last executing test programs: 16.061614642s ago: executing program 1 (id=351): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r0, 0x0, 0x1034}, 0x18) rt_sigaction(0x12, &(0x7f0000000240)={&(0x7f0000000000)="40395268c4c1b55f12fbc4411dc2159b00000006c4e11de0088fe9c0980fc4a281acae000000000f1f41326645df6d020f0f3ebf", 0x5, &(0x7f0000000200)="f3470f01d9f2440f5ac82e0f01f9dc6305c4a17c53510a450fc727c441fb5d9f1e4e135e66470f3a20bf3223333333c4015dfa38c481fe129931642b00"}, 0x0, 0x8, &(0x7f0000000280)) 14.949731656s ago: executing program 1 (id=354): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) 14.259708753s ago: executing program 1 (id=356): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) bind$can_raw(r0, &(0x7f00000005c0), 0x10) read(r0, &(0x7f00000027c0)=""/4073, 0xfe9) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000040)=0x2, 0x4) sendmsg$can_raw(r0, &(0x7f0000000240)={&(0x7f0000000780)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f00000007c0)=@can={{0x2, 0x0, 0x1, 0x1}, 0x1, 0x3f57955e7be81d83, 0x0, 0x0, "f97003b8750e5566"}, 0x10}}, 0x4000040) 13.048292491s ago: executing program 0 (id=357): r0 = socket(0x10, 0x803, 0x0) unshare(0x26020480) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x15, 0x5, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000001c0)={0x87e, 0xdc, 0xd1, 0xd, 0x101}, 0x14) getsockopt(r2, 0x200000000114, 0x271b, &(0x7f0000000580)=""/102389, &(0x7f0000000100)=0x18ff5) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000019600)={{0x14}, [@NFT_MSG_NEWRULE={0x38, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0xffff}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x1}]}], {0x14}}, 0x60}, 0x1, 0x0, 0x0, 0x2000094}, 0x20000005) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x48) dup(0xffffffffffffffff) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000003, 0x13, r4, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) 12.908919027s ago: executing program 1 (id=358): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x94) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(0x0, 0x1c100, 0x10) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) 12.250538543s ago: executing program 1 (id=359): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xb, &(0x7f0000000180)=ANY=[@ANYRES8=r1], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0xff, 0x0, 0x0, 0x0, 0x3}}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x100}) 10.894757117s ago: executing program 1 (id=360): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) 10.853328468s ago: executing program 32 (id=360): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) 7.771517911s ago: executing program 0 (id=361): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb=0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00'}, 0x18) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20000000) waitid(0x2, 0x0, 0x0, 0x8, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180300000000000000000000fa00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000542ff71e18d020e6002020702500000000002020205b1af8ff00000000bfa100000000000007070000f8ffffffb702000000000000b7030000000000008500000070000000e4f2b3467211d48120cde9bacac376b80c1916ba732ac6a795f85c00c7dd4698c45a19611ad5e2920e6360c8d027891c47d27422ac25028a4d6b737b45826fe1ef4f16dea061148e896a7e85f446b13674841b33890107dedf234335ee87db09ec05f1939fdfad43fc6f39fa11705574535f53e5e7a57174ab8f642ce1ee0ae6aa8dae4fece9673468023102eba04ddc68adfe9cd7a9946236", @ANYRES8=r4, @ANYRES64=r0, @ANYRES8=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x6d653bf3b72f4b87, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) pselect6(0x40, &(0x7f0000001f40)={0xc04, 0x3ff, 0x0, 0x2, 0xfffffffffffff000, 0x5, 0x2df0, 0x6}, &(0x7f0000001f80)={0x6, 0x98, 0x3, 0x1, 0x8, 0x9aa, 0x1, 0x992}, &(0x7f0000001fc0)={0x8, 0x4, 0xac0, 0x7, 0x6, 0x8, 0x2, 0x7ffffffd}, &(0x7f0000002000)={0x0, 0x989680}, &(0x7f0000002080)={&(0x7f0000002040)={[0x5]}, 0x8}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r6 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r6, &(0x7f0000000080), 0x10) close(r6) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xa6c3, 0x0) fcntl$setlease(r7, 0x400, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) socket$inet6(0xa, 0x805, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000540), 0x3c) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000040)=@gcm_256={{0x304, 0x36}, "1a88ef816c4b42ed", "a5fdeb69a751e94df50ad7e9fb434d1665e9298b01e49419567b443803cf578f", "6d02cd81", "066580001e00"}, 0x38) setsockopt$inet6_tcp_int(r8, 0x11a, 0x4, &(0x7f0000000000), 0x4) 5.766239881s ago: executing program 0 (id=362): r0 = socket$kcm(0x10, 0x2, 0x0) setitimer(0x2, &(0x7f0000000580)={{0x77359400}, {0x0, 0xea60}}, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffffff}, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="2e0000001000818807b62aa73f72cc9f0ba1f8483a0000005e120602000300000e000a0010000000028000001294", 0x2e}], 0x1}, 0x20008800) 3.093163567s ago: executing program 0 (id=363): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1\x00', 0x94) mount$fuse(0x0, 0x0, 0x0, 0xfc5cd7921c2c19c4, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f0000000080)='./file1\x00') r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r0, 0x0) setpgid(0x0, r0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(0x0, 0x1c100, 0x10) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) 1.709162652s ago: executing program 0 (id=365): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4048000}, 0x44450) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0b0400000000000000000200000054000480500001800a0001006d6174636800000040000280080002400000000124000300d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d5324520e000100636f6e6e6c696d69740000000900010073797a30000000000900020073797a32"], 0xa8}}, 0x4048010) 19.158469ms ago: executing program 0 (id=366): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000030601a9d5d5c50000000000000000000500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 0s ago: executing program 33 (id=366): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000030601a9d5d5c50000000000000000000500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:14637' (ED25519) to the list of known hosts. [ 207.061816][ T30] audit: type=1400 audit(206.530:46): avc: denied { name_bind } for pid=3312 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 207.697824][ T30] audit: type=1400 audit(207.170:47): avc: denied { execute } for pid=3313 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 207.714931][ T30] audit: type=1400 audit(207.180:48): avc: denied { execute_no_trans } for pid=3313 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 214.930989][ T30] audit: type=1400 audit(214.400:49): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 214.949924][ T30] audit: type=1400 audit(214.420:50): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 215.033654][ T3313] cgroup: Unknown subsys name 'net' [ 215.069391][ T30] audit: type=1400 audit(214.540:51): avc: denied { unmount } for pid=3313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 215.377246][ T3313] cgroup: Unknown subsys name 'cpuset' [ 215.443289][ T3313] cgroup: Unknown subsys name 'rlimit' [ 215.761000][ T30] audit: type=1400 audit(215.230:52): avc: denied { setattr } for pid=3313 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 215.764767][ T30] audit: type=1400 