last executing test programs: 5m57.816160324s ago: executing program 0 (id=386): r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x6}, {0xffff, 0xffff}, {0x0, 0xfff1}}}, 0x24}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r1, {0xfff1}, {}, {0x8, 0xffe0}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_CLASSID={0x8, 0x1, {0x10, 0x4}}]}}]}, 0x3c}}, 0x4000) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 5m56.553676889s ago: executing program 0 (id=387): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x14, r1, 0x1, 0x4070bd28, 0x1}, 0x14}}, 0x18) 5m55.509334678s ago: executing program 0 (id=388): timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8b, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000001f00)=""/50, 0x32}], 0x1) 5m52.148882062s ago: executing program 0 (id=389): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x7fff0006}]}) close_range(r1, 0xffffffffffffffff, 0x0) 5m51.583839579s ago: executing program 0 (id=390): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffe}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = getpgrp(0x0) r3 = syz_pidfd_open(r2, 0x0) process_madvise(r3, 0x0, 0x0, 0x4, 0x0) 5m50.81362223s ago: executing program 0 (id=391): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) 5m5.712382664s ago: executing program 32 (id=391): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) 10.941689492s ago: executing program 2 (id=854): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000880)={'tunl0\x00', &(0x7f0000000800)={'syztnl1\x00', 0x0, 0x40, 0x1, 0x200000, 0x6, {{0xa, 0x4, 0x2, 0x5, 0x28, 0x68, 0x0, 0xe1, 0x4, 0x0, @remote, @rand_addr=0x64010101, {[@lsrr={0x83, 0x7, 0x97, [@broadcast]}, @generic={0x89, 0xa, "007156515fd387a6"}]}}}}}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="640000001000370403000000ffffffff00000000", @ANYRES32=r4, @ANYBLOB="0b1b050000000000440012800b00010069703667726500003400028008000100", @ANYRES32], 0x64}, 0x1, 0x0, 0x0, 0x48810}, 0x4000010) sendmmsg$inet(r2, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e25, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @multicast1}}}], 0x20, 0x3f}}], 0x1, 0xc0) 10.463192914s ago: executing program 2 (id=855): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000240)=""/207) 9.777915679s ago: executing program 2 (id=856): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x70bd2e, 0x1, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) 9.449375911s ago: executing program 2 (id=857): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xffff}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000300)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) rseq(&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1}, 0x20, 0x0, 0x0) 9.178449839s ago: executing program 2 (id=858): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000040)={0x38, 0x1403, 0x1, 0x70bd28, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'ip6_vti0\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8840}, 0x4000) 8.56978964s ago: executing program 2 (id=860): socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x50) 1.190628851s ago: executing program 1 (id=871): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000000), &(0x7f0000000180)=r3}, 0x20) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000fddbdf251b0000000c00018008000100", @ANYRES32=r5], 0x20}}, 0x0) 968.234836ms ago: executing program 1 (id=872): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) unshare(0x2a020400) r1 = getpgrp(0x0) r2 = syz_pidfd_open(r1, 0x0) setns(r2, 0x34020000) 710.204423ms ago: executing program 1 (id=873): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x25dfdbfb, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x4, 0x3, 0x6, 0x1f7c, 0x8}, 0x2}}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) 404.971573ms ago: executing program 1 (id=874): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="4400000013002f0a26bd70000000000007006800", @ANYRES32=r1, @ANYBLOB="68c900004502030024001a8009000100766c616e000000001400048010000380"], 0x44}}, 0x10) 228.568025ms ago: executing program 1 (id=875): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000680)={{r0}, &(0x7f0000000400), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x44, 0x2}]}}}], 0x18}, 0x20002880) 0s ago: executing program 1 (id=876): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x201, &(0x7f0000000000)={0x0, 0x300}) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) sigaltstack(0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r3, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0x10, &(0x7f0000002700)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00", @ANYBLOB="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", @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x121202, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TIOCVHANGUP(r4, 0x5437, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) syz_emit_ethernet(0x101, &(0x7f0000000580)={@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x22}, @val={@void, {0x8100, 0x4, 0x0, 0x3}}, {@generic={0xf7, "f4f1866e1e2e3596e824a2e917a855a537829708d63e4df2f38c6651f472081ef50b8321d1a0e5bb8132ebef4bca38f361379067ec6fbe585d3a72280b14d2df5cfe0179405f42ef2b53114ea3e195d990b217f12d6881303db430e5b23b274a2ef983acc8b69815011bee63394631b65395770e823f746ac00bc400a6b4c608d892efc46879a340b862b99cb4b8b75c30179c414f33a97ea4a69fb1d9fe133e80f624fcef37b83c1ee0e792cf88082f25d34033e5f3210da8630b5c12f3df0c311cf893a2fe550116bb6deba94b23f2c2aa12d6a3f24efa69c88936d0804912d32dc07fb093f2b71c4577790a439b"}}}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x7) utimensat(r3, &(0x7f0000000080)='./cgroup/../file0\x00', &(0x7f0000000100)={{0x77359400}, {r7, r8/1000+60000}}, 0x100) openat$cgroup_subtree(r2, &(0x7f0000000200), 0x2, 0x0) rmdir(&(0x7f0000000040)='./cgroup/../file0\x00') kernel console output (not intermixed with test programs): tover after parsing attributes in process `'. [ 279.979207][ T10] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 280.153152][ T10] usb 2-1: Using ep0 maxpacket: 32 [ 280.167312][ T10] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x82 has invalid wMaxPacketSize 0 [ 280.167644][ T10] usb 2-1: config 0 interface 0 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 0 [ 280.180926][ T10] usb 2-1: config 0 interface 0 has no altsetting 0 [ 280.274352][ T10] usb 2-1: New USB device found, idVendor=16d0, idProduct=10b8, bcdDevice=de.8e [ 280.274700][ T10] usb 2-1: New USB device strings: Mfr=229, Product=1, SerialNumber=3 [ 280.274834][ T10] usb 2-1: Product: syz [ 280.274897][ T10] usb 2-1: Manufacturer: syz [ 280.274945][ T10] usb 2-1: SerialNumber: syz [ 280.290132][ T10] usb 2-1: config 0 descriptor?? [ 280.769229][ T10] gs_usb 2-1:0.0: Couldn't get device config: (err=-71) [ 280.769488][ T10] gs_usb 2-1:0.0: probe with driver gs_usb failed with error -71 [ 280.779517][ T10] usb 2-1: USB disconnect, device number 22 [ 281.440518][ T4635] netlink: 8 bytes leftover after parsing attributes in process `syz.0.242'. [ 283.396807][ T4651] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 283.834059][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 283.840839][ T29] audit: type=1400 audit(283.750:424): avc: denied { create } for pid=4653 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 283.852195][ T29] audit: type=1400 audit(283.770:425): avc: denied { bind } for pid=4653 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 283.856099][ T29] audit: type=1400 audit(283.770:426): avc: denied { connect } for pid=4653 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 287.020208][ T4673] netlink: 'syz.1.253': attribute type 10 has an invalid length. [ 288.436057][ T29] audit: type=1400 audit(288.350:427): avc: denied { module_load } for pid=4682 comm="syz.1.258" path=2F2173656C696E7578776B311FD06DC37F39C99E2A0D5493FDE291EFAA16236A978FBCDE590FCCC56D56CB15766D2870C92D515A23D27B84BF06 dev="mqueue" ino=3973 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 288.437073][ T4684] kernel read not supported for file /!selinuxwk1m9ɞ*T#jYmVvm(p-QZ#{ (pid: 4684 comm: syz.1.258) [ 288.773215][ T29] audit: type=1400 audit(288.690:428): avc: denied { connect } for pid=4685 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 292.114047][ T4713] syzkaller0: entered promiscuous mode [ 292.114731][ T4713] syzkaller0: entered allmulticast mode [ 294.955819][ T29] audit: type=1400 audit(294.870:429): avc: denied { create } for pid=4721 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 296.536791][ T29] audit: type=1326 audit(296.420:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.543537][ T29] audit: type=1326 audit(296.440:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.550788][ T29] audit: type=1326 audit(296.450:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.551215][ T29] audit: type=1326 audit(296.450:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.555005][ T29] audit: type=1326 audit(296.470:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.589760][ T29] audit: type=1326 audit(296.510:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.590210][ T29] audit: type=1326 audit(296.510:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.600866][ T29] audit: type=1326 audit(296.510:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.603382][ T29] audit: type=1326 audit(296.520:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4734 comm="syz.0.276" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.533464][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 301.533748][ T29] audit: type=1326 audit(301.450:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4767 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.546458][ T29] audit: type=1326 audit(301.460:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4767 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.546992][ T29] audit: type=1326 audit(301.460:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4767 comm="syz.0.283" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.913238][ T29] audit: type=1326 audit(301.830:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.0.285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.913913][ T29] audit: type=1326 audit(301.830:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.0.285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.922306][ T29] audit: type=1326 audit(301.830:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.0.285" exe="/syz-executor" sig=0 arch=40000028 syscall=336 compat=0 ip=0x132320 code=0x7ffc0000 [ 301.922685][ T29] audit: type=1326 audit(301.840:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4772 comm="syz.0.285" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.833312][ T29] audit: type=1400 audit(303.750:465): avc: denied { validate_trans } for pid=4784 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 312.890973][ T29] audit: type=1400 audit(312.810:466): avc: denied { create } for pid=4821 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 312.909836][ T29] audit: type=1400 audit(312.820:467): avc: denied { setopt } for pid=4821 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 324.101294][ T29] audit: type=1400 audit(324.020:468): avc: denied { create } for pid=4852 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 324.859047][ T29] audit: type=1326 audit(324.770:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.872095][ T29] audit: type=1326 audit(324.780:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.875445][ T29] audit: type=1326 audit(324.790:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.878272][ T29] audit: type=1326 audit(324.790:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.882718][ T29] audit: type=1326 audit(324.800:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.886673][ T29] audit: type=1326 audit(324.800:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.908865][ T29] audit: type=1326 audit(324.820:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.909282][ T29] audit: type=1326 audit(324.820:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.909429][ T29] audit: type=1326 audit(324.820:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4860 comm="syz.1.312" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.060957][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 333.063975][ T29] audit: type=1326 audit(332.980:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.068916][ T29] audit: type=1326 audit(332.980:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.070719][ T29] audit: type=1326 audit(332.980:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.093296][ T29] audit: type=1326 audit(333.010:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.102907][ T29] audit: type=1326 audit(333.020:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.103187][ T29] audit: type=1326 audit(333.020:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.109032][ T29] audit: type=1326 audit(333.020:514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.125006][ T29] audit: type=1326 audit(333.030:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4885 comm="syz.0.320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 333.786310][ T29] audit: type=1400 audit(333.700:516): avc: denied { load_policy } for pid=4894 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 333.786592][ T4896] SELinux: policydb version -176988941 does not match my version range 15-35 [ 333.801817][ T4896] SELinux: failed to load policy [ 341.567883][ T29] audit: type=1326 audit(341.480:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.588896][ T29] audit: type=1326 audit(341.500:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.600701][ T29] audit: type=1326 audit(341.520:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.603464][ T29] audit: type=1326 audit(341.520:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.603807][ T29] audit: type=1326 audit(341.520:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.604109][ T29] audit: type=1326 audit(341.520:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.605027][ T29] audit: type=1326 audit(341.520:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.610239][ T29] audit: type=1326 audit(341.520:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.615664][ T29] audit: type=1326 audit(341.530:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132320 code=0x7ffc0000 [ 341.625016][ T29] audit: type=1326 audit(341.530:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4925 comm="syz.1.332" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 344.731193][ T4938] wg2: entered promiscuous mode [ 344.758127][ T4938] wg2: entered allmulticast mode [ 346.653562][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 346.655092][ T29] audit: type=1326 audit(346.570:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.657533][ T29] audit: type=1326 audit(346.570:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.716170][ T29] audit: type=1326 audit(346.630:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.719798][ T29] audit: type=1326 audit(346.630:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.722482][ T29] audit: type=1326 audit(346.630:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.750849][ T29] audit: type=1326 audit(346.670:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.781112][ T29] audit: type=1326 audit(346.700:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.803246][ T29] audit: type=1326 audit(346.720:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.806616][ T29] audit: type=1326 audit(346.720:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.817106][ T29] audit: type=1326 audit(346.720:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.1.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 346.973146][ T4954] netlink: 8 bytes leftover after parsing attributes in process `syz.0.339'. [ 346.977672][ T4954] netlink: 8 bytes leftover after parsing attributes in process `syz.0.339'. [ 346.991651][ T4954] netlink: 8 bytes leftover after parsing attributes in process `syz.0.339'. [ 346.992885][ T4954] netlink: 8 bytes leftover after parsing attributes in process `syz.0.339'. [ 348.809622][ T4982] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 353.911579][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 353.922432][ T29] audit: type=1400 audit(353.830:647): avc: denied { name_bind } for pid=5005 comm="syz.0.357" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 355.084218][ T29] audit: type=1326 audit(355.000:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.090707][ T29] audit: type=1326 audit(355.010:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.101580][ T29] audit: type=1326 audit(355.010:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.104635][ T29] audit: type=1326 audit(355.010:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.110297][ T29] audit: type=1326 audit(355.010:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 355.112226][ T29] audit: type=1326 audit(355.010:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.0.362" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 356.530822][ T29] audit: type=1400 audit(356.450:654): avc: denied { write } for pid=5042 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 356.954574][ T5048] tmpfs: Unsupported parameter 'mpol' [ 357.018288][ T29] audit: type=1400 audit(356.920:655): avc: denied { remount } for pid=5047 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 358.581664][ T29] audit: type=1326 audit(358.490:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5057 comm="syz.0.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 359.789635][ T5065] netlink: 4 bytes leftover after parsing attributes in process `syz.0.369'. [ 366.207001][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 366.223497][ T29] audit: type=1326 audit(366.120:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.225605][ T29] audit: type=1326 audit(366.140:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.240975][ T29] audit: type=1326 audit(366.140:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.250087][ T29] audit: type=1326 audit(366.140:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.252642][ T29] audit: type=1326 audit(366.140:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.255272][ T29] audit: type=1326 audit(366.150:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=336 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.257257][ T29] audit: type=1326 audit(366.160:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 366.269183][ T29] audit: type=1326 audit(366.160:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5079 comm="syz.0.375" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.208812][ T29] audit: type=1326 audit(369.100:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.229585][ T29] audit: type=1326 audit(369.120:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5092 comm="syz.0.380" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 369.950980][ T5096] pimreg: entered allmulticast mode [ 369.989731][ T5096] pimreg: left allmulticast mode [ 372.973271][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 372.978957][ T29] audit: type=1400 audit(372.890:683): avc: denied { create } for pid=5113 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 379.162612][ T29] audit: type=1326 audit(379.080:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.180562][ T29] audit: type=1326 audit(379.090:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.182291][ T29] audit: type=1326 audit(379.100:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.189146][ T29] audit: type=1326 audit(379.100:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.191644][ T29] audit: type=1326 audit(379.110:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.196642][ T29] audit: type=1326 audit(379.110:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.203384][ T29] audit: type=1326 audit(379.120:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.222249][ T29] audit: type=1326 audit(379.140:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.224005][ T29] audit: type=1326 audit(379.140:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 379.226745][ T29] audit: type=1326 audit(379.140:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5126 comm="syz.0.390" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 385.352846][ T5043] alloc_vmap_area: 10 callbacks suppressed [ 385.354507][ T5043] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 385.355907][ T5043] syz.1.365: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 385.361020][ T5043] CPU: 0 UID: 0 PID: 5043 Comm: syz.1.365 Not tainted syzkaller #0 PREEMPT [ 385.361309][ T5043] Hardware name: ARM-Versatile Express [ 385.361587][ T5043] Call trace: [ 385.363855][ T5043] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 385.368631][ T5043] r7:ffffffff r6:822b1844 r5:60000013 r4:8229592c [ 385.368826][ T5043] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 385.368910][ T5043] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 385.368966][ T5043] r5:85c64800 r4:00000000 [ 385.368983][ T5043] [<8021ee40>] (dump_stack) from [<80509eec>] (warn_alloc+0xd8/0x180) [ 385.369038][ T5043] [<80509e14>] (warn_alloc) from [<804f83f0>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 385.369095][ T5043] r3:1ffffff8 r2:822b1844 [ 385.369121][ T5043] r6:00000dc0 r5:822b187c r4:ff800000 [ 385.369138][ T5043] [<804f8330>] (__vmalloc_node_range_noprof) from [<8051b670>] (__kvmalloc_node_noprof+0x294/0x700) [ 385.369240][ T5043] r10:ea651d00 r9:848ba400 r8:85c64800 r7:00000000 r6:000002d0 r5:00000400 [ 385.369277][ T5043] r4:1ffffff8 [ 385.369295][ T5043] [<8051b3dc>] (__kvmalloc_node_noprof) from [<8176cf9c>] (xt_alloc_entry_offsets+0x28/0x34) [ 385.369362][ T5043] r10:ea651d00 r9:848ba400 r8:00000000 r7:00000000 r6:000002d0 r5:848ba440 [ 385.369383][ T5043] r4:07fffffe [ 385.369401][ T5043] [<8176cf74>] (xt_alloc_entry_offsets) from [<818fb9c4>] (translate_table+0x70/0x78c) [ 385.369456][ T5043] [<818fb954>] (translate_table) from [<818fcba0>] (do_replace+0xe8/0x5d0) [ 385.369516][ T5043] r10:b5403587 r9:848ba440 r8:00000000 r7:20000060 r6:000002d0 r5:848ba400 [ 385.369536][ T5043] r4:84b90000 [ 385.369552][ T5043] [<818fcab8>] (do_replace) from [<818fd1bc>] (do_ip6t_set_ctl+0x134/0x2a0) [ 385.369614][ T5043] r10:00000126 r9:8159a59c r8:00000330 r7:852b4524 r6:ea651da8 r5:84f3f380 [ 385.369636][ T5043] r4:00000040 [ 385.369652][ T5043] [<818fd088>] (do_ip6t_set_ctl) from [<816f5500>] (nf_setsockopt+0x60/0x7c) [ 385.369716][ T5043] r10:00000126 r9:8159a59c r8:00000330 r7:852b4524 r6:84f3f380 r5:818fd088 [ 385.369737][ T5043] r4:829f4eb8 [ 385.369753][ T5043] [<816f54a4>] (nf_setsockopt) from [<818b306c>] (ipv6_setsockopt+0x9c/0xbc) [ 385.369813][ T5043] r6:00000330 r5:84f3f380 r4:00000040 [ 385.369831][ T5043] [<818b2fd4>] (ipv6_setsockopt) from [<817a41f0>] (tcp_setsockopt+0x3c/0x58) [ 385.369892][ T5043] r6:00000029 r5:852b4000 r4:818b2fd0 [ 385.369909][ T5043] [<817a41b8>] (tcp_setsockopt) from [<8159a5d4>] (sock_common_setsockopt+0x38/0x40) [ 385.369970][ T5043] r4:817a41b4 [ 385.369987][ T5043] [<8159a5a0>] (sock_common_setsockopt) from [<819a6fdc>] (smc_setsockopt+0xac/0x3cc) [ 385.370051][ T5043] r4:00000040 [ 385.370068][ T5043] [<819a6f34>] (smc_setsockopt) from [<81595e0c>] (do_sock_setsockopt+0x70/0xc8) [ 385.370135][ T5043] r9:85c64800 r8:00000330 r7:855b1900 r6:00000040 r5:00000029 r4:819a6f30 [ 385.370164][ T5043] [<81595d9c>] (do_sock_setsockopt) from [<8159926c>] (__sys_setsockopt+0x7c/0xc4) [ 385.370230][ T5043] r8:00000000 r7:85a02900 r6:85a02901 r5:00000040 r4:00000029 [ 385.370249][ T5043] [<815991f0>] (__sys_setsockopt) from [<815992d0>] (sys_setsockopt+0x1c/0x24) [ 