last executing test programs: 16.65025644s ago: executing program 1 (id=354): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x9, 0x3, 0x8, 0x4, 0x2}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x100000011, @multicast2, 0x0, 0x0, 'lblcr\x00', 0x15, 0x88, 0xc000067}, 0x2c) 12.726239678s ago: executing program 1 (id=359): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000019400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r3, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) 11.014429306s ago: executing program 0 (id=361): r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000004780)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="14"], 0x18}}], 0x1, 0x0) 10.582954363s ago: executing program 0 (id=362): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1e, 0x12, r0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x40201) ioctl$SNDRV_TIMER_IOCTL_TREAD64(r2, 0x400454a4, 0x0) socket(0x2, 0xa, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x5) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}], 0x1}, 0x40) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="000000f50203e200fcff02008106bbbbbbbb006058a86e0700a1c04cf5e4402a964fb1b45d9d4465301b532c020000003efa4982432ae6a5362637bc82fa2e0f7192ac83822ced16f88804868200"/91], 0x68) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) add_key(0x0, &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 9.780349656s ago: executing program 0 (id=363): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2f00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000006000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000005e00679a3601ffc4"], 0x1c}}, 0x0) 9.779900876s ago: executing program 1 (id=364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00', 0x3}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 8.883742682s ago: executing program 1 (id=365): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a1c000000090a0104000000e4ff0000000a000004080005400000002b14000000110001feffffffffffffff000100000a58031f0ad64a69ae"], 0x44}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000440)=ANY=[@ANYBLOB="011785056c4ae6c6fbc93a0f1c5e7f620092eb6b424d32b2d70bf1d33c75637bfe16814aa37b419a6aae9c88d0f0c6dc81b3116b41842801f1ad6b6b9cd1dbefc0293e856cdf92b6e4b1fb1c30daf37e34dba2da195d8d7fe204a94e68652c39f7bfbc81e83724223bd31cd874600f843829f4f8bf346d0560d0"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x30, 0x2, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x0, 0x0, 0x89}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}]}, 0x30}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f300000"], 0xd4}}, 0x4000010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0xd, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = dup(r3) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r5, {0x8}}, './file0\x00'}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) r8 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r8, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_xfrm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=@newsa={0xfc, 0x10, 0x713, 0x0, 0x25dfdbfc, {{@in6=@rand_addr=' \x01\x00', @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x4e21, 0x2, 0x0, 0x0, 0x0, 0x6c, 0x0, 0xee00}, {@in6=@private1, 0xfe, 0x32}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9, 0xffffffff00000001, 0x0, 0x80000001, 0x543}, {0x4, 0x7fff7fffffffffff, 0x0, 0x1}, {}, 0x70bd2c, 0x3500, 0xa, 0x0, 0x0, 0x50}, [@offload={0xc, 0x1c, {r9, 0x3}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x880}, 0x2000) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000400)={'ip6tnl0\x00', &(0x7f0000000380)={'syztnl2\x00', r9, 0x29, 0x2, 0x2, 0x9, 0x30, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x47, 0x8000, 0x2, 0xfffff801}}) 6.111682194s ago: executing program 1 (id=366): socket$inet6_mptcp(0xa, 0x1, 0x106) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r0}, 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00304, 0x17) 5.176175681s ago: executing program 0 (id=367): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='+}[@\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r2, {0x0, 0x1}, {0xffff, 0xffff}, {0xc}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x4, 0x0, 0x6, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x1, 0x0, 0x10000202, 0xfff, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x272, 0xb, 0x0, 0x9, 0x3, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffa3, 0x2, 0x7, 0x4, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x10001, 0xfffffffc, 0x3, 0x0, 0x7, 0x0, 0xb97, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x10, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0xfffffffd, 0x3ff, 0x0, 0x80003, 0x0, 0x0, 0x1, 0x0, 0x400, 0x0, 0x0, 0xffffffff, 0x40, 0x0, 0xfffffffd, 0x0, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x81, 0x20, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0xffff, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x440000, 0x0, 0x2, 0x800000, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xae, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x2, 0x0, 0x0, 0x100001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x0, 0x6, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff, 0x0, 0x0, 0x0, 0x0, 0x8d4}, 0x0, 0x7f}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 2.435900061s ago: executing program 1 (id=368): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a9a4850000000400000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) 2.21827616s ago: executing program 0 (id=369): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000019400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') pread64(r3, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) 0s ago: executing program 0 (id=370): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)='%+9llu \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r0}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x2000002, 0xe, 0x20, &(0x7f0000000200)="df33c9f7b9a60000000000002000", 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bea100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x9}, 0x10, 0xffffffffffffffff, r4, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a603f00000000000500000014000500200100000000000000000100000000001c00090008000000", @ANYRES32=r3], 0x4c}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:10945' (ED25519) to the list of known hosts. [ 267.608951][ T30] audit: type=1400 audit(267.010:46): avc: denied { name_bind } for pid=3318 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 268.386991][ T30] audit: type=1400 audit(267.790:47): avc: denied { execute } for pid=3319 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 268.407434][ T30] audit: type=1400 audit(267.810:48): avc: denied { execute_no_trans } for pid=3319 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 278.007745][ T30] audit: type=1400 audit(277.410:49): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 278.028098][ T30] audit: type=1400 audit(277.430:50): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 278.093821][ T3319] cgroup: Unknown subsys name 'net' [ 278.134822][ T30] audit: type=1400 audit(277.540:51): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 278.504709][ T3319] cgroup: Unknown subsys name 'cpuset' [ 278.585914][ T3319] cgroup: Unknown subsys name 'rlimit' [ 278.978162][ T30] audit: type=1400 audit(278.380:52): avc: denied { setattr } for pid=3319 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 278.984823][ T30] audit: type=1400 audit(278.390:53): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 278.996158][ T30] audit: type=1400 audit(278.390:54): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 279.938721][ T3321] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 279.946654][ T30] audit: type=1400 audit(279.350:55): avc: denied { relabelto } for pid=3321 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.956951][ T30] audit: type=1400 audit(279.360:56): avc: denied { write } for pid=3321 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 280.056987][ T30] audit: type=1400 audit(279.460:57): avc: denied { read } for pid=3319 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 280.071339][ T30] audit: type=1400 audit(279.460:58): avc: denied { open } for pid=3319 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 280.112312][ T3319] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 298.961365][ T30] audit: type=1400 audit(298.350:59): avc: denied { execmem } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 299.045577][ T30] audit: type=1400 audit(298.450:60): avc: denied { read } for pid=3324 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 299.061032][ T30] audit: type=1400 audit(298.460:61): avc: denied { open } for pid=3324 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 