audit(215.230:53): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 215.769644][ T30] audit: type=1400 audit(215.230:54): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 216.542634][ T3315] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 216.551429][ T30] audit: type=1400 audit(216.020:55): avc: denied { relabelto } for pid=3315 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 216.556921][ T30] audit: type=1400 audit(216.030:56): avc: denied { write } for pid=3315 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 216.710230][ T30] audit: type=1400 audit(216.180:57): avc: denied { read } for pid=3313 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 216.715314][ T30] audit: type=1400 audit(216.190:58): avc: denied { open } for pid=3313 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 216.740611][ T3313] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 230.970690][ T30] audit: type=1400 audit(230.440:59): avc: denied { execmem } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 231.069967][ T30] audit: type=1400 audit(230.540:60): avc: denied { read } for pid=3318 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 231.070877][ T30] audit: type=1400 audit(230.540:61): avc: denied { open } for pid=3318 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 231.076387][ T30] audit: type=1400 audit(230.550:62): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 231.116629][ T30] audit: type=1400 audit(230.590:63): avc: denied { module_request } for pid=3318 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 231.334695][ T30] audit: type=1400 audit(230.810:64): avc: denied { sys_module } for pid=3319 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 239.447300][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.492163][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.527651][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.555967][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.828146][ T3319] hsr_slave_0: entered promiscuous mode [ 242.843825][ T3319] hsr_slave_1: entered promiscuous mode [ 243.218310][ T3318] hsr_slave_0: entered promiscuous mode [ 243.224474][ T3318] hsr_slave_1: entered promiscuous mode [ 243.235795][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 243.237105][ T3318] Cannot create hsr debugfs directory [ 245.513744][ T30] audit: type=1400 audit(244.990:65): avc: denied { create } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.526907][ T30] audit: type=1400 audit(245.000:66): avc: denied { write } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.538570][ T30] audit: type=1400 audit(245.010:67): avc: denied { read } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.590769][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 245.767390][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 245.805042][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 245.886054][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 246.355257][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 246.491190][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 246.625258][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 246.672000][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 249.277458][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.099920][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.397378][ T3319] veth0_vlan: entered promiscuous mode [ 261.568092][ T3319] veth1_vlan: entered promiscuous mode [ 262.024457][ T3319] veth0_macvtap: entered promiscuous mode [ 262.164584][ T3319] veth1_macvtap: entered promiscuous mode [ 262.751921][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.755749][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.855993][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.936038][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.604916][ T30] audit: type=1400 audit(263.080:68): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 263.626981][ T30] audit: type=1400 audit(263.100:69): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.YUqhw2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 263.645248][ T30] audit: type=1400 audit(263.120:70): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 263.682479][ T30] audit: type=1400 audit(263.150:71): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.YUqhw2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 263.695680][ T30] audit: type=1400 audit(263.170:72): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.YUqhw2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4153 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 263.766911][ T30] audit: type=1400 audit(263.240:73): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 263.809961][ T30] audit: type=1400 audit(263.270:74): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 263.810945][ T30] audit: type=1400 audit(263.290:75): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="gadgetfs" ino=4154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 263.846539][ T30] audit: type=1400 audit(263.320:76): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 263.874235][ T30] audit: type=1400 audit(263.340:77): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 264.206024][ T3318] veth0_vlan: entered promiscuous mode [ 264.243510][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 264.361635][ T3318] veth1_vlan: entered promiscuous mode [ 264.961153][ T3318] veth0_macvtap: entered promiscuous mode [ 265.032011][ T3318] veth1_macvtap: entered promiscuous mode [ 265.576172][ T120] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.600021][ T120] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.601892][ T120] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.613637][ T120] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 269.384707][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 269.391553][ T30] audit: type=1326 audit(268.850:91): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 269.392731][ T30] audit: type=1326 audit(268.860:92): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 269.421155][ T30] audit: type=1326 audit(268.890:93): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 269.430128][ T30] audit: type=1326 audit(268.900:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=1 ip=0x132280 code=0x7ffc0000 [ 269.441243][ T30] audit: type=1326 audit(268.910:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 269.455865][ T30] audit: type=1326 audit(268.920:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 269.464957][ T30] audit: type=1326 audit(268.940:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 269.490704][ T30] audit: type=1326 audit(268.960:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 269.491721][ T30] audit: type=1326 audit(268.960:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=335 compat=1 ip=0x132280 code=0x7ffc0000 [ 269.492071][ T30] audit: type=1326 audit(268.960:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.3" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 275.425223][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 275.426882][ T30] audit: type=1400 audit(274.900:105): avc: denied { create } for pid=3484 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 275.443398][ T30] audit: type=1326 audit(274.900:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 275.447853][ T30] audit: type=1326 audit(274.920:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 275.461002][ T30] audit: type=1326 audit(274.930:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 275.467347][ T30] audit: type=1326 audit(274.940:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=355 compat=1 ip=0x132280 code=0x7ffc0000 [ 275.481327][ T30] audit: type=1400 audit(274.960:109): avc: denied { write } for pid=3484 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 275.522224][ T30] audit: type=1326 audit(275.000:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 275.525386][ T30] audit: type=1326 audit(275.000:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3485 comm="syz.1.