385.370350][ T5043] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000330 [ 385.370368][ T5043] [<815992b4>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 385.370493][ T5043] Exception stack(0xea651fa8 to 0xea651ff0) [ 385.370682][ T5043] 1fa0: 00000330 00000000 00000005 00000029 00000040 20000000 [ 385.370737][ T5043] 1fc0: 00000330 00000000 00316318 00000126 00300000 00000000 00006364 76f990bc [ 385.370764][ T5043] 1fe0: 76f98ec0 76f98eb0 0001929c 00132320 [ 385.389728][ T5043] Mem-Info: [ 385.390340][ T5043] active_anon:1303 inactive_anon:0 isolated_anon:0 [ 385.390340][ T5043] active_file:6126 inactive_file:35395 isolated_file:0 [ 385.390340][ T5043] unevictable:768 dirty:9 writeback:0 [ 385.390340][ T5043] slab_reclaimable:1082 slab_unreclaimable:9963 [ 385.390340][ T5043] mapped:2335 shmem:778 pagetables:392 [ 385.390340][ T5043] sec_pagetables:0 bounce:0 [ 385.390340][ T5043] kernel_misc_reclaimable:0 [ 385.390340][ T5043] free:430326 free_pcp:1449 free_cma:4032 [ 385.390715][ T5043] Node 0 active_anon:5212kB inactive_anon:0kB active_file:24504kB inactive_file:141580kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9340kB dirty:36kB writeback:0kB shmem:3112kB kernel_stack:2784kB pagetables:1568kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 385.391218][ T5043] Normal free:1362276kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1224kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:5796kB local_pcp:2972kB free_cma:0kB [ 385.391368][ T5043] lowmem_reserve[]: 0 4224 4224 [ 385.391749][ T5043] Normal: 19*4kB (UE) 33*8kB (UM) 3*16kB (UME) 3*32kB (UME) 4*64kB (UM) 1*128kB (U) 4*256kB (UE) 7*512kB (UME) 5*1024kB (ME) 4*2048kB (UM) 328*4096kB (UM) = 1362276kB [ 385.392778][ T5043] 42301 total pagecache pages [ 385.392836][ T5043] 0 pages in swap cache [ 385.392892][ T5043] Free swap = 124996kB [ 385.392935][ T5043] Total swap = 124996kB [ 385.393045][ T5043] 524288 pages RAM [ 385.393089][ T5043] 135168 pages HighMem/MovableOnly [ 385.393140][ T5043] 32395 pages reserved [ 385.393192][ T5043] 4096 pages cma reserved [ 388.869486][ T29] audit: type=1326 audit(388.790:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 388.881137][ T29] audit: type=1326 audit(388.800:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 388.891403][ T29] audit: type=1326 audit(388.800:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 388.909930][ T29] audit: type=1326 audit(388.800:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 388.911674][ T29] audit: type=1326 audit(388.830:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132320 code=0x7ffc0000 [ 389.419870][ T29] audit: type=1326 audit(389.340:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 389.421797][ T29] audit: type=1326 audit(389.340:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 391.970836][ T29] audit: type=1326 audit(391.890:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.972594][ T29] audit: type=1326 audit(391.890:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x13246c code=0x7ffc0000 [ 391.977060][ T29] audit: type=1326 audit(391.890:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.988877][ T29] audit: type=1326 audit(391.890:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10ae60 code=0x7ffc0000 [ 391.991041][ T29] audit: type=1326 audit(391.890:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x1337dc code=0x7ffc0000 [ 391.992660][ T29] audit: type=1326 audit(391.890:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=338 compat=0 ip=0x10a42c code=0x7ffc0000 [ 391.994278][ T29] audit: type=1326 audit(391.890:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10a4c0 code=0x7ffc0000 [ 391.995993][ T29] audit: type=1326 audit(391.890:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 391.997308][ T29] audit: type=1326 audit(391.890:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x10aed4 code=0x7ffc0000 [ 391.997540][ T29] audit: type=1326 audit(391.890:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5143 comm="syz.1.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 397.236343][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 397.238983][ T29] audit: type=1400 audit(397.150:752): avc: denied { read } for pid=5160 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 397.401352][ T29] audit: type=1400 audit(397.320:753): avc: denied { map_create } for pid=5160 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 397.401790][ T29] audit: type=1400 audit(397.320:754): avc: denied { bpf } for pid=5160 comm="syz.1.402" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 397.403499][ T29] audit: type=1400 audit(397.320:755): avc: denied { map_read map_write } for pid=5160 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 398.649611][ T29] audit: type=1400 audit(398.570:756): avc: denied { prog_load } for pid=5160 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 400.240405][ T29] audit: type=1400 audit(400.160:757): avc: denied { create } for pid=5164 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 400.276432][ T29] audit: type=1400 audit(400.190:758): avc: denied { perfmon } for pid=5164 comm="syz.1.403" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 400.363247][ T29] audit: type=1400 audit(400.280:759): avc: denied { prog_run } for pid=5164 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 400.489862][ T29] audit: type=1400 audit(400.410:760): avc: denied { write } for pid=5164 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 400.516091][ T29] audit: type=1400 audit(400.410:761): avc: denied { module_request } for pid=5164 comm="syz.1.403" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 405.849952][ T29] audit: type=1400 audit(405.760:762): avc: denied { write } for pid=5179 comm="syz.1.409" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 408.195679][ T5186] netlink: 4 bytes leftover after parsing attributes in process `syz.1.412'. [ 410.120530][ T5190] netdevsim netdevsim1: Direct firmware load for ./file1 failed with error -2 [ 410.141899][ T29] audit: type=1400 audit(410.060:763): avc: denied { firmware_load } for pid=5189 comm="syz.1.414" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 410.145022][ T5190] netdevsim netdevsim1: Falling back to sysfs fallback for: ./file1 [ 410.674405][ T29] audit: type=1400 audit(410.580:764): avc: denied { create } for pid=5189 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 410.685506][ T29] audit: type=1400 audit(410.590:765): avc: denied { ioctl } for pid=5189 comm="syz.1.414" path="socket:[4978]" dev="sockfs" ino=4978 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 411.220203][ T5194] netlink: 4 bytes leftover after parsing attributes in process `syz.1.414'. [ 411.236574][ T29] audit: type=1400 audit(411.150:766): avc: denied { sys_module } for pid=5189 comm="syz.1.414" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 412.775682][ T29] audit: type=1400 audit(412.690:767): avc: denied { mounton } for pid=5197 comm="syz.1.415" path="/153/file0" dev="tmpfs" ino=795 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 412.787967][ T29] audit: type=1400 audit(412.700:768): avc: denied { mount } for pid=5197 comm="syz.1.415" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 412.860922][ T29] audit: type=1400 audit(412.780:769): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 414.572267][ T29] audit: type=1400 audit(414.490:770): avc: denied { create } for pid=5201 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 414.663865][ T5202] netlink: 12 bytes leftover after parsing attributes in process `syz.1.417'. [ 415.100165][ T29] audit: type=1400 audit(415.020:771): avc: denied { create } for pid=5203 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 418.051684][ T29] audit: type=1400 audit(417.970:772): avc: denied { create } for pid=5209 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 418.064123][ T29] audit: type=1400 audit(417.980:773): avc: denied { bind } for pid=5209 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 418.064670][ T29] audit: type=1400 audit(417.980:774): avc: denied { name_bind } for pid=5209 comm="syz.1.420" src=19998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 418.080381][ T29] audit: type=1400 audit(417.980:775): avc: denied { node_bind } for pid=5209 comm="syz.1.420" saddr=10.1.1.131 src=19998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 418.792254][ T29] audit: type=1400 audit(418.710:776): avc: denied { create } for pid=5211 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 418.797238][ T29] audit: type=1400 audit(418.710:777): avc: denied { connect } for pid=5211 comm="syz.1.421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 420.203601][ T29] audit: type=1326 audit(420.120:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 420.205243][ T29] audit: type=1326 audit(420.120:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 420.232457][ T29] audit: type=1326 audit(420.140:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 420.251546][ T29] audit: type=1326 audit(420.150:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5216 comm="syz.1.423" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 422.936542][ T5224] syzkaller0: entered promiscuous mode [ 422.939264][ T5224] syzkaller0: entered allmulticast mode [ 423.155236][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 423.169272][ T29] audit: type=1400 audit(423.070:791): avc: denied { write } for pid=5223 comm="syz.1.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 423.990107][ T5230] netlink: 4 bytes leftover after parsing attributes in process `syz.1.426'. [ 424.629386][ T29] audit: type=1400 audit(424.550:792): avc: denied { execute } for pid=5233 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 424.651884][ T29] audit: type=1400 audit(424.570:793): avc: denied { execute_no_trans } for pid=5233 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 424.739258][ T29] audit: type=1400 audit(424.650:794): avc: denied { execmem } for pid=5233 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 424.762105][ T29] audit: type=1400 audit(424.680:795): avc: denied { read } for pid=5235 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 424.764076][ T29] audit: type=1400 audit(424.680:796): avc: denied { open } for pid=5235 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 424.766559][ T29] audit: type=1400 audit(424.680:797): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 424.819687][ T29] audit: type=1400 audit(424.740:798): avc: denied { write } for pid=5234 comm="syz.1.429" name="icmp6" dev="proc" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 425.444274][ T29] audit: type=1326 audit(425.360:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.1.431" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 425.462174][ T29] audit: type=1326 audit(425.380:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5242 comm="syz.1.431" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x132320 code=0x7ffc0000 [ 427.947616][ T5303] pimreg: entered allmulticast mode [ 428.479404][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 428.482220][ T29] audit: type=1326 audit(428.390:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.482806][ T29] audit: type=1326 audit(428.390:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.482896][ T29] audit: type=1326 audit(428.390:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.482962][ T29] audit: type=1326 audit(428.390:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=366 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.483017][ T29] audit: type=1326 audit(428.400:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.483086][ T29] audit: type=1326 audit(428.400:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 428.483158][ T29] audit: type=1326 audit(428.400:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5328 comm="syz.1.442" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 