299.103245][ T30] audit: type=1400 audit(298.510:62): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 299.247326][ T30] audit: type=1400 audit(298.650:63): avc: denied { module_request } for pid=3324 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 299.565685][ T30] audit: type=1400 audit(298.970:64): avc: denied { sys_module } for pid=3324 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 309.713562][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 309.745038][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.658467][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 310.717244][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.107716][ T3325] hsr_slave_0: entered promiscuous mode [ 314.129990][ T3325] hsr_slave_1: entered promiscuous mode [ 315.495593][ T3324] hsr_slave_0: entered promiscuous mode [ 315.513340][ T3324] hsr_slave_1: entered promiscuous mode [ 315.525834][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 315.528177][ T3324] Cannot create hsr debugfs directory [ 317.973290][ T30] audit: type=1400 audit(317.380:65): avc: denied { create } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 317.984571][ T30] audit: type=1400 audit(317.390:66): avc: denied { write } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 318.005973][ T30] audit: type=1400 audit(317.410:67): avc: denied { read } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 318.076232][ T3325] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 318.377537][ T3325] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 318.526147][ T3325] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 318.708112][ T3325] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 319.043882][ T3324] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 319.160912][ T3324] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 319.211279][ T3324] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 319.332582][ T3324] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 323.776677][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 323.868537][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.435272][ T3324] veth0_vlan: entered promiscuous mode [ 340.628871][ T3324] veth1_vlan: entered promiscuous mode [ 341.080777][ T3325] veth0_vlan: entered promiscuous mode [ 341.324535][ T3325] veth1_vlan: entered promiscuous mode [ 341.595695][ T3324] veth0_macvtap: entered promiscuous mode [ 341.694499][ T3324] veth1_macvtap: entered promiscuous mode [ 342.335797][ T3325] veth0_macvtap: entered promiscuous mode [ 342.494499][ T93] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.541973][ T93] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.543045][ T93] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.543475][ T93] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.573403][ T3325] veth1_macvtap: entered promiscuous mode [ 343.574831][ T30] audit: type=1400 audit(342.980:68): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 343.595442][ T30] audit: type=1400 audit(343.000:69): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.w8tAqE/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 343.635561][ T30] audit: type=1400 audit(343.040:70): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 343.673037][ T30] audit: type=1400 audit(343.070:71): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.w8tAqE/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 343.674075][ T30] audit: type=1400 audit(343.080:72): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.w8tAqE/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2939 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 343.726198][ T30] audit: type=1400 audit(343.130:73): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 343.792726][ T30] audit: type=1400 audit(343.200:74): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 343.821454][ T30] audit: type=1400 audit(343.220:75): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="gadgetfs" ino=2941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 343.858342][ T93] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.872214][ T1588] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.873052][ T1588] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.873372][ T1588] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.893844][ T30] audit: type=1400 audit(343.300:76): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 343.902420][ T30] audit: type=1400 audit(343.310:77): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 344.266256][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 348.614799][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 348.621123][ T30] audit: type=1400 audit(348.020:87): avc: denied { create } for pid=3475 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.658564][ T30] audit: type=1400 audit(348.060:88): avc: denied { write } for pid=3475 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.678006][ T30] audit: type=1400 audit(348.080:89): avc: denied { nlmsg_write } for pid=3475 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.707945][ T3476] netlink: 100 bytes leftover after parsing attributes in process `syz.0.3'. [ 349.045661][ T3477] SELinux: Context @ is not valid (left unmapped). [ 349.068555][ T30] audit: type=1400 audit(348.470:90): avc: denied { relabelto } for pid=3473 comm="syz.1.2" name="cgroup.controllers" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="@" [ 349.132071][ T30] audit: type=1400 audit(348.470:91): avc: denied { associate } for pid=3473 comm="syz.1.2" name="cgroup.controllers" dev="tmpfs" ino=18 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="@" [ 349.528209][ T30] audit: type=1400 audit(348.930:92): avc: denied { map_create } for pid=3478 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 349.552534][ T30] audit: type=1400 audit(348.950:93): avc: denied { map_read map_write } for pid=3478 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 352.235740][ T3487] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 353.534740][ T30] audit: type=1326 audit(352.940:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.567657][ T30] audit: type=1326 audit(352.970:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.620834][ T30] audit: type=1326 audit(353.010:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.625062][ T30] audit: type=1326 audit(353.030:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.662975][ T30] audit: type=1326 audit(353.050:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.673805][ T30] audit: type=1326 audit(353.080:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.674438][ T30] audit: type=1326 audit(353.080:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.694910][ T30] audit: type=1326 audit(353.100:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.706414][ T30] audit: type=1326 audit(353.110:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 353.743463][ T30] audit: type=1326 audit(353.140:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8e95a594 code=0x7ffc0000 [ 353.769931][ T30] audit: type=1400 audit(353.170:104): avc: denied { write } for pid=3494 comm="syz.1.12" name="ip_mr_vif" dev="proc" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 353.792129][ T30] audit: type=1326 audit(353.190:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3494 comm="syz.1.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8e95a594 code=0x7ffc0000 [ 357.784427][ T3510] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 358.770322][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 358.771493][ T30] audit: type=1400 audit(358.170:113): avc: denied { create } for pid=3512 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.911731][ T30] audit: type=1400 audit(358.300:114): avc: denied { setopt } for pid=3512 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 359.082427][ T30] audit: type=1400 audit(358.480:115): avc: denied { allowed } for pid=3512 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 359.164243][ T30] audit: type=1400 audit(358.560:116): avc: denied { create } for pid=3512 comm="syz.1.18" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.236125][ T30] audit: type=1400 audit(358.640:117): avc: denied { map } for pid=3512 comm="syz.1.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3056 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.272941][ T30] audit: type=1400 audit(358.670:118): avc: denied { read write } for pid=3512 comm="syz.1.