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 277.720092][ T30] audit: type=1400 audit(277.190:112): avc: denied { ioctl } for pid=3493 comm="syz.1.14" path="socket:[4251]" dev="sockfs" ino=4251 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 277.721569][ T30] audit: type=1400 audit(277.190:113): avc: denied { bind } for pid=3493 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.861440][ T3499] smc: net device bond0 applied user defined pnetid SYZ0 [ 278.921368][ T3499] smc: net device bond0 erased user defined pnetid SYZ0 [ 290.000023][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 290.000583][ T30] audit: type=1400 audit(289.470:119): avc: denied { read } for pid=3526 comm="syz.1.27" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 290.000812][ T30] audit: type=1400 audit(289.470:120): avc: denied { open } for pid=3526 comm="syz.1.27" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 290.022780][ T30] audit: type=1400 audit(289.490:121): avc: denied { ioctl } for pid=3526 comm="syz.1.27" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 290.406138][ T30] audit: type=1400 audit(289.880:122): avc: denied { read } for pid=3528 comm="syz.1.28" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 290.415216][ T30] audit: type=1400 audit(289.890:123): avc: denied { open } for pid=3528 comm="syz.1.28" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 290.425228][ T30] audit: type=1400 audit(289.900:124): avc: denied { ioctl } for pid=3528 comm="syz.1.28" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 291.313048][ T30] audit: type=1400 audit(290.790:125): avc: denied { read write } for pid=3532 comm="syz.1.30" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 291.335909][ T30] audit: type=1400 audit(290.810:126): avc: denied { open } for pid=3532 comm="syz.1.30" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 292.138267][ T30] audit: type=1400 audit(291.610:127): avc: denied { create } for pid=3535 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.160655][ T30] audit: type=1400 audit(291.620:128): avc: denied { setopt } for pid=3535 comm="syz.1.31" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 295.296917][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 295.298188][ T30] audit: type=1400 audit(294.770:130): avc: denied { create } for pid=3544 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 295.391382][ T30] audit: type=1400 audit(294.870:131): avc: denied { setopt } for pid=3544 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 296.106860][ T3550] netlink: 96 bytes leftover after parsing attributes in process `syz.0.37'. [ 297.054654][ T30] audit: type=1400 audit(296.530:132): avc: denied { append } for pid=3554 comm="syz.1.40" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 298.346915][ T30] audit: type=1400 audit(297.820:133): avc: denied { create } for pid=3560 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.352174][ T30] audit: type=1400 audit(297.820:134): avc: denied { ioctl } for pid=3560 comm="syz.1.43" path="socket:[4344]" dev="sockfs" ino=4344 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 298.677327][ T30] audit: type=1400 audit(298.150:135): avc: denied { sqpoll } for pid=3561 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 298.944595][ T30] audit: type=1400 audit(298.420:136): avc: denied { write } for pid=3560 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 299.449819][ T3568] netlink: 28 bytes leftover after parsing attributes in process `syz.0.45'. [ 299.450199][ T3568] netlink: 28 bytes leftover after parsing attributes in process `syz.0.45'. [ 308.232172][ T30] audit: type=1400 audit(307.710:137): avc: denied { create } for pid=3598 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 308.545849][ T3599] netlink: 4 bytes leftover after parsing attributes in process `syz.1.57'. [ 310.080108][ T30] audit: type=1400 audit(309.550:138): avc: denied { create } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.145162][ T30] audit: type=1400 audit(309.620:139): avc: denied { bind } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.192259][ T30] audit: type=1400 audit(309.670:140): avc: denied { listen } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.254165][ T30] audit: type=1400 audit(309.730:141): avc: denied { connect } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.415205][ T30] audit: type=1400 audit(309.890:142): avc: denied { setopt } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.513793][ T30] audit: type=1400 audit(309.990:143): avc: denied { accept } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 310.561880][ T30] audit: type=1400 audit(310.030:144): avc: denied { read } for pid=3607 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 311.075484][ T30] audit: type=1400 audit(310.550:145): avc: denied { block_suspend } for pid=3607 comm="syz.1.59" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 313.392164][ T30] audit: type=1400 audit(312.870:146): avc: denied { create } for pid=3622 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 313.491539][ T30] audit: type=1400 audit(312.930:147): avc: denied { write } for pid=3622 comm="syz.1.62" path="socket:[4401]" dev="sockfs" ino=4401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 316.701134][ T3631] netlink: 4 bytes leftover after parsing attributes in process `syz.0.65'. [ 317.171484][ T30] audit: type=1400 audit(316.640:148): avc: denied { mount } for pid=3634 comm="syz.0.67" name="/" dev="ramfs" ino=5145 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 318.243567][ T3637] syzkaller0: entered promiscuous mode [ 318.244214][ T3637] syzkaller0: entered allmulticast mode [ 318.254935][ T30] audit: type=1400 audit(317.720:149): avc: denied { ioctl } for pid=3635 comm="syz.1.68" path="socket:[4410]" dev="sockfs" ino=4410 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 319.451852][ T3644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3644 comm=syz.1.70 [ 321.681063][ T30] audit: type=1400 audit(321.150:150): avc: denied { kexec_image_load } for pid=3651 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 324.364381][ T30] audit: type=1400 audit(323.840:151): avc: denied { create } for pid=3661 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 324.380654][ T30] audit: type=1400 audit(323.850:152): avc: denied { write } for pid=3661 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 330.077601][ T3680] netlink: 96 bytes leftover after parsing attributes in process `syz.1.84'. [ 330.141287][ T30] audit: type=1400 audit(329.620:153): avc: denied { create } for pid=3679 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 330.152472][ T30] audit: type=1400 audit(329.630:154): avc: denied { write } for pid=3679 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 333.867624][ T3691] ALSA: seq fatal error: cannot create timer (-19) [ 