429.920034][ T5235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 429.926459][ T5235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 432.122330][ T5235] hsr_slave_0: entered promiscuous mode [ 432.136489][ T5235] hsr_slave_1: entered promiscuous mode [ 432.154943][ T5235] debugfs: 'hsr0' already exists in 'hsr' [ 432.155409][ T5235] Cannot create hsr debugfs directory [ 433.063244][ T29] audit: type=1400 audit(432.980:827): avc: denied { write } for pid=5235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 433.064705][ T29] audit: type=1400 audit(432.980:828): avc: denied { read } for pid=5235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 433.068119][ T5235] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 433.082693][ T5235] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 433.093905][ T5235] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 433.105377][ T5235] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 435.052405][ T5235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.643822][ T5235] veth0_vlan: entered promiscuous mode [ 442.844128][ T5235] veth1_vlan: entered promiscuous mode [ 443.081016][ T5235] veth0_macvtap: entered promiscuous mode [ 443.105796][ T5235] veth1_macvtap: entered promiscuous mode [ 443.351346][ T1331] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 443.355306][ T1331] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 443.357549][ T1331] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 443.440779][ T1331] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 443.682704][ T29] audit: type=1400 audit(443.590:829): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/syzkaller.aGVs76/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 443.685004][ T29] audit: type=1400 audit(443.590:830): avc: denied { mount } for pid=5235 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 443.711832][ T29] audit: type=1400 audit(443.630:831): avc: denied { mount } for pid=5235 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 443.737465][ T29] audit: type=1400 audit(443.650:832): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/syzkaller.aGVs76/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 443.751935][ T29] audit: type=1400 audit(443.670:833): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/syzkaller.aGVs76/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 443.833558][ T29] audit: type=1400 audit(443.750:834): avc: denied { unmount } for pid=5235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 443.853425][ T29] audit: type=1400 audit(443.770:835): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 443.855360][ T29] audit: type=1400 audit(443.770:836): avc: denied { mount } for pid=5235 comm="syz-executor" name="/" dev="gadgetfs" ino=2402 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 443.860097][ T29] audit: type=1400 audit(443.770:837): avc: denied { mount } for pid=5235 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 443.860460][ T29] audit: type=1400 audit(443.770:838): avc: denied { mounton } for pid=5235 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 445.333159][ T5601] netlink: 48 bytes leftover after parsing attributes in process `syz.2.446'. [ 446.410245][ T5609] netlink: 12 bytes leftover after parsing attributes in process `syz.2.450'. [ 453.378796][ T5628] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.603186][ T5628] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.627521][ T5633] syzkaller0: entered promiscuous mode [ 453.629943][ T5633] syzkaller0: entered allmulticast mode [ 453.725879][ T5628] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.100078][ T5628] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.225390][ T171] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.271848][ T171] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.370532][ T1965] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.410617][ T1965] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.692325][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 454.692900][ T29] audit: type=1400 audit(454.610:892): avc: denied { create } for pid=5662 comm="syz.1.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 454.722927][ T29] audit: type=1400 audit(454.640:893): avc: denied { bind } for pid=5662 comm="syz.1.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 455.312819][ T5667] syzkaller0: entered promiscuous mode [ 455.314132][ T5667] syzkaller0: entered allmulticast mode [ 455.816727][ T5673] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 459.973721][ T29] audit: type=1400 audit(459.890:894): avc: denied { setopt } for pid=5687 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 464.249498][ T29] audit: type=1400 audit(464.170:895): avc: denied { setopt } for pid=5712 comm="syz.1.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 464.409963][ T29] audit: type=1400 audit(464.320:896): avc: denied { ioctl } for pid=5712 comm="syz.1.481" path="socket:[6445]" dev="sockfs" ino=6445 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 466.075204][ T5722] netlink: 8 bytes leftover after parsing attributes in process `syz.1.483'. [ 466.763809][ T29] audit: type=1400 audit(466.680:897): avc: denied { write } for pid=5723 comm="syz.1.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 467.847805][ T5728] ALSA: seq fatal error: cannot create timer (-16) [ 467.872237][ T5728] ALSA: seq fatal error: cannot create timer (-16) [ 469.026449][ T29] audit: type=1326 audit(468.940:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.040738][ T29] audit: type=1326 audit(468.960:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.043148][ T29] audit: type=1326 audit(468.960:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.045194][ T29] audit: type=1326 audit(468.960:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.046804][ T29] audit: type=1326 audit(468.940:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.046866][ T29] audit: type=1326 audit(468.960:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.049426][ T29] audit: type=1326 audit(468.960:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.052637][ T29] audit: type=1326 audit(468.970:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 469.055710][ T29] audit: type=1326 audit(468.970:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5735 comm="syz.1.490" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 471.993737][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 471.996185][ T29] audit: type=1400 audit(471.910:931): avc: denied { create } for pid=5750 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 472.017144][ T29] audit: type=1400 audit(471.930:932): avc: denied { write } for pid=5750 comm="syz.1.497" path="socket:[6524]" dev="sockfs" ino=6524 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 472.609607][ T29] audit: type=1326 audit(472.530:933): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.613528][ T29] audit: type=1326 audit(472.530:934): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.617453][ T29] audit: type=1326 audit(472.530:935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.620001][ T29] audit: type=1326 audit(472.540:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.621857][ T29] audit: type=1326 audit(472.540:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.627729][ T29] audit: type=1326 audit(472.540:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.642369][ T29] audit: type=1326 audit(472.560:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 472.642601][ T29] audit: type=1326 audit(472.560:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5758 comm="syz.1.499" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 487.660668][ T5490] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.699657][ T5490] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.760281][ T5490] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 487.820183][ T5490] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 488.366018][ T5490] bond0 (unregistering): Released all slaves [ 488.459462][ T5490] hsr_slave_0: left promiscuous mode [ 488.472740][ T5490] hsr_slave_1: left promiscuous mode [ 488.495572][ T5490] veth1_macvtap: left promiscuous mode [ 488.496212][ T5490] veth0_macvtap: left promiscuous mode [ 489.282080][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 489.285470][ T29] audit: type=1400 audit(489.200:946): avc: denied { block_suspend } for pid=5786 comm="syz.2.505" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 490.096279][ T29] audit: type=1400 audit(490.010:947): avc: denied { write } for pid=5794 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.100647][ T29] audit: type=1400 audit(490.010:948): avc: denied { open } for pid=5794 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.668927][ T29] audit: type=1400 audit(490.570:949): avc: denied { search } for pid=5798 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.670938][ T29] audit: type=1400 audit(490.570:950): avc: denied { search } for pid=5798 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.675474][ T29] audit: type=1400 audit(490.570:951): avc: denied { search } for pid=5798 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.683602][ T29] audit: type=1400 audit(490.590:952): avc: denied { search } for pid=5798 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.718318][ T29] audit: type=1400 audit(490.630:953): avc: denied { read open } for pid=5802 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.738982][ T29] audit: type=1400 audit(490.630:954): avc: denied { getattr } for pid=5802 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 490.774386][ T29] audit: type=1400 audit(490.690:955): avc: denied { add_name } for pid=5798 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 495.694344][ T5820] netlink: 204 bytes leftover after parsing attributes in process `syz.2.511'. [ 496.112103][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 496.114686][ T29] audit: type=1326 audit(496.030:965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115213][ T29] audit: type=1326 audit(496.030:966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115310][ T29] audit: type=1326 audit(496.030:967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115472][ T29] audit: type=1326 audit(496.030:968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115557][ T29] audit: type=1326 audit(496.030:969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=245 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115624][ T29] audit: type=1326 audit(496.030:970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.115682][ T29] audit: type=1326 audit(496.030:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.135542][ T29] audit: type=1326 audit(496.050:972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.142415][ T29] audit: type=1326 audit(496.060:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5821 comm="syz.2.512" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 496.645833][ T29] audit: type=1400 audit(496.560:974): avc: denied { execute } for pid=5827 comm="syz.2.514" name="file1" dev="tmpfs" ino=150 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 496.660503][ T5828] process 'syz.2.514' launched './file1' with NULL argv: empty string added [ 515.864726][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 515.866535][ T29] audit: type=1326 audit(515.780:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.880850][ T29] audit: type=1326 audit(515.800:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.891271][ T29] audit: type=1326 audit(515.810:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.894571][ T29] audit: type=1326 audit(515.810:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.899500][ T29] audit: type=1326 audit(515.810:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.899941][ T29] audit: type=1326 audit(515.810:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.900158][ T29] audit: type=1326 audit(515.820:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.903727][ T29] audit: type=1326 audit(515.820:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.920269][ T29] audit: type=1326 audit(515.830:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 515.921956][ T29] audit: type=1326 audit(515.840:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5896 comm="syz.2.532" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 521.408096][ T5948] netlink: 240 bytes leftover after parsing attributes in process `syz.2.543'. [ 529.229396][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 529.230003][ T29] audit: type=1400 audit(529.140:1033): avc: denied { create } for pid=5967 comm="syz.1.