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3056 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 360.874079][ T30] audit: type=1400 audit(360.260:119): avc: denied { execute } for pid=3516 comm="syz.1.19" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=3065 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 360.998535][ T30] audit: type=1400 audit(360.400:120): avc: denied { create } for pid=3516 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.051028][ T30] audit: type=1400 audit(360.450:121): avc: denied { bind } for pid=3516 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 361.144505][ T30] audit: type=1400 audit(360.550:122): avc: denied { write } for pid=3516 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 363.658700][ T3527] netlink: 56 bytes leftover after parsing attributes in process `syz.1.24'. [ 368.398580][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 368.411415][ T30] audit: type=1400 audit(367.800:129): avc: denied { connect } for pid=3533 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 369.216870][ T30] audit: type=1400 audit(368.620:130): avc: denied { setopt } for pid=3533 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 376.193456][ T30] audit: type=1400 audit(375.570:131): avc: denied { mount } for pid=3540 comm="syz.0.29" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 377.247397][ T3548] netlink: 96 bytes leftover after parsing attributes in process `syz.0.31'. [ 379.416737][ T30] audit: type=1400 audit(378.820:132): avc: denied { block_suspend } for pid=3556 comm="syz.0.35" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 386.422441][ T3567] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'. [ 386.516991][ T30] audit: type=1400 audit(385.920:133): avc: denied { ioctl } for pid=3566 comm="syz.1.37" path="socket:[4207]" dev="sockfs" ino=4207 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 390.044676][ T30] audit: type=1400 audit(389.450:134): avc: denied { bind } for pid=3574 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 390.057229][ T30] audit: type=1400 audit(389.460:135): avc: denied { setopt } for pid=3574 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 390.628578][ T3575] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 391.333927][ T3575] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.017892][ T3575] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.461846][ T3575] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.938522][ T41] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.176900][ T26] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.381390][ T26] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.507162][ T1588] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.947746][ T30] audit: type=1400 audit(393.350:136): avc: denied { create } for pid=3581 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 393.993929][ T30] audit: type=1400 audit(393.380:137): avc: denied { write } for pid=3581 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 395.459850][ T30] audit: type=1400 audit(394.860:138): avc: denied { prog_run } for pid=3586 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 395.522295][ T3588] Driver unsupported XDP return value 0 on prog (id 1) dev N/A, expect packet loss! [ 395.581416][ T30] audit: type=1400 audit(394.950:139): avc: denied { load_policy } for pid=3585 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 395.626910][ T3587] SELinux: ebitmap: map size 0 does not match my size 64 (high bit was 0) [ 395.703538][ T3587] SELinux: failed to load policy [ 397.291112][ T30] audit: type=1400 audit(396.690:140): avc: denied { mounton } for pid=3594 comm="syz.0.48" path=2F32342FE91F7189591E9233614B dev="tmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 398.835755][ T30] audit: type=1400 audit(398.240:141): avc: denied { create } for pid=3599 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 400.557121][ T3600] netlink: 'syz.0.50': attribute type 4 has an invalid length. [ 404.556361][ T3611] netlink: 8 bytes leftover after parsing attributes in process `syz.0.53'. [ 405.286311][ T3613] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3613 comm=syz.0.54 [ 405.294211][ T3613] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3613 comm=syz.0.54 [ 409.054913][ T30] audit: type=1400 audit(408.460:142): avc: denied { write } for pid=3625 comm="syz.0.60" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 409.583937][ T30] audit: type=1400 audit(408.990:143): avc: denied { create } for pid=3627 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 409.602604][ T30] audit: type=1400 audit(409.010:144): avc: denied { setopt } for pid=3627 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 409.625690][ T30] audit: type=1400 audit(409.020:145): avc: denied { connect } for pid=3627 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 410.102510][ T3630] netlink: 28 bytes leftover after parsing attributes in process `syz.0.62'. [ 410.103048][ T3630] netlink: 196 bytes leftover after parsing attributes in process `syz.0.62'. [ 410.171599][ T3630] netlink: 28 bytes leftover after parsing attributes in process `syz.0.62'. [ 410.183595][ T3630] netlink: 196 bytes leftover after parsing attributes in process `syz.0.62'. [ 410.604278][ T30] audit: type=1400 audit(410.000:146): avc: denied { write } for pid=3631 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 410.816321][ T30] audit: type=1400 audit(410.220:147): avc: denied { create } for pid=3633 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 410.845095][ T30] audit: type=1400 audit(410.230:148): avc: denied { bind } for pid=3633 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 410.869746][ T30] audit: type=1400 audit(410.270:149): avc: denied { create } for pid=3633 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 411.274249][ T30] audit: type=1400 audit(410.680:150): avc: denied { ioctl } for pid=3636 comm="syz.1.65" path="socket:[5343]" dev="sockfs" ino=5343 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 411.298432][ T30] audit: type=1400 audit(410.700:151): avc: denied { write } for pid=3636 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 415.271999][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 415.272951][ T30] audit: type=1400 audit(414.670:155): avc: denied { create } for pid=3650 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 415.338011][ T30] audit: type=1400 audit(414.740:156): avc: denied { prog_load } for pid=3650 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 415.377969][ T30] audit: type=1400 audit(414.780:157): avc: denied { bpf } for pid=3650 comm="syz.0.71" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.392136][ T30] audit: type=1400 audit(414.790:158): avc: denied { perfmon } for pid=3650 comm="syz.0.71" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 415.510311][ T30] audit: type=1400 audit(414.910:159): avc: denied { write } for pid=3650 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 415.533589][ T30] audit: type=1400 audit(414.940:160): avc: denied { module_request } for pid=3650 comm="syz.0.71" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 416.391989][ T30] audit: type=1400 audit(415.790:161): avc: denied { read write } for pid=3325 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 416.414707][ T30] audit: type=1400 audit(415.820:162): avc: denied { open } for pid=3325 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 416.442508][ T30] audit: type=1400 audit(415.830:163): avc: denied { ioctl } for pid=3325 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 417.280302][ T30] audit: type=1400 audit(416.680:164): avc: denied { allowed } for pid=3657 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 421.143869][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 421.146447][ T30] audit: type=1326 audit(420.550:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.171352][ T30] audit: type=1326 audit(420.580:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.177664][ T30] audit: type=1326 audit(420.580:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.190498][ T30] audit: type=1400 audit(420.590:170): avc: denied { map_create } for pid=3665 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.257092][ T30] audit: type=1400 audit(420.640:171): avc: denied { map_read map_write } for pid=3665 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.258069][ T30] audit: type=1326 audit(420.660:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.267251][ T30] audit: type=1326 audit(420.670:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.291931][ T30] audit: type=1326 audit(420.690:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.300428][ T30] audit: type=1326 audit(420.700:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 421.310284][ T30] audit: type=1326 audit(420.710:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3665 comm="syz.1.76" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 424.908313][ T3675] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 427.120753][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 427.124132][ T30] audit: type=1400 audit(426.520:201): avc: denied { create } for pid=3687 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 427.162024][ T30] audit: type=1400 audit(426.550:202): avc: denied { create } for pid=3687 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 428.351696][ T30] audit: type=1400 audit(427.750:203): avc: denied { write } for pid=3693 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 430.090823][ T30] audit: type=1400 audit(429.490:204): avc: denied { sys_module } for pid=3700 comm="syz.1.90" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 433.293335][ T30] audit: type=1400 audit(432.700:205): avc: denied { connect } for pid=3709 comm="syz.1.94" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 433.390165][ T30] audit: type=1400 audit(432.790:206): avc: denied { write } for pid=3709 comm="syz.1.94" path="socket:[4549]" dev="sockfs" ino=4549 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 434.385734][ T30] audit: type=1400 audit(433.790:207): avc: denied { create } for pid=3711 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 434.445681][ T30] audit: type=1400 audit(433.850:208): avc: denied { write } for pid=3711 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 434.873146][ T30] audit: type=1400 audit(434.280:209): avc: denied { write } for pid=3715 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 435.071756][ T3719] netlink: 12 bytes leftover after parsing attributes in process `syz.1.98'. [ 435.163597][ T3719] vlan2: entered promiscuous mode [ 435.170788][ T3719] gretap0: entered promiscuous mode [ 435.436561][ T30] audit: type=1400 audit(434.840:210): avc: denied { ioctl } for pid=3715 comm="syz.0.97" path="socket:[5459]" dev="sockfs" ino=5459 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 435.614100][ T30] audit: type=1400 audit(435.020:211): avc: denied { read } for pid=3715 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 436.063339][ T30] audit: type=1400 audit(435.460:212): avc: denied { create } for pid=3722 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 436.640585][ T30] audit: type=1400 audit(436.040:213): avc: denied { execmem } for pid=3722 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 443.371984][ T3733] netlink: 44 bytes leftover after parsing attributes in process `syz.0.101'. [ 443.374064][ T3733] netlink: 64 bytes leftover after parsing attributes in process `syz.0.101'. [ 443.606923][ T3736] netlink: 92 bytes leftover after parsing attributes in process `syz.0.102'. [ 444.086892][ T3738] netlink: 28 bytes leftover after parsing attributes in process `syz.0.103'. [ 444.087966][ T3738] netem: change failed [ 444.553907][ T30] audit: type=1400 audit(443.960:214): avc: denied { setcheckreqprot } for pid=3739 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 451.885874][ T30] audit: type=1326 audit(451.290:215): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 451.901387][ T30] audit: type=1326 audit(451.300:216): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 451.945469][ T30] audit: type=1326 audit(451.350:217): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 451.990763][ T30] audit: type=1326 audit(451.390:218): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 451.998059][ T30] audit: type=1326 audit(451.400:219): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 452.015367][ T30] audit: type=1400 audit(451.420:220): avc: denied { read write } for pid=3747 comm="syz.0.108" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 452.084940][ T30] audit: type=1400 audit(451.460:221): avc: denied { open } for pid=3747 comm="syz.0.108" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 452.095608][ T30] audit: type=1326 audit(451.490:222): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 452.142467][ T30] audit: type=1326 audit(451.540:223): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 452.157126][ T30] audit: type=1326 audit(451.550:224): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3747 comm="syz.0.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 452.587880][ T3748] pim6reg: entered allmulticast mode [ 452.634909][ T3748] pim6reg: left allmulticast mode [ 456.918278][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 456.931832][ T30] audit: type=1400 audit(456.320:249): avc: denied { create } for pid=3768 comm="syz.0.113" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 456.952067][ T30] audit: type=1326 audit(456.350:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 456.953108][ T30] audit: type=1326 audit(456.350:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 456.974838][ T30] audit: type=1326 audit(456.360:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 456.975864][ T30] audit: type=1326 audit(456.370:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 456.976262][ T30] audit: type=1326 audit(456.370:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 457.006818][ T30] audit: type=1326 audit(456.400:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 457.025904][ T30] audit: type=1326 audit(456.430:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 457.052226][ T30] audit: type=1326 audit(456.450:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 457.075687][ T30] audit: type=1326 audit(456.470:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3768 comm="syz.0.113" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 457.782957][ T3773] SELinux: Context system_u:object_r:inetd_exec_t:s0 is not valid (left unmapped). [ 460.227488][ T3784] SELinux: ebitmap: truncated map [ 460.763647][ T3784] SELinux: failed to load policy [ 467.694911][ T3808] netlink: 48 bytes leftover after parsing attributes in process `syz.0.129'. [ 471.950715][ T30] kauditd_printk_skb: 51 callbacks suppressed [ 471.951300][ T30] audit: type=1400 audit(471.350:310): avc: denied { kexec_image_load } for pid=3821 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 473.003079][ T30] audit: type=1400 audit(472.400:311): avc: denied { create } for pid=3825 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 474.427360][ T3830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3830 comm=syz.1.138 [ 476.147058][ T3836] capability: warning: `syz.1.141' uses deprecated v2 capabilities in a way that may be insecure [ 477.467015][ T30] audit: type=1400 audit(476.870:312): avc: denied { ioctl } for pid=3840 comm="syz.0.143" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 478.286288][ T3413] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 478.600985][ T3413] usb 1-1: unable to get BOS descriptor or descriptor too short [ 478.627698][ T3413] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 478.633411][ T3413] usb 1-1: can't read configurations, error -71 [ 479.457352][ T30] audit: type=1326 audit(478.860:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3845 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 479.530977][ T30] audit: type=1326 audit(478.930:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3845 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=163 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 479.532053][ T30] audit: type=1326 audit(478.930:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3845 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 479.566588][ T30] audit: type=1326 audit(478.970:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3845 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 480.661388][ T3852] netlink: 'syz.0.146': attribute type 10 has an invalid length. [ 481.517622][ T30] audit: type=1326 audit(480.920:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.1.148" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 481.535472][ T30] audit: type=1326 audit(480.940:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.1.148" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 481.536805][ T30] audit: type=1326 audit(480.940:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.1.148" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 481.576685][ T30] audit: type=1326 audit(480.980:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.1.148" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 481.630984][ T30] audit: type=1326 audit(481.020:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3854 comm="syz.1.148" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 482.743184][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 482.744093][ T30] audit: type=1326 audit(482.130:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.744604][ T30] audit: type=1326 audit(482.150:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.787355][ T30] audit: type=1326 audit(482.190:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.800523][ T30] audit: type=1326 audit(482.200:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.847492][ T30] audit: type=1326 audit(482.250:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.867047][ T30] audit: type=1326 audit(482.270:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.910112][ T30] audit: type=1326 audit(482.310:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=264 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.947308][ T30] audit: type=1326 audit(482.340:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 482.961763][ T30] audit: type=1326 audit(482.360:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3858 comm="syz.0.150" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 484.000581][ T30] audit: type=1326 audit(483.320:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.1.