334.080385][ T3681] infiniband syz2: set active [ 334.083539][ T3681] infiniband syz2: added bond0 [ 334.132535][ T3681] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 334.287850][ T3681] infiniband syz2: Couldn't open port 1 [ 335.105774][ T3681] RDS/IB: syz2: added [ 335.157389][ T3681] smc: adding ib device syz2 with port count 1 [ 335.167443][ T3681] smc: ib device syz2 port 1 has pnetid [ 346.501335][ T3722] capability: warning: `syz.0.102' uses deprecated v2 capabilities in a way that may be insecure [ 346.563115][ T30] audit: type=1401 audit(346.040:155): op=setxattr invalid_context="" [ 347.705910][ T3730] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3730 comm=syz.1.105 [ 349.021453][ T30] audit: type=1400 audit(348.490:156): avc: denied { ioctl } for pid=3737 comm="syz.0.108" path="socket:[5301]" dev="sockfs" ino=5301 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 353.110780][ T3758] netlink: 'syz.1.114': attribute type 13 has an invalid length. [ 353.263382][ T3758] gretap0: refused to change device tx_queue_len [ 353.300879][ T3758] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 353.425164][ T30] audit: type=1326 audit(352.900:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 353.457306][ T30] audit: type=1326 audit(352.920:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 353.475481][ T30] audit: type=1326 audit(352.950:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 353.486384][ T30] audit: type=1326 audit(352.960:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=229 compat=1 ip=0x132280 code=0x7ffc0000 [ 353.491073][ T30] audit: type=1326 audit(352.960:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 353.498121][ T30] audit: type=1326 audit(352.960:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 361.711950][ T30] audit: type=1400 audit(361.180:163): avc: denied { mounton } for pid=3783 comm="syz.1.125" path="/74/file0" dev="tmpfs" ino=394 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 361.721145][ T30] audit: type=1400 audit(361.190:164): avc: denied { remount } for pid=3783 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 364.044484][ T30] audit: type=1326 audit(363.520:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 364.050288][ T30] audit: type=1326 audit(363.520:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 364.082637][ T30] audit: type=1326 audit(363.560:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 364.125706][ T30] audit: type=1326 audit(363.600:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 364.162721][ T30] audit: type=1326 audit(363.640:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 364.180337][ T30] audit: type=1326 audit(363.650:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 364.194560][ T30] audit: type=1326 audit(363.660:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 364.280980][ T30] audit: type=1326 audit(363.740:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3787 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 367.666597][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 367.672795][ T30] audit: type=1400 audit(367.140:178): avc: denied { connect } for pid=3803 comm="syz.0.134" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 367.692178][ T30] audit: type=1400 audit(367.170:179): avc: denied { ioctl } for pid=3803 comm="syz.0.134" path="socket:[4686]" dev="sockfs" ino=4686 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 369.925074][ T30] audit: type=1400 audit(369.400:180): avc: denied { relabelfrom } for pid=3811 comm="syz.1.138" name="" dev="pipefs" ino=4703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 369.925303][ T3812] SELinux: Context system_u:object_r:var_lib_t:s0 is not valid (left unmapped). [ 369.935173][ T30] audit: type=1400 audit(369.400:181): avc: denied { relabelto } for pid=3811 comm="syz.1.138" name="" dev="pipefs" ino=4703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:var_lib_t:s0" [ 372.329944][ T30] audit: type=1400 audit(371.800:182): avc: denied { create } for pid=3817 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 372.345082][ T30] audit: type=1400 audit(371.820:183): avc: denied { bind } for pid=3817 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 372.389936][ T30] audit: type=1400 audit(371.860:184): avc: denied { write } for pid=3817 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 374.407874][ T3824] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 374.467051][ T3824] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 375.886528][ T30] audit: type=1400 audit(375.360:185): avc: denied { write } for pid=3807 comm="syz.0.136" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 378.164558][ T3838] autofs: Unknown parameter '0x0000000000000000' [ 378.890771][ T30] audit: type=1400 audit(378.350:186): avc: denied { write } for pid=3840 comm="syz.1.151" name="ip6_mr_cache" dev="proc" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 379.838480][ T30] audit: type=1400 audit(379.310:187): avc: denied { create } for pid=3842 comm="syz.1.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 382.049888][ T30] audit: type=1400 audit(381.520:188): avc: denied { execute } for pid=3852 comm="syz.1.153" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 382.085007][ T3853] process 'syz.1.153' launched '/dev/fd/3' with NULL argv: empty string added [ 382.102774][ T30] audit: type=1400 audit(381.560:189): avc: denied { execute_no_trans } for pid=3852 comm="syz.1.153" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 383.544075][ T3857] autofs: Unknown parameter '0x0000000000000000' [ 389.483216][ T3868] autofs: Unknown parameter '0x0000000000000000' [ 392.212139][ T3877] syz.1.164 uses obsolete (PF_INET,SOCK_PACKET) [ 392.945504][ T3879] autofs: Unknown parameter '0x0000000000000000' [ 395.119257][ T30] audit: type=1326 audit(394.590:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 395.137211][ T30] audit: type=1326 audit(394.610:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 395.148408][ T30] audit: type=1326 audit(394.620:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 395.151538][ T30] audit: type=1326 audit(394.630:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=389 compat=1 ip=0x132280 code=0x7ffc0000 [ 395.167610][ T30] audit: type=1326 audit(394.640:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 395.194443][ T30] audit: type=1326 audit(394.650:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3887 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 396.299910][ T30] audit: type=1326 audit(395.750:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3891 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 396.300917][ T30] audit: type=1326 audit(395.770:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3891 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 396.312421][ T30] audit: type=1326 audit(395.790:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3891 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 396.313439][ T30] audit: type=1326 audit(395.790:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3891 comm="syz.1.171" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 397.437137][ T3898] netlink: 'syz.0.174': attribute type 10 has an invalid length. [ 397.442850][ T3898] netlink: 40 bytes leftover after parsing attributes in process `syz.0.174'. [ 397.445087][ T3898] vxcan0: entered promiscuous mode [ 400.574566][ T3920] netlink: 24 bytes leftover