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 538.680888][ T29] audit: type=1326 audit(538.600:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.689936][ T29] audit: type=1326 audit(538.610:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.701187][ T29] audit: type=1326 audit(538.610:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.703824][ T29] audit: type=1326 audit(538.620:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.706475][ T29] audit: type=1326 audit(538.620:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.710766][ T29] audit: type=1400 audit(538.620:1039): avc: denied { watch } for pid=5971 comm="syz.2.557" path="/52" dev="tmpfs" ino=277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 538.711477][ T29] audit: type=1326 audit(538.620:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.711578][ T29] audit: type=1326 audit(538.620:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.711648][ T29] audit: type=1326 audit(538.620:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 538.725575][ T29] audit: type=1326 audit(538.640:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5971 comm="syz.2.557" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.962758][ T5983] netlink: 'syz.2.560': attribute type 1 has an invalid length. [ 544.398039][ T5983] bond_slave_0: entered promiscuous mode [ 544.399213][ T5983] bond_slave_1: entered promiscuous mode [ 544.405021][ T5983] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 544.412950][ T5983] bond1: (slave macvlan2): making interface the new active one [ 544.417322][ T5983] bond1: (slave macvlan2): Enslaving as an active interface with an up link [ 549.833738][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 549.836668][ T29] audit: type=1326 audit(549.750:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.837066][ T29] audit: type=1326 audit(549.750:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.842791][ T29] audit: type=1326 audit(549.760:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.844856][ T29] audit: type=1326 audit(549.760:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=305 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.849181][ T29] audit: type=1326 audit(549.760:1055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.855869][ T29] audit: type=1326 audit(549.770:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 549.859617][ T29] audit: type=1326 audit(549.770:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6033 comm="syz.1.566" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.363254][ T29] audit: type=1400 audit(550.280:1058): avc: denied { mounton } for pid=6041 comm="syz.2.569" path="/proc/139/task" dev="proc" ino=7800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 555.121259][ T29] audit: type=1326 audit(555.030:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6050 comm="syz.2.571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 555.130249][ T29] audit: type=1326 audit(555.050:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6050 comm="syz.2.571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 555.139919][ T29] audit: type=1326 audit(555.060:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6050 comm="syz.2.571" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x132320 code=0x7ffc0000 [ 555.147051][ T29] audit: type=1326 audit(555.060:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6050 comm="syz.2.571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 555.149938][ T29] audit: type=1326 audit(555.060:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6050 comm="syz.2.571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 556.557961][ T29] audit: type=1400 audit(556.470:1064): avc: denied { connect } for pid=6058 comm="syz.1.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 557.111666][ T29] audit: type=1326 audit(557.030:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6063 comm="syz.1.578" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 557.125747][ T29] audit: type=1326 audit(557.030:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6063 comm="syz.1.578" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 557.140795][ T29] audit: type=1326 audit(557.060:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6063 comm="syz.1.578" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 557.143850][ T29] audit: type=1326 audit(557.060:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6063 comm="syz.1.578" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 558.091242][ T6072] netlink: 12 bytes leftover after parsing attributes in process `syz.2.581'. [ 558.091877][ T6072] netlink: 28 bytes leftover after parsing attributes in process `syz.2.581'. [ 558.132751][ T6075] netlink: 12 bytes leftover after parsing attributes in process `syz.1.582'. [ 558.134654][ T6075] bridge_slave_0: default FDB implementation only supports local addresses [ 560.561336][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 560.565932][ T29] audit: type=1400 audit(560.480:1077): avc: denied { create } for pid=6099 comm="syz.1.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 560.569179][ T29] audit: type=1400 audit(560.480:1078): avc: denied { write } for pid=6099 comm="syz.1.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 560.734770][ T29] audit: type=1400 audit(560.640:1079): avc: denied { connect } for pid=6101 comm="syz.2.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 560.739446][ T29] audit: type=1400 audit(560.650:1080): avc: denied { ioctl } for pid=6101 comm="syz.2.592" path="socket:[6918]" dev="sockfs" ino=6918 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 560.742293][ T29] audit: type=1400 audit(560.650:1081): avc: denied { write } for pid=6101 comm="syz.2.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 561.211833][ T6109] netlink: 96 bytes leftover after parsing attributes in process `'. [ 561.526794][ T6113] : renamed from vlan0 (while UP) [ 561.721088][ T6117] netlink: 8 bytes leftover after parsing attributes in process `syz.1.600'. [ 561.721628][ T6117] netlink: 8 bytes leftover after parsing attributes in process `syz.1.600'. [ 561.742600][ T29] audit: type=1400 audit(561.660:1082): avc: denied { create } for pid=6115 comm="syz.2.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 561.801544][ T6118] netlink: 4 bytes leftover after parsing attributes in process `syz.2.599'. [ 561.940277][ T6123] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 561.990260][ T29] audit: type=1400 audit(561.910:1083): avc: denied { setopt } for pid=6121 comm="syz.2.602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 562.429883][ T29] audit: type=1400 audit(562.350:1084): avc: denied { relabelfrom } for pid=6125 comm="syz.1.603" name="" dev="pipefs" ino=7926 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 562.614734][ T29] audit: type=1326 audit(562.530:1085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6128 comm="syz.1.604" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 562.616225][ T29] audit: type=1326 audit(562.530:1086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6128 comm="syz.1.604" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 562.739970][ T6123] netlink: 4 bytes leftover after parsing attributes in process `syz.2.602'. [ 562.885422][ T6134] netlink: 4 bytes leftover after parsing attributes in process `syz.2.606'. [ 569.622709][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 569.625197][ T29] audit: type=1400 audit(569.540:1109): avc: denied { write } for pid=6171 comm="syz.1.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 569.639476][ T29] audit: type=1400 audit(569.560:1110): avc: denied { nlmsg_write } for pid=6171 comm="syz.1.614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 570.324134][ T29] audit: type=1400 audit(570.240:1111): avc: denied { ioctl } for pid=6181 comm="syz.2.617" path="socket:[7997]" dev="sockfs" ino=7997 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 570.367730][ T6183] netlink: 4 bytes leftover after parsing attributes in process `syz.2.617'. [ 570.565492][ T6184] netlink: 12 bytes leftover after parsing attributes in process `syz.1.618'. [ 570.814378][ T29] audit: type=1400 audit(570.730:1112): avc: denied { bind } for pid=6182 comm="syz.1.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 571.920656][ T29] audit: type=1400 audit(571.840:1113): avc: denied { load_policy } for pid=6205 comm="syz.2.621" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 571.929740][ T6206] SELinux: failed to load policy [ 572.058897][ T29] audit: type=1326 audit(571.960:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6207 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 572.061101][ T29] audit: type=1326 audit(571.970:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6207 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 572.062361][ T29] audit: type=1326 audit(571.980:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6207 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 572.063594][ T29] audit: type=1326 audit(571.980:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6207 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 572.064531][ T29] audit: type=1326 audit(571.980:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6207 comm="syz.2.622" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.877770][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 574.926499][ T29] audit: type=1326 audit(574.790:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 574.926933][ T29] audit: type=1326 audit(574.830:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.049029][ T29] audit: type=1326 audit(574.960:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.051517][ T29] audit: type=1326 audit(574.960:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.054597][ T29] audit: type=1326 audit(574.970:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.075370][ T29] audit: type=1326 audit(574.980:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.075984][ T29] audit: type=1326 audit(574.980:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.171344][ T29] audit: type=1326 audit(575.090:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=374 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.175557][ T29] audit: type=1326 audit(575.090:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.179853][ T29] audit: type=1326 audit(575.090:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6226 comm="syz.2.631" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 575.254380][ T6235] IPv6: Can't replace route, no match found [ 577.898321][ T6254] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 578.633982][ T6261] netlink: 24 bytes leftover after parsing attributes in process `syz.2.646'. [ 580.697911][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 580.704823][ T29] audit: type=1326 audit(580.610:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.707933][ T29] audit: type=1326 audit(580.620:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.711987][ T29] audit: type=1326 audit(580.630:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.721844][ T29] audit: type=1326 audit(580.640:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.724906][ T29] audit: type=1326 audit(580.640:1154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.726679][ T29] audit: type=1326 audit(580.640:1155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.729978][ T29] audit: type=1326 audit(580.650:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.734920][ T29] audit: type=1326 audit(580.650:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.739895][ T29] audit: type=1326 audit(580.660:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 580.748956][ T29] audit: type=1326 audit(580.660:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6279 comm="syz.2.