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 488.517330][ T3873] SELinux: Context system_u:object_r:random_device_t:s0 is not valid (left unmapped). [ 488.532930][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 488.533296][ T30] audit: type=1400 audit(487.920:382): avc: denied { relabelto } for pid=3871 comm="syz.1.156" name="file0" dev="tmpfs" ino=442 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:random_device_t:s0" [ 488.556174][ T30] audit: type=1400 audit(487.930:383): avc: denied { associate } for pid=3871 comm="syz.1.156" name="file0" dev="tmpfs" ino=442 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:random_device_t:s0" [ 493.099977][ T30] audit: type=1326 audit(492.500:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 493.116621][ T30] audit: type=1326 audit(492.520:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=186 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 493.157588][ T30] audit: type=1326 audit(492.560:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 493.201386][ T30] audit: type=1326 audit(492.590:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3877 comm="syz.1.158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.873456][ T30] audit: type=1326 audit(496.280:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.883701][ T30] audit: type=1326 audit(496.290:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.890812][ T30] audit: type=1326 audit(496.290:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.902620][ T30] audit: type=1326 audit(496.300:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.906727][ T30] audit: type=1326 audit(496.310:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.912641][ T30] audit: type=1326 audit(496.310:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.924152][ T30] audit: type=1326 audit(496.330:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.934687][ T30] audit: type=1326 audit(496.340:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.951015][ T30] audit: type=1326 audit(496.350:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 496.957462][ T30] audit: type=1326 audit(496.350:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.162" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 500.401845][ T3907] netlink: 132 bytes leftover after parsing attributes in process `syz.1.170'. [ 501.890150][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 501.896754][ T30] audit: type=1326 audit(501.280:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=426 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 501.902815][ T30] audit: type=1326 audit(501.300:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 501.934653][ T30] audit: type=1326 audit(501.300:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=261 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 501.935799][ T30] audit: type=1326 audit(501.340:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.1.174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 501.956554][ T30] audit: type=1326 audit(501.340:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 501.990422][ T30] audit: type=1326 audit(501.380:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.1.174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=84 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 501.991533][ T30] audit: type=1326 audit(501.380:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 502.011916][ T30] audit: type=1326 audit(501.410:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=194 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 502.013009][ T30] audit: type=1326 audit(501.400:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.1.174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 502.081258][ T30] audit: type=1326 audit(501.480:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.0.173" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 505.172926][ T3926] netlink: 28 bytes leftover after parsing attributes in process `syz.0.179'. [ 505.189970][ T3926] netlink: 196 bytes leftover after parsing attributes in process `syz.0.179'. [ 505.192060][ T3926] netlink: 28 bytes leftover after parsing attributes in process `syz.0.179'. [ 505.192579][ T3926] netlink: 196 bytes leftover after parsing attributes in process `syz.0.179'. [ 506.775441][ T3932] netlink: 'syz.1.182': attribute type 7 has an invalid length. [ 509.926491][ T30] kauditd_printk_skb: 176 callbacks suppressed [ 509.927409][ T30] audit: type=1400 audit(509.330:602): avc: denied { create } for pid=3936 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 509.985526][ T30] audit: type=1400 audit(509.390:603): avc: denied { ioctl } for pid=3936 comm="syz.1.184" path="socket:[4886]" dev="sockfs" ino=4886 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.016636][ T30] audit: type=1400 audit(509.420:604): avc: denied { bind } for pid=3936 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.070067][ T30] audit: type=1400 audit(509.470:605): avc: denied { write } for pid=3936 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 510.120576][ T30] audit: type=1400 audit(509.520:606): avc: denied { read } for pid=3936 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 512.346437][ T30] audit: type=1400 audit(511.750:607): avc: denied { execute } for pid=3928 comm="syz.0.181" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=4890 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 514.286550][ T30] audit: type=1400 audit(513.690:608): avc: denied { open } for pid=3948 comm="syz.1.189" path="/dev/ttyq7" dev="devtmpfs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 522.902735][ T3972] mmap: syz.1.197 (3972) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 525.698139][ T30] audit: type=1400 audit(525.100:609): avc: denied { create } for pid=3978 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 526.550621][ T30] audit: type=1400 audit(525.950:610): avc: denied { prog_run } for pid=3978 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 528.484987][ T30] audit: type=1400 audit(527.890:611): avc: denied { ioctl } for pid=3985 comm="syz.0.201" path="socket:[4983]" dev="sockfs" ino=4983 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 529.188274][ T30] audit: type=1326 audit(528.590:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.205269][ T30] audit: type=1326 audit(528.610:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.245783][ T30] audit: type=1326 audit(528.630:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.246542][ T30] audit: type=1326 audit(528.640:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.247233][ T30] audit: type=1326 audit(528.640:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.247436][ T30] audit: type=1326 audit(528.640:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 529.276209][ T30] audit: type=1326 audit(528.680:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3987 comm="syz.1.202" exe="/syz-executor" sig=0 arch=c00000b7 syscall=167 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 530.234840][ T3994] netlink: 8 bytes leftover after parsing attributes in process `syz.1.205'. [ 530.261287][ T3994] netlink: 8 bytes leftover after parsing attributes in process `syz.1.205'. [ 530.475452][ T3994] Zero length message leads to an empty skb [ 531.562311][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 531.563844][ T30] audit: type=1400 audit(530.960:626): avc: denied { name_bind } for pid=3997 comm="syz.1.207" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 531.564309][ T30] audit: type=1400 audit(530.970:627): avc: denied { node_bind } for pid=3997 comm="syz.1.207" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 537.064389][ T30] audit: type=1400 audit(536.470:628): avc: denied { read } for pid=3988 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 537.970435][ T30] audit: type=1400 audit(537.370:629): avc: denied { create } for pid=4013 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 538.026456][ T30] audit: type=1400 audit(537.420:630): avc: denied { write } for pid=4013 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 538.035747][ T4014] netlink: 40 bytes leftover after parsing