after parsing attributes in process `syz.0.184'. [ 401.151253][ T3920] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3920 comm=syz.0.184 [ 401.393514][ T3925] pimreg: entered allmulticast mode [ 401.915506][ T30] kauditd_printk_skb: 66 callbacks suppressed [ 401.916438][ T30] audit: type=1326 audit(401.390:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 401.954729][ T30] audit: type=1326 audit(401.390:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 401.966479][ T30] audit: type=1326 audit(401.440:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 401.976074][ T30] audit: type=1326 audit(401.450:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 401.985806][ T30] audit: type=1326 audit(401.450:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x132280 code=0x7ffc0000 [ 401.993228][ T30] audit: type=1326 audit(401.460:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 402.001912][ T30] audit: type=1326 audit(401.470:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 402.009514][ T30] audit: type=1326 audit(401.480:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 402.019619][ T30] audit: type=1326 audit(401.490:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 402.020570][ T30] audit: type=1326 audit(401.490:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3926 comm="syz.0.187" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 402.283096][ T3929] autofs: Unknown parameter '0x0000000000000000' [ 408.488421][ T30] kauditd_printk_skb: 61 callbacks suppressed [ 408.494607][ T30] audit: type=1400 audit(407.960:337): avc: denied { create } for pid=3948 comm=ACED scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 408.932924][ T30] audit: type=1326 audit(408.410:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 408.935884][ T30] audit: type=1326 audit(408.410:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 408.951310][ T30] audit: type=1326 audit(408.430:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 408.955713][ T30] audit: type=1326 audit(408.430:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=300 compat=1 ip=0x132280 code=0x7ffc0000 [ 408.960231][ T30] audit: type=1326 audit(408.430:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 408.963875][ T30] audit: type=1326 audit(408.430:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3951 comm="syz.0.196" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 414.655309][ T3959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 414.658580][ T3959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 416.147278][ T30] audit: type=1400 audit(415.620:344): avc: denied { append } for pid=3964 comm="syz.1.202" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 417.537265][ T3973] sch_tbf: peakrate 64 is lower than or equals to rate 17038211371681383082 ! [ 418.463725][ T30] audit: type=1400 audit(417.940:345): avc: denied { create } for pid=3976 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 418.489692][ T30] audit: type=1400 audit(417.960:346): avc: denied { setopt } for pid=3976 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 418.516700][ T30] audit: type=1400 audit(417.990:347): avc: denied { connect } for pid=3976 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 422.926687][ T30] audit: type=1326 audit(422.400:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 422.976225][ T30] audit: type=1326 audit(422.450:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 422.994710][ T30] audit: type=1326 audit(422.470:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 423.063626][ T30] audit: type=1326 audit(422.520:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=274 compat=1 ip=0x132280 code=0x7ffc0000 [ 423.087851][ T30] audit: type=1326 audit(422.560:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 423.123981][ T30] audit: type=1326 audit(422.600:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 423.168275][ T30] audit: type=1326 audit(422.640:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3980 comm="syz.1.210" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 425.384043][ T30] audit: type=1400 audit(424.860:355): avc: denied { bind } for pid=4001 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 425.413282][ T30] audit: type=1400 audit(424.880:356): avc: denied { setopt } for pid=4001 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 426.581581][ T30] audit: type=1400 audit(426.040:357): avc: denied { node_bind } for pid=4007 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 430.512506][ T4027] netlink: 8 bytes leftover after parsing attributes in process `syz.0.223'. [ 430.513795][ T4027] netlink: 8 bytes leftover after parsing attributes in process `syz.0.223'. [ 435.434865][ T30] audit: type=1400 audit(434.910:358): avc: denied { create } for pid=4059 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 435.490350][ T30] audit: type=1400 audit(434.960:359): avc: denied { write } for pid=4059 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 435.492050][ T30] audit: type=1400 audit(434.960:360): avc: denied { nlmsg_write } for pid=4059 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 435.512442][ T30] audit: type=1400 audit(434.990:361): avc: denied { bind } for pid=4059 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 437.052242][ T30] audit: type=1326 audit(436.520:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 437.053260][ T30] audit: type=1326 audit(436.520:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 437.054116][ T30] audit: type=1326 audit(436.520:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 437.054606][ T30] audit: type=1326 audit(436.530:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 437.060040][ T30] audit: type=1326 audit(436.530:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 437.092183][ T30] audit: type=1326 audit(436.570:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4068 comm="syz.1.242" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 437.995695][ T4075] netlink: 'syz.1.244': attribute type 4 has an invalid length. [ 438.225755][ T4075] netlink: 'syz.1.244': attribute type 4 has an invalid length. [ 440.785209][ T30] kauditd_printk_skb: 62 callbacks suppressed [ 440.795938][ T30] audit: type=1400 audit(440.260:430): avc: denied { map_create } for pid=4087 comm="syz.0.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 440.800256][ T30] audit: type=1400 audit(440.260:431): avc: denied { map_read map_write } for pid=4087 comm="syz.0.