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 581.102835][ T6284] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 581.202076][ T6284] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 581.305294][ T6284] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 581.524872][ T6284] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 581.716959][ T1107] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.743999][ T171] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.762807][ T171] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.785734][ T171] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 583.605033][ T6330] netlink: 'syz.1.662': attribute type 13 has an invalid length. [ 584.511636][ T6337] SELinux: Context system_u:object_r:pam_console_exec_t:s0 is not valid (left unmapped). [ 584.936731][ T171] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.937054][ T171] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.937404][ T171] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.937474][ T171] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.944533][ T6339] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.027408][ T6339] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.116782][ T6339] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.179960][ T6339] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.317507][ T171] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 585.352925][ T171] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 585.374789][ T171] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 585.395270][ T171] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.143127][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 586.144319][ T29] audit: type=1326 audit(586.060:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.162539][ T29] audit: type=1326 audit(586.080:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.188869][ T29] audit: type=1326 audit(586.080:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.197677][ T29] audit: type=1326 audit(586.080:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.199134][ T29] audit: type=1326 audit(586.080:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6363 comm="syz.1.670" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.350277][ T29] audit: type=1326 audit(586.260:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm=1E exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.352684][ T29] audit: type=1326 audit(586.270:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm=1E exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.364333][ T29] audit: type=1326 audit(586.270:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm=1E exe="/syz-executor" sig=0 arch=40000028 syscall=103 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.366235][ T29] audit: type=1326 audit(586.270:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6367 comm=1E exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 586.859239][ T29] audit: type=1326 audit(586.760:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6369 comm="syz.1.673" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 590.447625][ T6380] netlink: 256 bytes leftover after parsing attributes in process `syz.1.676'. [ 592.137782][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 592.138018][ T29] audit: type=1400 audit(592.050:1188): avc: denied { create } for pid=6384 comm="syz.1.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 593.331416][ T6389] netlink: 'syz.1.679': attribute type 21 has an invalid length. [ 594.837674][ T29] audit: type=1326 audit(594.750:1189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.848998][ T29] audit: type=1326 audit(594.760:1190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.859720][ T29] audit: type=1326 audit(594.770:1192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.863069][ T29] audit: type=1326 audit(594.760:1191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.901148][ T29] audit: type=1326 audit(594.820:1193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.906780][ T29] audit: type=1326 audit(594.820:1194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.909601][ T29] audit: type=1326 audit(594.820:1195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.912320][ T29] audit: type=1326 audit(594.830:1196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.927960][ T29] audit: type=1326 audit(594.840:1197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6391 comm="syz.1.680" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 597.980618][ T6402] netlink: 9 bytes leftover after parsing attributes in process `syz.1.685'. [ 597.994613][ T6402] netlink: 9 bytes leftover after parsing attributes in process `syz.1.685'. [ 599.101768][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 599.102839][ T29] audit: type=1400 audit(599.020:1217): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.110274][ T29] audit: type=1400 audit(599.020:1218): avc: denied { open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.112168][ T29] audit: type=1400 audit(599.030:1219): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.308982][ T29] audit: type=1400 audit(599.200:1220): avc: denied { read } for pid=6407 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.357364][ T29] audit: type=1400 audit(599.270:1221): avc: denied { prog_load } for pid=6407 comm="syz.1.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 599.360814][ T29] audit: type=1400 audit(599.270:1222): avc: denied { bpf } for pid=6407 comm="syz.1.688" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 599.364776][ T29] audit: type=1400 audit(599.280:1223): avc: denied { perfmon } for pid=6407 comm="syz.1.688" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 599.429496][ T29] audit: type=1400 audit(599.340:1224): avc: denied { prog_run } for pid=6407 comm="syz.1.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 599.472494][ T6408] netlink: 96 bytes leftover after parsing attributes in process `syz.1.688'. [ 599.892976][ T29] audit: type=1400 audit(599.800:1225): avc: denied { create } for pid=6409 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 599.913100][ T29] audit: type=1400 audit(599.830:1226): avc: denied { write } for pid=6409 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 605.489000][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 605.490815][ T29] audit: type=1400 audit(605.400:1239): avc: denied { create } for pid=6427 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 605.495087][ T29] audit: type=1400 audit(605.410:1240): avc: denied { ioctl } for pid=6427 comm="syz.1.697" path="socket:[9357]" dev="sockfs" ino=9357 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 605.497344][ T29] audit: type=1400 audit(605.410:1241): avc: denied { bind } for pid=6427 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 608.600765][ T29] audit: type=1400 audit(608.520:1242): avc: denied { bind } for pid=6437 comm="syz.1.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 608.602820][ T29] audit: type=1400 audit(608.520:1243): avc: denied { setopt } for pid=6437 comm="syz.1.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 609.656561][ T29] audit: type=1400 audit(609.570:1244): avc: denied { ioctl } for pid=6437 comm="syz.1.702" path="socket:[9375]" dev="sockfs" ino=9375 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 614.992673][ T29] audit: type=1326 audit(614.910:1245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 615.010330][ T29] audit: type=1326 audit(614.930:1246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 615.022327][ T29] audit: type=1326 audit(614.940:1247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132320 code=0x7ffc0000 [ 615.024219][ T29] audit: type=1326 audit(614.940:1248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 615.039515][ T29] audit: type=1326 audit(614.950:1249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=236 compat=0 ip=0x132320 code=0x7ffc0000 [ 615.041229][ T29] audit: type=1326 audit(614.960:1250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6467 comm="syz.1.706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 627.380041][ T29] audit: type=1400 audit(627.300:1251): avc: denied { create } for pid=6472 comm="syz.2.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 631.300404][ T29] audit: type=1400 audit(631.220:1252): avc: denied { create } for pid=6477 comm="syz.2.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 631.319910][ T29] audit: type=1400 audit(631.230:1253): avc: denied { write } for pid=6477 comm="syz.2.710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 631.687049][ T6481] netlink: 8 bytes leftover after parsing attributes in process `syz.1.712'. [ 632.019063][ T29] audit: type=1400 audit(631.930:1254): avc: denied { open } for pid=6486 comm="syz.1.714" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 632.033966][ T29] audit: type=1400 audit(631.950:1255): avc: denied { ioctl } for pid=6486 comm="syz.1.714" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 632.301300][ T29] audit: type=1400 audit(632.220:1256): avc: denied { write } for pid=6492 comm="syz.2.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 632.305451][ T6494] netlink: 28 bytes leftover after parsing attributes in process `syz.2.715'. [ 632.724203][ T29] audit: type=1400 audit(632.640:1257): avc: denied { create } for pid=6498 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 632.739221][ T29] audit: type=1400 audit(632.650:1258): avc: denied { setopt } for pid=6498 comm="syz.1.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 633.001702][ T6503] netlink: 16 bytes leftover after parsing attributes in process `syz.2.719'. [ 633.669638][ T29] audit: type=1400 audit(633.590:1259): avc: denied { create } for pid=6507 comm="syz.1.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 634.169458][ T29] audit: type=1326 audit(634.050:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.172756][ T29] audit: type=1326 audit(634.090:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.179321][ T29] audit: type=1326 audit(634.090:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.263672][ T29] audit: type=1326 audit(634.180:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.265070][ T29] audit: type=1326 audit(634.180:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.268270][ T29] audit: type=1326 audit(634.180:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 634.281673][ T29] audit: type=1326 audit(634.180:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6512 comm="syz.2.723" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 638.992579][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 638.994133][ T29] audit: type=1400 audit(638.910:1315): avc: denied { allowed } for pid=6540 comm="syz.2.736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 639.523616][ T29] audit: type=1400 audit(639.440:1316): avc: denied { create } for pid=6545 comm="syz.1.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 639.587523][ T29] audit: type=1400 audit(639.500:1317): avc: denied { setopt } for pid=6545 comm="syz.1.