attributes in process `syz.1.214'. [ 541.540757][ T30] audit: type=1400 audit(540.930:631): avc: denied { read write } for pid=4020 comm="syz.1.218" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 541.556500][ T30] audit: type=1400 audit(540.950:632): avc: denied { open } for pid=4020 comm="syz.1.218" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 541.853697][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x4 [ 541.864323][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x2 [ 541.874047][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.878345][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.891206][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.895464][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.900588][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.905568][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.911872][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.916487][ T23] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 541.975982][ T23] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 545.971846][ T30] audit: type=1326 audit(545.370:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 545.995507][ T30] audit: type=1326 audit(545.400:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.021001][ T30] audit: type=1326 audit(545.420:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.024438][ T30] audit: type=1326 audit(545.430:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.045788][ T30] audit: type=1326 audit(545.450:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.056457][ T4029] fido_id[4029]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 546.083562][ T30] audit: type=1326 audit(545.480:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.085539][ T30] audit: type=1326 audit(545.480:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.161287][ T30] audit: type=1326 audit(545.550:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=55 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 546.211675][ T30] audit: type=1400 audit(545.570:641): avc: denied { setattr } for pid=4038 comm="syz.1.226" name="NETLINK" dev="sockfs" ino=5045 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 546.235790][ T30] audit: type=1326 audit(545.630:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.226" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 551.565055][ T4055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4055 comm=syz.1.232 [ 557.181095][ T4076] pim6reg1: entered promiscuous mode [ 557.181854][ T4076] pim6reg1: entered allmulticast mode [ 557.435528][ T4076] SELinux: policydb magic number 0x6572666b does not match expected magic number 0xf97cff8c [ 557.445037][ T4076] SELinux: failed to load policy [ 560.330346][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 560.331387][ T30] audit: type=1400 audit(559.730:647): avc: granted { setsecparam } for pid=4082 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 561.282193][ T30] audit: type=1400 audit(560.680:648): avc: denied { relabelto } for pid=4084 comm="syz.1.246" name="cgroup.controllers" dev="tmpfs" ino=778 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="@" [ 561.283473][ T30] audit: type=1400 audit(560.680:649): avc: denied { associate } for pid=4084 comm="syz.1.246" name="cgroup.controllers" dev="tmpfs" ino=778 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="@" [ 564.386541][ T30] audit: type=1400 audit(563.790:650): avc: denied { create } for pid=4093 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 564.441153][ T30] audit: type=1400 audit(563.840:651): avc: denied { write } for pid=4093 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 566.825958][ T4107] netlink: 4 bytes leftover after parsing attributes in process `syz.1.254'. [ 570.414151][ T30] audit: type=1326 audit(569.810:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.433762][ T30] audit: type=1326 audit(569.840:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.455011][ T30] audit: type=1326 audit(569.840:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.484718][ T30] audit: type=1326 audit(569.860:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.515088][ T30] audit: type=1326 audit(569.910:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=111 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.531374][ T30] audit: type=1326 audit(569.930:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 570.582122][ T30] audit: type=1326 audit(569.980:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4120 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 571.393561][ T4126] netlink: 24 bytes leftover after parsing attributes in process `syz.0.263'. [ 572.355216][ T30] audit: type=1400 audit(571.760:659): avc: denied { ioctl } for pid=4129 comm="syz.0.266" path="socket:[6210]" dev="sockfs" ino=6210 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 573.643575][ T4137] netlink: 12 bytes leftover after parsing attributes in process `syz.1.267'. [ 573.672656][ T4137] netlink: 4 bytes leftover after parsing attributes in process `syz.1.267'. [ 576.785006][ T30] audit: type=1326 audit(576.140:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.786017][ T30] audit: type=1326 audit(576.190:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.828651][ T30] audit: type=1326 audit(576.220:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.832688][ T30] audit: type=1326 audit(576.230:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.871059][ T30] audit: type=1326 audit(576.270:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.890571][ T30] audit: type=1326 audit(576.290:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.917578][ T30] audit: type=1326 audit(576.320:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.918646][ T30] audit: type=1326 audit(576.320:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.927720][ T30] audit: type=1326 audit(576.330:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 576.928160][ T30] audit: type=1326 audit(576.330:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4146 comm="syz.0.272" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 582.298597][ T4166] netlink: 4 bytes leftover after parsing attributes in process `syz.0.278'. [ 582.325971][ T4166] netlink: 12 bytes leftover after parsing attributes in process `syz.0.278'. [ 584.193852][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 584.209873][ T30] audit: type=1400 audit(583.600:678): avc: denied { lock } for pid=4170 comm="syz.0.280" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=6131 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 584.788475][ T30] audit: type=1326 audit(584.190:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.802302][ T30] audit: type=1326 audit(584.210:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.806550][ T30] audit: type=1326 audit(584.210:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.813882][ T30] audit: type=1326 audit(584.210:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.843423][ T30] audit: type=1326 audit(584.250:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.852340][ T30] audit: type=1326 audit(584.260:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.857222][ T30] audit: type=1326 audit(584.260:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.887058][ T30] audit: type=1326 audit(584.290:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=0 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 584.926847][ T30] audit: type=1326 audit(584.330:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4172 comm="syz.0.281" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 591.965102][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 591.971269][ T30] audit: type=1326 audit(591.360:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 591.981708][ T30] audit: type=1326 audit(591.360:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 591.982355][ T30] audit: type=1326 audit(591.380:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=203 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 591.982728][ T30] audit: type=1326 audit(591.380:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 591.983172][ T30] audit: type=1326 audit(591.380:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 591.983563][ T30] audit: type=1326 audit(591.390:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4182 comm="syz.1.