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 440.865236][ T30] audit: type=1326 audit(440.340:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 440.870448][ T30] audit: type=1326 audit(440.340:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 440.876429][ T30] audit: type=1326 audit(440.350:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 440.883661][ T30] audit: type=1326 audit(440.360:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=1 ip=0x132280 code=0x7ffc0000 [ 440.902627][ T30] audit: type=1326 audit(440.360:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 440.906573][ T30] audit: type=1326 audit(440.380:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 440.924958][ T30] audit: type=1326 audit(440.400:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.250" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 442.365738][ T30] audit: type=1400 audit(441.830:439): avc: denied { read } for pid=4091 comm="syz.0.252" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 444.632490][ T4098] netlink: 96 bytes leftover after parsing attributes in process `syz.0.255'. [ 446.667203][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 446.668113][ T30] audit: type=1400 audit(446.130:447): avc: denied { read } for pid=4099 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 448.122747][ T30] audit: type=1326 audit(447.590:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 448.254005][ T30] audit: type=1326 audit(447.680:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 448.340448][ T30] audit: type=1326 audit(447.810:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 448.366872][ T30] audit: type=1326 audit(447.840:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 448.378081][ T30] audit: type=1326 audit(447.850:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=1 ip=0x132280 code=0x7ffc0000 [ 448.456203][ T30] audit: type=1326 audit(447.880:453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 448.456802][ T30] audit: type=1326 audit(447.930:454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 448.457203][ T30] audit: type=1326 audit(447.930:455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 448.471661][ T30] audit: type=1326 audit(447.950:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4107 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 449.013859][ T4113] netlink: 176 bytes leftover after parsing attributes in process `syz.1.261'. [ 450.496168][ T4118] netlink: 4 bytes leftover after parsing attributes in process `syz.0.263'. [ 450.524603][ T4118] netlink: 4 bytes leftover after parsing attributes in process `syz.0.263'. [ 452.986895][ T30] kauditd_printk_skb: 125 callbacks suppressed [ 452.987331][ T30] audit: type=1400 audit(452.460:582): avc: denied { name_bind } for pid=4127 comm="syz.0.268" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 452.997445][ T30] audit: type=1400 audit(452.470:583): avc: denied { node_bind } for pid=4127 comm="syz.0.268" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 453.835622][ T30] audit: type=1400 audit(453.310:584): avc: denied { bind } for pid=4131 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 453.847789][ T30] audit: type=1400 audit(453.320:585): avc: denied { setopt } for pid=4131 comm="syz.0.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 454.726460][ T4136] netlink: 12 bytes leftover after parsing attributes in process `syz.0.272'. [ 454.731095][ T4136] netlink: 28 bytes leftover after parsing attributes in process `syz.0.272'. [ 457.904745][ T30] audit: type=1400 audit(457.360:586): avc: denied { prog_run } for pid=4149 comm="syz.1.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 458.286603][ T30] audit: type=1400 audit(457.760:587): avc: denied { read write } for pid=4151 comm="syz.0.278" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 458.296980][ T30] audit: type=1400 audit(457.770:588): avc: denied { open } for pid=4151 comm="syz.0.278" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 458.360167][ T30] audit: type=1400 audit(457.830:589): avc: denied { ioctl } for pid=4151 comm="syz.0.278" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 458.820088][ T30] audit: type=1400 audit(458.290:590): avc: denied { setopt } for pid=4155 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 459.431942][ T3464] Process accounting resumed [ 460.095914][ T30] audit: type=1400 audit(459.570:591): avc: denied { load_policy } for pid=4162 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 460.567018][ T4163] SELinux: failed to load policy [ 462.093967][ T30] audit: type=1400 audit(461.570:592): avc: denied { create } for pid=4172 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 462.185642][ T4173] netlink: 40 bytes leftover after parsing attributes in process `syz.0.288'. [ 465.036285][ T30] audit: type=1400 audit(464.510:593): avc: denied { create } for pid=4181 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 465.068099][ T30] audit: type=1400 audit(464.540:594): avc: denied { bind } for pid=4181 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 465.111945][ T30] audit: type=1400 audit(464.570:595): avc: denied { write } for pid=4181 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 468.621122][ T30] audit: type=1400 audit(468.100:596): avc: denied { ioctl } for pid=4189 comm="syz.0.295" path="socket:[6024]" dev="sockfs" ino=6024 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 469.183643][ T4192] netlink: 4 bytes leftover after parsing attributes in process `syz.0.295'. [ 469.210225][ T30] audit: type=1400 audit(468.680:597): avc: denied { sys_module } for pid=4189 comm="syz.0.295" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 471.127276][ T4200] netlink: 212 bytes leftover after parsing attributes in process `syz.0.298'. [ 475.497504][ T30] audit: type=1400 audit(474.970:598): avc: denied { create } for pid=4206 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 484.587144][ T30] audit: type=1400 audit(484.060:599): avc: denied { read write } for pid=4209 comm="syz.0.301" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 484.605581][ T30] audit: type=1400 audit(484.080:600): avc: denied { open } for pid=4209 comm="syz.0.301" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 484.661430][ T30] audit: type=1400 audit(484.130:601): avc: denied { ioctl } for pid=4209 comm="syz.0.301" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 484.817556][ T4216] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 484.822406][ T4216] SELinux: failed to load policy [ 485.141771][ T40] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 485.300469][ T40] usb 1-1: device descriptor read/64, error -71 [ 485.387010][ T30] audit: type=1400 audit(484.860:602): avc: denied { create } for pid=4218 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.400260][ T30] audit: type=1400 audit(484.880:603): avc: denied { setopt } for pid=4218 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.446029][ T30] audit: type=1400 audit(484.920:604): avc: denied { ioctl } for pid=4218 comm="syz.1.303" path="socket:[6069]" dev="sockfs" ino=6069 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.469624][ T30] audit: type=1400 audit(484.940:605): avc: denied { write } for pid=4218 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.589664][ T40] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 485.730653][ T40] usb 1-1: device descriptor read/64, error -71 [ 485.851908][ T40] usb usb1-port1: attempt power cycle [ 486.231839][ T40] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 486.383197][ T40] usb 1-1: device descriptor read/8, error -71 [ 486.650384][ T40] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 486.807233][ T40] usb 1-1: device descriptor read/8, error -71 [ 486.920644][ T40] usb usb1-port1: unable to enumerate USB device [ 493.990223][ T30] audit: type=1400 audit(493.460:606): avc: denied { bind } for pid=4237 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 494.010244][ T30] audit: type=1400 audit(493.480:607): avc: denied { write } for pid=4237 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 494.265231][ T30] audit: type=1400 audit(493.740:608): avc: denied { name_bind } for pid=4239 comm="syz.1.311" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 494.851371][ T30] audit: type=1326 audit(494.330:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 494.854107][ T30] audit: type=1326 audit(494.330:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 494.856845][ T30] audit: type=1326 audit(494.330:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 494.876911][ T30] audit: type=1326 audit(494.350:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 494.877324][ T30] audit: type=1326 audit(494.350:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 494.877694][ T30] audit: type=1326 audit(494.350:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 494.890307][ T30] audit: type=1326 audit(494.360:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4239 comm="syz.1.311" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 497.974330][ T4245] Zero length message leads to an empty skb [ 502.674262][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 502.675636][ T30] audit: type=1400 audit(502.150:623): avc: denied { create } for pid=4252 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 502.709457][ T30] audit: type=1400 audit(502.180:624): avc: denied { write } for pid=4252 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 504.855857][ T4258] syzkaller0: entered promiscuous mode [ 504.856758][ T4258] syzkaller0: entered allmulticast mode [ 504.971099][ T4258] sch_tbf: burst 127 is lower than device syzkaller0 mtu (1514) ! [ 505.817722][ T30] audit: type=1400 audit(505.290:625): avc: denied { create } for pid=4262 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 505.920357][ T30] audit: type=1400 audit(505.390:626): avc: denied { setopt } for pid=4262 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 506.212889][ T30] audit: type=1400 audit(505.690:627): avc: denied { mounton } for pid=4266 comm="syz.1.323" path="/188/file0" dev="tmpfs" ino=981 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 506.220490][ T30] audit: type=1400 audit(505.690:628): avc: denied { mount } for pid=4266 comm="syz.1.323" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 506.302636][ T30] audit: type=1400 audit(505.770:629): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 506.479967][ T30] audit: type=1400 audit(505.950:630): avc: denied { validate_trans } for pid=4268 comm="syz.1.324" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 508.585847][ T30] audit: type=1400 audit(508.060:631): avc: denied { create } for pid=4284 comm="syz.0.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 509.732096][ T30] audit: type=1400 audit(509.210:632): avc: denied { sqpoll } for pid=4289 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 511.134182][ T30] audit: type=1400 audit(510.610:633): avc: denied { read } for pid=4298 comm="syz.0.337" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 511.136497][ T30] audit: type=1400 audit(510.610:634): avc: denied { open } for pid=4298 comm="syz.0.337" path="net:[4026532691]" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 514.352034][ T30] audit: type=1400 audit(513.820:635): avc: denied { lock } for pid=4307 comm="syz.1.341" path="socket:[7243]" dev="sockfs" ino=7243 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 516.515595][ T30] audit: type=1400 audit(515.990:636): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 516.543798][ T30] audit: type=1400 audit(516.020:637): avc: denied { open } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 516.568024][ T30] audit: type=1400 audit(516.040:638): avc: denied { ioctl } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 516.633522][ T30] audit: type=1400 audit(516.100:639): avc: denied { sys_module } for pid=4311 comm="syz.1.342" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 516.661311][ T30] audit: type=1400 audit(516.110:640): avc: denied { write } for pid=4311 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 516.714923][ T30] audit: type=1400 audit(516.190:641): avc: denied { module_request } for pid=4311 comm="syz.1.342" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 516.723858][ T30] audit: type=1400 audit(516.200:642): avc: denied { create } for pid=4318 comm="syz.0.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 517.270452][ T30] audit: type=1400 audit(516.740:643): avc: denied { create } for pid=4321 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 517.287735][ T30] audit: type=1400 audit(516.760:644): avc: denied { setopt } for pid=4321 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 519.743842][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 519.744367][ T30] audit: type=1326 audit(519.220:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 519.744655][ T30] audit: type=1326 audit(519.220:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 519.744852][ T30] audit: type=1326 audit(519.220:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 519.774045][ T30] audit: type=1326 audit(519.250:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 519.777846][ T30] audit: type=1326 audit(519.250:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 519.795274][ T30] audit: type=1326 audit(519.260:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 519.796388][ T30] audit: type=1326 audit(519.270:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 519.796837][ T30] audit: type=1326 audit(519.270:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132280 code=0x7ffc0000 [ 519.848141][ T30] audit: type=1326 audit(519.320:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x7ffc0000 [ 519.871175][ T30] audit: type=1326 audit(519.330:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4337 comm="syz.1.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132280 code=0x7ffc0000 [ 523.007964][ T4355] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.407808][ T4355] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 523.896520][ T4355] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.233154][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.686144][ T4355] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.893828][ T30] kauditd_printk_skb: 33 callbacks suppressed [ 524.894710][ T30] audit: type=1400 audit(524.370:699): avc: denied { read } for pid=4360 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 524.902696][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.930232][ T30] audit: type=1400 audit(524.400:700): avc: denied { open } for pid=4360 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 524.954245][ T30] audit: type=1400 audit(524.430:701): avc: denied { mounton } for pid=4360 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 525.130161][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.462687][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 525.943817][ T120] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 526.194835][ T1102] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 526.622655][ T3990] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 527.236024][ T1102] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 527.341409][ T30] audit: type=1400 audit(526.800:702): avc: denied { read } for pid=3163 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 530.061697][ T4375] netlink: 'syz.0.362': attribute type 10 has an invalid length. [ 531.567910][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 531.656638][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 531.726891][ T12] bond0 (unregistering): Released all slaves [ 531.940845][ T4375] macvtap0: entered allmulticast mode [ 531.941783][ T4375] veth0_macvtap: entered allmulticast mode [ 532.099224][ T30] audit: type=1400 audit(531.570:703): avc: denied { search } for pid=3163 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.151307][ T30] audit: type=1400 audit(531.610:704): avc: denied { search } for pid=3163 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.152333][ T30] audit: type=1400 audit(531.610:705): avc: denied { search } for pid=3163 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.153010][ T30] audit: type=1400 audit(531.610:706): avc: denied { search } for pid=3163 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.153387][ T30] audit: type=1400 audit(531.610:707): avc: denied { search } for pid=3163 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.153822][ T30] audit: type=1400 audit(531.610:708): avc: denied { search } for pid=3163 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 532.154164][ T30] audit: type=1400 audit(531.610:709): avc: denied { read } for pid=3163 comm="dhcpcd" name="n18" dev="tmpfs" ino=2084 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 532.154622][ T30] audit: type=1400 audit(531.610:710): avc: denied { open } for pid=3163 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=2084 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 532.154949][ T30] audit: type=1400 audit(531.610:711): avc: denied { getattr } for pid=3163 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=2084 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 535.343145][ T30] audit: type=1400 audit(534.790:712): avc: denied { read open } for pid=4386 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=877 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 537.453378][ T12] hsr_slave_0: left promiscuous mode [ 537.477537][ T12] hsr_slave_1: left promiscuous mode [ 537.635566][ T12] veth1_macvtap: left promiscuous mode [ 537.645624][ T12] veth0_macvtap: left promiscuous mode [ 537.647911][ T12] veth1_vlan: left promiscuous mode [ 537.651420][ T12] veth0_vlan: left promiscuous mode [ 538.330012][ T12] pimreg (unregistering): left allmulticast mode [ 542.253012][ T3095] syz1: Port: 1 Link DOWN [ 544.074001][ T12] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 544.506042][ T12] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 544.783591][ T12] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 545.043224][ T12] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 550.867868][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 550.914262][ T120] smc: removing ib device syz2 [ 550.946574][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 551.007958][ T12] bond0 (unregistering): Released all slaves [ 559.695969][ T4360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 559.841446][ T4360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 561.700590][ T12] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 561.704592][ T12] ref_tracker: netdev@00000000f8cf7b77 has 1/1 users at [ 561.704592][ T12] ib_device_set_netdev+0x1cc/0x580 [ 561.704592][ T12] rxe_register_device+0x200/0x2b8 [ 561.704592][ T12] rxe_add+0xd60/0x10c8 [ 561.704592][ T12] rxe_net_add+0x9c/0xf4 [ 561.704592][ T12] rxe_newlink+0x58/0x14c [ 561.704592][ T12] nldev_newlink+0x280/0x4b4 [ 561.704592][ T12] rdma_nl_rcv_msg+0x274/0x56c [ 561.704592][ T12] rdma_nl_rcv_skb.constprop.0.isra.0+0x1f0/0x328 [ 561.704592][ T12] rdma_nl_rcv+0x10/0x1c [ 561.704592][ T12] netlink_unicast+0x424/0x700 [ 561.704592][ T12] netlink_sendmsg+0x644/0xa54 [ 561.704592][ T12] __sock_sendmsg+0xc8/0x168 [ 561.704592][ T12] ____sys_sendmsg+0x500/0x764 [ 561.704592][ T12] ___sys_sendmsg+0x11c/0x19c [ 561.704592][ T12] __sys_sendmsg+0x114/0x19c [ 561.704592][ T12] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 561.704592][ T12] [ 561.726554][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 561.727189][ T30] audit: type=1400 audit(561.200:720): avc: denied { read } for pid=3118 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 561.782286][ T30] audit: type=1400 audit(561.260:721): avc: denied { search } for pid=3118 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.786559][ T30] audit: type=1400 audit(561.260:722): avc: denied { search } for pid=3118 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.791333][ T30] audit: type=1400 audit(561.260:723): avc: denied { add_name } for pid=3118 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.794198][ T30] audit: type=1400 audit(561.270:724): avc: denied { create } for pid=3118 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.799967][ T30] audit: type=1400 audit(561.270:725): avc: denied { append open } for pid=3118 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.803601][ T30] audit: type=1400 audit(561.280:726): avc: denied { getattr } for pid=3118 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.829801][ T30] audit: type=1400 audit(561.300:727): avc: denied { write } for pid=3313 comm="syz-executor" path="pipe:[3323]" dev="pipefs" ino=3323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 565.411617][ T12] hsr_slave_0: left promiscuous mode [ 565.463007][ T12] hsr_slave_1: left promiscuous mode [ 565.661022][ T12] veth1_macvtap: left promiscuous mode [ 565.662559][ T12] veth0_macvtap: left allmulticast mode [ 565.665584][ T12] veth0_macvtap: left promiscuous mode [ 565.670355][ T12] veth1_vlan: left promiscuous mode [ 565.671739][ T12] veth0_vlan: left promiscuous mode [ 572.076625][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 572.131026][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 572.224432][ T12] bond0 (unregistering): Released all slaves [ 573.014426][ T12] bond0 (unregistering): Released all slaves VM DIAGNOSIS: 14:51:15 Registers: info registers vcpu 0 CPU#0 PC=ffff800085442580 X00=00000000000000c0 X01=ffff7fffe2fe0000 X02=0000000000000000 X03=1fffe00001c51b59 X04=000000003d4ba25f X05=0000000000008000 X06=ffff00000e28e5f0 X07=de35cb53879efced X08=0000000000000000 X09=ffff8000897e6000 X10=ffff00000e28e550 X11=0000000000000002 X12=0000000000000161 X13=0000000000008000 X14=0000000000000000 X15=0000000000000007 X16=ffff800081740c10 X17=ffff8000845906a8 X18=0000000000000000 X19=0000000000000001 X20=ffff00000e28e5f0 X21=ffff800087220c90 X22=0000000000000028 X23=ffff00000e28e550 X24=ffff8000870aa548 X25=00000000ffffffff X26=00000000000000c0 X27=ffff00000e28dac0 X28=ffff000018c43180 X29=ffff80008d5e7350 X30=ffff800085442560 SP=ffff80008d5e7350 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2e2e2e2e2e2e2e2e:2e2e2e2e2e2e2e2e Q01=8b35a5e6702fe600:7365697261646e6f Q02=00000000000000cc:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:0000000c00000000 Q06=0000ffffc78ae75e:0000ffffc78ae750 Q07=0000ffffc78ae779:0000ffffc78ae76b Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc789a010:0000ffffc789a010 Q17=ffffff80ffffffd0:0000ffffc7899fe0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008544367c X00=ffff8000871115e8 X01=0000000000000000 X02=0000000000000001 X03=0000000000000003 X04=1ffff000141aeed8 X05=ffff8000a0d775c8 X06=ffff8000a0d77690 X07=ffff8000a0d77740 X08=ffff8000a0d77618 X09=dfff800000000000 X10=ffff7000141aeec2 X11=1ffff000141aeec2 X12=ffff7000141aeec3 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000803f4fa0 X20=ffff8000a0d77590 X21=ffff000014b5bc80 X22=0000000000000000 X23=ffff8000808e2220 X24=00000000000000d0 X25=0000000000000cc0 X26=000000000000000f X27=ffff80008d3fada0 X28=fffffdffc0852180 X29=ffff8000a0d777e0 X30=ffff8000808e2220 SP=ffff8000a0d77900 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000