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 639.603886][ T29] audit: type=1400 audit(639.510:1318): avc: denied { bind } for pid=6545 comm="syz.1.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 639.834309][ T29] audit: type=1400 audit(639.750:1319): avc: denied { create } for pid=6548 comm="syz.2.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 639.912034][ T29] audit: type=1400 audit(639.830:1320): avc: denied { execmem } for pid=6548 comm="syz.2.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 640.813251][ T29] audit: type=1400 audit(640.730:1321): avc: denied { write } for pid=6556 comm="syz.1.744" name="protocols" dev="proc" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 640.830837][ T29] audit: type=1400 audit(640.730:1322): avc: denied { write } for pid=6556 comm="syz.1.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 640.833634][ T29] audit: type=1400 audit(640.750:1323): avc: denied { nlmsg_write } for pid=6556 comm="syz.1.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 640.874229][ T29] audit: type=1326 audit(640.790:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6556 comm="syz.1.744" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 644.480792][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 644.482562][ T29] audit: type=1400 audit(644.400:1341): avc: denied { create } for pid=6563 comm="syz.1.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 644.497431][ T29] audit: type=1400 audit(644.410:1342): avc: denied { setopt } for pid=6563 comm="syz.1.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 644.506378][ T6564] kernel profiling enabled (shift: 9) [ 645.180034][ T29] audit: type=1326 audit(645.100:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6566 comm="syz.1.748" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 645.209654][ T29] audit: type=1326 audit(645.100:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6566 comm="syz.1.748" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 645.214087][ T29] audit: type=1326 audit(645.130:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6566 comm="syz.1.748" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x132320 code=0x7ffc0000 [ 645.220676][ T29] audit: type=1326 audit(645.130:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6566 comm="syz.1.748" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 645.233257][ T29] audit: type=1326 audit(645.130:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6566 comm="syz.1.748" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 645.376622][ T6569] SELinux: policydb version 17152 does not match my version range 15-35 [ 645.377872][ T29] audit: type=1400 audit(645.290:1348): avc: denied { load_policy } for pid=6568 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 645.381279][ T6569] SELinux: failed to load policy [ 645.533896][ T29] audit: type=1400 audit(645.450:1349): avc: denied { mount } for pid=6570 comm="syz.1.750" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 645.966138][ T29] audit: type=1400 audit(645.880:1350): avc: denied { write } for pid=6575 comm="syz.1.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 648.709692][ T6592] netlink: 4 bytes leftover after parsing attributes in process `syz.1.759'. [ 648.776299][ T6592] netlink: 24 bytes leftover after parsing attributes in process `syz.1.759'. [ 649.284040][ T6594] pim6reg: entered allmulticast mode [ 649.288085][ T6594] pim6reg: left allmulticast mode [ 649.597782][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 649.633746][ T29] audit: type=1400 audit(649.510:1362): avc: denied { name_bind } for pid=6599 comm="syz.1.761" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 649.719560][ T29] audit: type=1400 audit(649.610:1363): avc: denied { node_bind } for pid=6599 comm="syz.1.761" saddr=::ffff:172.20.20.187 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 652.481762][ T29] audit: type=1326 audit(652.400:1364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.485890][ T29] audit: type=1326 audit(652.400:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.500926][ T29] audit: type=1326 audit(652.420:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.511289][ T29] audit: type=1326 audit(652.430:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.530483][ T29] audit: type=1326 audit(652.450:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.534041][ T29] audit: type=1326 audit(652.450:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.551674][ T29] audit: type=1326 audit(652.470:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 652.556285][ T29] audit: type=1326 audit(652.470:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6602 comm="syz.1.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 655.482245][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 655.483500][ T29] audit: type=1400 audit(655.400:1392): avc: denied { read } for pid=6611 comm="syz.1.766" path="socket:[8882]" dev="sockfs" ino=8882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 655.985554][ T6635] netlink: 240 bytes leftover after parsing attributes in process `syz.1.766'. [ 668.935783][ T29] audit: type=1326 audit(668.850:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 668.950027][ T29] audit: type=1326 audit(668.870:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 668.960668][ T29] audit: type=1326 audit(668.880:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132320 code=0x7ffc0000 [ 668.982817][ T29] audit: type=1326 audit(668.890:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 668.983284][ T29] audit: type=1326 audit(668.900:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6652 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 669.007603][ T29] audit: type=1326 audit(668.920:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 669.008165][ T29] audit: type=1326 audit(668.920:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=268 compat=0 ip=0x132320 code=0x7ffc0000 [ 669.019330][ T29] audit: type=1326 audit(668.920:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 669.021545][ T29] audit: type=1326 audit(668.930:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 669.023227][ T29] audit: type=1326 audit(668.930:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6650 comm="syz.2.772" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132320 code=0x7ffc0000 [ 676.729257][ T29] kauditd_printk_skb: 674 callbacks suppressed [ 676.730730][ T29] audit: type=1400 audit(676.630:2077): avc: denied { connect } for pid=6692 comm="syz.2.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 676.733298][ T29] audit: type=1400 audit(676.640:2078): avc: denied { setopt } for pid=6692 comm="syz.2.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 676.739505][ T29] audit: type=1400 audit(676.650:2079): avc: denied { write } for pid=6692 comm="syz.2.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 676.813498][ T6694] vxcan1: entered promiscuous mode [ 677.480376][ T29] audit: type=1400 audit(677.400:2080): avc: denied { execute } for pid=6700 comm="syz.2.784" name="file1" dev="tmpfs" ino=782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 677.484479][ T29] audit: type=1400 audit(677.400:2081): avc: denied { execute_no_trans } for pid=6700 comm="syz.2.784" path="/150/file1" dev="tmpfs" ino=782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 678.959827][ T6719] geneve2: entered promiscuous mode [ 679.876253][ T6730] netlink: 8 bytes leftover after parsing attributes in process `syz.2.794'. [ 682.792724][ T29] audit: type=1400 audit(682.710:2082): avc: denied { ioctl } for pid=6748 comm="syz.2.800" path="socket:[9052]" dev="sockfs" ino=9052 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 684.135982][ T6757] netlink: 4 bytes leftover after parsing attributes in process `syz.1.793'. [ 684.380263][ T6759] SELinux: failed to load policy [ 684.800926][ T6728] netlink: 164 bytes leftover after parsing attributes in process `syz.1.793'. [ 687.854988][ T6779] netlink: 92 bytes leftover after parsing attributes in process `syz.1.812'. [ 687.856137][ T6779] netlink: 32 bytes leftover after parsing attributes in process `syz.1.812'. [ 693.135972][ T29] audit: type=1400 audit(693.050:2083): avc: denied { create } for pid=6789 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 693.157702][ T29] audit: type=1400 audit(693.070:2084): avc: denied { sys_admin } for pid=6789 comm="syz.1.816" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 697.583210][ T29] audit: type=1400 audit(697.500:2085): avc: denied { mounton } for pid=6801 comm="syz.2.820" path="/176/file0" dev="tmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 697.621040][ T29] audit: type=1400 audit(697.540:2086): avc: denied { watch watch_reads } for pid=6801 comm="syz.2.820" path="/176/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 697.626732][ T29] audit: type=1400 audit(697.540:2087): avc: denied { mac_admin } for pid=6801 comm="syz.2.820" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 697.630448][ T6802] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 697.631686][ T29] audit: type=1400 audit(697.550:2088): avc: denied { relabelto } for pid=6801 comm="syz.2.820" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 697.639859][ T29] audit: type=1400 audit(697.550:2089): avc: denied { associate } for pid=6801 comm="syz.2.820" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 697.707974][ T29] audit: type=1400 audit(697.620:2090): avc: denied { unmount } for pid=5235 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 703.185194][ T29] audit: type=1326 audit(703.100:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.199894][ T29] audit: type=1326 audit(703.120:2092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=256 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.201669][ T29] audit: type=1326 audit(703.120:2093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.210833][ T29] audit: type=1326 audit(703.130:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.211824][ T29] audit: type=1326 audit(703.130:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.214818][ T29] audit: type=1326 audit(703.130:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.215132][ T29] audit: type=1326 audit(703.130:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.215203][ T29] audit: type=1326 audit(703.130:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 703.226364][ T29] audit: type=1326 audit(703.140:2099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6812 comm="syz.2.825" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 706.221039][ T29] audit: type=1400 audit(706.140:2100): avc: denied { write } for pid=6816 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 710.774144][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 710.777409][ T29] audit: type=1400 audit(710.690:2119): avc: denied { read } for pid=6834 comm="syz.1.832" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 710.780603][ T29] audit: type=1400 audit(710.690:2120): avc: denied { open } for pid=6834 comm="syz.1.832" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 712.225778][ T29] audit: type=1400 audit(712.140:2121): avc: denied { create } for pid=6842 comm="syz.1.836" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 712.234637][ T29] audit: type=1400 audit(712.140:2122): avc: denied { write } for pid=6842 comm="syz.1.836" name="file0" dev="tmpfs" ino=1970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 712.237100][ T29] audit: type=1400 audit(712.150:2123): avc: denied { open } for pid=6842 comm="syz.1.836" path="/386/file0" dev="tmpfs" ino=1970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 712.285596][ T29] audit: type=1400 audit(712.200:2124): avc: denied { unlink } for pid=3095 comm="syz-executor" name="file0" dev="tmpfs" ino=1970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 712.470182][ T6845] netlink: 24 bytes leftover after parsing attributes in process `syz.1.837'. [ 712.999117][ T29] audit: type=1326 audit(712.910:2125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6849 comm="syz.1.839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 712.999664][ T29] audit: type=1326 audit(712.920:2126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6849 comm="syz.1.839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 713.007348][ T29] audit: type=1326 audit(712.920:2127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6849 comm="syz.1.839" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 713.011917][ T29] audit: type=1326 audit(712.930:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6849 comm="syz.1.839" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x132320 code=0x7ffc0000 [ 714.141784][ T6858] pimreg: entered allmulticast mode [ 714.205553][ T6858] pimreg: left allmulticast mode [ 718.573386][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 718.581530][ T29] audit: type=1400 audit(718.490:2138): avc: denied { getopt } for pid=6876 comm="syz.2.