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=269 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 612.936819][ T30] audit: type=1326 audit(612.340:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 612.957672][ T30] audit: type=1326 audit(612.360:707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 612.994522][ T30] audit: type=1326 audit(612.390:708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 612.995256][ T30] audit: type=1326 audit(612.390:709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 612.995733][ T30] audit: type=1326 audit(612.390:710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 613.011265][ T30] audit: type=1326 audit(612.410:711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 613.025197][ T30] audit: type=1326 audit(612.420:712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 613.053730][ T30] audit: type=1326 audit(612.440:713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 613.054707][ T30] audit: type=1326 audit(612.460:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 613.058353][ T30] audit: type=1326 audit(612.460:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4204 comm="syz.1.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 622.904353][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 622.905247][ T30] audit: type=1326 audit(622.310:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4215 comm="syz.1.296" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 622.905831][ T30] audit: type=1326 audit(622.310:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4215 comm="syz.1.296" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 622.936691][ T30] audit: type=1326 audit(622.330:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4215 comm="syz.1.296" exe="/syz-executor" sig=0 arch=c00000b7 syscall=448 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 622.954605][ T30] audit: type=1326 audit(622.350:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4215 comm="syz.1.296" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 622.973738][ T30] audit: type=1326 audit(622.380:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4215 comm="syz.1.296" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 628.999815][ T4230] syzkaller0: entered promiscuous mode [ 629.000548][ T4230] syzkaller0: entered allmulticast mode [ 629.176891][ T30] audit: type=1400 audit(628.580:725): avc: denied { getopt } for pid=4227 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 634.074048][ T30] audit: type=1326 audit(633.460:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.123029][ T30] audit: type=1326 audit(633.530:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.180106][ T30] audit: type=1326 audit(633.580:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.187815][ T30] audit: type=1326 audit(633.590:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.231975][ T30] audit: type=1326 audit(633.630:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.275970][ T30] audit: type=1326 audit(633.670:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.294604][ T30] audit: type=1326 audit(633.700:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.311993][ T30] audit: type=1326 audit(633.710:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.341591][ T30] audit: type=1326 audit(633.740:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.346078][ T30] audit: type=1326 audit(633.750:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.380628][ T30] audit: type=1326 audit(633.770:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=184 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 634.395963][ T30] audit: type=1326 audit(633.800:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 647.277039][ T4252] netlink: 24 bytes leftover after parsing attributes in process `syz.1.310'. [ 657.941051][ T4261] syz.1.313 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 659.674088][ T4271] netlink: 28 bytes leftover after parsing attributes in process `syz.0.316'. [ 659.684560][ T4271] netlink: 28 bytes leftover after parsing attributes in process `syz.0.316'. [ 669.285471][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 669.287615][ T30] audit: type=1400 audit(668.690:739): avc: denied { connect } for pid=4280 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 673.133773][ T4295] netlink: 4 bytes leftover after parsing attributes in process `syz.0.321'. [ 684.320332][ T30] audit: type=1326 audit(683.720:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.1.329" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 684.336974][ T30] audit: type=1326 audit(683.740:741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.1.329" exe="/syz-executor" sig=0 arch=c00000b7 syscall=440 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 684.374649][ T30] audit: type=1326 audit(683.740:742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4315 comm="syz.1.329" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 685.182702][ T4321] netlink: 'syz.1.331': attribute type 10 has an invalid length. [ 686.106407][ T30] audit: type=1326 audit(685.510:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4323 comm="syz.1.333" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 686.123429][ T30] audit: type=1326 audit(685.530:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4323 comm="syz.1.333" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 686.150044][ T30] audit: type=1326 audit(685.540:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4323 comm="syz.1.333" exe="/syz-executor" sig=0 arch=c00000b7 syscall=141 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 686.176061][ T30] audit: type=1326 audit(685.550:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4323 comm="syz.1.333" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 716.315927][ T30] audit: type=1326 audit(715.720:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4389 comm="syz.0.357" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 716.334801][ T30] audit: type=1326 audit(715.740:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4389 comm="syz.0.357" exe="/syz-executor" sig=0 arch=c00000b7 syscall=95 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 716.383934][ T30] audit: type=1326 audit(715.750:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4389 comm="syz.0.357" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 716.385104][ T30] audit: type=1326 audit(715.770:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4389 comm="syz.0.357" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8515c068 code=0x7ffc0000 [ 719.271546][ T30] audit: type=1400 audit(718.670:751): avc: denied { execute } for pid=4401 comm="syz.0.362" path="/150/memory.events" dev="tmpfs" ino=774 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 719.361440][ T4402] syz.0.362 uses obsolete (PF_INET,SOCK_PACKET) [ 719.523258][ T4402] netlink: 'syz.0.362': attribute type 10 has an invalid length. [ 721.633510][ T30] audit: type=1326 audit(721.030:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.681311][ T30] audit: type=1326 audit(721.070:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.704455][ T30] audit: type=1326 audit(721.110:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.738263][ T30] audit: type=1400 audit(721.140:755): avc: denied { read } for pid=4409 comm="syz.1.365" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 721.752523][ T30] audit: type=1400 audit(721.150:756): avc: denied { open } for pid=4409 comm="syz.1.365" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 721.762407][ T30] audit: type=1326 audit(721.170:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.774836][ T30] audit: type=1326 audit(721.180:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.783519][ T30] audit: type=1400 audit(721.190:759): avc: denied { ioctl } for pid=4409 comm="syz.1.365" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 721.808222][ T30] audit: type=1326 audit(721.210:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 721.830963][ T30] audit: type=1326 audit(721.220:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.1.365" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8e95c068 code=0x7ffc0000 [ 727.017941][ T4417] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 730.158786][ T4425] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 730.163000][ T4425] IPv6: NLM_F_CREATE should be set when creating new route [ 730.163921][ T4425] IPv6: NLM_F_CREATE should be set when creating new route [ 730.179694][ T4425] ------------[ cut here ]------------ [ 730.180450][ T4425] WARNING: CPU: 0 PID: 4425 at drivers/net/netdevsim/fib.c:831 nsim_fib_event_nb+0x89c/0xa6c [ 730.185979][ T4425] Modules linked in: [ 730.188515][ T4425] CPU: 0 UID: 0 PID: 4425 Comm: syz.0.370 Not tainted syzkaller #0 PREEMPT [ 730.190905][ T4425] Hardware name: linux,dummy-virt (DT) [ 730.191943][ T4425] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 730.192535][ T4425] pc : nsim_fib_event_nb+0x89c/0xa6c [ 730.193108][ T4425] lr : nsim_fib_event_nb+0x384/0xa6c [ 730.193583][ T4425] sp : ffff8000a0666e50 [ 730.193941][ T4425] x29: ffff8000a0666e50 x28: ffff00001ee3c100 x27: ffff8000a0667040 [ 730.194794][ T4425] x26: 