T30] audit: type=1400 audit(686.997:6315): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.488981][ T30] audit: type=1400 audit(687.027:6316): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.528532][ T30] audit: type=1400 audit(687.067:6317): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.533609][ T30] audit: type=1400 audit(687.067:6318): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.559836][ T30] audit: type=1400 audit(687.067:6319): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.573373][ T30] audit: type=1400 audit(687.107:6320): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.598676][ T30] audit: type=1400 audit(687.137:6321): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.628492][ T30] audit: type=1400 audit(687.167:6322): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.633316][ T30] audit: type=1400 audit(687.167:6323): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 687.637759][ T30] audit: type=1400 audit(687.167:6324): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 691.877846][ T1093] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 691.995086][ T1093] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 692.102975][ T1093] bond0 (unregistering): Released all slaves [ 692.482839][ T30] kauditd_printk_skb: 1093 callbacks suppressed [ 692.483702][ T30] audit: type=1400 audit(692.017:7418): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.484273][ T30] audit: type=1400 audit(692.017:7419): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.492572][ T30] audit: type=1400 audit(692.017:7420): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.499158][ T30] audit: type=1400 audit(692.037:7421): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.513404][ T30] audit: type=1400 audit(692.047:7422): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.514390][ T30] audit: type=1400 audit(692.047:7423): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.514876][ T30] audit: type=1400 audit(692.047:7424): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.531314][ T30] audit: type=1400 audit(692.067:7425): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.538231][ T30] audit: type=1400 audit(692.077:7426): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.547501][ T30] audit: type=1400 audit(692.087:7427): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 692.577021][ T1093] bond1 (unregistering): Released all slaves VM DIAGNOSIS: 11:46:21 Registers: info registers vcpu 0 CPU#0 PC=ffff80008024d49c X00=ffff800086ccf240 X01=1ffff00010e21bf3 X02=0000000000000001 X03=0000000000000001 X04=1fffe00001f4c001 X05=0000000000000000 X06=0000000000000008 X07=ab2bf13cede669c0 X08=0000000000000000 X09=ffff8000897e6000 X10=ffff00000fa60a90 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=00000000020051e6 X15=ffff00001fd08780 X16=0000000000000000 X17=1fffe000037559e0 X18=ffff00001fd08790 X19=ffff800085463878 X20=ffff00006a0c1f98 X21=0000000000000000 X22=0000000000000000 X23=ffff00006a0c1f90 X24=ffff00006a0c1f88 X25=0000000000000098 X26=00000000000000c0 X27=ffff00006a0c2ab8 X28=ffff00006a0c1f80 X29=ffff8000800068e0 X30=ffff800080316f5c SP=ffff8000800068e0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=0000000000000000:ffffffff00000000 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcf19a1f0:0000ffffcf19a1f0 Q17=ffffff80ffffffd0:0000ffffcf19a1c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008021647c X00=ffff800085485aa0 X01=ffff0000153abc80 X02=0000000000000000 X03=0000000000000000 X04=1fffe00002a75791 X05=ffff00006a0ad590 X06=ffff60000d415ab2 X07=0000000000000001 X08=ffff00006a0ad593 X09=dfff800000000000 X10=ffff60000d415ab2 X11=1fffe0000d415ab2 X12=ffff60000d415ab3 X13=0000000000000001 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000002 X19=ffff0000153abc80 X20=ffff800085485aa0 X21=ffff800088b83b23 X22=0000000000000002 X23=ffff0000153ac500 X24=ffff800088ccb1a0 X25=0000000000000001 X26=0000000000000000 X27=00000000000013ae X28=ffff8000866013e0 X29=ffff80008f836840 X30=ffff8000853bb4a0 SP=ffff80008f836810 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=0000000000000000:ffffffff00000000 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffb0be900:0000fffffb0be900 Q17=ffffff80ffffffd0:0000fffffb0be8d0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000