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 719.394802][ T6885] netlink: 40 bytes leftover after parsing attributes in process `syz.2.854'. [ 719.444879][ T6885] ip6gre1: entered promiscuous mode [ 719.459255][ T6885] ip6gre1: entered allmulticast mode [ 720.232171][ T29] audit: type=1326 audit(720.150:2139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.2.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.240014][ T29] audit: type=1326 audit(720.150:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.2.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.240147][ T29] audit: type=1326 audit(720.150:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.2.855" exe="/syz-executor" sig=0 arch=40000028 syscall=300 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.276599][ T29] audit: type=1326 audit(720.190:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.2.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.281089][ T29] audit: type=1326 audit(720.200:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6888 comm="syz.2.855" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.937011][ T29] audit: type=1326 audit(720.850:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6892 comm="syz.2.857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.944091][ T29] audit: type=1326 audit(720.860:2145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6892 comm="syz.2.857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.944263][ T29] audit: type=1326 audit(720.860:2146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6892 comm="syz.2.857" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 720.945312][ T29] audit: type=1326 audit(720.860:2147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6892 comm="syz.2.857" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.481369][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 726.485418][ T29] audit: type=1326 audit(726.400:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.490435][ T29] audit: type=1326 audit(726.410:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.497788][ T29] audit: type=1326 audit(726.410:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.507387][ T29] audit: type=1326 audit(726.420:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.514694][ T29] audit: type=1326 audit(726.430:2161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.518093][ T29] audit: type=1326 audit(726.430:2162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.522511][ T29] audit: type=1326 audit(726.440:2163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.530291][ T29] audit: type=1326 audit(726.450:2164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=234 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.533482][ T29] audit: type=1326 audit(726.450:2165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 726.626891][ T29] audit: type=1326 audit(726.530:2166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6912 comm="syz.1.864" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 728.073495][ T6920] raw_sendmsg: syz.1.867 forgot to set AF_INET. Fix it! [ 730.362679][ T6940] 8<--- cut here --- [ 730.363026][ T6940] Unable to handle kernel NULL pointer dereference at virtual address 00000038 when read [ 730.363140][ T6940] [00000038] *pgd=85c39003, *pmd=df88d003 [ 730.364594][ T6940] Internal error: Oops: 205 [#1] SMP ARM [ 730.366576][ T6940] Modules linked in: [ 730.367799][ T6940] CPU: 0 UID: 0 PID: 6940 Comm: syz.1.876 Not tainted syzkaller #0 PREEMPT [ 730.368462][ T6940] Hardware name: ARM-Versatile Express [ 730.368744][ T6940] PC is at simple_xattrs_free+0x1c/0x8c [ 730.371868][ T6940] LR is at __kernfs_new_node+0x1c0/0x228 [ 730.375676][ T6940] pc : [<805a5784>] lr : [<806360e8>] psr: 60000013 [ 730.376141][ T6940] sp : dfc8dd70 ip : dfc8dd90 fp : dfc8dd8c [ 730.376482][ T6940] r10: 8309f49c r9 : 85221800 r8 : 82498a44 [ 730.376757][ T6940] r7 : 00000038 r6 : 00000000 r5 : 8309f480 r4 : 85a8a268 [ 730.377060][ T6940] r3 : 85221800 r2 : 00000000 r1 : 00000000 r0 : 00000038 [ 730.377461][ T6940] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 730.377806][ T6940] Control: 30c5387d Table: 85ff1a00 DAC: fffffffd [ 730.378136][ T6940] Register r0 information: non-paged memory [ 730.378955][ T6940] Register r1 information: NULL pointer [ 730.379218][ T6940] Register r2 information: NULL pointer [ 730.379456][ T6940] Register r3 information: slab task_struct start 85221800 pointer offset 0 size 3072 [ 730.380438][ T6940] Register r4 information: slab kernfs_node_cache start 85a8a268 pointer offset 0 size 88 [ 730.380900][ T6940] Register r5 information: slab kmalloc-192 start 8309f480 pointer offset 0 size 192 [ 730.381360][ T6940] Register r6 information: NULL pointer [ 730.381600][ T6940] Register r7 information: non-paged memory [ 730.381846][ T6940] Register r8 information: non-slab/vmalloc memory [ 730.382205][ T6940] Register r9 information: slab task_struct start 85221800 pointer offset 0 size 3072 [ 730.382633][ T6940] Register r10 information: slab kmalloc-192 start 8309f480 pointer offset 28 size 192 [ 730.383055][ T6940] Register r11 information: 2-page vmalloc region starting at 0xdfc8c000 allocated at kernel_clone+0xac/0x3ec [ 730.383592][ T6940] Register r12 information: 2-page vmalloc region starting at 0xdfc8c000 allocated at kernel_clone+0xac/0x3ec [ 730.384069][ T6940] Process syz.1.876 (pid: 6940, stack limit = 0xdfc8c000) [ 730.384386][ T6940] Stack: (0xdfc8dd70 to 0xdfc8e000) [ 730.384612][ T6940] dd60: 85a8a268 8309f480 852ba500 830a31b8 [ 730.384930][ T6940] dd80: dfc8de2c dfc8dd90 806360e8 805a5774 00000820 dfc8dda0 8309f488 00000001 [ 730.385262][ T6940] dda0: 00000079 00004000 00000000 ffffffff 60000013 83fee480 824986c8 deffc538 [ 730.385583][ T6940] ddc0: 83fee480 a40d96c4 0000d6c4 00000008 dfc8de6c dfc8dde0 804b74a0 804b5ed8 [ 730.385904][ T6940] dde0: 807ae09c 83001240 84c89408 00000dc0 00000000 0000001c dfc8de14 351512e5 [ 730.386264][ T6940] de00: 8053a368 830a31b8 00004000 00000000 00000001 00000000 8363913c 8309f480 [ 730.386934][ T6940] de20: dfc8de6c dfc8de30 80637bbc 80635f34 00000000 00000000 00000001 351512e5 [ 730.388333][ T6940] de40: 00000000 828fa180 830a31b8 830a31b8 8363913c 00000000 00000000 84c89408 [ 730.388928][ T6940] de60: dfc8de8c dfc8de70 80638104 80637b48 00000000 00000001 828fa180 84c89400 [ 730.389440][ T6940] de80: dfc8dedc dfc8de90 803613c4 806380e4 00000000 84c89400 00000000 351512e5 [ 730.394681][ T6940] dea0: 00000002 855856c0 828fa140 00000000 8291fa94 830a31b8 828fa090 83639110 [ 730.398959][ T6940] dec0: 00000000 85221800 00000000 00000000 dfc8defc dfc8dee0 80637adc 803612ac [ 730.399526][ T6940] dee0: 855856c0 80637a70 83639110 8291fa94 dfc8df44 dfc8df00 8057b868 80637a7c [ 730.400358][ T6940] df00: ffffff9c 85a05790 83639110 351512e5 00000000 00000000 dfc8df44 83639110 [ 730.400734][ T6940] df20: 00000000 83220000 00000000 ffffff9c 85221800 00000002 dfc8df8c dfc8df48 [ 730.401088][ T6940] df40: 8058222c 8057b658 dfc8df50 8099f7d0 00000000 85a05790 85709aa0 351512e5 [ 730.401442][ T6940] df60: 8020029c 00000000 00000000 0031630c 00000027 8020029c 85221800 00000027 [ 730.401793][ T6940] df80: dfc8dfa4 dfc8df90 805822e8 805820b4 00000000 00000000 00000000 dfc8dfa8 [ 730.402139][ T6940] dfa0: 80200060 805822cc 00000000 00000000 20000000 00000000 00000000 00000000 [ 730.402502][ T6940] dfc0: 00000000 00000000 0031630c 00000027 00300000 00000000 00006364 76f990bc [ 730.402847][ T6940] dfe0: 76f98ec0 76f98eb0 0001929c 00132320 60000010 20000000 00000000 00000000 [ 730.403221][ T6940] Call trace: [ 730.403466][ T6940] [<805a5768>] (simple_xattrs_free) from [<806360e8>] (__kernfs_new_node+0x1c0/0x228) [ 730.403941][ T6940] r7:830a31b8 r6:852ba500 r5:8309f480 r4:85a8a268 [ 730.404210][ T6940] [<80635f28>] (__kernfs_new_node) from [<80637bbc>] (kernfs_new_node+0x80/0xa4) [ 730.404865][ T6940] r10:8309f480 r9:8363913c r8:00000000 r7:00000001 r6:00000000 r5:00004000 [ 730.405192][ T6940] r4:830a31b8 [ 730.405355][ T6940] [<80637b3c>] (kernfs_new_node) from [<80638104>] (kernfs_create_dir_ns+0x2c/0x80) [ 730.405745][ T6940] r10:84c89408 r9:00000000 r8:00000000 r7:8363913c r6:830a31b8 r5:830a31b8 [ 730.406063][ T6940] r4:828fa180 [ 730.406236][ T6940] [<806380d8>] (kernfs_create_dir_ns) from [<803613c4>] (cgroup_mkdir+0x124/0x52c) [ 730.406634][ T6940] r5:84c89400 r4:828fa180 [ 730.406826][ T6940] [<803612a0>] (cgroup_mkdir) from [<80637adc>] (kernfs_iop_mkdir+0x6c/0x90) [ 730.407216][ T6940] r10:00000000 r9:00000000 r8:85221800 r7:00000000 r6:83639110 r5:828fa090 [ 730.407538][ T6940] r4:830a31b8 [ 730.407732][ T6940] [<80637a70>] (kernfs_iop_mkdir) from [<8057b868>] (vfs_mkdir+0x21c/0x2fc) [ 730.408158][ T6940] r7:8291fa94 r6:83639110 r5:80637a70 r4:855856c0 [ 730.408684][ T6940] [<8057b64c>] (vfs_mkdir) from [<8058222c>] (do_mkdirat+0x184/0x1e0) [ 730.409365][ T6940] r10:00000002 r9:85221800 r8:ffffff9c r7:00000000 r6:83220000 r5:00000000 [ 730.410161][ T6940] r4:83639110 [ 730.410440][ T6940] [<805820a8>] (do_mkdirat) from [<805822e8>] (sys_mkdir+0x28/0x2c) [ 730.411232][ T6940] r10:00000027 r9:85221800 r8:8020029c r7:00000027 r6:0031630c r5:00000000 [ 730.417272][ T6940] r4:00000000 [ 730.418611][ T6940] [<805822c0>] (sys_mkdir) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 730.419215][ T6940] Exception stack(0xdfc8dfa8 to 0xdfc8dff0) [ 730.419583][ T6940] dfa0: 00000000 00000000 20000000 00000000 00000000 00000000 [ 730.419967][ T6940] dfc0: 00000000 00000000 0031630c 00000027 00300000 00000000 00006364 76f990bc [ 730.420321][ T6940] dfe0: 76f98ec0 76f98eb0 0001929c 00132320 [ 730.420594][ T6940] r5:00000000 r4:00000000 [ 730.421086][ T6940] Code: e2516000 e1a07000 13a03000 15863000 (e5903000) [ 730.430326][ T6940] ---[ end trace 0000000000000000 ]--- [ 730.479929][ T6940] Kernel panic - not syncing: Fatal exception [ 730.482610][ T6940] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:51:07 Registers: info registers vcpu 0 CPU#0 R00=85221800 R01=00000000 R02=00000000 R03=85221800 R04=828f533c R05=828f5340 R06=82291b30 R07=60000113 R08=82a7b45c R09=8281d178 R10=85221800 R11=dfc8dc04 R12=dfc8dbc8 R13=dfc8dbc8 R14=80205c70 R15=80205c8c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=200790d4 R01=7effffff R02=00000000 R03=b5403587 R04=e03cdee0 R05=200790c0 R06=b5003500 R07=00000000 R08=00000000 R09=00000002 R10=e03cdd4c R11=e03cddfc R12=a10790db R13=e03cdd40 R14=81596858 R15=8159687c PSR=60000013 -ZC- A S svc32 s00=7ec02928 s01=76f19150 d00=76f191507ec02928 s02=00000001 s03=76f0da88 d01=76f0da8800000001 s04=fffc0100 s05=fffc0100 d02=fffc0100fffc0100 s06=00000001 s07=00000000 d03=0000000000000001 s08=c0300c00 s09=c0300c03 d04=c0300c03c0300c00 s10=08040201 s11=80402010 d05=8040201008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000