0000000000000001 x25: dfff800000000000 x24: ffff0000204dc000 [ 730.195454][ T4425] x23: 0000000000000002 x22: ffff0000204dc000 x21: ffff0000120b1140 [ 730.196075][ T4425] x20: ffff00001ed22000 x19: 0000000000000001 x18: ffff80008d6274cc [ 730.196703][ T4425] x17: ffff8000870cef80 x16: ffff00006a0884c4 x15: ffff8000844e0bc8 [ 730.197340][ T4425] x14: ffff8000844e0ad0 x13: ffff800080045d78 x12: ffff600003376a06 [ 730.197986][ T4425] x11: 1fffe00003376a05 x10: ffff600003376a05 x9 : dfff800000000000 [ 730.198800][ T4425] x8 : ffff000019bb502f x7 : 0000000000000000 x6 : ffff600003376a05 [ 730.200234][ T4425] x5 : ffff000019bb502c x4 : ffff600003376a06 x3 : ffff0000204dc018 [ 730.201026][ T4425] x2 : ffff000019bb502c x1 : 0000000000000003 x0 : 0000000000000000 [ 730.202248][ T4425] Call trace: [ 730.202929][ T4425] nsim_fib_event_nb+0x89c/0xa6c (P) [ 730.203915][ T4425] notifier_call_chain+0x11c/0x49c [ 730.204370][ T4425] atomic_notifier_call_chain+0x70/0x134 [ 730.204766][ T4425] call_fib_notifiers+0x34/0x58 [ 730.205313][ T4425] call_fib6_notifiers+0x44/0x70 [ 730.205691][ T4425] call_fib6_multipath_entry_notifiers+0xcc/0x13c [ 730.206238][ T4425] ip6_route_multipath_add+0x6e4/0x11cc [ 730.206633][ T4425] inet6_rtm_newroute+0xc0/0x138 [ 730.206996][ T4425] rtnetlink_rcv_msg+0x65c/0x8d4 [ 730.207512][ T4425] netlink_rcv_skb+0x19c/0x338 [ 730.207964][ T4425] rtnetlink_rcv+0x18/0x24 [ 730.208338][ T4425] netlink_unicast+0x424/0x700 [ 730.208663][ T4425] netlink_sendmsg+0x644/0xa54 [ 730.209193][ T4425] __sock_sendmsg+0xc8/0x168 [ 730.209563][ T4425] ____sys_sendmsg+0x500/0x764 [ 730.210073][ T4425] ___sys_sendmsg+0x11c/0x19c [ 730.210431][ T4425] __sys_sendmsg+0x114/0x19c [ 730.210774][ T4425] __arm64_sys_sendmsg+0x70/0xa0 [ 730.211167][ T4425] invoke_syscall+0x6c/0x258 [ 730.211507][ T4425] el0_svc_common.constprop.0+0xac/0x230 [ 730.211877][ T4425] do_el0_svc+0x40/0x58 [ 730.212235][ T4425] el0_svc+0x50/0x1a0 [ 730.212557][ T4425] el0t_64_sync_handler+0xa0/0xe4 [ 730.212910][ T4425] el0t_64_sync+0x198/0x19c [ 730.213600][ T4425] irq event stamp: 1252 [ 730.213945][ T4425] hardirqs last enabled at (1251): [] _raw_spin_unlock_irqrestore+0x80/0xac [ 730.214527][ T4425] hardirqs last disabled at (1252): [] el1_brk64+0x1c/0x48 [ 730.214987][ T4425] softirqs last enabled at (1246): [] ip6_route_multipath_add+0x30c/0x11cc [ 730.215837][ T4425] softirqs last disabled at (1244): [] ip6_route_multipath_add+0x2ec/0x11cc [ 730.216777][ T4425] ---[ end trace 0000000000000000 ]--- [ 730.321479][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 730.322411][ T30] audit: type=1400 audit(729.670:774): avc: denied { write } for pid=3319 comm="syz-executor" path="pipe:[3459]" dev="pipefs" ino=3459 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 732.362806][ T1585] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 732.793188][ T1585] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.090869][ T1585] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 733.381325][ T1585] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 734.846687][ T30] audit: type=1400 audit(734.240:775): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 737.334093][ T1585] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 737.434590][ T1585] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 737.496041][ T1585] bond0 (unregistering): Released all slaves [ 737.805735][ T30] audit: type=1400 audit(737.210:776): avc: denied { search } for pid=3164 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.808474][ T30] audit: type=1400 audit(737.210:777): avc: denied { search } for pid=3164 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.818377][ T30] audit: type=1400 audit(737.220:778): avc: denied { search } for pid=3164 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.831533][ T30] audit: type=1400 audit(737.230:779): avc: denied { search } for pid=3164 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.832660][ T30] audit: type=1400 audit(737.230:780): avc: denied { search } for pid=3164 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.833138][ T30] audit: type=1400 audit(737.230:781): avc: denied { search } for pid=3164 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.833579][ T30] audit: type=1400 audit(737.230:782): avc: denied { read } for pid=3164 comm="dhcpcd" name="n18" dev="tmpfs" ino=1912 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 737.851242][ T30] audit: type=1400 audit(737.250:783): avc: denied { open } for pid=3164 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1912 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 737.861865][ T30] audit: type=1400 audit(737.260:784): avc: denied { getattr } for pid=3164 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1912 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 738.124047][ T1585] hsr_slave_0: left promiscuous mode [ 738.144940][ T1585] hsr_slave_1: left promiscuous mode [ 738.306082][ T1585] veth1_macvtap: left promiscuous mode [ 738.308670][ T1585] veth0_macvtap: left promiscuous mode [ 738.315864][ T1585] veth1_vlan: left promiscuous mode [ 738.318473][ T1585] veth0_vlan: left promiscuous mode [ 745.212931][ T30] audit: type=1400 audit(744.610:785): avc: denied { read open } for pid=4434 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 745.217599][ T30] audit: type=1400 audit(744.620:786): avc: denied { getattr } for pid=4434 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=553 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 745.325071][ T30] audit: type=1400 audit(744.730:787): avc: denied { add_name } for pid=4433 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 745.327015][ T30] audit: type=1400 audit(744.730:788): avc: denied { create } for pid=4433 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 745.335680][ T30] audit: type=1400 audit(744.740:789): avc: denied { write } for pid=4433 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1916 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 745.356452][ T30] audit: type=1400 audit(744.750:790): avc: denied { append } for pid=4433 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1916 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 746.408517][ T30] audit: type=1400 audit(745.810:791): avc: denied { remove_name } for pid=4436 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1916 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 746.410769][ T30] audit: type=1400 audit(745.810:792): avc: denied { unlink } for pid=4436 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1916 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 VM DIAGNOSIS: 17:20:06 Registers: info registers vcpu 0 CPU#0 PC=ffff800085422dec X00=ffff8000a0666580 X01=0000000000000002 X02=0000000000000000 X03=dfff800000000000 X04=0000000000000000 X05=1ffff000140cccb0 X06=0000000000000000 X07=ffff7000140ccc8e X08=0000000041b58ab3 X09=ffff8000a06663d4 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=00000000ffffffff X14=0000000000000001 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff80008d6274cc X19=ffff800086611451 X20=ffff8000a06667a8 X21=ffff8000a0666a38 X22=ffff8000a0666a40 X23=0000000000000000 X24=0000000000000403 X25=ffff8000a0666580 X26=0000000000000004 X27=ffff8000a06667de X28=0000000000000003 X29=ffff8000a06664d0 X30=ffff80008543141c SP=ffff8000a06664d0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffcbfc01a0:29dd48d5b3bffe00 Q02=0000ffffcbfc0180:ffffff80ffffffd8 Q03=0000ffffcbfc0230:0000ffffcbfc0230 Q04=0000ffffcbfc0230:0000ffff85137148 Q05=0000ffffcbfc0200:0000ffffcbfc0230 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcbfc0450:0000ffffcbfc0450 Q17=ffffff80ffffffd0:0000ffffcbfc0420 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000803ba234 X00=0000000000000001 X01=ffff0000176cdac0 X02=0000000000000000 X03=1fffe00002ed9b59 X04=0000000000000001 X05=1fffe0000d4181e2 X06=ffff60000d418208 X07=0000000000000001 X08=ffff00006a0c1045 X09=dfff800000000000 X10=ffff60000d418208 X11=1fffe0000d418208 X12=ffff60000d418209 X13=0000000000000000 X14=ffff00006a0af468 X15=ffff00006a0af054 X16=ffff80008d4f0000 X17=ffff7fffe2ff1000 X18=0000000000000000 X19=ffff8000871215e0 X20=1ffff00011a9ef4a X21=ffff8000870cff00 X22=ffff00006a0c0f20 X23=ffff80008544705c X24=ffff800087120000 X25=ffff800087120ae0 X26=ffff80008711e000 X27=ffff80008711e058 X28=ffff80008711e000 X29=ffff80008d4f78d0 X30=ffff8000803a6c5c SP=ffff80008d4f78d0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=7263206e65687720:7465732065622064 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=2074657320656220:646c756f68732045 Q06=207265766f746665:6c20736574796220 Q07=746120676e697372:6170207265746661 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd7690f50:0000ffffd7690f50 Q17=ffffff80ffffffd0:0000ffffd7690f20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000